CN110851825B - eSIM card and working method thereof - Google Patents

eSIM card and working method thereof Download PDF

Info

Publication number
CN110851825B
CN110851825B CN201911142458.XA CN201911142458A CN110851825B CN 110851825 B CN110851825 B CN 110851825B CN 201911142458 A CN201911142458 A CN 201911142458A CN 110851825 B CN110851825 B CN 110851825B
Authority
CN
China
Prior art keywords
information
esim card
operator server
operator
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911142458.XA
Other languages
Chinese (zh)
Other versions
CN110851825A (en
Inventor
钱京
崔可
尤洪松
梁宇
何碧波
底明辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengbao Co Ltd
Original Assignee
恒宝股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 恒宝股份有限公司 filed Critical 恒宝股份有限公司
Priority to CN201911142458.XA priority Critical patent/CN110851825B/en
Publication of CN110851825A publication Critical patent/CN110851825A/en
Application granted granted Critical
Publication of CN110851825B publication Critical patent/CN110851825B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses an eSIM card and a working method thereof, wherein the working method comprises the following steps: in response to the initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component; establishing a secure communication connection with a management server using the connection information; sending the initialization command to a management server; receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information; storing operator server communication public information in the blank sub-area; the carrier server communication private information is stored in the auxiliary security component. The method and the system can realize the safety management of the eSIM card, ensure that the eSIM card runs under a safety framework, and simultaneously manage each running data in the eSIM card by using a safety framework from issuing, transmitting to managing and deleting, thereby ensuring the safety of the whole running of the eSIM card.

Description

eSIM card and working method thereof
Technical Field
The present application relates to the field of computers, and in particular, to an eSIM card and a working method thereof.
Background
With the release of the 5G network, remote operators and the corresponding remote operator services thereof become application scenarios of future development, and then, eSIM (Embedded Subscriber identity Module) technology is continuously developed and improved, and devices implemented by using the eSIM technology are gradually favored by users. The data of a plurality of mobile operators are stored in the eSIM card, and when a user uses the eSIM card, the identity identification module of the eSIM card allows the user to select the operators according to the needs of the user and allows the user to switch at will at any time. Therefore, the user can select the mobile operator more flexibly, more terminal use cost is saved for the user, and convenience and safety are brought.
As shown in fig. 1, the existing eSIM card and management system 101 of a plurality of carriers is embedded in a terminal, and communication with a plurality of mobile carriers is realized through the terminal. As can be seen from fig. 1, in order to implement management of an eSIM, a terminal in the prior art typically accesses multiple operators through a network, and each operator manages data stored on an eSIM card. In the existing eSIM card management system, for the data security of the eSIM, information transmission is performed between an operator and an eSIM card by using an encryption key, and the information transmission mode can only ensure the security of the data of the operator, but does not consider the security of the eSIM card in the whole process of issuing and operating, so that the whole system of the eSIM card is in an unsafe state.
Disclosure of Invention
The application requests to protect an eSIM card and a working method thereof, and tries to provide a security management scheme for the eSIM card from the perspective of a system architecture.
The application provides a secure working method of an eSIM card, which comprises the following steps: in response to the initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component; establishing a secure communication connection with a management server using the connection information; sending the initialization command to a management server; receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information; storing operator server communication public information in the blank sub-area; the carrier server communication private information is stored in the auxiliary security component.
Preferably, the method further comprises presetting connection information into the trusted security component in advance, wherein the connection information is information required for establishing secure communication with the management server.
Preferably, the method further comprises periodically receiving the life cycle management information of the eSIM card through the established secure communication connection, and managing the eSIM card according to the life cycle management information of the eSIM card.
Preferably, the initialization command includes information of the operator server to be downloaded.
Preferably, the method further comprises periodically receiving information of the trusted application through the established secure communication connection, and downloading or updating the trusted application according to the information of the trusted application.
The present application further provides a mobile device comprising the following components: a memory chip storing a general execution environment; an eSIM card storing a secure execution environment; wherein the trusted security component and the auxiliary security component are arranged in the secure execution environment; the eSIM card executes the following steps: in response to the initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component; establishing a secure communication connection with a management server using the connection information; sending the initialization command to a management server; receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information; storing operator server communication public information in the blank sub-area; the carrier server communication private information is stored in the auxiliary security component.
Preferably, the method further comprises presetting connection information into the trusted security component in advance, wherein the connection information is information required for establishing secure communication with the management server.
Preferably, the method further comprises periodically receiving the life cycle management information of the eSIM card through the established secure communication connection, and managing the eSIM card according to the life cycle management information of the eSIM card.
Preferably, the initialization command includes carrier server communication information to be downloaded.
Preferably, the method further comprises periodically receiving information of the trusted application through the established secure communication connection, and downloading or updating the trusted application according to the information of the trusted application.
By the method and the device, the safety management of the eSIM card can be realized, the eSIM card is ensured to operate under a safety framework, and simultaneously, each operating data is managed by using the safety framework from issuing, transmission to management and deletion, so that the safety of the integral operation of the eSIM card is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a management structure diagram of an existing eSIM card and a plurality of carriers;
fig. 2 is a system configuration diagram of an eSIM card security service system according to the present application;
FIG. 3 is a system configuration diagram of the terminal of the present application;
fig. 4 is a flow chart of the working method of the present application.
Detailed Description
The technical solutions in the embodiments of the present application are clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Example 1
The application provides an eSIM card security service system which can realize security management of an eSIM card. The eSIM card security service system 201, as shown in fig. 2, includes the following components:
the system comprises a terminal, a plurality of operator management servers, an issuing terminal and a management server, wherein an eSIM card is embedded in the terminal. The components are matched with each other to realize the safety management of the full flow of the eSIM card.
The multiple operator servers issue the profile file to the eSIM card;
an issuing terminal which provides an eSIM card, presets a certificate for the eSIM card, and presets connection information of a management server, such as address information of the management server, key information required for communication between the eSIM card and the management server, and the like;
and the management server provides life cycle management and profile operator management of the eSIM card, storage and release of trusted applications, and life cycle management and management authorization of the trusted applications in the auxiliary security sub-component. Specifically, the working method is as follows:
1. for the life cycle management of the eSIM card, the method comprises the following sub-steps:
the eSIM card establishes a secure communication connection with a management server by using the management server connection information stored in the eSIM card;
sending the preset certificate of the eSIM card to a management server through a secure communication connection;
the management server obtains an eSIM card identifier according to the eSIM card preset certificate;
inquiring an eSIM card life cycle table to obtain an eSIM card life cycle state;
and managing the eSIM card according to the eSIM card lifecycle state.
The life cycle table of the eSIM card is as follows:
eSIM card identification Current life cycle state
E1 Activation
E2 Pausing
E3 Stop
The above only shows three eSIM cards schematically, and those skilled in the art know that the number of eSIM cards can be increased or decreased according to actual needs, and the number of eSIM cards can be in more than the three states.
Through the mode, the management of the service life cycle of the eSIM card by the management server can be realized.
2. The management server manages the operator server;
the management server collects operator server information periodically and/or the operator server actively sends its relevant information to the management server. The operator server information comprises information such as operator server identification, credit rating, supported network communication mode, operator server communication public information, operator server communication private information and the like; the management server stores the operator server information in a list for use when the eSIM card is initialized, and further pushes the operator server information to the eSIM card when the operator server is changed.
For example, when the operator server switches the network communication mode or suspends the service, the management server immediately notifies the use of the eSIM card of the relevant operator server, thereby preventing the loss.
3. Storage, release and management authorization of trusted applications;
the management server collects the trusted application information, stores part of the trusted application with high downloading frequency to the management server, and periodically releases the collected trusted application information, including information such as trusted application introduction, downloading frequency, downloading level and downloading address.
When the eSIM card requests to download a certain trusted application, the management server provides a management function, such as a management authorization function, that is, whether the eSIM card is allowed to download the trusted application is judged, and if so, the mobile terminal where the eSIM card is located downloads the trusted application, otherwise, the eSIM card is not allowed to download.
4. Lifecycle management of trusted applications;
and managing the trusted application, recording information of the trusted application, the downloading times of the trusted application, information of whether the trusted application needs to be paused or stopped and the like.
Further, as shown in fig. 3, the terminal 300 of the present application includes a memory card 301 and an eSIM card 302, where the memory card 301 stores a general execution environment (not shown), and the eSIM card 302 stores a secure execution environment (not shown). For example, a general execution environment is provided by the operating system of the terminal, and a secure chip on the eSIM card 302 provides a secure execution environment. One or more untrusted execution units are run in the general execution environment, e.g. untrusted execution units are applications that run in the general execution environment provided by the terminal, without high requirements on confidentiality and security.
The eSIM card includes a trusted security component and a plurality of secondary security components thereon, the trusted security component and the secondary security components operating in a secure execution environment, wherein:
the trusted security component stores an eSIM card preset certificate and key information required by the eSIM card for communicating with the management service; the trusted security component performs eSIM card registration management, profile file card storage and management, signing and authentication, initial key distribution, application authorization management, management of secondary security subcomponents (each secondary security subcomponent stores a trusted application). Obviously, the trusted security component requires a high level of security and high security, and is therefore stored in the secure chip of the eSIM card and operated in a secure execution environment.
When the general execution environment accesses the safe execution environment, the key is required to be used for authentication, and after the key authentication is passed, the access to the safe execution environment can be realized. But the access is an access with restricted rights, e.g. some untrusted execution units in the general purpose execution environment have full access rights, e.g. read and write rights, while other untrusted execution units have partial access rights, e.g. read only or write only rights. The security of data needing to be kept secret on the eSIM card is realized by arranging the security chip.
The generic execution environment is located on the terminal, i.e., the various untrusted execution components running thereon are accessible without special authentication.
Fast access to components or applications that do not require authentication is enabled through a generic execution environment.
Example 2
The construction of the eSIM card security service system is introduced above, and the secure working method of the eSIM card is described below with reference to fig. 4. The method comprises the following steps:
step S410, responding to an initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component;
wherein the initialization command can be issued by the mobile device or by a carrier server connected to the mobile device, the initialization command for performing initialization of an eSIM card on the mobile device.
Upon receiving the initialization command, a specified number of sub-regions are reserved in the trusted security component of the eSIM card. The specified number may be specified in advance.
Step S420, establishing a secure communication connection with a management server by using the connection information;
connection information, which is information required to establish secure communication with the management server, is preset in the trusted security component in advance. Establishing a secure communication connection with the management server using the connection information.
Step S430, sending the initialization command to a management server;
the initialization command includes information of the operator server to be downloaded.
Step S440, receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information;
and the operator server acquires the information of the operator server requested by the eSIM card according to the received initialization command, acquires an operator server identifier from the information, inquires the working state of the operator server according to the operator server identifier, and sends the operator server communication information containing the operator server communication public information and the operator server communication private information to the eSIM card when the working state is good.
Step S450, storing operator server communication public information in a blank subregion;
and storing the public information, such as operator server identification, public key information, communication path and the like, which is communicated with the operator server in the operator file, in the blank subarea of the credible safety part.
Further, if the sub-area in the trusted security component is fully occupied and no blank sub-area exists, applying for a new sub-area from the trusted security component. The common information is stored using the newly applied sub-regions.
And step S460, storing the communication private information of the operator server in the auxiliary safety component.
To enable subsequent connections, an auxiliary security component associated with the operator server is provided on the eSIM card. Multiple operator files may be stored on the eSIM card, each operator file being associated with one operator server, so that one operator server would correspond to an auxiliary security component on one eSIM card. Private information, such as transaction information, data download content, authentication information, and the like, in the operator file, which enables communication with the operator server, is stored in the auxiliary security component corresponding to the operator server.
Further, after the secure communication connection is established, the eSIM card may periodically receive the eSIM card lifecycle management information from the management server, and manage the eSIM card according to the eSIM card lifecycle management information.
Corresponding to the secure working method in fig. 3, an embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the steps of the secure control method.
Specifically, the storage medium can be a general-purpose storage medium, such as a removable disk, a hard disk, or the like, and when a computer program on the storage medium is executed, the method for issuing an eSIM certificate online can be performed.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments provided in the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus once an item is defined in one figure, it need not be further defined and explained in subsequent figures, and moreover, the terms "first", "second", "third", etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the present disclosure, which should be construed in light of the above teachings. Are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An eSIM card safe working method comprises the following steps:
in response to the initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component associated with the operator server; the eSIM card stores a plurality of operator files; each operator file is associated with an operator server; one operator server corresponds to an auxiliary safety component on one eSIM card;
establishing a secure communication connection with a management server using the connection information; the connection information is the connection information of a management server preset in the eSIM card;
sending the initialization command to a management server;
receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information;
storing operator server communication public information in the blank sub-area;
storing, in the auxiliary security component, private information in an operator file of the eSIM card in communication with an operator server;
the management server manages the life cycle of the eSIM card, and comprises the following steps:
sending the preset certificate of the eSIM card to a management server through a secure communication connection;
the management server obtains an eSIM card identifier according to the eSIM card preset certificate;
inquiring an eSIM card life cycle table to obtain an eSIM card life cycle state;
managing the eSIM card according to the life cycle state of the eSIM card;
the management server periodically collects operator server information, and pushes the operator server information to the eSIM card when the operator server changes; the operator server information includes operator server identification, credit rating, supported network communication mode, operator server communication public information, and operator server communication private information.
2. The secure working method of claim 1, further comprising presetting connection information, which is information required to establish secure communication with the management server, in advance into the trusted security component.
3. The secure operation method of claim 1, further comprising periodically receiving the eSIM card lifecycle management information through the established secure communication connection, and managing the eSIM card according to the eSIM card lifecycle management informativeness.
4. The secure working method of claim 1, wherein the initialization command includes information of an operator server to be downloaded.
5. The secure work method of claim 1, further comprising periodically receiving information of the trusted application through the established secure communication connection, and downloading or updating the trusted application according to the information of the trusted application.
6. A mobile device comprising the following components:
a memory chip storing a general execution environment;
an eSIM card storing a secure execution environment;
wherein the trusted security component and the auxiliary security component are arranged in the secure execution environment;
the eSIM card executes the following steps:
in response to the initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component associated with the operator server; the eSIM card stores a plurality of operator files; each operator file is associated with an operator server; one operator server corresponds to an auxiliary safety component on one eSIM card;
establishing a secure communication connection with a management server using the connection information; the connection information is the connection information of a management server preset in the eSIM card;
sending the initialization command to a management server;
receiving operator server communication information issued by a management server, wherein the operator server communication information comprises operator server communication public information and operator server communication private information;
storing operator server communication public information in the blank sub-area;
storing, in the auxiliary security component, private information in an operator file of the eSIM card in communication with an operator server;
the management server manages the life cycle of the eSIM card, and comprises the following steps:
sending the preset certificate of the eSIM card to a management server through a secure communication connection;
the management server obtains an eSIM card identifier according to the eSIM card preset certificate;
inquiring an eSIM card life cycle table to obtain an eSIM card life cycle state;
managing the eSIM card according to the life cycle state of the eSIM card;
the management server periodically collects operator server information, and pushes the operator server information to the eSIM card when the operator server changes; the operator server information includes operator server identification, credit rating, supported network communication mode, operator server communication public information, and operator server communication private information.
7. The mobile device of claim 6, further comprising pre-provisioning connection information into the trusted security component, the connection information being information required to establish secure communications with the management server.
8. The mobile device of claim 6, further comprising periodically receiving the eSIM card lifecycle management information over the established secure communication connection, the eSIM card being managed according to the eSIM card lifecycle management informativeness.
9. The mobile device of claim 6, wherein the initialization command includes carrier server communication information to be downloaded.
10. The mobile device of claim 6, further comprising periodically receiving information of the trusted application over the established secure communication connection, downloading or updating the trusted application in accordance with the information of the trusted application.
CN201911142458.XA 2019-11-20 2019-11-20 eSIM card and working method thereof Active CN110851825B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911142458.XA CN110851825B (en) 2019-11-20 2019-11-20 eSIM card and working method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911142458.XA CN110851825B (en) 2019-11-20 2019-11-20 eSIM card and working method thereof

Publications (2)

Publication Number Publication Date
CN110851825A CN110851825A (en) 2020-02-28
CN110851825B true CN110851825B (en) 2022-04-15

Family

ID=69603117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911142458.XA Active CN110851825B (en) 2019-11-20 2019-11-20 eSIM card and working method thereof

Country Status (1)

Country Link
CN (1) CN110851825B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111372237B (en) * 2020-03-17 2023-05-23 恒宝股份有限公司 eSIM card operator file management method and device
CN111417109B (en) * 2020-03-17 2023-05-23 恒宝股份有限公司 eSIM card and operator file management method and management system thereof
CN111757248A (en) * 2020-05-19 2020-10-09 物联神州网络股份有限公司 Multifunctional patrol guiding device based on connection orientation
CN112203271B (en) * 2020-11-20 2023-09-15 恒宝股份有限公司 Communication connection method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908024A (en) * 2010-08-17 2010-12-08 湖南源科高新技术有限公司 Encrypting method, device and hard disk
CN107613487A (en) * 2017-11-07 2018-01-19 恒宝股份有限公司 A kind of eSIM cards and its method of work
CN107979835A (en) * 2017-12-01 2018-05-01 恒宝股份有限公司 A kind of eSIM cards and its management method
CN110224838A (en) * 2019-06-11 2019-09-10 中国联合网络通信集团有限公司 Data managing method, device and storage medium based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102016206488B4 (en) * 2015-04-21 2022-10-27 Apple Inc. Managing inactive electronic subscriber identity modules

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908024A (en) * 2010-08-17 2010-12-08 湖南源科高新技术有限公司 Encrypting method, device and hard disk
CN107613487A (en) * 2017-11-07 2018-01-19 恒宝股份有限公司 A kind of eSIM cards and its method of work
CN107979835A (en) * 2017-12-01 2018-05-01 恒宝股份有限公司 A kind of eSIM cards and its management method
CN110224838A (en) * 2019-06-11 2019-09-10 中国联合网络通信集团有限公司 Data managing method, device and storage medium based on block chain

Also Published As

Publication number Publication date
CN110851825A (en) 2020-02-28

Similar Documents

Publication Publication Date Title
CN110851825B (en) eSIM card and working method thereof
EP2731381B1 (en) Method for changing the mobile network operator in an embedded sim on basis of special privilege
US10334443B2 (en) Method for configuring profile of subscriber authenticating module embedded and installed in terminal device, and apparatus using same
EP2741548B1 (en) Method for changing mno in embedded sim on basis of dynamic key generation and embedded sim and recording medium therefor
CN109168156B (en) Method, system, medium, computer program product and server for implementing virtual SIM card
KR101979162B1 (en) Method for Managing Key of Embedded SIM, Embedded SIM and recording medium for the same
CN111935110B (en) Method and device for controlling permission of tenant to access container instance
CN104754552A (en) Trusted execution environment (TEE) initialization method and equipment
JP6923582B2 (en) Information processing equipment, information processing methods, and programs
CN103974250A (en) Configuration method and equipment
CN109347839B (en) Centralized password management method and device, electronic equipment and computer storage medium
EP2727384B1 (en) Method for accessing at least one service and corresponding system
CN101895883B (en) Smart card supporting authentication arithmetic update and method for updating authentication arithmetic
US9398015B2 (en) Method for modifying rights to security domain for smartcard, and server, smartcard, and terminal for same
CN105825134A (en) Intelligent card processing method, intelligent card management server and terminal
CN111372237B (en) eSIM card operator file management method and device
CN111417109B (en) eSIM card and operator file management method and management system thereof
CN111093186B (en) eSIM card operator file management method and system
CN110933668B (en) eSIM card and safety control method thereof
CN111050312B (en) eSIM card operator file management method and device
CN117785028A (en) Disk redirection method, device, equipment and medium
KR20140049935A (en) Method for servicing smart card and apparatus for performing the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220323

Address after: 212355 Hengtang Industrial Zone, Danyang City, Zhenjiang City, Jiangsu Province

Applicant after: HENGBAO Corp.

Address before: 801, 8 / F, building 4a, international R & D headquarters park, 68 Olympic street, Jianye District, Nanjing City, Jiangsu Province 210019

Applicant before: JIANGSU HENGBAO INTELLIGENT SYSTEM TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant