CN110851825A - eSIM card and working method thereof - Google Patents
eSIM card and working method thereof Download PDFInfo
- Publication number
- CN110851825A CN110851825A CN201911142458.XA CN201911142458A CN110851825A CN 110851825 A CN110851825 A CN 110851825A CN 201911142458 A CN201911142458 A CN 201911142458A CN 110851825 A CN110851825 A CN 110851825A
- Authority
- CN
- China
- Prior art keywords
- information
- esim card
- operator server
- security component
- secure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000004891 communication Methods 0.000 claims abstract description 75
- 230000004044 response Effects 0.000 claims abstract description 5
- 238000013475 authorization Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 239000000969 carrier Substances 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses an eSIM card and a working method thereof, wherein the working method comprises the following steps: in response to the initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component; establishing a secure communication connection with a management server using the connection information; sending the initialization command to a management server; receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information; storing operator server communication public information in the blank sub-area; the carrier server communication private information is stored in the auxiliary security component. The method and the system can realize the safety management of the eSIM card, ensure that the eSIM card runs under a safety framework, and simultaneously manage each running data in the eSIM card by using a safety framework from issuing, transmitting to managing and deleting, thereby ensuring the safety of the whole running of the eSIM card.
Description
Technical Field
The present application relates to the field of computers, and in particular, to an eSIM card and a working method thereof.
Background
With the release of the 5G network, remote operators and the corresponding remote operator services thereof become application scenarios of future development, and then, eSIM (Embedded Subscriber identity Module) technology is continuously developed and improved, and devices implemented by using the eSIM technology are gradually favored by users. The data of a plurality of mobile operators are stored in the eSIM card, and when a user uses the eSIM card, the identity identification module of the eSIM card allows the user to select the operators according to the needs of the user and allows the user to switch at will at any time. Therefore, the user can select the mobile operator more flexibly, more terminal use cost is saved for the user, and convenience and safety are brought.
As shown in fig. 1, the existing eSIM card and management system 101 of a plurality of carriers is embedded in a terminal, and communication with a plurality of mobile carriers is realized through the terminal. As can be seen from fig. 1, in order to implement management of an eSIM, a terminal in the prior art typically accesses multiple operators through a network, and each operator manages data stored on an eSIM card. In the existing eSIM card management system, for the data security of the eSIM, information transmission is performed between an operator and an eSIM card by using an encryption key, and the information transmission mode can only ensure the security of the data of the operator, but does not consider the security of the eSIM card in the whole process of issuing and operating, so that the whole system of the eSIM card is in an unsafe state.
Disclosure of Invention
The application requests to protect an eSIM card and a working method thereof, and tries to provide a security management scheme for the eSIM card from the perspective of a system architecture.
The application provides a secure working method of an eSIM card, which comprises the following steps: in response to the initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component; establishing a secure communication connection with a management server using the connection information; sending the initialization command to a management server; receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information; storing operator server communication public information in the blank sub-area; the carrier server communication private information is stored in the auxiliary security component.
Preferably, the method further comprises presetting connection information into the trusted security component in advance, wherein the connection information is information required for establishing secure communication with the management server.
Preferably, the method further comprises periodically receiving the life cycle management information of the eSIM card through the established secure communication connection, and managing the eSIM card according to the life cycle management information of the eSIM card.
Preferably, the initialization command includes information of the operator server to be downloaded.
Preferably, the method further comprises periodically receiving information of the trusted application through the established secure communication connection, and downloading or updating the trusted application according to the information of the trusted application.
The present application further provides a mobile device comprising the following components: a memory chip storing a general execution environment; an eSIM card storing a secure execution environment; wherein the trusted security component and the auxiliary security component are arranged in the secure execution environment; the eSIM card executes the following steps: in response to the initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component; establishing a secure communication connection with a management server using the connection information; sending the initialization command to a management server; receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information; storing operator server communication public information in the blank sub-area; the carrier server communication private information is stored in the auxiliary security component.
Preferably, the method further comprises presetting connection information into the trusted security component in advance, wherein the connection information is information required for establishing secure communication with the management server.
Preferably, the method further comprises periodically receiving the life cycle management information of the eSIM card through the established secure communication connection, and managing the eSIM card according to the life cycle management information of the eSIM card.
Preferably, the initialization command includes carrier server communication information to be downloaded.
Preferably, the method further comprises periodically receiving information of the trusted application through the established secure communication connection, and downloading or updating the trusted application according to the information of the trusted application.
By the method and the device, the safety management of the eSIM card can be realized, the eSIM card is ensured to operate under a safety framework, and simultaneously, each operating data is managed by using the safety framework from issuing, transmission to management and deletion, so that the safety of the integral operation of the eSIM card is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a management structure diagram of an existing eSIM card and a plurality of carriers;
fig. 2 is a system configuration diagram of an eSIM card security service system according to the present application;
FIG. 3 is a system configuration diagram of the terminal of the present application;
fig. 4 is a flow chart of the working method of the present application.
Detailed Description
The technical solutions in the embodiments of the present application are clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Example 1
The application provides an eSIM card security service system which can realize security management of an eSIM card. The eSIM card security service system 201, as shown in fig. 2, includes the following components:
the system comprises a terminal, a plurality of operator management servers, an issuing terminal and a management server, wherein an eSIM card is embedded in the terminal. The components are matched with each other to realize the safety management of the full flow of the eSIM card.
The multiple operator servers issue the profile file to the eSIM card;
an issuing terminal which provides an eSIM card, presets a certificate for the eSIM card, and presets connection information of a management server, such as address information of the management server, key information required for communication between the eSIM card and the management server, and the like;
and the management server provides life cycle management and profile operator management of the eSIM card, storage and release of trusted applications, and life cycle management and management authorization of the trusted applications in the auxiliary security sub-component. Specifically, the working method is as follows:
1. for the life cycle management of the eSIM card, the method comprises the following sub-steps:
the eSIM card establishes a secure communication connection with a management server by using the management server connection information stored in the eSIM card;
sending the preset certificate of the eSIM card to a management server through a secure communication connection;
the management server obtains an eSIM card identifier according to the eSIM card preset certificate;
inquiring an eSIM card life cycle table to obtain an eSIM card life cycle state;
and managing the eSIM card according to the eSIM card lifecycle state.
The life cycle table of the eSIM card is as follows:
eSIM card identification | Current life cycle state |
E1 | Activation |
E2 | Pausing |
E3 | Stop |
The above only shows three eSIM cards schematically, and those skilled in the art know that the number of eSIM cards can be increased or decreased according to actual needs, and the number of eSIM cards can be in more than the three states.
Through the mode, the management of the service life cycle of the eSIM card by the management server can be realized.
2. The management server manages the operator server;
the management server collects operator server information periodically and/or the operator server actively sends its relevant information to the management server. The operator server information comprises information such as operator server identification, credit rating, supported network communication mode, operator server communication public information, operator server communication private information and the like; the management server stores the operator server information in a list for use when the eSIM card is initialized, and further pushes the operator server information to the eSIM card when the operator server is changed.
For example, when the operator server switches the network communication mode or suspends the service, the management server immediately notifies the use of the eSIM card of the relevant operator server, thereby preventing the loss.
3. Storage, release and management authorization of trusted applications;
the management server collects the trusted application information, stores part of the trusted application with high downloading frequency to the management server, and periodically releases the collected trusted application information, including information such as trusted application introduction, downloading frequency, downloading level and downloading address.
When the eSIM card requests to download a certain trusted application, the management server provides a management function, such as a management authorization function, that is, whether the eSIM card is allowed to download the trusted application is judged, and if so, the mobile terminal where the eSIM card is located downloads the trusted application, otherwise, the eSIM card is not allowed to download.
4. Lifecycle management of trusted applications;
and managing the trusted application, recording information of the trusted application, the downloading times of the trusted application, information of whether the trusted application needs to be paused or stopped and the like.
