TR201911383T4 - Güvenlik modülünün geliştirilmiş yaşam döngüsü yönetimi. - Google Patents

Güvenlik modülünün geliştirilmiş yaşam döngüsü yönetimi. Download PDF

Info

Publication number
TR201911383T4
TR201911383T4 TR2019/11383T TR201911383T TR201911383T4 TR 201911383 T4 TR201911383 T4 TR 201911383T4 TR 2019/11383 T TR2019/11383 T TR 2019/11383T TR 201911383 T TR201911383 T TR 201911383T TR 201911383 T4 TR201911383 T4 TR 201911383T4
Authority
TR
Turkey
Prior art keywords
life cycle
security module
cycle management
improved life
lifecycle state
Prior art date
Application number
TR2019/11383T
Other languages
English (en)
Inventor
Holtmanns Silke
Adolf Lindholm Rune
Original Assignee
Nokia Technologies Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Technologies Oy filed Critical Nokia Technologies Oy
Publication of TR201911383T4 publication Critical patent/TR201911383T4/tr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files

Abstract

Bir yöntem, bilgisayar programı, aparat ve bir güvenli modül tarif edilir. Örnek yolu ile yöntemde, güvenli bir modül için kilit açma yaşam döngüsü durumuna girmek üzere bir birinci varlıktan bir talep alma; kilit açma yaşam çevrimi durumuna girmek için onay isteme ve talebin onaylanması durumunda güvenli modülü mevcut bir yaşam döngüsü durumundan kilit açma yaşam döngüsü durumuna geçirme adımlarını bulunur.
TR2019/11383T 2011-12-07 2012-12-04 Güvenlik modülünün geliştirilmiş yaşam döngüsü yönetimi. TR201911383T4 (tr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US201161567750P 2011-12-07 2011-12-07

Publications (1)

Publication Number Publication Date
TR201911383T4 true TR201911383T4 (tr) 2019-08-21

Family

ID=48573316

Family Applications (1)

Application Number Title Priority Date Filing Date
TR2019/11383T TR201911383T4 (tr) 2011-12-07 2012-12-04 Güvenlik modülünün geliştirilmiş yaşam döngüsü yönetimi.

Country Status (6)

Country Link
US (1) US9021548B2 (tr)
EP (1) EP2789179B1 (tr)
CN (1) CN103988530B (tr)
PL (1) PL2789179T3 (tr)
TR (1) TR201911383T4 (tr)
WO (1) WO2013083874A1 (tr)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013131164A (ja) * 2011-12-22 2013-07-04 Internatl Business Mach Corp <Ibm> ロック機能を有する情報処理装置およびロック機能を実行させるためのプログラム
US9626859B2 (en) 2012-04-11 2017-04-18 Digilock Asia Limited Electronic locking systems, methods, and apparatus
EP3402235B1 (en) * 2012-05-23 2024-03-06 Samsung Electronics Co., Ltd. Method for control and enforcement of policy rule and euicc
FR3025965B1 (fr) * 2014-09-15 2016-09-30 Oberthur Technologies Procede d'administration de cycles de vie de profils de communication
US10013164B2 (en) * 2014-12-03 2018-07-03 Samsung Electronics Co., Ltd Optimizing access to universal integrated circuit card (UICC) files in a user equipment (UE)
WO2018072177A1 (zh) * 2016-10-20 2018-04-26 华为技术有限公司 嵌入式通用集成电路卡eUICC的管理方法及装置
EP3703400B1 (en) * 2017-12-19 2021-10-27 Huawei Technologies Co., Ltd. Profile management method and embedded universal integrated circuit card
KR102536948B1 (ko) 2018-10-29 2023-05-25 삼성전자주식회사 Ssp의 번들을 관리하는 방법 및 장치

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2347684A1 (en) * 1998-10-27 2000-05-04 Visa International Service Association Delegated management of smart card applications
US7063262B2 (en) * 2003-08-29 2006-06-20 Motorola, Inc. Method for provisioning and product
KR100640881B1 (ko) * 2004-12-22 2006-11-02 엘지전자 주식회사 이동통신 단말기의 사용자 인식모듈 해킹 방지방법
US7933583B2 (en) * 2005-04-27 2011-04-26 Nokia Corporation Method and apparatus for digital image processing of an image from an image sensor
US20080003980A1 (en) * 2006-06-30 2008-01-03 Motorola, Inc. Subsidy-controlled handset device via a sim card using asymmetric verification and method thereof
US8050705B2 (en) * 2006-10-12 2011-11-01 Dell Products L.P. Subscriber identity module unlocking service portal
US7941184B2 (en) * 2006-11-10 2011-05-10 Dell Products L.P. Methods and systems for managing and/or tracking use of subscriber identity module components
US7826825B2 (en) * 2007-02-25 2010-11-02 Motorola, Inc. Method and apparatus for providing a data protocol voice enabled subscription lock for a wireless communication device
JP2010141838A (ja) * 2008-12-15 2010-06-24 Toshiba Corp 携帯端末、携帯端末のネットワーク制御方法、携帯端末のネットワーク制御プログラム、および無線通信システム
SE532121C2 (sv) * 2009-02-13 2009-10-27 Smarttrust Ab Förfarande för att avaktivera och möjligen återaktivera SIM-kort
US8467768B2 (en) * 2009-02-17 2013-06-18 Lookout, Inc. System and method for remotely securing or recovering a mobile device
CN106714124A (zh) 2009-08-28 2017-05-24 中兴通讯股份有限公司 智能卡远程控制的方法和系统
US8737318B2 (en) * 2009-12-01 2014-05-27 At&T Intellectual Property I, L.P. Service models for roaming mobile device
TWI396996B (zh) * 2010-09-02 2013-05-21 Wistron Corp 合法解除sim卡鎖之方法、解鎖伺服器及sim卡鎖解除系統
EP2461613A1 (en) * 2010-12-06 2012-06-06 Gemalto SA Methods and system for handling UICC data
CN103583067B (zh) 2011-05-09 2017-04-12 诺基亚技术有限公司 用于多sim环境的sim锁定
US10075848B2 (en) * 2012-08-25 2018-09-11 T-Mobile Usa, Inc. SIM level mobile security

Also Published As

Publication number Publication date
EP2789179A1 (en) 2014-10-15
EP2789179A4 (en) 2015-08-12
US20130152159A1 (en) 2013-06-13
WO2013083874A1 (en) 2013-06-13
US9021548B2 (en) 2015-04-28
CN103988530A (zh) 2014-08-13
EP2789179B1 (en) 2019-05-15
PL2789179T3 (pl) 2019-10-31
CN103988530B (zh) 2018-03-27

Similar Documents

Publication Publication Date Title
TR201911383T4 (tr) Güvenlik modülünün geliştirilmiş yaşam döngüsü yönetimi.
GB2509036A (en) Providing a network-accessible malware analysis
MX2013012859A (es) Metodo, programa de computadora, aparato de recepcion, y aparato de suministro de informacion para la compactacion del activador.
NZ597431A (en) Methods for providing energy management utilizing a power meter
UA104088C2 (ru) Способ и устройство определения режима взаимодействия
GB2511017A (en) Providing a malware analysis using a secure malware detection process
MX2015003143A (es) Gestion de datos microsismicos para equiparacion de fracturas.
GB201319170D0 (en) Malware detection
EP2713548A4 (en) KEY GENERATION, FUSE AND MIGRATION PROCESSES AND SYSTEM ON THE BASIS OF TRUSTWORTHY DATA PROCESSING
IN2014DN03436A (tr)
WO2014055241A3 (en) Secure identification of computing device and secure identification methods
GB2501215A (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
GB2513753A (en) Consolidating disparate cloud service data and behavior based on trust relationships between cloud services
GB2502715A (en) Malware Detection
EA201590134A1 (ru) Способ и система идентификации защищенного документа
EP2680251A4 (en) SEARCHING SYSTEM, SEARCHING METHOD FOR SEARCHING SYSTEM, INFORMATION PROCESSING DEVICE, SEARCHING PROGRAM, CORRESPONDING KEYWORD MANAGEMENT DEVICE, AND CORRESPONDING KEYWORDS MANAGEMENT SYSTEM
MX2011008220A (es) Sistema de manejo de desempeño.
GB2506803A (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
GB2511691A (en) Detecting malware using patterns
GB2512214A (en) Multi-touch interface schemes
MX2012011955A (es) Generacion de un archivo unico de auditoria a partir de fuentes multiples.
FR2991105B1 (fr) Procede de determination d&#39;un etat d&#39;energie d&#39;un accumulateur electrochimique, dispositif, support et programme informatique
TW201613076A (en) System-on-chip to support full handshake and mobile device having the same
NZ601461A (en) Systems, methods, and apparatus for utility meter configuration
NZ601872A (en) Meter access management system