[go: up one dir, main page]

WO2013066077A1 - Procédé pour gérer plusieurs profils dans une carte uicc intégrée, carte uicc intégrée et terminal correspondant - Google Patents

Procédé pour gérer plusieurs profils dans une carte uicc intégrée, carte uicc intégrée et terminal correspondant Download PDF

Info

Publication number
WO2013066077A1
WO2013066077A1 PCT/KR2012/009129 KR2012009129W WO2013066077A1 WO 2013066077 A1 WO2013066077 A1 WO 2013066077A1 KR 2012009129 W KR2012009129 W KR 2012009129W WO 2013066077 A1 WO2013066077 A1 WO 2013066077A1
Authority
WO
WIPO (PCT)
Prior art keywords
profile
euicc
common
data
profiles
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/KR2012/009129
Other languages
English (en)
Korean (ko)
Inventor
이진형
윤여민
정윤필
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KT Corp
Original Assignee
KT Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by KT Corp filed Critical KT Corp
Priority to US14/356,089 priority Critical patent/US9414220B2/en
Priority claimed from KR1020120122793A external-priority patent/KR101996677B1/ko
Publication of WO2013066077A1 publication Critical patent/WO2013066077A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • the present invention relates to a technology for managing a plurality of profiles inside an embedded universal integrated circuit card (UIC) embedded in a terminal.
  • UICC embedded universal integrated circuit card
  • a UICC Universal Integrated Circuit Card
  • the UICC may store the personal information of the user and the operator information on the mobile communication provider to which the user subscribes.
  • the UICC may include an International Mobile Subscriber Identity (IMSI) for identifying a user.
  • IMSI International Mobile Subscriber Identity
  • the UICC is also called a Subscriber Identity Module (SIM) card in the case of the Global System for Mobile communications (GSM) scheme, and a Universal Subscriber Identity Module (USIM) card in the case of the Wideband Code Division Multiple Access (WCDMA) scheme.
  • SIM Subscriber Identity Module
  • GSM Global System for Mobile communications
  • USBMA Wideband Code Division Multiple Access
  • the user mounts the UICC on the user's terminal
  • the user is automatically authenticated using the information stored in the UICC so that the user can conveniently use the terminal.
  • the user replaces the terminal the user can easily replace the terminal by mounting the UICC removed from the existing terminal to a new terminal.
  • Terminals requiring miniaturization for example, terminals for machine-to-machine (M2M) communication, have difficulty in miniaturization of terminals when manufactured in a structure capable of detachable UICC.
  • M2M machine-to-machine
  • an embedded UICC hereinafter referred to as eUICC or eSIM
  • eUICC embedded UICC
  • eSIM embedded UICC
  • user information using the UICC should be recorded in IMSI format.
  • the existing UICC can be attached to or detached from the terminal, and the user can open the terminal regardless of the type of terminal or the mobile communication provider.
  • the manufactured terminal can be assigned an IMSI in the embedded UICC only when the premise that the terminal is used only for a specific mobile communication provider is satisfied.
  • Both mobile operators and terminal manufacturers ordering terminals have no choice but to pay attention to product inventory, which leads to a problem that product prices rise.
  • the user is inconvenient to change the mobile operator for the terminal. Therefore, even in the case of the built-in UICC, a method for allowing a user to open the terminal regardless of the mobile communication provider is required.
  • MNO's operational profiles are in application and data form, and may exist in multiple, but only one active operational profile may exist at a time. At this time, the rest becomes an Inactive Operational Profile. In this case, there is a potential disadvantage of two possible performance degradation factors.
  • An object of the present invention is to provide a method for efficiently managing a plurality of profiles in the eUICC.
  • Another object of the present invention is to provide a method for efficiently using a plurality of profiles in consideration of a case where a plurality of profiles can be stored in an eUICC.
  • Another object of the present invention when a plurality of profiles can be stored in the eUICC, by separately managing data (common data) commonly used by a plurality of profiles among the data available for each of a plurality of profiles, a plurality of profiles in the eUICC To manage your profile efficiently.
  • Another object of the present invention is to use a common profile (common data) as a kind of profile, in which a plurality of profiles can be stored in the eUICC, and commonly used by multiple profiles among data available for each of the plurality of profiles.
  • New definition to efficiently manage multiple profiles in the eUICC.
  • the present invention is an embedded Universal Integrated Circuit Card (eUICC) interworking with a mobile network operator (MNO) and embedded in a terminal, and a plurality of profiles in the form of one or more of applications and data are common.
  • eUICC embedded Universal Integrated Circuit Card
  • MNO mobile network operator
  • an eUICC characterized by storing a common profile having common data available.
  • the present invention is a method for interworking with a mobile network operator (MNO) and managing a profile in an embedded Universal Integrated Circuit Card (eUICC) embedded in a terminal, wherein the eUICC is an application and data.
  • MNO mobile network operator
  • eUICC embedded Universal Integrated Circuit Card
  • the present invention relates to a method of managing multiple profiles in an embedded universal integrated circuit card (eUICC) interworking with a mobile network operator (MNO) and embedded in a terminal, wherein the eUICC is an application and data.
  • eUICC embedded universal integrated circuit card
  • MNO mobile network operator
  • the present invention is a terminal for providing a communication service in conjunction with a mobile network operator (MNO), a common profile (Common) having a common data that can be commonly used by a plurality of profiles in the form of one or more of applications and data It provides a terminal characterized in that embedded embedded UICC (eUICC: storing a Profile).
  • MNO mobile network operator
  • Common profile Common profile
  • eUICC embedded embedded UICC
  • Figure 1 shows the overall service architecture including the eSIM (eUICC) to which the present invention is applied.
  • eSIM eUICC
  • FIG. 2 shows a system architecture of an SM separation environment to which the present invention may be applied.
  • FIG. 3 illustrates a case where two operational profiles are stored as an internal structure of a general eUICC.
  • FIG. 4 illustrates an eUICC internal structure when using a common operational profile, according to one embodiment of the invention.
  • FIG. 5 illustrates access control for a common operational profile according to an embodiment of the present invention.
  • 6 through 9 illustrate a process of storing or updating an operational profile in an eUICC according to an embodiment of the present invention.
  • FIG. 10 is a flowchart illustrating a plurality of profile management methods in an eUICC according to an embodiment of the present invention.
  • 11 is another flowchart of a method of managing a plurality of profiles in an eUICC according to an embodiment of the present invention.
  • M2M (Machine-to-Machine) terminal which is actively discussed in the current GSMA, should be small in size.
  • a module for attaching the UICC to the M2M terminal must be separately inserted. If the M2M terminal is manufactured, it is difficult to miniaturize the M2M terminal.
  • the eUICC mounted on the M2M terminal includes information on a mobile network operator (hereinafter referred to as “MNO”) that uses the UICC. It must be stored in the UICC in the form of an identifier (International Mobile Subscriber Identity, IMSI).
  • MNO mobile network operator