Further, as shown in fig. 3, the terminal 300 of the present application includes a memory card 301 and an eSIM card 302, where the memory card 301 stores a general execution environment (not shown), and the eSIM card 302 stores a secure execution environment (not shown). For example, a general execution environment is provided by the operating system of the terminal, and a secure chip on the eSIM card 302 provides a secure execution environment. One or more untrusted execution units are run in the general execution environment, e.g. untrusted execution units are applications that run in the general execution environment provided by the terminal, without high requirements on confidentiality and security.
The eSIM card includes a trusted security component and a plurality of secondary security components thereon, the trusted security component and the secondary security components operating in a secure execution environment, wherein:
the trusted security component stores an eSIM card preset certificate and key information required by the eSIM card for communicating with the management service; the trusted security component performs eSIM card registration management, profile file card storage and management, signing and authentication, initial key distribution, application authorization management, management of secondary security subcomponents (each secondary security subcomponent stores a trusted application). Obviously, the trusted security component requires a high level of security and high security, and is therefore stored in the secure chip of the eSIM card and operated in a secure execution environment.
When the general execution environment accesses the safe execution environment, the key is required to be used for authentication, and after the key authentication is passed, the access to the safe execution environment can be realized. But the access is an access with restricted rights, e.g. some untrusted execution units in the general purpose execution environment have full access rights, e.g. read and write rights, while other untrusted execution units have partial access rights, e.g. read only or write only rights. The security of data needing to be kept secret on the eSIM card is realized by arranging the security chip.
The generic execution environment is located on the terminal, i.e., the various untrusted execution components running thereon are accessible without special authentication.
Fast access to components or applications that do not require authentication is enabled through a generic execution environment.
Example 2
The construction of the eSIM card security service system is introduced above, and the secure working method of the eSIM card is described below with reference to fig. 4. The method comprises the following steps:
step S410, responding to an initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component;
wherein the initialization command can be issued by the mobile device or by a carrier server connected to the mobile device, the initialization command for performing initialization of an eSIM card on the mobile device.
Upon receiving the initialization command, a specified number of sub-regions are reserved in the trusted security component of the eSIM card. The specified number may be specified in advance.
Step S420, establishing a secure communication connection with a management server by using the connection information;
connection information, which is information required to establish secure communication with the management server, is preset in the trusted security component in advance. Establishing a secure communication connection with the management server using the connection information.
Step S430, sending the initialization command to a management server;
the initialization command includes information of the operator server to be downloaded.
Step S440, receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information;
and the operator server acquires the information of the operator server requested by the eSIM card according to the received initialization command, acquires an operator server identifier from the information, inquires the working state of the operator server according to the operator server identifier, and sends the operator server communication information containing the operator server communication public information and the operator server communication private information to the eSIM card when the working state is good.
Step S450, storing operator server communication public information in a blank subregion;
and storing the public information, such as operator server identification, public key information, communication path and the like, which is communicated with the operator server in the operator file, in the blank subarea of the credible safety part.
Further, if the sub-area in the trusted security component is fully occupied and no blank sub-area exists, applying for a new sub-area from the trusted security component. The common information is stored using the newly applied sub-regions.
And step S460, storing the communication private information of the operator server in the auxiliary safety component.
To enable subsequent connections, an auxiliary security component associated with the operator server is provided on the eSIM card. Multiple operator files may be stored on the eSIM card, each operator file being associated with one operator server, so that one operator server would correspond to an auxiliary security component on one eSIM card. Private information, such as transaction information, data download content, authentication information, and the like, in the operator file, which enables communication with the operator server, is stored in the auxiliary security component corresponding to the operator server.
Further, after the secure communication connection is established, the eSIM card may periodically receive the eSIM card lifecycle management information from the management server, and manage the eSIM card according to the eSIM card lifecycle management information.
Corresponding to the secure working method in fig. 3, an embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the steps of the secure control method.
