WO2009002042A2 - System for supporting over-the-air service and method thereof - Google Patents
System for supporting over-the-air service and method thereof Download PDFInfo
- Publication number
- WO2009002042A2 WO2009002042A2 PCT/KR2008/003441 KR2008003441W WO2009002042A2 WO 2009002042 A2 WO2009002042 A2 WO 2009002042A2 KR 2008003441 W KR2008003441 W KR 2008003441W WO 2009002042 A2 WO2009002042 A2 WO 2009002042A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ota
- data
- type
- message
- ota data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/24—Negotiation of communication capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
Definitions
- the present invention relates to a system and method for providing Over-The-Air (OTA) service.
- OTA Over-The-Air
- OTA service denotes a general type of wireless communication service which sends information as requested by the users of mobile terminals. That is, OTA service is a service in which an OTA server sends information to a mobile terminal when a user requests information from the OTA server.
- a mobile terminal installs terminal information related to mobile terminal or various types of applications (hereinafter ' applets ' ) in a smart cards and then uses these . Since smart cards can store and process a large amount of information and provide excellent security, the necessity for smart cards is gradually increasing. For example, smart cards can be used in the financial, communication, medical, security and broadcasting fields .
- smart cards may be generally classified into the following three types depending on their functions and internal structures. That is, smart cards may include 1) memory-type smart cards in which microprocessors are not embedded, 2) smart cards in which microprocessors are embedded, and 3) interactive smart cards in which applications are installed and which are capable of the bi- directional transmission of information.
- Such smart cards are used separately for their respective purposes, and are provided with data corresponding to terminal information or an applet via a Short Message Service (SMS) message. Accordingly, there is a data transmission capacity problem, for example, only data of a maximum size of 180 bytes can be sent, and thus currently it is possible to send only a small amount of data.
- SMS Short Message Service
- an object of the present invention is to provide a system and method for providing OTA service which enables OTA data to be encrypted and decrypted using preset OTA keys depending on the type of OTA data, thereby enabling various types of OTA data to be installed or stored in a single smart card.
- Another object of the present invention is to provide a system and method for providing OTA service which divides and provides OTA data depending on the processing capacity of a smart card, thereby enabling the efficient processing of a large amount of OTA data.
- a system including a mobile terminal for, when a message is received from an OTA server, dividing OTA data, included in the message, into data segments of a predetermined size depending on a size of the message; and a smart card for receiving each of the data segments, decrypting the data segment using a preset OTA key, and storing the decrypted OTA data in a preset area.
- a smart card including a first processing unit for receiving OTA data from a mobile terminal, decrypting the received OTA data using a first type of OTA key, and determining whether to process a first type of extracted OTA data; a CPU for receiving the first type of OTA data depending on results of the determination; and a second processing unit for receiving the first type of OTA data from the CPU, decrypting the first type of OTA data using a second type of OTA key, and processing a second type of extracted OTA data.
- a method of providing OTA service including, dividing OTA data, included in the message, into data segments of a predetermined size depending on a size of the message when a message is received from an OTA server; and sending each of the data segments to a smart card.
- a method of providing OTA service including, decrypting the received OTA data using a first type of OTA key when OTA data is received from a mobile terminal and determining whether to process a first type of extracted OTA data through a first processing unit; receiving the first type of OTA data from the first processing unit depending on results of the determination; and decrypting the first type of OTA data using a second type of OTA key and processing a second type of extracted OTA data through a second processing unit.
- Fig. 1 is a diagram showing an example of the schematic construction of a system according to an embodiment of the present invention
- Fig. 2 is a first flowchart showing a method of providing OTA service according to an embodiment of the present invention
- Fig. 3 is a diagram showing an example of the detailed construction of the smart card shown in Fig. 1;
- Fig. 4 is a second flowchart showing a method of providing OTA service according to an embodiment of the present invention. description of reference numerals of principal elements in the drawings>
- first storage unit 320 second storage unit
- the present invention proposes a method of constructing a USIM/SIM Application Toolkit (USAT) framework and a Global Platform (GP) framework in a smart card and installing or storing various types of OTA data in the smart card via the frameworks. That is, the present invention enables all services, including financial services such as mobile banking, stock trading and a credit card service, daily life infrastructure services such as a traffic card service and an ID card service, and other services such as a broadcasting service and a communication service, to be incorporated into a single smart card.
- financial services such as mobile banking, stock trading and a credit card service
- daily life infrastructure services such as a traffic card service and an ID card service
- other services such as a broadcasting service and a communication service
- the present invention proposes the setup of OTA keys in the respective frameworks to grant processing rights for various types of OTA data. Accordingly, the present invention allows for the provision of OTA data, for example, a mobile application which requires a large amount of data, via Multimedia Message Service (MMS) messages.
- MMS Multimedia Message Service
- a mobile application may refer to a program that is downloaded to a mobile terminal, and is independently executed and used.
- Fig. 1 is a diagram showing an example of the schematic construction of a system according to an embodiment of the present invention.
- the system according to the present invention may include a smart card 110, a mobile terminal 120, a message center 130, an OTA server 140, and a database 141.
- OTA data such as various types of terminal information related to mobile terminal and mobile applications (hereinafter 'applets') corresponding to various types of additional services, for use in the financial, communication, medical, security and broadcasting fields, may be installed in the smart card 110.
- the mobile terminal 120 which operates in conjunction with the smart card 110, may use the OTA data installed in the smart card 110.
- the smart card 110 may refer to any one of a Subscriber Identification Module (SIM) card, a Universal Subscriber Identification Module (USIM) card, a User Identification Module (UIM) card and a Removable User Identification Module (RUIM) card, which may be installed in or detachably attached to the mobile terminal 120.
- SIM Subscriber Identification Module
- USIM Universal Subscriber Identification Module
- UAM User Identification Module
- RUIM Removable User Identification Module
- the OTA server 140 may create a message, including OTA data.
- the OTA server 140 may provide the created message to the mobile terminal 120 through the message center 130.
- the database 141 may assemble and manage OTA data to be installed or stored in the smart card 110.
- the message center 130 may send a message including
- the message center 130 may be any one of a Short Message Service Center (SMSC) , a Long Message
- LMSC Mobile Broadcast Service Center
- Multimedia Message Service Center LMSC and a Multimedia Message Service Center
- the present invention proposes a method of dividing
- the present invention allows for the efficient processing of a large amount of OTA data.
- Fig. 2 is a first flowchart showing a method of providing OTA service according to an embodiment of the present invention.
- the mobile terminal may request the OTA data from the OTA server.
- the OTA server may check the type of requested OTA data, that is, whether the requested OTA data is a first type of OTA data corresponding to terminal information related to mobile terminal or a second type of OTA data corresponding to service information related to additional service.
- the OTA server may search the database for the OTA data.
- the OTA server may encrypt found OTA data using a preset OTA key.
- the OTA server may create a message including the encrypted OTA data.
- the OTA server may encrypt the OTA data using a preset OTA key depending on the type of OTA data.
- OTA keys for encrypting OTA data may include a first type of OTA key that is used for terminal information such as an authentication value for the authentication of a mobile terminal, a phone book, and a language for the setting of the mobile terminal, and a second type of OTA key that is used for service information such as an applet for the use of an additional service, for example, banking, stock trading, a certificate service or a credit card service, and personal information related to applet such as a bank account number, an encryption key value and a Personal Identification Number (PIN) .
- terminal information such as an authentication value for the authentication of a mobile terminal, a phone book, and a language for the setting of the mobile terminal
- service information such as an applet for the use of an additional service, for example, banking, stock trading, a certificate service or a credit card service, and personal information related to applet such as a bank account number, an encryption
- the OTA server may create a first type of encrypted OTA data by encrypting the first type of OTA data using a first type of OTA key. Accordingly, the OTA server may create a message including the first type of encrypted OTA data.
- the OTA server may create a second type of encrypted OTA data by encrypting the second type of OTA data using a second type of OTA key. Accordingly, the OTA server may create a message including the second type of encrypted OTA data.
- the OTA server may opt not to include the second type of primarily encrypted OTA data in a message, but may secondarily encrypt the second type of primarily encrypted OTA data using the first type of OTA key and then create a message including the second type of secondarily encrypted OTA data. Thereafter, the OTA server may send the created message to the message center at step S210. The message center may send the message to the mobile terminal at step S220.
- the message may be any one of a Short Message Service (SMS) message, a Long Message Service (LMS) message and a Multimedia Message Service (MMS) message.
- SMS Short Message Service
- LMS Long Message Service
- MMS Multimedia Message Service
- the mobile terminal may receive the message.
- the mobile terminal may determine whether the size of the received message is equal to or larger than a preset threshold value V thr at step S230.
- the mobile terminal may extract encrypted OTA data from the received message. Accordingly, the mobile terminal may send the extracted OTA data to the smart card without change. In contrast, if the size of the message is equal to or larger than the preset threshold value V thr/ the mobile terminal may create an information request message, requesting information corresponding to the processing capacity of the smart card, such as CPU information.
- the mobile terminal may send the created information request message to the smart card at step S240.
- the smart card may create an information response message in response to the information request message.
- the smart card may send the created information response message to the mobile terminal at step S250.
- the mobile terminal may receive the information response message.
- the mobile terminal may divide the encrypted OTA data into data segments of a predetermined size based on the information response message at step S260.
- the mobile terminal may send each of the data segments to the smart card at step S270.
- the smart card may receive and process the data segment at step S280.
- various types of OTA data may be installed or stored in a single smart card in such a way as to encrypt and decrypt OTA data using preset OTA keys depending on the type of data.
- Fig. 3 is a diagram showing an example of the detailed construction of the smart card shown in Fig. 1.
- the smart card according to the present invention may include a first storage unit 310, a second storage unit 320, a first processing unit 330, a second processing unit 340, Read Only Memory (ROM) 350, a Central Processing Unit (CPU) 360, Random Access Memory (RAM) 370, and an interface 380.
- ROM Read Only Memory
- CPU Central Processing Unit
- RAM Random Access Memory
- the interface 380 may receive encrypted OTA data from the mobile terminal.
- the CPU 360 may provide the received OTA data to the first processing unit 330, and may receive OTA data from the first processing unit 330 or the second processing unit 340 and then provide the OTA data to the mobile terminal through the interface 380.
- the ROM 350 may store an operating system and programs related thereto.
- the RAM 370 may be used as working space for the CPU 360.
- the first processing unit 330 may receive encrypted OTA data from the mobile terminal.
- the first processing unit 330 may decrypt the OTA data using a first type of OTA key and extract a first type of OTA data.
- the first processing unit 330 may process a first type of extracted OTA data, that is, it may install or store a first type of extracted OTA data in the first storage unit 310.
- the first processing unit 330 may provide the extracted OTA data to the second processing unit 340.
- the second processing unit 340 may receive the encrypted OTA data from the first processing unit 330.
- the second processing unit 340 may decrypt the OTA data using a second type of OTA key and extract a second type of OTA data. Accordingly, the second processing unit 340 may process a second type of extracted OTA data, that is, it may install or store the second type of extracted OTA data in the second storage unit 320.
- a USIM/SIM Application Toolkit (USAT) framework may be applied to the first processing unit.
- a Global Platform (GP) framework may be applied to the second processing unit.
- first storage unit 310 and the second storage unit 320 may be formed of respective separate areas in a single piece of Electrically Erasable and Programmable
- EEPROM Read Only Memory
- the present invention allows for the division and provision of OTA data depending on the processing capacity of a smart card, thereby enabling the efficient processing of a large amount of data.
- Fig. 4 is a second flowchart showing a method of providing OTA service according to an embodiment of the present invention.
- the CPU may receive encrypted OTA data from the mobile terminal at step S410.
- the CPU may send the received OTA data to the first processing unit first at step S420.
- the first processing unit may receive the encrypted OTA data from the CPU.
- the first processing unit may decrypt the encrypted OTA data using a first type of preset OTA key and extract a first type of OTA data at step S430.
- the first processing unit may check whether the first type of extracted OTA data has been encrypted at step S440. That is, since the first processing unit determines extracted OTA data to be a first type of OTA data if the extracted OTA data has not been encrypted, the first processing unit may install or store the extracted OTA data in the first storage unit at step S481.
- the first processing unit may return the first type of extracted OTA data to the CPU at step S450. Accordingly, the CPU may send the first type of returned OTA data to the second processing unit at step S460.
- the second processing unit may receive the first type of OTA data from the first processing unit .
- the second processing unit may decrypt the first type of OTA data using a second type of preset OTA key and extract a second type of
- the second processing unit may install or store the second type of extracted OTA data in the second storage unit at step S480.
- OTA data is encrypted and decrypted using preset OTA keys, that is, the first type of OTA key and the second type of OTA key, and thus processing rights for various types of OTA data can be distinctively granted through the above-described procedure.
- the system and method for providing OTA service according to the present invention may be varied and modified within the scope of the technical spirit of the present invention, and is not limited to the above-described embodiments.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Sub-Exchange Stations And Push- Button Telephones (AREA)
Abstract
Disclosed herein is a system and method for providing Over-The-Air (OTA) service. The system according to the present invention includes a mobile terminal for, when a message is received from an OTA server, dividing OTA data, included in the message, into data segments of a predetermined size depending on a size of the message, and a smart card for receiving each of the data segments, decrypting the data segment using a preset OTA key, and storing the decrypted OTA data in a preset area.
Description
[DESCRIPTION]
[invention Title]
SYSTEM FOR SUPPORTING OVER-THE-AIR SERVICE AND METHOD THEREOF [Technical Field]
The present invention relates to a system and method for providing Over-The-Air (OTA) service. [Background Art]
In general, OTA service denotes a general type of wireless communication service which sends information as requested by the users of mobile terminals. That is, OTA service is a service in which an OTA server sends information to a mobile terminal when a user requests information from the OTA server. A mobile terminal installs terminal information related to mobile terminal or various types of applications (hereinafter ' applets ' ) in a smart cards and then uses these . Since smart cards can store and process a large amount of information and provide excellent security, the necessity for smart cards is gradually increasing. For example, smart cards can be used in the financial, communication, medical, security and broadcasting fields .
Here, smart cards may be generally classified into the following three types depending on their functions and internal structures. That is, smart cards may include 1)
memory-type smart cards in which microprocessors are not embedded, 2) smart cards in which microprocessors are embedded, and 3) interactive smart cards in which applications are installed and which are capable of the bi- directional transmission of information.
Such smart cards are used separately for their respective purposes, and are provided with data corresponding to terminal information or an applet via a Short Message Service (SMS) message. Accordingly, there is a data transmission capacity problem, for example, only data of a maximum size of 180 bytes can be sent, and thus currently it is possible to send only a small amount of data.
As a countermeasure against this problem, a method of transmitting OTA data through a Virtual Machine (VM) and a browser has been proposed. However, this method also has a problem in that OTA data can be received only when access to the wireless Internet has been made.
As a result, research into a system and method for providing OTA service that enables various types of OTA data to be installed or stored in a single smart card and processed efficiently must be continuously conducted. [Disclosure]
Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and an object of the present invention is to provide a
system and method for providing OTA service which enables OTA data to be encrypted and decrypted using preset OTA keys depending on the type of OTA data, thereby enabling various types of OTA data to be installed or stored in a single smart card.
Another object of the present invention is to provide a system and method for providing OTA service which divides and provides OTA data depending on the processing capacity of a smart card, thereby enabling the efficient processing of a large amount of OTA data.
In order to achieve the above objects, according to an aspect of the present invention, there is provided a system, including a mobile terminal for, when a message is received from an OTA server, dividing OTA data, included in the message, into data segments of a predetermined size depending on a size of the message; and a smart card for receiving each of the data segments, decrypting the data segment using a preset OTA key, and storing the decrypted OTA data in a preset area. According to another aspect of the present invention, there is provided a smart card, including a first processing unit for receiving OTA data from a mobile terminal, decrypting the received OTA data using a first type of OTA key, and determining whether to process a first type of extracted OTA data; a CPU for receiving the first type of OTA
data depending on results of the determination; and a second processing unit for receiving the first type of OTA data from the CPU, decrypting the first type of OTA data using a second type of OTA key, and processing a second type of extracted OTA data.
According to still another aspect of the present invention, there is provided a method of providing OTA service, including, dividing OTA data, included in the message, into data segments of a predetermined size depending on a size of the message when a message is received from an OTA server; and sending each of the data segments to a smart card.
According to still another aspect of the present invention, there is provided a method of providing OTA service, including, decrypting the received OTA data using a first type of OTA key when OTA data is received from a mobile terminal and determining whether to process a first type of extracted OTA data through a first processing unit; receiving the first type of OTA data from the first processing unit depending on results of the determination; and decrypting the first type of OTA data using a second type of OTA key and processing a second type of extracted OTA data through a second processing unit. [Description of Drawings]
Fig. 1 is a diagram showing an example of the schematic construction of a system according to an embodiment of the present invention;
Fig. 2 is a first flowchart showing a method of providing OTA service according to an embodiment of the present invention;
Fig. 3 is a diagram showing an example of the detailed construction of the smart card shown in Fig. 1; and
Fig. 4 is a second flowchart showing a method of providing OTA service according to an embodiment of the present invention. description of reference numerals of principal elements in the drawings>
110: smart card 120: mobile terminal
130: message center
140: OTA server
141: database
310: first storage unit 320: second storage unit
330: first processing unit
340: second processing unit
350: ROM (Read Only Memory)
360: CPU (Central Processing Unit) 370: RAM (Random Access Memory)
380: interface [Mode for Invention]
A system and method of providing OTA service according to an embodiment of the present invention will be described in detail below with reference to Figs . 1 to 4.
The present invention proposes a method of constructing a USIM/SIM Application Toolkit (USAT) framework and a Global Platform (GP) framework in a smart card and installing or storing various types of OTA data in the smart card via the frameworks. That is, the present invention enables all services, including financial services such as mobile banking, stock trading and a credit card service, daily life infrastructure services such as a traffic card service and an ID card service, and other services such as a broadcasting service and a communication service, to be incorporated into a single smart card.
For this purpose, the present invention proposes the setup of OTA keys in the respective frameworks to grant processing rights for various types of OTA data. Accordingly, the present invention allows for the provision of OTA data, for example, a mobile application which requires a large amount of data, via Multimedia Message Service (MMS) messages. Here, a mobile application may refer to a program that is downloaded to a mobile terminal, and is independently executed and used.
Fig. 1 is a diagram showing an example of the schematic construction of a system according to an embodiment of the present invention.
As shown in Fig. 1, the system according to the present invention may include a smart card 110, a mobile terminal 120, a message center 130, an OTA server 140, and a database 141.
OTA data, such as various types of terminal information related to mobile terminal and mobile applications (hereinafter 'applets') corresponding to various types of additional services, for use in the financial, communication, medical, security and broadcasting fields, may be installed in the smart card 110. The mobile terminal 120, which operates in conjunction with the smart card 110, may use the OTA data installed in the smart card 110.
In this case, the smart card 110 may refer to any one of a Subscriber Identification Module (SIM) card, a Universal Subscriber Identification Module (USIM) card, a User Identification Module (UIM) card and a Removable User Identification Module (RUIM) card, which may be installed in or detachably attached to the mobile terminal 120.
The OTA server 140 may create a message, including OTA data. The OTA server 140 may provide the created message to the mobile terminal 120 through the message center 130.
The database 141 may assemble and manage OTA data to be installed or stored in the smart card 110.
The message center 130 may send a message including
OTA data. For example, the message center 130 may be any one of a Short Message Service Center (SMSC) , a Long Message
Service Center (LMSC) and a Multimedia Message Service Center
(MMSC) .
The present invention proposes a method of dividing
OTA data depending on the processing capacity of a smart card and then sending divided OTA data. Using this method, the present invention allows for the efficient processing of a large amount of OTA data.
Fig. 2 is a first flowchart showing a method of providing OTA service according to an embodiment of the present invention.
As shown in Fig. 2, when a user requires OTA data, the mobile terminal may request the OTA data from the OTA server. The OTA server may check the type of requested OTA data, that is, whether the requested OTA data is a first type of OTA data corresponding to terminal information related to mobile terminal or a second type of OTA data corresponding to service information related to additional service.
The OTA server may search the database for the OTA data. The OTA server may encrypt found OTA data using a
preset OTA key. The OTA server may create a message including the encrypted OTA data.
In this case, the OTA server may encrypt the OTA data using a preset OTA key depending on the type of OTA data. Such OTA keys for encrypting OTA data may include a first type of OTA key that is used for terminal information such as an authentication value for the authentication of a mobile terminal, a phone book, and a language for the setting of the mobile terminal, and a second type of OTA key that is used for service information such as an applet for the use of an additional service, for example, banking, stock trading, a certificate service or a credit card service, and personal information related to applet such as a bank account number, an encryption key value and a Personal Identification Number (PIN) .
In greater detail, if the requested OTA data is a first type of OTA data, the OTA server may create a first type of encrypted OTA data by encrypting the first type of OTA data using a first type of OTA key. Accordingly, the OTA server may create a message including the first type of encrypted OTA data.
If the requested OTA data is a second type of OTA data, the OTA server may create a second type of encrypted OTA data by encrypting the second type of OTA data using a second type of OTA key. Accordingly, the OTA server may
create a message including the second type of encrypted OTA data.
In this case, when creating the message including the second type of encrypted OTA data, the OTA server may opt not to include the second type of primarily encrypted OTA data in a message, but may secondarily encrypt the second type of primarily encrypted OTA data using the first type of OTA key and then create a message including the second type of secondarily encrypted OTA data. Thereafter, the OTA server may send the created message to the message center at step S210. The message center may send the message to the mobile terminal at step S220.
In this case, the message may be any one of a Short Message Service (SMS) message, a Long Message Service (LMS) message and a Multimedia Message Service (MMS) message.
The mobile terminal may receive the message. The mobile terminal may determine whether the size of the received message is equal to or larger than a preset threshold value Vthr at step S230.
If the size of the message is smaller than the preset threshold value Vthr/ the mobile terminal may extract encrypted OTA data from the received message. Accordingly, the mobile terminal may send the extracted OTA data to the smart card without change.
In contrast, if the size of the message is equal to or larger than the preset threshold value Vthr/ the mobile terminal may create an information request message, requesting information corresponding to the processing capacity of the smart card, such as CPU information.
Thereafter, the mobile terminal may send the created information request message to the smart card at step S240.
The smart card may create an information response message in response to the information request message. The smart card may send the created information response message to the mobile terminal at step S250.
The mobile terminal may receive the information response message. The mobile terminal may divide the encrypted OTA data into data segments of a predetermined size based on the information response message at step S260.
Accordingly, the mobile terminal may send each of the data segments to the smart card at step S270.
As a result, the smart card may receive and process the data segment at step S280. As described above, in the present invention, various types of OTA data may be installed or stored in a single smart card in such a way as to encrypt and decrypt OTA data using preset OTA keys depending on the type of data.
Fig. 3 is a diagram showing an example of the detailed construction of the smart card shown in Fig. 1.
As shown in Fig. 3 , the smart card according to the present invention may include a first storage unit 310, a second storage unit 320, a first processing unit 330, a second processing unit 340, Read Only Memory (ROM) 350, a Central Processing Unit (CPU) 360, Random Access Memory (RAM) 370, and an interface 380.
The interface 380 may receive encrypted OTA data from the mobile terminal.
The CPU 360 may provide the received OTA data to the first processing unit 330, and may receive OTA data from the first processing unit 330 or the second processing unit 340 and then provide the OTA data to the mobile terminal through the interface 380.
The ROM 350 may store an operating system and programs related thereto. The RAM 370 may be used as working space for the CPU 360.
The first processing unit 330 may receive encrypted OTA data from the mobile terminal. The first processing unit 330 may decrypt the OTA data using a first type of OTA key and extract a first type of OTA data.
Accordingly, the first processing unit 330 may process a first type of extracted OTA data, that is, it may install or store a first type of extracted OTA data in the first storage unit 310.
In contrast, if the OTA data extracted using the first type of OTA key is encrypted OTA data that cannot be processed by the first processing unit 330, the first processing unit 330 may provide the extracted OTA data to the second processing unit 340.
The second processing unit 340 may receive the encrypted OTA data from the first processing unit 330. The second processing unit 340 may decrypt the OTA data using a second type of OTA key and extract a second type of OTA data. Accordingly, the second processing unit 340 may process a second type of extracted OTA data, that is, it may install or store the second type of extracted OTA data in the second storage unit 320.
In this case, a USIM/SIM Application Toolkit (USAT) framework may be applied to the first processing unit. A Global Platform (GP) framework may be applied to the second processing unit.
Here, the first storage unit 310 and the second storage unit 320 may be formed of respective separate areas in a single piece of Electrically Erasable and Programmable
Read Only Memory (EEPROM) capable of storing OTA data, or may be formed of respective pieces of EEPROM.
As described above, the present invention allows for the division and provision of OTA data depending on the
processing capacity of a smart card, thereby enabling the efficient processing of a large amount of data.
Fig. 4 is a second flowchart showing a method of providing OTA service according to an embodiment of the present invention.
As shown in Fig. 4, the CPU may receive encrypted OTA data from the mobile terminal at step S410. The CPU may send the received OTA data to the first processing unit first at step S420. Accordingly, the first processing unit may receive the encrypted OTA data from the CPU. The first processing unit may decrypt the encrypted OTA data using a first type of preset OTA key and extract a first type of OTA data at step S430. The first processing unit may check whether the first type of extracted OTA data has been encrypted at step S440. That is, since the first processing unit determines extracted OTA data to be a first type of OTA data if the extracted OTA data has not been encrypted, the first processing unit may install or store the extracted OTA data in the first storage unit at step S481.
In contrast, if the first type of extracted OTA data has been encrypted, the first processing unit may return the first type of extracted OTA data to the CPU at step S450.
Accordingly, the CPU may send the first type of returned OTA data to the second processing unit at step S460.
The second processing unit may receive the first type of OTA data from the first processing unit . The second processing unit may decrypt the first type of OTA data using a second type of preset OTA key and extract a second type of
OTA data at step S470.
As a result, the second processing unit may install or store the second type of extracted OTA data in the second storage unit at step S480.
The reason for this is to enable the first processing unit to access the OTA data using the first type of OTA key and enable the second processing unit to access the OTA data using the second type of OTA key. As described above, in the present invention, OTA data is encrypted and decrypted using preset OTA keys, that is, the first type of OTA key and the second type of OTA key, and thus processing rights for various types of OTA data can be distinctively granted through the above-described procedure. The system and method for providing OTA service according to the present invention may be varied and modified within the scope of the technical spirit of the present invention, and is not limited to the above-described embodiments. Furthermore, the above embodiments and drawings are intended to describe the content of the present invention
in detail, but are not intended to limit the range of the technical spirit of the present invention. Since it will be apparent to those skilled in that art that various substitutions, variations and modifications of the present invention are possible within the scope of the technical spirit of the present invention, the present invention is not limited to the above-described embodiments and the attached drawings. The range of the rights of the present invention should be appreciated on the basis of the range of equivalents to the present invention, as well as the following claims .
Claims
[CLAIMS]
[Claim l]
A system, comprising: a mobile terminal for, when a message is received from an Over-The-Air (OTA) server, dividing OTA data, included in the message, into data segments of a predetermined size depending on a size of the message; and a smart card for receiving each of the data segments, decrypting the data segment using a preset OTA key, and storing the decrypted OTA data in a preset area.
[Claim 2]
The system according to claim 1, wherein the mobile terminal : if a size of the message is equal to or larger than a preset threshold value, creating an information request message, requesting information corresponding to data processing capacity of the smart card, and sending the information request message to the smart card; and receiving an information response message from the smart card as a response to the information request message, and dividing the OTA data into the data segments of a predetermined size based on information included in the received information response message.
[Claim 3] The system according to claim 1, wherein the smart card: receives the OTA data, decrypts the OTA data using a first type of OTA key, and stores a first type of extracted OTA data in a first storage unit; or decrypts the first type of OTA data, extracted using the first type of OTA key, using a second type of OTA key, and stores a second type of extracted OTA data in a second storage unit .
[Claim 4]
The system according to claim 1, wherein the smart card is any one of a Subscriber Identification Module (SIM) card, a Universal Subscriber Identification Module (USIM) card, a User Identification Module (UIM) card and a Removable User Identification Module (RUIM) card, which is capable of being installed in or detachably attached to the mobile terminal .
[Claim 5]
The system according to claim 1, wherein the message is any one of a Short Message Service (SMS) message, a Long Message Service (LMS) message and a Multimedia Message Service (MMS) message.
[Claim 6]
A smart card, comprising: a first processing unit for receiving OTA data from a mobile terminal, decrypting the received OTA data using a first type of OTA key, and determining whether to process a first type of extracted OTA data; a Central Processing Unit (CPU) for receiving the first type of OTA data depending on results of the determination; and a second processing unit for receiving the first type of OTA data from the CPU, decrypting the first type of OTA data using a second type of OTA key, and processing a second type of extracted OTA data.
[Claim 7]
The smart card according to claim 6, wherein the first processing unit : if the first type of OTA data, extracted by decrypting the OTA data using the first type of OTA key, has not been encrypted, installs or stores the first type of OTA data in a first storage unit; and if the first type of OTA data, extracted using the first type of OTA key, has been encrypted, returns the first type of OTA data to the CPU.
[Claim 8]
The smart card according to claim 6, wherein a USIM/SIM Application Toolkit (USAT) framework is applied to the first processing unit, and a Global Platform (GP) framework is applied to the second processing unit .
[Claim 9]
The smart card according to claim 6, further comprising: an interface for sending and receiving the OTA data to and from the mobile terminal; and a CPU for providing the received OTA data to the first processing unit, receiving the OTA data from the first processing unit or the second processing unit, and providing the OTA data to the mobile terminal through the interface.
[Claim 10]
A method of providing OTA service, comprising: dividing OTA data, included in the message, into data segments of a predetermined size depending on a size of the message when a message is received from an OTA server; and sending each of the data segments to a smart card.
[Claim 11]
The method according to claim 10, wherein the division of the OTA data into the data segments of a predetermined size comprises : determining whether a size of the received message is equal to or larger than a preset threshold value,- determining whether to divide the OTA data included in the message if the size of the message is equal to or larger than the threshold value; and dividing the OTA data, included in the message, into data segments of a predetermined size depending to results of the determination.
[Claim 12]
The method according to claim 11, wherein the determination of whether to divide the OTA data comprises : sending an information request message, requesting information corresponding to data processing capability of the smart card, to the smart card depending on whether to divide the OTA data if the size of the message is equal to or larger than the threshold value; receiving an information response message in response to the information request message from the smart card; and determining whether to divide the OTA data based on information included in the received information response message when the mobile terminal receives the information response message.
[Claim 13]
A method of providing OTA service, comprising: decrypting the received OTA data using a first type of OTA key when OTA data is received from a mobile terminal and determining whether to process a first type of extracted OTA data through a first processing unit; receiving the first type of OTA data from the first processing unit depending on results of the determination; and decrypting the first type of OTA data using a second type of OTA key and processing a second type of extracted OTA data through a second processing unit.
[Claim 14] The method according to claim 13 , wherein the determination of whether to process the first type of OTA data comprises : sending the OTA data to the first processing unit when the OTA data is received from the mobile terminal; and decrypting the OTA data and determining whether to process a first type of extracted OTA data through the first processing unit. [Claim 15]
The method according to claim 13 , wherein the processing of the second type of OTA data comprises: receiving the first type of extracted OTA data from the first processing unit depending on results of the determination; sending the first type of received OTA data to the second processing unit; and decrypting the first type of OTA data using a second type of OTA key and processing a second type of extracted OTA data through the second processing unit.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/666,204 US8284940B2 (en) | 2007-06-22 | 2008-06-18 | System for supporting over-the-air service and method thereof |
EP08766402.5A EP2163113B1 (en) | 2007-06-22 | 2008-06-18 | System for supporting over-the-air service and method thereof |
JP2010513111A JP5116846B2 (en) | 2007-06-22 | 2008-06-18 | System and method for providing OTA service |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020070061687A KR100840904B1 (en) | 2007-06-22 | 2007-06-22 | System for supporting over-the-air service and method thereof |
KR10-2007-0061687 | 2007-06-22 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2009002042A2 true WO2009002042A2 (en) | 2008-12-31 |
WO2009002042A3 WO2009002042A3 (en) | 2009-02-26 |
Family
ID=39772323
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2008/003441 WO2009002042A2 (en) | 2007-06-22 | 2008-06-18 | System for supporting over-the-air service and method thereof |
Country Status (5)
Country | Link |
---|---|
US (1) | US8284940B2 (en) |
EP (1) | EP2163113B1 (en) |
JP (1) | JP5116846B2 (en) |
KR (1) | KR100840904B1 (en) |
WO (1) | WO2009002042A2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2395781A1 (en) * | 2010-06-10 | 2011-12-14 | Research in Motion Limited | Method and system for secure provisioning of a wireless device |
US9621716B2 (en) | 2010-06-10 | 2017-04-11 | Blackberry Limited | Method and system for secure provisioning of a wireless device |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6591098B1 (en) * | 2000-11-07 | 2003-07-08 | At&T Wireless Services, Inc. | System and method for using a temporary electronic serial number for over-the-air activation of a mobile device |
KR101213672B1 (en) | 2008-08-08 | 2012-12-18 | 에스케이플래닛 주식회사 | System and method for interfacing between user terminal and smart card |
EP2453377A1 (en) * | 2010-11-15 | 2012-05-16 | Gemalto SA | Method of loading data into a portable secure token |
US9712467B2 (en) * | 2014-02-28 | 2017-07-18 | International Business Machines Corporation | Iterative method to successfully send large electronic messages |
EP2999249A1 (en) * | 2014-09-22 | 2016-03-23 | Gemalto Sa | Method for detecting dynamically that secure elements are eligible to an OTA campaign and corresponding OTA server |
FR3028122A1 (en) * | 2014-11-05 | 2016-05-06 | Orange | SYSTEM FOR SECURING EXCHANGES BETWEEN A COMMUNICATING OBJECT AND A SERVICE PLATFORM |
KR101659912B1 (en) * | 2015-09-09 | 2016-09-26 | 한국과학기술연구원 | Apparatus and method for quantum message authentication |
US11934559B2 (en) * | 2021-05-06 | 2024-03-19 | Charter Communications Operating, Llc | Coordinated privacy for targeted communications and reporting |
KR102450914B1 (en) | 2022-03-23 | 2022-10-06 | 재단법인 경북아이티융합 산업기술원 | Vehicle-to-Vehicle(V2V)-based Over The Air(OTA) update method and system |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0634038B1 (en) * | 1992-03-30 | 2001-10-24 | Telstra Corporation Limited | A cryptographic communications method and system |
US5915021A (en) * | 1997-02-07 | 1999-06-22 | Nokia Mobile Phones Limited | Method for secure communications in a telecommunications system |
US6385723B1 (en) * | 1997-05-15 | 2002-05-07 | Mondex International Limited | Key transformation unit for an IC card |
FI105637B (en) * | 1997-07-02 | 2000-09-15 | Sonera Oyj | A method for managing applications stored on a subscriber identity module |
KR19990038700A (en) * | 1997-11-06 | 1999-06-05 | 구본준 | Multi smart card using Java chip |
US6510515B1 (en) * | 1998-06-15 | 2003-01-21 | Telefonaktlebolaget Lm Ericsson | Broadcast service access control |
AU2297402A (en) | 2000-07-14 | 2002-01-30 | Irdeto Access | Secure packet-based data broadcasting architecture |
US7165173B1 (en) * | 2000-09-01 | 2007-01-16 | Samsung Electronics Co., Ltd. | System and method for secure over-the-air administration of a wireless mobile station |
FR2826212B1 (en) * | 2001-06-15 | 2004-11-19 | Gemplus Card Int | METHOD FOR REMOTELY LOADING AN ENCRYPTION KEY IN A STATION OF A TELECOMMUNICATION NETWORK |
KR100447393B1 (en) * | 2001-08-31 | 2004-09-04 | 엘지전자 주식회사 | A method for preventing reprinting a-key for mobile communication system |
US7352868B2 (en) * | 2001-10-09 | 2008-04-01 | Philip Hawkes | Method and apparatus for security in a data processing system |
US7363354B2 (en) * | 2001-11-29 | 2008-04-22 | Nokia Corporation | System and method for identifying and accessing network services |
US7296156B2 (en) | 2002-06-20 | 2007-11-13 | International Business Machines Corporation | System and method for SMS authentication |
ES2221535B1 (en) * | 2002-07-31 | 2006-03-01 | Airtel Movil, S.A. | A MOBILE TELEPHONY DEVICE AND A DATA MANAGEMENT METHOD. |
KR20040036402A (en) * | 2002-10-25 | 2004-04-30 | 한국전자통신연구원 | On-line system by using the smart card and method for connecting and loading the application program thereof |
US7319757B2 (en) * | 2003-01-02 | 2008-01-15 | Intel Corporation | Wireless communication device and method for over-the-air application service |
US8442231B2 (en) * | 2004-07-22 | 2013-05-14 | Telecom Italia S.P.A. | Method and system for improving robustness of secure messaging in a mobile communications network |
ES2353877T3 (en) * | 2004-10-28 | 2011-03-07 | Telecom Italia S.P.A. | PROCEDURE FOR CONFIGURING A RADIO TERMINAL THROUGH A RADIO COMMUNICATION NETWORK, ASSOCIATED NETWORK AND COMPUTER PROGRAM TO THIS EFFECT. |
ATE439747T1 (en) * | 2004-10-28 | 2009-08-15 | Telecom Italia Spa | METHOD AND NETWORK ARCHITECTURE FOR CONFIGURING A RADIO TERMINAL, RADIO TERMINAL, NETWORK NODE AND COMPUTER PROGRAM PRODUCT THEREOF |
JP4709556B2 (en) * | 2005-01-13 | 2011-06-22 | 株式会社東芝 | Electronic device and communication system mounted on terminal device |
KR100628085B1 (en) * | 2005-03-02 | 2006-09-26 | 엘지전자 주식회사 | Method of applying OTA service with SMS service |
US7558234B2 (en) * | 2005-05-17 | 2009-07-07 | Tektronix, Inc. | System and method for correlation of mobile subscriber activity across multiple interfaces in a GPRS network |
US20070288752A1 (en) * | 2006-06-08 | 2007-12-13 | Weng Chong Chan | Secure removable memory element for mobile electronic device |
-
2007
- 2007-06-22 KR KR1020070061687A patent/KR100840904B1/en active IP Right Grant
-
2008
- 2008-06-18 EP EP08766402.5A patent/EP2163113B1/en active Active
- 2008-06-18 WO PCT/KR2008/003441 patent/WO2009002042A2/en active Application Filing
- 2008-06-18 JP JP2010513111A patent/JP5116846B2/en active Active
- 2008-06-18 US US12/666,204 patent/US8284940B2/en active Active
Non-Patent Citations (3)
Title |
---|
"Smart Cards; Card Application Toolkit (CAT) (Release 7); ETSI TS 102 223", IEEE, LIS, SOPHIA ANTIPOLIS CEDEX, vol. SCP-WG3, no. V7.6.0, 1 February 2007 (2007-02-01) |
See also references of EP2163113A4 |
WOLFGANG RANKL ET AL.: "Smart Card Handbook - 13.2 THE GSM SYSTEM", 1 December 2003, JOHN WILEY & SONS, article "Smart Card Handbook - 13.2 THE GSM SYSTEM", pages: 735 - 786 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2395781A1 (en) * | 2010-06-10 | 2011-12-14 | Research in Motion Limited | Method and system for secure provisioning of a wireless device |
US9621716B2 (en) | 2010-06-10 | 2017-04-11 | Blackberry Limited | Method and system for secure provisioning of a wireless device |
Also Published As
Publication number | Publication date |
---|---|
EP2163113B1 (en) | 2016-05-25 |
KR100840904B1 (en) | 2008-06-24 |
JP2010531108A (en) | 2010-09-16 |
US20100322425A1 (en) | 2010-12-23 |
EP2163113A2 (en) | 2010-03-17 |
EP2163113A4 (en) | 2015-04-01 |
US8284940B2 (en) | 2012-10-09 |
JP5116846B2 (en) | 2013-01-09 |
WO2009002042A3 (en) | 2009-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9325668B2 (en) | System for supporting over-the-air service and method thereof | |
US8284940B2 (en) | System for supporting over-the-air service and method thereof | |
JP6185152B2 (en) | Method of accessing services, device and system for accessing | |
US8391837B2 (en) | Method, system and trusted service manager for securely transmitting an application to a mobile phone | |
JP4734595B2 (en) | Data transfer between two chip cards | |
EP3589074B1 (en) | Method and terminal device for keeping subscriber identity module card in standby state | |
KR100996768B1 (en) | System for remotely accessing a mass storage unit and a security storage unit in a portable communicating object | |
CN102026187B (en) | Subscriber identification module and transmission method and system based on subscriber identification module | |
EP1621955B1 (en) | Method and device for providing access to encrypted content | |
KR20170042344A (en) | Mobile payment device and method | |
US20110029786A1 (en) | Method for accessing and transferring data linked to an application installed on a security module associated with a mobile terminal, and associated security module, management server and system | |
CN105975867B (en) | A kind of data processing method | |
KR20180133837A (en) | Method for Managing Key of Embedded SIM, Embedded SIM and recording medium for the same | |
US20230180007A1 (en) | Electronic device and method for electronic device to provide ranging-based service | |
CN101223798A (en) | Retrospective implementation of sim capabilities in a security module | |
EP2530631A1 (en) | A method for accessing at least one service, corresponding communicating device and system | |
KR20070094108A (en) | Data security device and method and mobile terminal including the same | |
CN101841806A (en) | Service card information processing method, device and system and communication terminal | |
CN113746835A (en) | Data transmission method, device, equipment and storage medium | |
CN115150760A (en) | Short message encryption transmission system, method and storage medium | |
KR20080069451A (en) | Terminal and method incoporating function for certifying downloaded contents thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08766402 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010513111 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008766402 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12666204 Country of ref document: US |