  • the terminal manufactured from the time of manufacturing the M2M terminal can be assigned IMSI in the eUICC only if the premise that the terminal is used only in a specific MNO is established, both the M2M terminal or the MNO ordering the UICC or the M2M manufacturer manufacturing the M2M terminal have a lot of attention to the product inventory. There is a problem that can not only be assigned to the product price will rise, which is a big obstacle to the expansion of M2M terminal.
  • the built-in SIM (hereinafter, referred to as eSIM or eUICC) that is integrally mounted on the terminal has many issues regarding the authority to open, additional service business initiative, and subscriber information security due to the physical structure difference.
  • eSIM the built-in SIM
  • the international standardization bodies of the GSMA and ETSI are conducting standardization activities on relevant elements such as operators, manufacturers, SIM vendors (Vendors), and other necessary elements, including top-level structures.
  • SM is at the center of issues as eSIM is discussed through standardization bodies, and issues an important profile (which can be called Operator Credential, MNO Credential, Profile, eUICC Profile, Profile Package, etc.) to eSIM and initiates the process of changing subscriptions. It refers to an entity or a function / role that plays an overall administrative role for eSIM, such as processing.
  • GSMA has proposed a structure that classifies SM into SM-DP (Data Preparation), which plays a role in generating operator information, and SM-SR (Secure Routing), which carries carrier information directly to eSIM. It does not mention the technical actual issuance method.
  • SM-DP Data Preparation
  • SM-SR Secure Routing
  • the present invention proposes a method for managing eSIM by utilizing dynamic encryption key (public key, etc.) generation in the SM role separation environment of GSMA.
  • eSIM attaches the IC chip on the terminal circuit board at the terminal manufacturing stage, and then attaches the SIM data (open information, additional service information, etc.) in software form to OTA (Over The Air) or offline (technology-based connection such as USB to PC). Is a new concept of SIM technology in the manner of issuing through.
  • IC chips used in eSIM generally support hardware-based Crypto Co-Processor (CCP) to provide hardware-based public key generation, and APIs that can be utilized in application (eg applet) based SIM platform (eg , Java Card Platform, etc.).
  • Java Card Platform Java Card Platform is one of the platforms that can provide services and load multiple applications, such as smart cards.
  • the SIM service management platform issues data to the SIM memory area through authentication and security with management keys.
  • the Global Platform and Remote File Management (RFM) and RAM (Remote Application Management) of ETSI TS 102.226 It is a standard technology of the service management platform.
  • eSIM is responsible for issuing communication and additional service data remotely through management keys (UICC OTA Key, GP ISD Key, etc.).
  • management keys UICC OTA Key, GP ISD Key, etc.
  • the management key or the eSIM management key or the eUICC management key is an access authentication key to the eSIM for safely delivering the operator information to the eSIM, and is a concept distinct from the encryption key (public key, etc.) mainly dealt with in the present invention. As described below, it may be expressed as eUICC access credentials.
  • SM-DP securely builds IMSI, K, OPc, supplementary service applications, supplementary service data, etc. in addition to the operational profile (or operator information) to form a credential package.
  • SM-SR securely downloads the credential package generated by SM-DP to eSIM through SIM remote management technology such as Over-The-Air (OTA) or GP Secure Communication Protocol (GP SCP).
  • OTA Over-The-Air
  • GP SCP GP Secure Communication Protocol
  • MNO1 is SM1
  • SM1 is SM4
  • SM4 forms a trust relationship with the eSIM, thereby forming a trust relationship between the MNO and eSIM.
  • a mobile network operator refers to a mobile communication operator and means an entity that provides a communication service to a customer through a mobile network.
  • a subscription manager is a subscription management device and performs a management function of an eUICC.
  • eUICC Supplier means a person who supplies eUICC module and embedded software (firmware and operating system, etc.).
  • Device Vendor includes a device's provider, in particular a wireless modem function via a mobile network driven by the MNO, and consequently means a supplier of a device requiring a UICC (or eUICC) form.
  • a device's provider in particular a wireless modem function via a mobile network driven by the MNO, and consequently means a supplier of a device requiring a UICC (or eUICC) form.
  • Provisioning refers to the process of loading a profile into an eUICC
  • a provisioning profile refers to a profile used by a device to connect to a communication network for the purpose of provisioning other provisioning profiles and operational profiles.
  • Subscription means a commercial relationship for providing a service between a subscriber and a wireless communication service provider.
  • eUICC access credentials refer to data in the eUICC that allows secure communication between the eUICC and external entities to be set up to manage profiles on the eUICC.
  • Profile access credentials are data that resides within a profile or within an eUICC, and means data that allows secure communications to be set up between the eUICC and external entities to protect or manage the profile structure and its data. .
  • a profile is a combination of file structures, data, and applications that can be provisioned or managed within an eUICC.
  • the profile is an operator profile, an operator profile, a provisioning profile for provisioning, and other policy control functions (PCFs). It means all information that can exist in eUICC such as profile.
  • Operational Profile or operator information refers to all kinds of profiles related to Operational Subcription.
  • Figure 1 shows the overall service architecture including the eSIM (eUICC) to which the present invention is applied.
  • eSIM eUICC
  • the eUICC system architecture to which the present invention can be applied may include a plurality of MNO systems, one or more SM systems, an eUICC manufacturer system, a device manufacturer system including an eUICC, an eUICC, and the like for each entity or subject.
  • MNO systems one or more SM systems
  • eUICC manufacturer system an eUICC manufacturer system
  • device manufacturer system including an eUICC, an eUICC, and the like for each entity or subject.
  • the dashed line in FIG. 1 shows the trust circle, and the two solid lines represent the secure link.
  • the MNO and eUICC must be able to decode the MNO Credentials information, that is, the profile (operational profile, provisioning profile, etc.).
  • the profile operational profile, provisioning profile, etc.
  • the only exception to this could be a third party authorized by a particular MNO, for example a SIM vendor. However, it is not a general function of a third party to do this.
  • Subscriptions cannot be switched within the eUICC outside of operator policy control.
  • the user must be aware of any changes in the MNO content and its active subscription, must be able to avoid security risks, and have a level of security that is compatible with the current UICC model.
  • the MNO credential or profile may mean a subscription credential including K, algorithm, algorithm parameters, supplementary service application, supplementary service data, and the like.
  • MNO credentials or profiles must be done in a secure manner from end to end.
  • the transmission can be made in successive steps without breaking the security chain, and all steps in the transmission chain must be made under the recognition and approval of the MNO.
  • No entity in the transport chain should be able to see the MNO credentials clearly, but the only exception may be a third party delegated from a particular MNO, for example a SIM vendor. However, it is not a general function of a third party to do this.
  • the operator must have complete control over his credentials and the operator must have strong supervision and control over the SM operation.
  • SM functions must be provided by the MNO or a third party, if provided by the third party, there may be a commercial relationship established between the SM and the MNO.
  • the SM has no direct relationship with the MNO subscriber for subscription management.
  • the MNO has a relationship with the subscriber and should be the entry point for the customer subscription, it is not intended to piggyback on the contractual relationship an M2M service provider (the M2M service provider is an MNO subscriber) may have with its customers.
  • the donor and receiving MNOs may or may not have a prior agreement with each other. There must be a mechanism to approve pre-contracts.
  • the donor operator's policy control function can be defined for the condition of removing his / her credential, and the policy control function (PCF) can implement this function.
  • the architecture introduces a feature defined as SM, and SM's primary role is to prepare and deliver a package or profile containing the MNO credentials to the eUICC.
  • the SM function may be provided directly by the MNO, or the MNO may contract with a third party to obtain the SM service.
  • SM can be divided into two sub-functions such as SM-SR and SM-DP.
  • these SM-SR and SM-DP functions may be provided by another entity or may be provided by the same entity. Therefore, there is a need to clearly demarcate the functions of SM-DP and SM-SR, and to define the interface between these entities.
  • SM-DP is responsible for secure preparation of package or profile to be delivered to eUICC, and works with SM-SR for actual transmission.
  • the key functions of the SM-DP are 1) managing the functional characteristics and certification levels of the eUICC, and 2) one of the MNO credentials or profiles (e.g., IMSI, K, supplementary service applications, supplementary service data). Some of these are potentially managed by the MNO, and 3) the ability to calculate the OTA package for download by the SM-SR. Can be added.
  • SM-DP can have a significant amount of background processing, and the requirements for performance, scalability and reliability are expected to be important.
  • SM-SR is responsible for securely routing and delivering the credential package to the corresponding eUICC.
  • the key features of the SM-SR are 1) managing OTA communication with the eUICC via a ciphered VPN, and 2) other SM-SR to form an end-to-end up to the eUICC.
  • To manage communication with the eUICC 3) to manage eUICC data used for SM-SR OTA communication provided by the eUICC provider, and 4) to protect the communication with the eUICC by filtering only allowed entities. (Firewall function).
  • the SM-SR database is provided by eUICC vendors, device (such as M2M terminal) vendors, and potentially MNOs, and can be used by MNOs through the SM-SR mesh network.
  • the circle of trust enables end-to-end security links during provisioning profile delivery, and the SM-SR shares the trust circle for secure routing and eUICC discovery of the provisioning profile.
  • the MNO can be linked with SM-SR and SM-DP entities in the trust circle, and can provide this functionality on its own.
  • EUICC and MNO Credentials to prevent illegal use of eUICC (cloning, illegal use of credentials, denial of service, illegal MNO context changes, etc.) without violating MNO's contractual and legal obligations with respect to its customers. There is a need for a secure end-to-end link between.
  • 110 represents a trust circle formed between SMs, more specifically, between SM-SR members, 120 represents a trust circle of MNO partners, and 130 represents an end-to-end trust link.
  • FIG. 2 illustrates a configuration in which an SM-SR and an SM-DP are located in a system in an SM separation environment.
  • the SM is divided into an SM-DP for safely preparing various profiles related to the eUICC (operational profile, provisioning profile, etc. of the MNO), and an SM-SR for routing the same. It can be linked with the SM-SR in a trust relationship, and the SM-DP is linked with the MNO system.
  • SM-DP can be linked with SM-SR and MNO system can be linked with SM-DP
  • the MNO's operational profiles on the eUICC are in application and data form, can exist in multiple, and only one Active Operational Profile will exist at a time. At this time, the rest becomes an Inactive Operational Profile. In this case there are potentially two performance degradation factors.
  • the second problem in this case is that if a plurality of operational profiles have contents of elementary files (EF) independently of each other, memory resource waste may occur.
  • EF elementary files
  • data such as a phonebook stored by a specific MNO in the eUICC is alive because the user is the same even if the MNO is changed and another operational profile is activated.
  • FIG. 3 illustrates a case where two operational profiles are stored as an internal structure of a general eUICC embedded in a device.
  • the device is also referred to as a terminal.
  • the eUICC has preloaded the MNO's operational profiles in advance, or there are multiple operational profiles in the process of changing the MNO, and only one operational profile remains active at any one of them. do. At this time, each operational profile has all the basic files of MNO independently.
  • the eUICC may be an M2M terminal or a mobile terminal.
  • the memory capacity of the eUICC increases, the cost increases. From this point of view, if each Operational Profile has contents of MNO's basic files independently, the following problems can occur.
  • Waste of memory resources is incurred.
  • data such as phonebooks stored by a particular MNO in the eUICC have a requirement that the user wants to be alive because the MNO is changed and other operational profiles are activated.
  • swap of an operational profile means activation and deactivation of an operational profile, or deletion and loading.
  • the proposed method of the present invention is to create and use contents that can be commonly used in common operational profiles (EF: Elementary Files) that can be commonly used by multiple operational profiles.
  • EF Elementary Files
  • an embodiment of the present invention provides a method of separately managing data commonly used among parameters or fields of all operational profiles in an eUICC storing various communication schemes and / or operational profiles of various operators. To provide.
  • data commonly used among parameters or fields of all operational profiles may be used in an eUICC that stores various communication schemes and / or operational profiles of various operators.
  • eUICC that stores various communication schemes and / or operational profiles of various operators.
  • an active profile or an activation profile means a profile that a file or an application can select by the UICC-Terminal interface under the control of a Policy Control Function (PCF) associated with an MNO.
  • PCF Policy Control Function
  • the common operational profile refers to data of contents that can be used in common by the operational profiles of respective MNOs among the operational profile contents.
  • FIG. 4 illustrates an eUICC internal structure when using a common operational profile, according to one embodiment of the invention.
  • the contents (common profile data) that the common operational profile of the MNO may have and the contents (unique profile data of each MNO or communication method) that each operational profile may have may be as follows. have. However, it is possible to subtract the contents that the MNO does not use in the operational profile from the contents uniquely independent of the operational profiles.
  • the contents of the common operational profile may consist of the following files. Firstly, files that the user changes (ex. Phonebook), and secondly, files in which values obtained from the terminal system are stored, that is, files changed by the terminal system (ex. Location information: LOCI, SLOCI )) And so on.
  • a scenario where a common operational profile is populated is as follows.
  • the common operational profile is filled with default values on initial load. (ex. May be filled with "F" values or null values as default values in memory.)
  • the common operational profile file contents that can be changed by the user are filled in. (ex. phonebook, SMS, etc.)
  • the carrier change is made from MNO1 to MNO2.
  • the user can still read the contents of the common operational profile that was changed by the user in the MNO1 subscription state. (ex. phonebook, SMS, etc.)
  • the contents of the common operation profile files that have been changed by the user in the subscription state of MNO1 are updated (ex. Phonebook, SMS, etc.).
  • the data included in the common profile is a file structure including items such as a master file (MF), a universal subscriber identity module (USIM), GSM-ACCESS, GSM, and TELECOM, and information related to each item. It may be. Information related to each item in the above example may be as Tables 1 to 6 below, but is not limited thereto.
  • the number of initial creations in a common operational profile is made to be controlled by an input parameter.
  • the unique data parameters (fields) that the plurality of operational profiles independently have Universal Subscriber Identity Module (USIM), IP Multimedia Service Identity Module (ISIM) -ACCESS, Home Node B (HNB), GSM, It may have a file structure including items such as TELECOM and information related to each item. Information related to each item mentioned above may be as follows, but is not limited thereto.
  • Independent data of multiple operational profiles may include items (parameters or fields) included in Tables 7 to 11 below, but are not limited thereto.
  • the information related to each item may be included in an elementary file (EF) defined in the eUICC or may be the elementary file itself.
  • EF elementary file
  • FIG. 5 illustrates access control for a common operational profile according to an embodiment of the present invention.
  • the content of the common operational profile may control access of another application (another profile) in the terminal eUICC through the following access control.
  • an operational profile ID also called an "operational ID” or “profile ID”
  • access parameters certain parameters (access parameters).
  • profile ID also called an "operational ID” or “profile ID”
  • the common operational profile causes the pre-registered operational profile ID and the promised parameters to respond only to the identified request. (In the figure below, unregistered profiles will prohibit access.)
  • 6 through 9 illustrate a process of storing or updating an operational profile in an eUICC according to an embodiment of the present invention.
  • FIG. 6 illustrates a case where a common operational profile is mounted in an eUICC when an eUICC is embedded in a terminal according to the present invention.
  • the phonebook file can be made to control the number of inputs at the time of initial generation in the common operational profile.
  • the MNO when the MNO first loads an operational profile, 1) externally loads an operational profile, and 2) assigns an operational profile ID (or an operational ID or profile ID) to a common offer. 3) the access parameter is obtained from the common operational profile.
  • FIG. 8 is a diagram illustrating a process of reading or writing a value (data) required for a common operational profile in a terminal (device), that is, a terminal system.
  • data (common data) included in the common operational profile may be generated or updated.
  • each of a plurality of operational profiles in an eUICC is common among data (which may be information, contents, files, etc.) for use.
  • data which may be information, contents, files, etc.
  • each of the plurality of operational profiles need only have remaining data (unique data) except common data among data for use.
  • the plurality of profile management methods in the eUICC according to an embodiment of the present invention described above provides inter-profile access control in the case where a plurality of operational profiles use common data of the common operational profile. can do.
  • the operational profile and the common operational profile described above are one type of profile, hereinafter, the operational profile is described as a profile, and the common operational profile is described as a common profile.
  • an eUICC is a UICC interworking with a mobile network operator (MNO) and embedded in a terminal.
  • MNO mobile network operator
  • a plurality of profiles are stored in a common profile having common data that can be used in common.
  • the eUICC may include a memory resource as a configuration in order to store one or more profiles, a common profile, and the like.
  • the data used by each of a number of profiles already stored in the eUICC or to be stored in the future does not require that the profile be used in common with other profiles and that the common profile has a common profile and that the profile does not need to be used in common with other profiles. It may include unique data data that the profile has independently.
  • data (eg, EF files) used by one first profile may include common data and unique data.
  • the common data is data that the first profile can use in common with other profile (s) among the data used by the first profile, and the unique data is profile (s) different from the first profile among the data used by the first profile. This data does not need to be used in common with.
  • common data is included in a common profile (eg, common operational profile), and unique data is included in the first profile.
  • the common data mentioned above may include one or more of eUICC identification information (eg, eICCID) and user data.
  • eUICC identification information eg, eICCID
  • user data e.g, user data
  • User data (also referred to as customer data or subscriber data) that may be included in the common data may include, for example, data about one or more of a phonebook and a message in which contacts such as a phone number are stored.
  • the message may be, for example, a Short Message Service (SMS) message, a Multimeda Message Service (MMS) message, or the like.
  • SMS Short Message Service
  • MMS Multimeda Message Service
  • the aforementioned common data may include data (terminal system related data) obtained from the terminal system when the activation profile is loaded.
  • the terminal system related data that may be included in the common data may include, for example, location information.
  • the location information may include, for example, LOC (LOCcation Information), PSLOCI (Packet Switched LOCation Information), and the like.
  • the common data mentioned above may include, for example, a master file (MF), a universal subscriber identity module (USIM: Universal Subscriber Identity Module, etc.), a network access (eg, GSM- as shown in Tables 1 to 6). ACCESS, etc.), a communication network (eg, GSM, etc.), telecom (Telecom), etc., and may have a file structure containing one or more information related to each item.
  • the information (content) related to each item may be in the form of an elementary file (EF) of the eUICC.
  • the unique data of each of the plurality of profiles independently may be, for example, as shown in Tables 7 to 11 above.
  • USB Universal Subscriber Identity Module
  • ISIM Access to IP Multimedia Service Identity Module
  • Base Station e.g., Home Node B, etc.
  • Network e.g., GSM
  • Telecom Telecom
  • a file structure including one or more pieces of information related to each item.
  • the information (content) related to each item may be in the form of an elementary file (EF) of the eUICC.
  • the common data of the common profile may be updated based on at least one of terminal system-related data obtained from the terminal system and user data according to a user input when the activation profile is loaded.
  • the common data included in the common profile may include various types of information or contents, and among them, one or more of eUICC identification information (for example, eICCID) and user information (for example, phone book, etc.) may be included in the common data.
  • eUICC identification information for example, eICCID
  • user information for example, phone book, etc.
  • Information that must be included and can be included in common data may optionally be included in common data.
  • Other information except for the eUICC identification information (e.g. eICCID, etc.) and user information (e.g., phonebook, etc.) To Table 6) may optionally be included in common data.
  • access of another profile may be controlled according to a profile ID registered in advance.
  • access to the common profile may be controlled according to the profile ID of the profile.
  • profile ID of profile 1 is registered in the common profile, and then profile 1 sends an access request and profile ID to the common profile, so that the common profile has previously registered the profile ID received from profile 1 It checks with the ID and responds to the access request.
  • Each of the plurality of profiles described above may be an Operational Profile of a corresponding MNO, and the common profile may be a Common Operational Profile.
  • FIG. 10 is a flowchart illustrating a plurality of profile management methods in an eUICC according to an embodiment of the present invention.
  • an eUICC is one or more types of applications and data, and multiple profiles inside the eUICC are common. Mounting a common profile that can have common data available (S1000), and based on one or more of the terminal system-related data obtained from the terminal system at the time of loading the activation profile and the user data according to the user input, etc. Updating the common data of the common profile (S1002) and the like.
  • Common data contents, information, files, etc.
  • Common data are data that can be used by a plurality of profiles in common, and are data that need to be maintained even if the activation profile is changed.
  • Such common data may include, for example, eUICC identification information (eg, eICCID).
  • eUICC identification information eg, eICCID
  • the common data may include user data by a user input
  • the user data may include, for example, data about one or more of a phonebook and a message.
  • the common data may include terminal system-related data obtained from the terminal system, wherein the terminal system-related data may include, for example, location information such as LOC (LOCcation Information) and PSLOCI (Packet Switched LOCation Information). It may include.
  • location information such as LOC (LOCcation Information) and PSLOCI (Packet Switched LOCation Information). It may include.
  • LOC LOCcation Information
  • PSLOCI Packet Switched LOCation Information
  • a plurality of profile management method in the eUICC after the above-described step S1002, the step of loading the activation profile changed according to the change of the activation profile (S1004) and Updating common data of the common profile based on terminal system related data obtained from the terminal system, and maintaining usable data after the change of the activation profile among the common data in the state before the change of the activation profile (S1006); It may further include.
  • step S1004 when the user changes the carrier from the first MNO to the second MNO, the profile (operational profile) of the first MNO is activated before the carrier change.
  • the profile (operational profile) of the first MNO is deactivated and the profile (operational profile) of the second MNO is activated. That is, it may mean that the activation profile is changed from the profile of the first MNO to the profile of the second MNO.
  • the activation profile mentioned above may be an operational profile of a mobile network operator (MNO) to which a user currently subscribes.
  • MNO mobile network operator
  • 11 is another flowchart of a method of managing a plurality of profiles in an eUICC according to an embodiment of the present invention.
  • a plurality of profiles in an eUICC in which the eUICC may be one or more of an application and data, etc. Storing a common profile having common data available in common (S1100), and a specific profile (which may be an active profile) of the plurality of profiles, the eUICC accesses the common profile to use the common data Step S1104; and the like.
  • the eUICC may register a profile accessible to the common profile and allow access to the common profile only for the registered profile.
  • the eUICC may control whether a specific profile can access the common profile according to a profile ID registered in advance.
  • the step S1102 of registering a specific profile to be accessed with the common profile is performed. You may need more.
  • step S1102 the eUICC registers the specific profile as a profile accessible to the common profile by registering the profile ID in the eUICC profile with the common profile and the profile in the eUICC obtaining an access parameter from the common profile. Can be.
  • a specific profile in the eUICC sends its profile ID and access parameters to the common profile along with a request for access to the common profile, and the common profile has been verified the profile ID and access parameters. It allows access only to access requests, so that a particular profile can access a common profile to read or write some data that the common profile has and is intended to use.
  • Common data that can be commonly used by a plurality of profiles may include, for example, one or more of eUICC identification information (eg, eICCID) and user data.
  • the user data may include, for example, data about one or more of a phonebook and a message.
  • the common data in which a plurality of profiles can be commonly used may include terminal system related data obtained from the terminal system.
  • the terminal system related data may include, for example, location information such as LOC (LOCcation Information), PSLOCI (Packet Switched LOCation Information), and the like.
  • the device illustrated in FIGS. 4 to 9 is a terminal providing a communication service in cooperation with a mobile network operator (MNO), and the terminal includes a plurality of profiles in the form of one or more of applications and data.
  • the (operational profile) may include a built-in eUICC that stores a common profile (common operational profile) having common data that can be commonly used.
  • the common data included in the common profile may include, for example, one or more of eUICC identification information (eg, eICCID) and user data.
  • the user data may include, for example, data about one or more of a phonebook and a message.
  • the common data included in the common profile may include terminal system related data obtained from the terminal system.
  • the terminal system related data may include, for example, location information such as LOC (LOCcation Information), PSLOCI (Packet Switched LOCation Information), and the like.
  • the present invention can provide a method for efficiently managing a plurality of profiles in an eUICC.
  • a method for efficiently using a plurality of profiles can be provided.
  • the eUICC when multiple communication schemes and / or profiles of various service providers can be stored in the eUICC, data (common data) commonly used by a plurality of profiles among data available for each of the plurality of profiles can be used.
  • data common data
  • data commonly used by a plurality of profiles among data available for each of the plurality of profiles
  • common data it is newly defined as a common profile, so that many profiles in the eUICC can be managed efficiently.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne une technologie pour gérer des profils dans une carte eUICC intégrée dans un terminal, et de manière plus spécifique un procédé pour gérer efficacement des profils dans une eUICC avec prise en compte d'un cas dans lequel plusieurs profils doivent être mémorisés dans la carte eUICC. Cette invention se rapporte également à une carte eUICC intégrée ainsi qu'à un terminal correspondant.
PCT/KR2012/009129 2011-11-04 2012-11-01 Procédé pour gérer plusieurs profils dans une carte uicc intégrée, carte uicc intégrée et terminal correspondant Ceased WO2013066077A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/356,089 US9414220B2 (en) 2011-11-04 2012-11-01 Method for managing multiple profiles in an embedded UICC, and embedded UICC and terminal therefor

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR10-2011-0114765 2011-11-04
KR20110114765 2011-11-04
KR1020120122793A KR101996677B1 (ko) 2011-11-04 2012-11-01 내장 uicc 내 다수의 프로파일 관리 방법과 이를 위한 내장 uicc 및 단말
KR10-2012-0122793 2012-11-01

Publications (1)

Publication Number Publication Date
WO2013066077A1 true WO2013066077A1 (fr) 2013-05-10

Family

ID=48192363

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2012/009129 Ceased WO2013066077A1 (fr) 2011-11-04 2012-11-01 Procédé pour gérer plusieurs profils dans une carte uicc intégrée, carte uicc intégrée et terminal correspondant

Country Status (1)

Country Link
WO (1) WO2013066077A1 (fr)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101381539B1 (ko) 2012-08-31 2014-04-10 에스케이씨앤씨 주식회사 Usim 어플리케이션 자동 선택방법 및 이를 적용한 모바일 단말장치
WO2014193188A1 (fr) * 2013-05-30 2014-12-04 Samsung Electronics Co., Ltd. Procédé et appareil de configuration de profils
CN104349269A (zh) * 2013-08-08 2015-02-11 华为终端有限公司 一种更新策略控制功能信息的方法、装置和系统
US9100175B2 (en) 2013-11-19 2015-08-04 M2M And Iot Technologies, Llc Embedded universal integrated circuit card supporting two-factor authentication
US9118464B2 (en) 2013-09-10 2015-08-25 M2M And Iot Technologies, Llc Set of servers for “machine-to-machine” communications using public key infrastructure
DE102014005566A1 (de) * 2014-04-16 2015-10-22 Giesecke & Devrient Gmbh Verfahren und Vorrichtung zum Betreiben eines mobilen Endgeräts in einem Mobilfunknetzwerk
WO2016201398A1 (fr) * 2015-06-11 2016-12-15 Giesecke & Devrient America, Inc. Gestion de profils actifs multiples de module d'identité d'abonné
CN106465460A (zh) * 2014-05-15 2017-02-22 苹果公司 用于支持嵌入式uicc上的globalplatform使用的方法和设备
CN106664544A (zh) * 2014-07-19 2017-05-10 三星电子株式会社 用于嵌入式sim供应的方法和设备
WO2018160010A1 (fr) * 2017-02-28 2018-09-07 Samsung Electronics Co., Ltd. Dispositif électronique pour fournir un service à l'aide d'un élément sécurisé et son procédé
US10484376B1 (en) 2015-01-26 2019-11-19 Winklevoss Ip, Llc Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
US10498530B2 (en) 2013-09-27 2019-12-03 Network-1 Technologies, Inc. Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
CN110868710A (zh) * 2018-08-28 2020-03-06 成都鼎桥通信技术有限公司 一种专网eSIM配置方法和系统
US10700856B2 (en) 2013-11-19 2020-06-30 Network-1 Technologies, Inc. Key derivation for a module using an embedded universal integrated circuit card
US12542660B2 (en) 2024-02-09 2026-02-03 Network-1 Technologies, Inc. Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100072305A (ko) * 2007-09-26 2010-06-30 콸콤 인코포레이티드 다수의 네트워크-서비스 어플리케이션 프로파일들 및 데이터 세션 충돌 해결에 기초하여 무선 장치들을 프로비저닝하기 위한 시스템들 및 방법들
US20100185874A1 (en) * 2008-04-08 2010-07-22 Microelectronica Espanola S.A.U Method of Mass Storage Memory Management for Large Capacity Universal Integrated Circuit Cards

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100072305A (ko) * 2007-09-26 2010-06-30 콸콤 인코포레이티드 다수의 네트워크-서비스 어플리케이션 프로파일들 및 데이터 세션 충돌 해결에 기초하여 무선 장치들을 프로비저닝하기 위한 시스템들 및 방법들
US20100185874A1 (en) * 2008-04-08 2010-07-22 Microelectronica Espanola S.A.U Method of Mass Storage Memory Management for Large Capacity Universal Integrated Circuit Cards

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"UICC in LTE : Guidance from SIMalliance", WHITEPATER VERSION2 (SIM ALLIANCE), 11 February 2011 (2011-02-11) *

Cited By (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101381539B1 (ko) 2012-08-31 2014-04-10 에스케이씨앤씨 주식회사 Usim 어플리케이션 자동 선택방법 및 이를 적용한 모바일 단말장치
US9232392B2 (en) 2013-05-30 2016-01-05 Samsung Electronics Co., Ltd. Method and apparatus for setting profile
WO2014193188A1 (fr) * 2013-05-30 2014-12-04 Samsung Electronics Co., Ltd. Procédé et appareil de configuration de profils
USRE49465E1 (en) 2013-05-30 2023-03-14 Samsung Electronics Co., Ltd. Method and apparatus for setting profile
US9800993B2 (en) 2013-05-30 2017-10-24 Samsung Electronics Co., Ltd Method and apparatus for setting profile
CN104349269A (zh) * 2013-08-08 2015-02-11 华为终端有限公司 一种更新策略控制功能信息的方法、装置和系统
WO2015018272A1 (fr) * 2013-08-08 2015-02-12 华为终端有限公司 Méthode, appareil et système de mise à jour d'informations de pcf
US10187206B2 (en) 2013-09-10 2019-01-22 Network-1 Technologies, Inc. Key derivation for a module using an embedded universal integrated circuit card
US9742562B2 (en) 2013-09-10 2017-08-22 M2M And Iot Technologies, Llc Key derivation for a module using an embedded universal integrated circuit card
US9288059B2 (en) 2013-09-10 2016-03-15 M2M And Iot Technologies, Llc Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
US9300473B2 (en) 2013-09-10 2016-03-29 M2M And Iot Technologies, Llc Module for “machine-to-machine” communications using public key infrastructure
US12355872B2 (en) 2013-09-10 2025-07-08 Network-1 Technologies, Inc. Set of servers for “machine-to-machine” communications using public key infrastructure
US9350550B2 (en) 2013-09-10 2016-05-24 M2M And Iot Technologies, Llc Power management and security for wireless modules in “machine-to-machine” communications
US11973863B2 (en) 2013-09-10 2024-04-30 Network-1 Technologies, Inc. Set of servers for “machine-to-machine” communications using public key infrastructure
US11606204B2 (en) 2013-09-10 2023-03-14 Network-1 Technologies, Inc. Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
US11539681B2 (en) 2013-09-10 2022-12-27 Network-1 Technologies, Inc. Network supporting two-factor authentication for modules with embedded universal integrated circuit cards
US9596078B2 (en) 2013-09-10 2017-03-14 M2M And Iot Technologies, Llc Set of servers for “machine-to-machine” communications using public key infrastructure
US9641327B2 (en) 2013-09-10 2017-05-02 M2M And Iot Technologies, Llc Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
US11283603B2 (en) 2013-09-10 2022-03-22 Network-1 Technologies, Inc. Set of servers for “machine-to-machine” communications using public key infrastructure
US9698981B2 (en) 2013-09-10 2017-07-04 M2M And Iot Technologies, Llc Power management and security for wireless modules in “machine-to-machine” communications
US10250386B2 (en) 2013-09-10 2019-04-02 Network-1 Technologies, Inc. Power management and security for wireless modules in “machine-to-machine” communications
US11258595B2 (en) 2013-09-10 2022-02-22 Network-1 Technologies, Inc. Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
US10652017B2 (en) 2013-09-10 2020-05-12 Network-1 Technologies, Inc. Set of servers for “machine-to-machine” communications using public key infrastructure
US10530575B2 (en) 2013-09-10 2020-01-07 Network-1 Technologies, Inc. Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
US9998280B2 (en) 2013-09-10 2018-06-12 Network-1 Technologies, Inc. Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
US9998281B2 (en) 2013-09-10 2018-06-12 Network-1 Technologies, Inc. Set of servers for “machine-to-machine” communications using public key infrastructure
US10003461B2 (en) 2013-09-10 2018-06-19 Network-1 Technologies, Inc. Power management and security for wireless modules in “machine-to-machine” communications
US10057059B2 (en) 2013-09-10 2018-08-21 Network-1 Technologies, Inc. Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
US10523432B2 (en) 2013-09-10 2019-12-31 Network-1 Technologies, Inc. Power management and security for wireless modules in “machine-to-machine” communications
US9276740B2 (en) 2013-09-10 2016-03-01 M2M And Iot Technologies, Llc Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
US9319223B2 (en) 2013-09-10 2016-04-19 M2M And Iot Technologies, Llc Key derivation for a module using an embedded universal integrated circuit card
US10177911B2 (en) 2013-09-10 2019-01-08 Network-1 Technologies, Inc. Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
US9118464B2 (en) 2013-09-10 2015-08-25 M2M And Iot Technologies, Llc Set of servers for “machine-to-machine” communications using public key infrastructure
US10498530B2 (en) 2013-09-27 2019-12-03 Network-1 Technologies, Inc. Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
US11082218B2 (en) 2013-11-19 2021-08-03 Network-1 Technologies, Inc. Key derivation for a module using an embedded universal integrated circuit card
US9351162B2 (en) 2013-11-19 2016-05-24 M2M And Iot Technologies, Llc Network supporting two-factor authentication for modules with embedded universal integrated circuit cards
US10700856B2 (en) 2013-11-19 2020-06-30 Network-1 Technologies, Inc. Key derivation for a module using an embedded universal integrated circuit card
US9100175B2 (en) 2013-11-19 2015-08-04 M2M And Iot Technologies, Llc Embedded universal integrated circuit card supporting two-factor authentication
US10362012B2 (en) 2013-11-19 2019-07-23 Network-1 Technologies, Inc. Network supporting two-factor authentication for modules with embedded universal integrated circuit cards
US10594679B2 (en) 2013-11-19 2020-03-17 Network-1 Technologies, Inc. Network supporting two-factor authentication for modules with embedded universal integrated circuit cards
US9961060B2 (en) 2013-11-19 2018-05-01 Network-1 Technologies, Inc. Embedded universal integrated circuit card supporting two-factor authentication
US11233780B2 (en) 2013-12-06 2022-01-25 Network-1 Technologies, Inc. Embedded universal integrated circuit card supporting two-factor authentication
US12490098B2 (en) 2013-12-06 2025-12-02 Network-1 Technologies, Inc. Embedded universal integrated circuit card supporting two-factor authentication
US10084768B2 (en) 2013-12-06 2018-09-25 Network-1 Technologies, Inc. Embedded universal integrated circuit card supporting two-factor authentication
US12477340B2 (en) 2013-12-06 2025-11-18 Network-1 Technologies, Inc. Embedded universal integrated circuit card supporting two-factor authentication
US10382422B2 (en) 2013-12-06 2019-08-13 Network-1 Technologies, Inc. Embedded universal integrated circuit card supporting two-factor authentication
US12477341B2 (en) 2013-12-06 2025-11-18 Network-1 Technologies, Inc. Embedded universal integrated circuit card supporting two-factor authentication
US12207094B2 (en) 2013-12-06 2025-01-21 Network-1 Technologies, Inc. Embedded universal integrated circuit card supporting two-factor authentication
US11916893B2 (en) 2013-12-06 2024-02-27 Network-1 Technologies, Inc. Embedded universal integrated circuit card supporting two-factor authentication
DE102014005566A1 (de) * 2014-04-16 2015-10-22 Giesecke & Devrient Gmbh Verfahren und Vorrichtung zum Betreiben eines mobilen Endgeräts in einem Mobilfunknetzwerk
US10136323B2 (en) 2014-04-16 2018-11-20 Giesecke+Devrient Mobile Security Gmbh Method and device for operating a mobile terminal in a mobile communication network
CN106465460A (zh) * 2014-05-15 2017-02-22 苹果公司 用于支持嵌入式uicc上的globalplatform使用的方法和设备
CN106664544B (zh) * 2014-07-19 2020-03-27 三星电子株式会社 用于嵌入式sim供应的方法和设备
CN106664544A (zh) * 2014-07-19 2017-05-10 三星电子株式会社 用于嵌入式sim供应的方法和设备
US10778682B1 (en) 2015-01-26 2020-09-15 Winklevoss Ip, Llc Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
US11283797B2 (en) 2015-01-26 2022-03-22 Gemini Ip, Llc Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
US10484376B1 (en) 2015-01-26 2019-11-19 Winklevoss Ip, Llc Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
US12143382B1 (en) 2015-01-26 2024-11-12 Gemini Ip, Llc Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
WO2016201398A1 (fr) * 2015-06-11 2016-12-15 Giesecke & Devrient America, Inc. Gestion de profils actifs multiples de module d'identité d'abonné
US10237723B2 (en) 2015-06-11 2019-03-19 Giesecke+Devrient Mobile Security America, Inc. Managing multiple active subscriber identity module profiles
CN107925867B (zh) * 2015-06-11 2021-01-12 捷德移动安全有限责任公司 管理多个激活的订户身份模块配置文件
CN107925867A (zh) * 2015-06-11 2018-04-17 美国捷德移动安全股份有限公司 管理多个激活的订户身份模块配置文件
US10440557B2 (en) 2017-02-28 2019-10-08 Samsung Electronics Co., Ltd. Electronic device for providing service using secure element and method thereof
WO2018160010A1 (fr) * 2017-02-28 2018-09-07 Samsung Electronics Co., Ltd. Dispositif électronique pour fournir un service à l'aide d'un élément sécurisé et son procédé
CN110868710B (zh) * 2018-08-28 2022-09-30 成都鼎桥通信技术有限公司 一种专网eSIM配置方法和系统
CN110868710A (zh) * 2018-08-28 2020-03-06 成都鼎桥通信技术有限公司 一种专网eSIM配置方法和系统
US12542660B2 (en) 2024-02-09 2026-02-03 Network-1 Technologies, Inc. Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

Similar Documents

Publication Publication Date Title
WO2013066077A1 (fr) Procédé pour gérer plusieurs profils dans une carte uicc intégrée, carte uicc intégrée et terminal correspondant
WO2013048084A2 (fr) Procédé de gestion de profil, uicc intégré, et dispositif pourvu de l'uicc intégré
WO2013009044A2 (fr) Méthode de changement d'orm dans un module sim intégré basé sur un privilège spécial, module sim intégré et support d'enregistrement prévus à cet effet
WO2020050701A1 (fr) Appareil et procédé au moyen desquels un dispositif ssp et un serveur négocient des certificats numériques
WO2021066572A1 (fr) Procédé et dispositif pour fournir de manière efficace un profil pour un service de communication
WO2013036010A1 (fr) Procédé de certification utilisant un certificat d'uicc intégrée, procédés de mise à disposition et de changement de mno utilisant le procédé de certification, uicc intégrée correspondante, système de mno et support d'enregistrement
WO2013009045A2 (fr) Méthode de changement d'orm dans un module sim intégré basé sur la génération d'un module sim intégré, module sim intégré et support d'enregistrement prévus à cet effet
WO2021045573A1 (fr) Appareil et procédé de fourniture de données d'abonnement à un terminal enregistré non abonné dans un système de communication sans fil
WO2018147711A1 (fr) Appareil et procédé de contrôle d'accès de esim
WO2016010312A1 (fr) Procédé et dispositif pour installer un profil d'une carte à circuit intégré universelle incorporée (euicc)
WO2015163623A1 (fr) Procédé et appareil de mise en service de profils
WO2016153281A1 (fr) Procédé et appareil de téléchargement de profil dans un système de communication sans fil
WO2016153303A1 (fr) Procédé et appareil permettant l'installation d'un profil de terminal dans un système de communication sans fil
WO2013036011A2 (fr) Procédé permettant de gérer un profil d'uicc intégrée et uicc intégrée, terminal équipé d'une uicc intégrée, procédé d'approvisionnement et procédé de modification de mno associé
WO2013036009A1 (fr) Procédé pour gérer une uicc intégrée et uicc intégrée correspondante, et système de mno, procédé de mise à disposition et procédé pour changer de mno les utilisant
WO2022108357A1 (fr) Procédé et appareil de gestion de profils par prise en compte d'une euicc amovible prenant en charge de multiples profils activés
WO2016153323A1 (fr) Procédé et dispositif permettant d'utiliser un service de communication mobile grâce à un changement de terminal dans un système de communication mobile
WO2019194639A1 (fr) Procédé et appareil pour négocier une version d'euicc
WO2023158243A1 (fr) Procédé et appareil de transfert et de stockage de code d'activation pour changement de dispositif esim
WO2014030893A1 (fr) Procédé de gestion de profil par module d'authentification d'abonné intégré dans un dispositif terminal, et dispositif d'authentification d'abonné l'utilisant
WO2016080595A1 (fr) Procédé pour fournir un service à numéros multiples
WO2022240144A1 (fr) Procédé et appareil d'identification de suppression de profil lors d'un changement de terminal euicc
WO2022139481A1 (fr) Dispositif électronique effectuant une vérification à l'aide d'une sim intégrée et son procédé de fonctionnement
WO2013065983A1 (fr) Procédé de modification de droits à un domaine de sécurité pour une carte de stockage de données, serveur, carte de stockage de données et borne correspondante
WO2014077544A1 (fr) Procédé de configuration d'un profil de module d'authentification de souscripteur intégré et installé dans un dispositif de terminal, et appareil l'utilisant

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12845441

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 14356089

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12845441

Country of ref document: EP

Kind code of ref document: A1