Specifically, the storage medium can be a general-purpose storage medium, such as a removable disk, a hard disk, or the like, and when a computer program on the storage medium is executed, the method for issuing an eSIM certificate online can be performed.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments provided in the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus once an item is defined in one figure, it need not be further defined and explained in subsequent figures, and moreover, the terms "first", "second", "third", etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the present disclosure, which should be construed in light of the above teachings. Are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. An eSIM card safe working method comprises the following steps:
in response to the initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component;
establishing a secure communication connection with a management server using the connection information;
sending the initialization command to a management server;
receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information;
storing operator server communication public information in the blank sub-area;
the carrier server communication private information is stored in the auxiliary security component.
2. The secure working method of claim 1, further comprising presetting connection information, which is information required to establish secure communication with the management server, in advance into the trusted security component.
3. The secure operation method of claim 1, further comprising periodically receiving the eSIM card lifecycle management information through the established secure communication connection, and managing the eSIM card according to the eSIM card lifecycle management informativeness.
4. The secure working method of claim 1, wherein the initialization command includes information of an operator server to be downloaded.
5. The secure work method of claim 1, further comprising periodically receiving information of the trusted application through the established secure communication connection, and downloading or updating the trusted application according to the information of the trusted application.
6. A mobile device comprising the following components:
a memory chip storing a general execution environment;
an eSIM card storing a secure execution environment;
wherein the trusted security component and the auxiliary security component are arranged in the secure execution environment;
the eSIM card executes the following steps:
in response to the initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component;
establishing a secure communication connection with a management server using the connection information;
sending the initialization command to a management server;
receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information;
storing operator server communication public information in the blank sub-area;
the carrier server communication private information is stored in the auxiliary security component.
7. The mobile device of claim 6, further comprising pre-provisioning connection information into the trusted security component, the connection information being information required to establish secure communications with the management server.
8. The mobile device of claim 6, further comprising periodically receiving the eSIM card lifecycle management information over the established secure communication connection, the eSIM card being managed according to the eSIM card lifecycle management informativeness.
9. The mobile device of claim 6, wherein the initialization command includes carrier server communication information to be downloaded.
10. The mobile device of claim 6, further comprising periodically receiving information of the trusted application over the established secure communication connection, downloading or updating the trusted application in accordance with the information of the trusted application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911142458.XA CN110851825B (en) | 2019-11-20 | 2019-11-20 | eSIM card and working method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911142458.XA CN110851825B (en) | 2019-11-20 | 2019-11-20 | eSIM card and working method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110851825A true CN110851825A (en) | 2020-02-28 |
CN110851825B CN110851825B (en) | 2022-04-15 |
Family
ID=69603117
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911142458.XA Active CN110851825B (en) | 2019-11-20 | 2019-11-20 | eSIM card and working method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110851825B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111372237A (en) * | 2020-03-17 | 2020-07-03 | 江苏恒宝智能系统技术有限公司 | eSIM card operator file management method and device |
CN111417109A (en) * | 2020-03-17 | 2020-07-14 | 江苏恒宝智能系统技术有限公司 | eSIM card and its operator file management method and system |
CN111757248A (en) * | 2020-05-19 | 2020-10-09 | 物联神州网络股份有限公司 | Multifunctional patrol guiding device based on connection orientation |
CN112203271A (en) * | 2020-11-20 | 2021-01-08 | 恒宝股份有限公司 | Communication connection method, device and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101908024A (en) * | 2010-08-17 | 2010-12-08 | 湖南源科高新技术有限公司 | Encrypting method, device and hard disk |
US20160316356A1 (en) * | 2015-04-21 | 2016-10-27 | Apple Inc. | Maintaining inactive electronic subscriber identity modules |
CN107613487A (en) * | 2017-11-07 | 2018-01-19 | 恒宝股份有限公司 | A kind of eSIM cards and its method of work |
CN107979835A (en) * | 2017-12-01 | 2018-05-01 | 恒宝股份有限公司 | A kind of eSIM cards and its management method |
CN110224838A (en) * | 2019-06-11 | 2019-09-10 | 中国联合网络通信集团有限公司 | Data managing method, device and storage medium based on block chain |
-
2019
- 2019-11-20 CN CN201911142458.XA patent/CN110851825B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101908024A (en) * | 2010-08-17 | 2010-12-08 | 湖南源科高新技术有限公司 | Encrypting method, device and hard disk |
US20160316356A1 (en) * | 2015-04-21 | 2016-10-27 | Apple Inc. | Maintaining inactive electronic subscriber identity modules |
CN107613487A (en) * | 2017-11-07 | 2018-01-19 | 恒宝股份有限公司 | A kind of eSIM cards and its method of work |
CN107979835A (en) * | 2017-12-01 | 2018-05-01 | 恒宝股份有限公司 | A kind of eSIM cards and its management method |
CN110224838A (en) * | 2019-06-11 | 2019-09-10 | 中国联合网络通信集团有限公司 | Data managing method, device and storage medium based on block chain |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111372237A (en) * | 2020-03-17 | 2020-07-03 | 江苏恒宝智能系统技术有限公司 | eSIM card operator file management method and device |
CN111417109A (en) * | 2020-03-17 | 2020-07-14 | 江苏恒宝智能系统技术有限公司 | eSIM card and its operator file management method and system |
CN111417109B (en) * | 2020-03-17 | 2023-05-23 | 恒宝股份有限公司 | eSIM card and operator file management method and management system thereof |
CN111757248A (en) * | 2020-05-19 | 2020-10-09 | 物联神州网络股份有限公司 | Multifunctional patrol guiding device based on connection orientation |
CN112203271A (en) * | 2020-11-20 | 2021-01-08 | 恒宝股份有限公司 | Communication connection method, device and system |
CN112203271B (en) * | 2020-11-20 | 2023-09-15 | 恒宝股份有限公司 | Communication connection method, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN110851825B (en) | 2022-04-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110851825B (en) | eSIM card and working method thereof | |
EP2731381B1 (en) | Method for changing the mobile network operator in an embedded sim on basis of special privilege | |
US10334443B2 (en) | Method for configuring profile of subscriber authenticating module embedded and installed in terminal device, and apparatus using same | |
EP2741548B1 (en) | Method for changing mno in embedded sim on basis of dynamic key generation and embedded sim and recording medium therefor | |
CN111935110B (en) | Method and device for controlling permission of tenant to access container instance | |
CN109168156B (en) | Method, system, medium, computer program product and server for implementing virtual SIM card | |
KR101979162B1 (en) | Method for Managing Key of Embedded SIM, Embedded SIM and recording medium for the same | |
CN104754552A (en) | Trusted execution environment (TEE) initialization method and equipment | |
JP6923582B2 (en) | Information processing equipment, information processing methods, and programs | |
EP2727384B1 (en) | Method for accessing at least one service and corresponding system | |
CN101895883B (en) | Smart card supporting authentication arithmetic update and method for updating authentication arithmetic | |
JP4972706B2 (en) | Method for managing unique memory device identification display, server and mobile communication device | |
CN111372237B (en) | eSIM card operator file management method and device | |
CN111417109B (en) | eSIM card and operator file management method and management system thereof | |
CN111093186B (en) | eSIM card operator file management method and system | |
CN110933668B (en) | eSIM card and safety control method thereof | |
CN106485104A (en) | The self-repairing method of terminal security strategy and device, system | |
CN111050312B (en) | eSIM card operator file management method and device | |
CN117785028A (en) | Disk redirection method, device, equipment and medium | |
KR20140049935A (en) | Method for servicing smart card and apparatus for performing the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220323 Address after: 212355 Hengtang Industrial Zone, Danyang City, Zhenjiang City, Jiangsu Province Applicant after: HENGBAO Corp. Address before: 801, 8 / F, building 4a, international R & D headquarters park, 68 Olympic street, Jianye District, Nanjing City, Jiangsu Province 210019 Applicant before: JIANGSU HENGBAO INTELLIGENT SYSTEM TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |