WO2011035572A1 - 一种m2m设备归属网络运营商变更的方法和系统 - Google Patents

一种m2m设备归属网络运营商变更的方法和系统 Download PDF

Info

Publication number
WO2011035572A1
WO2011035572A1 PCT/CN2010/071461 CN2010071461W WO2011035572A1 WO 2011035572 A1 WO2011035572 A1 WO 2011035572A1 CN 2010071461 W CN2010071461 W CN 2010071461W WO 2011035572 A1 WO2011035572 A1 WO 2011035572A1
Authority
WO
WIPO (PCT)
Prior art keywords
m2me
sho
new
imsi
old
Prior art date
Application number
PCT/CN2010/071461
Other languages
English (en)
French (fr)
Inventor
余万涛
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to EP10818266.8A priority Critical patent/EP2448298B1/en
Priority to US13/383,877 priority patent/US8468260B2/en
Publication of WO2011035572A1 publication Critical patent/WO2011035572A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/04Registration at HLR or HSS [Home Subscriber Server]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Definitions

  • the present invention relates to a M2M (Machine to Machine) communication technology, and more particularly to a M2ME (Machine to Machine Equipment) SH0 (Selected Home Operator) change method and system.
  • M2M Machine to Machine
  • SH0 Select Home Operator
  • M2M communication is a general term for a series of technologies and combinations that implement wireless communication technology to realize data communication and communication between machines and machines, machines and people.
  • M2M has two meanings: The first layer is the machine itself, which is called smart device in the embedded field. The second layer means the connection between the machine and the machine, connecting the machines together through the network.
  • Machine-based communication is used in a wide range of applications, such as intelligent measurement, remote monitoring, tracking, medical, etc., to make human life more intelligent.
  • M2ME Machine to Machine Equipment, M2M equipment
  • M2M equipment Machine to Machine Equipment
  • M2M In M2M communication, the main long-distance connection technologies include GSM/GPRS/UMTS, and the short-distance connection technologies mainly include 802.1 lb/g, Bluetooth, Zigbee, and RFID.
  • M2M is a device-oriented service. Because M2M integrates wireless communication and information technology, it can be used for two-way communication, such as collecting information, setting parameters and sending commands over long distances, thus enabling different application scenarios, such as security monitoring, vending, Cargo tracking, etc. Almost all the equipment involved in daily life is likely to become a potential customer. M2M provides a simple means of establishing real-time data between devices, between remote devices, or with individuals.
  • a MCIM application is a set of M2M security data and functions for accessing a 3GPP network (which may also be an IMS network).
  • the MCIM can be located on a UICC (Universal Integrated Circuit Card) or in a TRE (The Trusted environment) functional entity.
  • UICC Universal Integrated Circuit Card
  • TRE The Trusted environment
  • MCIM refers to USIM (Universal Subscriber Identity Module, or ISIM (IP Multimedia Services Identity Module).
  • the TRE functional entity refers to the functional entity of the trusted environment provided by the M2ME.
  • a TRE functional entity can be authenticated by an authorized external proxy whenever needed.
  • the MCIM can be installed in the TRE functional entity.
  • the M2ME provides hardware and software protection and isolation for the MCIM through the TRE functional entity.
  • M2ME provides M2M services in two ways: based on UICC or based on TRE functional entities.
  • M2ME provides M2M services based on UICC
  • how to change the subscription data remotely that is, change the home network operator of the M2M device, there are two options:
  • the remotely provided MCIM is installed in the TRE functional entity through the initial connection provided by the TRE functional entity.
  • the disadvantage is that the protection of the MCIM depends on the security of the TRE functional entity. Since the TRE functional entity is implemented on the M2ME, the security of the TRE functional entity is lower than that of the UICC, so the security of the MCIM in the TRE functional entity is not high; Based on the TRE functional entity's solution to change the home network operator of the M2M device, the problem remains that the security of the MCIM is more difficult to guarantee after the MCIM is provided to the TRE functional entity. Summary of the invention
  • the technical problem to be solved by the present invention is to propose a method and system for changing the home network operator of the M2M device, and combining the TRE and the UICC to implement the change of the M2ME home network operator.
  • the present invention provides a method for changing a home-to-machine (M2M) device home network operator, including:
  • the machine-to-machine device establishes a connection with a registered operator (RO) through a trusted environment (TRE) functional entity, and the RO registers the M2ME with a new home network operator (SHO);
  • the new SHO sends a new International Mobile Subscriber Identity (IMSSI) to the RO or the authorized RO to provide a new IMSI;
  • IMSSI International Mobile Subscriber Identity
  • the RO After receiving the information of the old IMSI of the M2ME, the RO activates the TRE functional entity on the M2ME through the connection provided by the old SHO.
  • the old SHO After receiving the old IMSI information of the M2ME, the old SHO activates the TRE functional entity on the M2ME through the connection being used or through the wireless download (OTA).
  • OTA wireless download
  • the M2ME establishes a connection with the RO through the TRE functional entity, and the RO registers the M2ME in the new SHO.
  • the steps include:
  • the M2ME establishes an initial connection with an arbitrarily selected visited network operator (VNO) through a TRE functional entity;
  • VNO visited network operator
  • PCID temporary connection identifier
  • the RO generates a set of authentication vectors for the PCID, and sends the same to the VNO;
  • the VNO authenticates the PCID and the M2ME by using the authentication vector, and after the authentication is passed, the VNO provides the M2ME with an IP connection to the RO;
  • the M2ME contacts the RO through an IP connection provided by the VNO;
  • the RO is a new SHO found by the M2ME, or the M2ME discovers a new SHO through the RO;
  • the RO connects the new SHO and registers the M2ME at the new SHO.
  • the new SHO In the step of the new SHO transmitting a new IMSI to the RO or authorizing the RO to provide a new IMSI, the new SHO also sends the new SHO subscription key and the corresponding OTA key to the RO, or new The SHO authorization RO provides a new SHO subscription key and a corresponding OTA key to the M2ME;
  • the RO In the step of the RO transmitting the new IMSI to the M2ME, the RO further sends a new SHO subscription key and a corresponding OTA key to the M2ME.
  • the M2ME replaces the old IMSI on the UICC with the new IMSI, it also performs:
  • the M2ME resets and activates the MCIM on the UICC.
  • the present invention provides a system for changing a home network operator of a machine to machine (M2M) device, including: a machine to machine device (M2ME), a new home network operator (SHO), an old SHO, Platform Verification Authorization Center (PVA) and Registry Operator (RO), where:
  • the M2ME is configured to establish a connection with the RO through a trusted environment (TRE) functional entity, and replace the old IMSI on the universal integrated circuit card (UICC) with the received new International Mobile Subscriber Identity (IMSI);
  • the RO is configured to register the M2ME with a new SHO, and, after receiving the new IMSI sent by the new SHO or receiving the authorization of the new SHO, the connection established by the TRE functional entity will Sending the new IMSI to the M2ME;
  • the new SHO is set to verify that the M2ME is passed by the PVA, send a new IMSI to the RO or authorize the RO to provide a new IMSI to the M2ME;
  • the UICC and the TRE functional entity are all located on the M2ME.
  • the RO is further configured to activate the TRE functional entity on the M2ME through the connection provided by the old SHO after receiving the information of the old IMSI of the M2ME.
  • the old SHO is set to activate the TRE function entity on the M2ME through the connection being used or through the wireless download (OTA) mode after receiving the information of the old IMSI of the M2ME.
  • OTA wireless download
  • the new SHO is further configured to send the new SHO subscription key and the corresponding OTA key to the RO, or authorize the RO to provide the new SHO subscription key and the corresponding OTA key to the M2ME;
  • the RO is further configured to send the subscription key of the new SHO and the corresponding OTA key to the M2ME.
  • the invention enables the M2M device to combine the initial connection provided by the TRE functional entity and the high security of the UICC to implement the change of the M2ME home network operator and ensure the security of the IMSI and the MCIM.
  • FIG. 1 is a schematic diagram of an M2ME architecture of a UICC (a TRE functional entity on an M2ME) according to an embodiment of the present invention
  • FIG. 2 is a M2M system of a UICC (TRE functional entity on M2ME) according to an embodiment of the present invention; Schematic diagram of the system;
  • FIG. 3 is a schematic diagram of a process of changing a home network operator of an M2M device by using an RO according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of a process of changing an M2M device home network operator by using an old SHO according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of a process of changing an M2M device home network operator by using an OTA (Over The Air) method in an RO;
  • OTA Over The Air
  • FIG. 6 is a schematic diagram of a process of changing an M2M device to a network operator by using an old SHO and an OTA method according to an embodiment of the present invention.
  • the TRE functional entity and the UICC are combined to implement the change of the M2ME home network operator and ensure the security of the MCIM.
  • the method of changing SHO is as follows:
  • the M2ME establishes a connection with the RO through the TRE function entity, and the RO registers the M2ME in the new SHO; the new SHO verifies that the M2ME is passed by the PVA, sends the new IMSI to the RO or the authorized RO to provide the new IMSI; Transmitting, by the connection established by the TRE function entity, a new IMSI to the M2ME; the M2ME replacing the old IMSI on the UICC with the new IMSI;
  • the UICC and the TRE functional entity are all located on the M2ME.
  • the TRE function entity on the M2ME may be activated by the RO, or the TRE function entity on the M2ME may be activated by the old SHO.
  • the new SHO also sends the new SHO subscription key and the corresponding OTA key to the RO
  • the new SHO authorization RO provides a new SHO subscription key and a corresponding OTA key to the M2ME
  • the RO sends a new IMSI to the M2ME
  • the RO also adds a new SHO The subscription key and the corresponding OTA key are sent to the M2ME.
  • FIG. 1 it is based on UICC (the TRE functional entity is located in M2ME).
  • UICC the TRE functional entity is located in M2ME.
  • Schematic diagram of the M2ME architecture In this architecture, the TRE functional entity is located on the M2ME, and the UICC is installed on the M2ME.
  • FIG. 2 it is a schematic diagram of an M2M system architecture based on UICC (the TRE functional entity is located on the M2ME) according to an embodiment of the present invention.
  • the M2ME uses PICD (Provisional Connectivity Identity) as its private identity.
  • PICD Provisional Connectivity Identity
  • the TRE functional entity refers to the trusted environment provided by M2ME. It provides hardware and software-based protection and isolation for provisioning, storing, executing and managing MCIM.
  • the security of PCID is also guaranteed by TRE functional entities, such as PCID security. Storage, retrieval and use are all implemented by the TRE functional entity.
  • a TRE functional entity can be authenticated by an authorized external agent whenever needed.
  • the UICC is installed on the M2ME.
  • VNO Visit Network Operator
  • RO it can have the following functions:
  • MCIM Download and Provisioning Function DPF, MCIM Download and Provisioning Function
  • ICF Initial Connection Function
  • SHO which provides operational services for M2ME, authorizes DPF to provide M2ME with SHO-generated or DPF-represented MCIM generated by SHO.
  • PVA used for insurance certificate M2ME.
  • the MCIM when the MCIM is located on the UICC, the MCIM refers to the USIM/ISIM.
  • MCIM is used instead of USIM/ISIM regardless of whether MCIM is located on the UICC.
  • both the UICC and TRE functional entities are located on the M2ME.
  • the initial MCIM can be pre-installed on the UICC, or it can be installed on the UICC via a remotely provided method.
  • the TRE functional entity is used for M2ME when the initial MCIM is installed on the UICC by a remotely provided method. Establish an initial connection with the visiting network operator.
  • FIG. 3 is a schematic diagram of a process of changing a home network operator of an M2M device based on a UICC by using an RO according to an embodiment of the present invention.
  • the UICC and TRE functional entities are located on the M2ME, and the old SHO MCIM is installed on the UICC. Since the M2ME subscription user and the old SHO contract are full or other reasons, the M2ME subscription user wants to change the SHO, and the M2ME subscription user contacts the old SHO and RO to change the M2ME home network operator. Specific changes
  • the process of the M2M device belonging to the network operator includes the following steps:
  • Step 301 When the M2ME subscription user and the old SHO contract are full, and want to change the SHO, the M2ME subscription user contacts the old SHO, and sends the old IMSI information of the M2ME that needs to change the SHO to the old SHO. It is also possible to contact the new SHO and send the old IMSI information of the M2ME that needs to change SHO to the old SHO through the new SHO.
  • the M2ME subscription user can send all the IMSI lists of the M2MEs that need to change the SHO to the old SHO, or send them to the old SHO through the new SHO.
  • Step 302 The M2ME subscription user contacts the RO, and sends the newly signed SHO information and the old IMSI information of the M2ME that needs to change the SHO.
  • Step 303 The RO contacts the M2ME through the connection provided by the old SHO, and activates the TRE functional entity on the M2ME.
  • Step 304 The M2ME establishes an initial connection with the arbitrarily selected VNO through the TRE functional entity. M2ME decodes network information and attaches to any VNO through standard GSM/UMTS principles. In the attach message, the M2ME sends a PCID (Temporary Connection ID, Provisional Connectivity ID) to the VNO.
  • PCID Temporal Connection ID, Provisional Connectivity ID
  • Step 305 The VNO contacts the RO (ICF function) and sends the PCID to the RO (ICF function). Note that in some cases, the RO can be located at VNO.
  • Step 306 After receiving the PCID, the RO (ICF function) generates a set of authentication vectors (AVs) for the PCID.
  • AVs authentication vectors
  • Step 307 The RO sends the generated authentication vector (AVs) to the VNO.
  • AKA Authentication and Key Agreement
  • Step 309 After the authentication is successful, the VNO provides the M2ME with an IP connection to the RO. The VNO assigns an IP address to the M2ME.
  • Step 310 The M2ME contacts the RO through an IP connection provided by the VNO network.
  • Step 311 The M2ME discovers the new SHO through the help of the RO, or the RO itself discovers the new SHO for the M2ME.
  • the new SHO discovery process can use the OMA (Open Mobile Alliance) BOOTSTRAP (Bootstrap Protocol).
  • Step 312 The RO connects to the new SHO and registers the M2ME to connect to the new SHO network in the new SHO.
  • Step 313 The new SHO requests the PVA (or requests the PVA through the RO) to verify the authenticity and integrity of the M2ME.
  • Step 314 The PVA verifies the authenticity and integrity of the M2ME.
  • Step 315 The PVA sends the verification result to the new SHO.
  • Step 316 If the verification is successful, the new SHO contacts the RO and authorizes the RO (DPF function) to provide the IMSI to the M2ME. At the same time, the RO can also be authorized to provide the new SHO subscription key and the corresponding new OTA key to the M2ME.
  • the RO DPF function
  • the new SHO IMSI, the subscription key and the corresponding OTA key can be sent to the RO by the new SHO or by the RO in the case of a new SHO authorization.
  • Step 317 The RO (DPF function) sends the IMSI of the new SHO, the new SHO subscription key and the corresponding OTA key to the M2ME, replaces the old IMSI on the UICC, the old SHO subscription key and the corresponding old one.
  • the OTA key in the final phase of the replacement completion, resets and activates the MCIM on the UICC.
  • Step 318 The RO (DPF function) reports the success/failure status information to the old SHO and the new SHO.
  • FIG. 4 is a schematic diagram of a process of changing a UICC-based M2M device home network operator by using an old SHO according to an embodiment of the present invention.
  • the UICC and TRE functional entities are all located on the M2ME, and the old SHO MCIM is installed on the UICC. Since the M2ME subscription user and the old SHO contract are full or other reasons, the M2ME subscription user wants to change the SHO, and the M2ME subscription user contacts the old SHO to change the M2ME home network operator.
  • the process of specifically changing the home network operator of the M2M device includes the following steps:
  • Step 401 When the M2ME subscription user and the old SHO contract are full, and want to change the SHO, the M2ME subscription user contacts the old SHO, and sends the old IMSI information of the M2ME that needs to change the SHO to the old SHO. It is also possible to contact the new SHO and send the old IMSI information of the M2ME that needs to change SHO to the old SHO through the new SHO.
  • the M2ME subscription user can send all the IMSI lists of the M2MEs that need to change the SHO to the old SHO, or send them to the old SHO through the new SHO.
  • Step 402 The old SHO contacts the M2ME through the connection being used, and activates the TRE functional entity on the M2ME.
  • the connection being used refers to the old SHO connection that M2ME is using through the old MCIM.
  • Step 403 The M2ME establishes an initial connection with the arbitrarily selected VNO through the TRE functional entity. M2ME decodes network information and attaches to any VNO through standard GSM/UMTS principles. In the attach message, the M2ME sends a PCID to the VNO.
  • Step 404 The VNO contacts the RO (ICF function) and sends the PCID to the RO (ICF function). Note that in some cases, the RO can be located at VNO.
  • Step 405 After receiving the PCID, the RO (ICF function) generates a set of authentication vectors (AVs) for the PCID.
  • AVs authentication vectors
  • Step 406 The RO sends the generated authentication vector (AVs) to the VNO.
  • Step 407 The VNO uses the authentication vector to authenticate the PCID/M2ME, which may be, but is not limited to, AKA authentication.
  • Step 408 After the authentication is successful, the VNO provides the M2ME with an IP connection to the RO. The VNO assigns an IP address to the M2ME.
  • Step 409 The M2ME contacts the RO through an IP connection provided by the VNO network.
  • Step 410 The M2ME discovers the new SHO through the help of the RO, or the RO itself discovers the new SHO for the M2ME.
  • the new SHO discovery process can use OMA BOOTSTRAP.
  • Step 411 The RO connects to the new SHO and registers the M2ME to connect to the new SHO network in the new SHO.
  • Step 412 The new SHO requests the PVA (or requests the PVA through the RO) to verify the authenticity and integrity of the M2ME.
  • Step 413 The PVA verifies the authenticity and integrity of the M2ME.
  • Step 414 The PVA sends the verification result to the new SHO.
  • Step 415 If the verification is successful, the new SHO contacts the RO and authorizes the RO (DPF function) to provide the IMSI to the M2ME. At the same time, the RO can also be authorized to provide the new SHO subscription key and the corresponding new OTA key to the M2ME.
  • the RO DPF function
  • the new SHO IMSI, the subscription key and the corresponding OTA key can be sent to the RO by the new SHO or by the RO in the case of a new SHO authorization.
  • Step 416 The RO (DPF function) sends the IMSI of the new SHO, the new SHO subscription key and the corresponding OTA key to the M2ME, replaces the old IMSI on the UICC, the old SHO subscription key and the corresponding old one.
  • the OTA key in the final phase of the replacement completion, resets and activates the MCIM on the UICC.
  • Step 417 The RO (DPF function) reports the success/failure status information to the old SHO and the new SHO.
  • FIG. 5 is a schematic diagram of a process of changing an M2M device home network operator by using an OTA method according to an embodiment of the present invention.
  • the UICC and TRE functional entities are all located on the M2ME, and the old SHO MCIM is installed on the UICC. Since the M2ME subscription user and the old SHO contract are full or other reasons, the M2ME subscription user wants to change the SHO, the M2ME subscription user contacts the old SHO, the new SHO and the RO to change the SHO of the M2ME. Specific changes
  • the process of the M2M device belonging to the network operator includes the following steps:
  • Step 501 When the M2ME subscription user and the old SHO contract are full, and want to change the SHO, the M2ME subscription user contacts the old SHO, and sends the information of the old IMSI of the M2ME that needs to change the SHO. Give the old SHO. It is also possible to contact the new SHO and send the information of the old IMSI of the M2ME that needs to change the SHO to the old SHO through the new SHO.
  • the M2ME subscription user can send all the IMSI lists of the M2MEs that need to change the SHO to the old SHO, or send them to the old SHO through the new SHO.
  • Step 502 The M2ME subscription user contacts the RO, sends the newly signed SHO information, and needs to change the IMSI information of the M2ME of the home network operator.
  • Step 503 The RO contacts the old SHO, and informs the old SHO to change the IMSI information of the M2ME of the home network operator.
  • Step 504 The old SHO activates the TRE functional entity on the M2ME by means of OTA.
  • Step 506 The VNO contacts the RO (ICF function) and sends the PCID to the RO (ICF function). Note that in some cases, the RO can be located at VNO.
  • Step 507 After receiving the PCID, the RO (ICF function) generates a set of authentication vectors (AVs) for the PCID.
  • AVs authentication vectors
  • Step 508 The RO sends the generated authentication vector (AVs) to the VNO.
  • Step 509 The VNO uses the authentication vector to authenticate the PCID/M2ME, which may be, but is not limited to, AKA authentication.
  • Step 510 After the authentication is successful, the VNO provides the M2ME with an IP connection to the RO. The VNO assigns an IP address to the M2ME.
  • Step 511 The M2ME contacts the RO through the IP connection provided by the VNO network.
  • Step 512 The M2ME discovers the new SHO through the help of the RO, or the RO itself discovers the new SHO for the M2ME.
  • the new SHO discovery process can use OMA BOOTSTRAP.
  • Step 513 The RO connects to the new SHO and registers the M2ME to connect to the new SHO network at the new SHO.
  • Step 515 The PVA verifies the authenticity and integrity of the M2ME.
  • Step 516 The PVA sends the verification result to the new SHO.
  • Step 517 If the verification is successful, the new SHO contacts the RO (DPF function) and authorizes the RO to provide the IMSI to the M2ME. At the same time, the RO can also be authorized to provide the new SHO subscription key and the corresponding new OTA key to the M2ME.
  • the RO DPF function
  • the new SHO IMSI, the subscription key and the corresponding OTA key can be sent to the RO by the new SHO or by the RO in the case of a new SHO authorization.
  • Step 518 The RO (DPF function) sends the IMSI of the new SHO, the new SHO subscription key and the corresponding OTA key to the M2ME, replaces the old IMSI on the UICC, the old SHO subscription key and the corresponding old one.
  • the OTA key in the final phase of the replacement completion, resets and activates the MCIM on the UICC.
  • Step 519 The RO (DPF function) reports the success/failure status information to the old SHO and the new SHO.
  • FIG. 6 is a schematic diagram of a process of changing an M2M device to a network operator by using an old SHO and an OTA method according to an embodiment of the present invention.
  • the UICC and TRE functional entities are all located on the M2ME, and the old SHO MCIM is installed on the UICC. Since the M2ME subscription user and the old SHO contract are full or other reasons, the M2ME subscription user wants to change the home network operator, and the M2ME subscription user contacts the old SHO to change the M2ME SHO. Specific changes
  • the process of the M2M device belonging to the network operator includes the following steps:
  • Step 601 When the M2ME subscription user and the old SHO contract are full, and want to change the SHO, the M2ME subscription user contacts the old SHO, and sends the old IMSI information of the M2ME that needs to change the SHO to the old SHO. It is also possible to contact the new SHO and send the old IMSI information of the M2ME that needs to change SHO to the old SHO through the new SHO.
  • the M2ME subscription user can send all the IMSI lists of the M2MEs that need to change the SHO to the old one. SHO, or sent to the old SHO via the new SHO.
  • Step 602 The old SHO activates the TRE functional entity on the M2ME by using the OTA mode.
  • Step 603 The M2ME establishes an initial connection with the arbitrarily selected VNO through the TRE functional entity. M2ME decodes network information and attaches to any VNO through standard GSM/UMTS principles. In the attach message, the M2ME sends a PCID to the VNO.
  • Step 604 The VNO contacts the RO (ICF function) and sends the PCID to the RO (ICF function). Note that in some cases, the RO can be located at VNO.
  • Step 605 After receiving the PCID, the RO (ICF function) generates a set of authentication vectors (AVs) for the PCID.
  • AVs authentication vectors
  • Step 606 The RO sends the generated authentication vector (AVs) to the VNO.
  • Step 607 The VNO uses the authentication vector to authenticate the PCID/M2ME, which may be, but is not limited to, AKA authentication.
  • Step 608 After the authentication is successful, the VNO provides an IP connection to the RO for the M2ME. The VNO assigns an IP address to the M2ME.
  • Step 609 The M2ME contacts the RO through the IP connection provided by the VNO network.
  • Step 610 The M2ME discovers the new SHO through the help of the RO, or the RO itself discovers the new SHO for the M2ME.
  • the new SHO discovery process can use OMA BOOTSTRAP.
  • Step 611 The RO connects to the new SHO and registers the M2ME to connect to the new SHO network in the new SHO.
  • Step 612 The new SHO requests the PVA (or requests the PVA through the RO) to verify the authenticity and integrity of the M2ME.
  • Step 613 The PVA verifies the authenticity and integrity of the M2ME.
  • Step 614 The PVA sends the verification result to the new SHO.
  • Step 615 If the verification is successful, the new SHO contacts the RO (DPF function) and authorizes the RO (DPF function) to provide the IMSI to the M2ME. At the same time, the RO can also be authorized to provide the new SHO subscription key and the corresponding new OTA key to the M2ME.
  • the new SHO's IMSI, the subscription key and the corresponding OTA key can be sent by the new SHO
  • the RO can also be generated by the RO in the case of a new SHO authorization.
  • Step 616 The RO (DPF function) sends the IMSI of the new SHO, the new SHO subscription key and the corresponding ⁇ key to ⁇ 2 ⁇ , replaces the old IMSI on the UICC, the old SHO subscription key and the corresponding old one.
  • ⁇ Key in the final stage of replacement completion, reset and activate MCIM on UICC.
  • Step 617 RO (DPF function) reports the success/failure status information to the old SHO, the new SHO.
  • the system for changing the home network operator of the M2M device in the embodiment of the present invention includes: M2ME, new SHO, old SHO, PVA, and RO, where:
  • the M2ME is configured to establish a connection with the RO through the TRE functional entity, and replace the old IMSI on the UICC with the received new IMSI;
  • the RO is configured to register the M2ME with a new SHO, and, after receiving the new IMSI sent by the new SHO or receiving the authorization of the new SHO, the connection established by the TRE functional entity will Sending the new IMSI to the M2ME;
  • the new SHO is set to verify that the M2ME is passed by the PVA, send a new IMSI to the RO or authorize the RO to provide a new IMSI to the M2ME;
  • the UICC and the TRE functional entity are all located on the M2ME.
  • the RO is further configured to: after receiving the information of the old IMSI of the M2ME, activate the TRE functional entity on the M2ME by using the connection provided by the old SHO.
  • the old SHO is set to activate the TRE functional entity on the M2ME through the connection being used or through the wireless download (OTA) mode after receiving the information of the old IMSI of the M2ME.
  • OTA wireless download
  • the new SHO is further configured to send a new SHO subscription key and a corresponding OTA key to the RO, or authorize the RO to provide a new SHO subscription key and a corresponding OTA key to the M2ME.
  • the RO is further configured to send the new SHO subscription key and the corresponding OTA key to the M2ME.
  • the present invention provides a method and system for changing a home network operator of an M2M device, so that the M2M device combines the initial connection provided by the TRE functional entity with the high security of the UICC to implement the change of the home network operator of the M2ME, and ensures the IMSI and the MCIM. safety.

Description

一种 M2M设备归属网络运营商变更的方法和系统
技术领域
本发明涉及 M2M ( Machine to Machine, 机器到机器) 的通信技术, 尤 其涉及一种 M2ME( Machine to Machine Equipment, M2M设备 )SH0( Selected Home Operator , 归属网络运营商) 变更的方法和系统。
背景技术
M2M通信是指应用无线通信技术, 实现机器与机器、机器与人之间的数 据通信和交流的一系列技术及其组合的总称。 M2M有两层含义: 第一层是机 器本身, 在嵌入式领域称为智能设备。 第二层意思是机器和机器之间的连接, 通过网络把机器连接在一起。 机器类通信的应用范围非常广泛, 例如智能测 量、 远程监控、 跟踪、 医疗等, 使人类生活更加智能化。 与传统的人与人之 间的通信相比, M2ME ( Machine to Machine Equipment, M2M设备)数量 巨大, 应用领域广泛, 具有巨大的市场前景。
在 M2M通信中, 主要的远距离连接技术包括 GSM/GPRS/UMTS, 近距 离连接技术主要有 802.1 lb/g、 蓝牙、 Zigbee、 RFID等。 M2M属于针对设备 的业务, 由于 M2M整合了无线通信和信息技术, 可用于双向通信, 如远距 离收集信息、 设置参数和发送指令, 因此可实现不同的应用方案, 如安全监 测、 自动售货、 货物跟踪等。 几乎所有日常生活中涉及到的设备都有可能成 为潜在的服务对象。 M2M提供了设备实时数据在系统之间、 远程设备之间、 或与个人之间建立无线连接的简单手段。
M2M通信的一个挑战是部署的 M2M设备的远程安全管理。 为此, 我们 需要解决如何为 M2ME远程提供签约数据即 MCIM (机器通信身份模块, Machine Communication Identity Module ) , 并防止 MCIM在供应过程中被攻 击者获得并使用。 MCIM应用是一组为接入 3GPP网络(也可以是 IMS网络) 的 M2M安全数据和功能。 MCIM可以位于 UICC ( Universal Integrated Circuit Card, 通用集成电路卡)上, 也可以位于一个 TRE ( The Trusted environment ) 功能实体中。 当 MCIM位于 UICC上时, MCIM 即是指 USIM ( Universal Subscriber Identity Module,通用用户身份模块)或 ISIM( IP Multimedia Services Identity Module, IP 多媒体服务身份模块) 。 TRE功能实体是指 M2ME提供 的可信环境的功能实体, 一个 TRE功能实体可以在任何需要的时候被授权的 外部代理验证。 MCIM可以安装在 TRE功能实体中 , M2ME通过 TRE功能 实体为 MCIM提供软硬件保护和隔离。
目前, M2ME提供 M2M服务通常釆用两种方式:基于 UICC或基于 TRE 功能实体。
当 M2ME基于 UICC来提供 M2M服务时, 如何远程改变签约数据, 即 变更 M2M设备归属网络运营商, 有两种方案:
1、 不能远程改变签约数据的方案, 这种方案虽然可以方便地为 M2ME 提供 M2M服务,但是, 当 M2M服务签约用户想改变 M2M服务的运营商时, 必须更换 UICC, 这使得 M2ME的维护非常困难, 即使可能, 也是代价高昂, 因此这种方案无法实现对 M2ME的 MCIM的远程管理;
2、 可以远程改变签约数据的方案, 这种方案当 UICC发布时就确定归属 网络运营商的话, 不存在 MCIM的初始提供问题, 但当 UICC在发布后再确 定归属网络运营商的话,初始提供 MCIM给 UICC是需要解决的问题; 另夕卜, 这种方案通过改变 IMSI ( International Mobile Subscriber Identity, 国际移动用 户识别码) 的方式来改变运营商, 这样虽然可以方便地管理 M2ME, 但这种 方案涉及 IMSI在不同移动运营商网络之间的传递, 从而增加了 M2ME签约 数据的安全风险; 同时在改变 IMSI的过程中, UICC可能中断与任何运营商 的连接;
当 M2ME基于 TRE功能实体来提供 M2M服务时 , 通过 TRE功能实体 提供的初始连接, 将远程提供的 MCIM安装在 TRE功能实体中。 其缺点是 MCIM的保护有赖于 TRE功能实体的安全性, 由于 TRE功能实体是 M2ME 上实现, 使得 TRE功能实体的安全性比 UICC要低, 因此 MCIM在 TRE功 能实体中的安全性并不高; 基于 TRE功能实体的变更 M2M设备的归属网络 运营商的解决方案, 问题仍然在于 MCIM提供给 TRE功能实体后, MCIM的 安全性比较难以得到保证。 发明内容
本发明要解决的技术问题就是提出一种 M2M设备归属网络运营商变更 的方法和系统,将 TRE和 UICC结合起来,实现变更 M2ME归属网络运营商。
为了解决上述技术问题, 本发明提供一种机器到机器(M2M )设备归属 网络运营商变更的方法, 包括:
机器到机器设备(M2ME )通过可信环境(TRE ) 功能实体与注册运营 商 (RO )建立连接, RO在新的归属网络运营商 (SHO ) 注册所述 M2ME;
所述新的 SHO经平台验证授权中心 (PVA )验证所述 M2ME通过后, 将新的国际移动用户识别码( IMSI )发送给 RO或者授权 RO提供新的 IMSI;
所述 RO通过 TRE功能实体建立的连接,将新的 IMSI发送给所述 M2ME; 所述 M2ME用所述新的 IMSI替换通用集成电路卡( UICC )上旧的 IMSI; 其中, 所述 UICC和 TRE功能实体均位于所述 M2ME上。
上述方法还可具有以下特点:
在所述 M2ME通过 TRE功能实体与 RO建立连接的步骤执行之前,还执 行:
所述 RO接收到所述 M2ME的旧的 IMSI的信息后, 通过旧的 SHO提供 的连接, 激活 M2ME上的 TRE功能实体。
上述方法还可具有以下特点:
在所述 M2ME通过 TRE功能实体与 RO建立连接的步骤执行之前,还执 行:
旧的 SHO接收到所述 M2ME的旧的 IMSI的信息后,通过正在使用的连 接或者通过无线下载(OTA )方式, 激活 M2ME上的 TRE功能实体。
上述方法还可具有以下特点:
所述 M2ME通过 TRE功能实体与 RO建立连接, RO在新的 SHO注册 所述 M2ME的步骤包括:
所述 M2ME通过 TRE功能实体与任意选择的拜访网络运营商 ( VNO ) 建立初始连接; 所述 VNO联系 RO , 并将从所述 Μ2ΜΕ接收到的临时连接标识( PCID ) 发送给所述 RO;
所述 RO针对所述 PCID生成一组认证向量, 并发送给所述 VNO;
所述 VNO使用所述认证向量对所述 PCID和 M2ME进行认证, 认证通 过后 , VNO为所述 M2ME提供到 RO的 IP连接;
所述 M2ME通过 VNO提供的 IP连接联系 RO;
所述 RO为 M2ME发现新的 SHO, 或者, 所述 M2ME通过 RO发现新 的 SHO;
所述 RO连接所述新的 SHO, 并在所述新的 SHO注册所述 M2ME。
上述方法还可具有以下特点:
在所述新的 SHO将新的 IMSI发送给 RO或者授权 RO提供新的 IMSI的 步骤中,所述新的 SHO还将新的 SHO的签约密钥和对应的 OTA密钥发送给 RO, 或者新的 SHO授权 RO提供新的 SHO的签约密钥和对应的 OTA密钥 给所述 M2ME;
在所述 RO将新的 IMSI发送给所述 M2ME的步骤中, 所述 RO还将新 的 SHO的签约密钥和对应的 OTA密钥发送给所述 M2ME。
上述方法还可具有以下特点:
在所述 M2ME用所述新的 IMSI替换 UICC上旧的 IMSI的步骤执行之后, 还执行:
所述 M2ME重置并激活 UICC上的 MCIM。
为了解决上述技术问题, 本发明提供一种机器到机器(M2M )设备归属 网络运营商变更的系统, 包括: 机器到机器设备(M2ME ) 、 新的归属网络 运营商( SHO )、 旧的 SHO、平台验证授权中心( PVA )和注册运营商( RO ) , 其中:
所述 M2ME设置成通过可信环境(TRE )功能实体与 RO建立连接, 以 及,用接收到的新的国际移动用户识别码( IMSI )替换通用集成电路卡( UICC ) 上旧的 IMSI; 所述 RO设置成在新的 SHO注册所述 M2ME, 以及, 当接收到所述新的 SHO发送的新的 IMSI或者接收到所述新的 SHO的授权后,通过 TRE功能实 体建立的连接, 将所述新的 IMSI发送给所述 M2ME;
所述新的 SHO设置成经 PVA验证所述 M2ME通过后, 将新的 IMSI发 送给 RO或者授权 RO提供新的 IMSI给所述 M2ME;
其中, 所述 UICC和 TRE功能实体均位于所述 M2ME上。
上述系统还可具有以下特点:
所述 RO进一步设置成接收到所述 M2ME的旧的 IMSI的信息后, 通过 旧的 SHO提供的连接, 激活 M2ME上的 TRE功能实体。
上述系统还可具有以下特点:
所述旧的 SHO设置成接收到所述 M2ME的旧的 IMSI的信息后,通过正 在使用的连接或者通过无线下载(OTA )方式, 激活 M2ME上的 TRE功能 实体。
上述系统还可具有以下特点:
所述新的 SHO进一步设置成将新的 SHO的签约密钥和对应的 OTA密钥 发送给 RO,或者授权 RO提供新的 SHO的签约密钥和对应的 OTA密钥给所 述 M2ME;
所述 RO进一步设置成将所述新的 SHO的签约密钥和对应的 OTA密钥 发送给所述 M2ME。
本发明使 M2M设备结合 TRE功能实体提供的初始连接和 UICC的高安 全性 , 实现变更 M2ME的归属网络运营商 ,并保证 IMSI及 MCIM的安全性。 附图概述
图 1 是本发明实施例的 UICC ( TRE功能实体在 M2ME上 ) 的 M2ME 架构示意图;
图 2是本发明实施例的 UICC ( TRE功能实体在 M2ME上) 的 M2M系 统架构示意图;
图 3 是本发明实施例的通过 RO变更 M2M设备归属网络运营商的流程 示意图;
图 4是本发明实施例的通过旧的 SHO变更 M2M设备归属网络运营商的 流程示意图;
图 5 是本发明实施例的通过 RO釆用 OTA ( Over The Air, 无线下载) 方式变更 M2M设备归属网络运营商的流程示意图;
图 6 是本发明实施例的通过旧的 SHO釆用 OTA方式变更 M2M设备归 属网络运营商的流程示意图。
本发明的较佳实施方式
在本发明中, TRE功能实体和 UICC结合起来, 实现变更 M2ME归属 网络运营商, 并保证 MCIM的安全性。 其中, 变更 SHO的方法如下:
M2ME通过 TRE功能实体与 RO建立连接, RO在新的 SHO注册所述 M2ME; 所述新的 SHO经 PVA验证所述 M2ME通过后 , 将新的 IMSI发送 给 RO或者授权 RO提供新的 IMSI;所述 RO通过 TRE功能实体建立的连接, 将新的 IMSI发送给所述 M2ME;所述 M2ME用所述新的 IMSI替换 UICC上 旧的 IMSI;
其中, 所述 UICC和 TRE功能实体均位于所述 M2ME上。
其中, 可以是由 RO激活 M2ME上的 TRE功能实体, 也可以是由旧的 SHO激活 M2ME上的 TRE功能实体。
优选地, 所述新的 SHO将新的 IMSI发送给 RO或者授权 RO提供新的 IMSI的步骤中, 所述新的 SHO还将新的 SHO的签约密钥和对应的 OTA密 钥发送给 RO, 或者新的 SHO授权 RO提供新的 SHO的签约密钥和对应的 OTA密钥给所述 M2ME;所述 RO将新的 IMSI发送给所述 M2ME的步骤中, 所述 RO还将新的 SHO的签约密钥和对应的 OTA密钥发送给所述 M2ME。
下面结合附图及具体实施例对本发明进行详细说明。
如图 1所示, 是本发明实施例的基于 UICC ( TRE功能实体位于 M2ME 上)的 M2ME架构示意图。 在该架构中 TRE功能实体位于 M2ME上, 以及, UICC安装在 M2ME上。
如图 2所示, 是本发明实施例的基于 UICC ( TRE功能实体位于 M2ME 上) 的 M2M系统架构示意图。
M2ME以 PICD (临时连接身份, Provisional Connectivity Identity )作为 其私有标识。 为了使 M2ME注册到与将来选择的归属运营商无关的 3GPP网 络, PCID需要通过供应商安装在 M2ME上。 PCID的格式与 IMSI相同。 其 中, TRE功能实体是指 M2ME提供的可信环境, 它为供应、 存储、 执行和管 理 MCIM提供了基于硬件和软件的保护和隔离, PCID的安全也由 TRE功能 实体来保证, 如 PCID的安全存储、 检索和使用都由 TRE功能实体实现。 一 个 TRE功能实体可以在任何需要的时候被授权的外部代理验证。 UICC安装 在 M2ME上。
VNO ( Visited Network Operator, 拜访网络运营商) , 它为 M2ME提供 初始连接, 用于初始注册、 MCIM和信任状的提供。
RO, 它可以具有如下功能:
1 ) MCIM的下载和提供功能(DPF, MCIM Download and Provisioning Function ) ;
2 )发现和注册功能(DRF, Discovery and Registration Function ) ;
3 )初始连接功能(ICF, Initial Connectivity Function ) 。
SHO, 为 M2ME提供运营服务,授权 DPF为 M2ME提供 SHO生成的或 DPF代表 SHO生成的 MCIM。
PVA, 用于险证 M2ME。
在本发明中, 当 MCIM位于 UICC上时, MCIM即是指 USIM/ISIM。 为 了描述方便, 在本发明中, 无论 MCIM是否位于 UICC上, 都只使用 MCIM, 而不用 USIM/ISIM。
在本发明中, UICC和 TRE功能实体都位于 M2ME上。 初始 MCIM可 以预安装在 UICC上, 也可以通过远程提供的方法安装 UICC上。 当通过远 程提供的方法将初始 MCIM安装在 UICC上时, TRE功能实体用于 M2ME 与拜访网络运营商建立初始连接。
图 3是本发明实施例通过 RO变更基于 UICC的 M2M设备归属网络运营 商的流程示意图。
如图 3所示, UICC和 TRE功能实体均位于 M2ME上, UICC上安装有 旧的 SHO的 MCIM。 由于 M2ME签约用户与旧的 SHO合约满或其它原因, M2ME签约用户想改变 SHO时, M2ME签约用户联系旧的 SHO和 RO, 以 改变 M2ME的归属网络运营商。 具体变更 M2M设备归属网络运营商的流程 包括以下步骤:
步骤 301: M2ME签约用户与旧的 SHO合约满,想改变 SHO时,则 M2ME 签约用户联系旧的 SHO,并发送需要改变 SHO的 M2ME的旧的 IMSI的信息 给旧的 SHO。 也可以联系新的 SHO, 并通过新的 SHO发送需要改变 SHO的 M2ME的旧的 IMSI的信息给旧的 SHO。
其中,当 M2ME签约用户有多个 M2M设备需要改变归属网络运营商时, M2ME签约用户可以将所有需要改变 SHO的 M2ME的 IMSI列表发送给旧的 SHO, 或通过新的 SHO发送给旧的 SHO。
步骤 302: M2ME签约用户联系 RO, 发送新签约的 SHO信息和需要变 更 SHO的 M2ME的旧的 IMSI信息。
步骤 303: RO通过旧的 SHO提供的连接联系 M2ME, 激活 M2ME上的 TRE功能实体。
步骤 304: M2ME通过 TRE功能实体与任意选择的 VNO建立初始连接。 M2ME通过标准的 GSM/UMTS 原则来解码网络信息并且附着到任意一个 VNO。 在附着消息中, M2ME 向 VNO发送一个 PCID (临时连接标识, Provisional Connectivity ID ) 。
步骤 305: VNO联系 RO ( ICF功能) , 并将 PCID发送给 RO ( ICF功 能) 。 注意, 在某些情况下, RO可以位于 VNO。
步骤 306: RO ( ICF功能)收到 PCID之后, 针对该 PCID生成一组认证 向量(AVs ) 。
步骤 307: RO将生成的认证向量(AVs )发送给 VNO。 步骤 308 : VNO使用认证向量对 PCID/M2ME进行认证, 可以但不限于 釆用 AKA ( Authentication and Key Agreement, 认证和密钥协商 )认证。
步骤 309: 认证成功后, VNO为 M2ME提供到 RO的 IP连接。 VNO为 M2ME分配 IP地址。
步骤 310: M2ME通过 VNO网络提供的 IP连接联系 RO。
步骤 311 : M2ME通过 RO的帮助, 发现新的 SHO, 或者, RO 自己为 M2ME发现新的 SHO。 新的 SHO发现过程可以使用 OMA ( Open Mobile Alliance,开放的移动联盟)BOOTSTRAP(即 Bootstrap Protocol,引导协议)。
步骤 312: RO连接新的 SHO并在新的 SHO注册要连接新的 SHO网络 的 M2ME。
步骤 313: 新的 SHO请求 PVA (或通过 RO请求 PVA )验证 M2ME的 真实性和完整性。
步骤 314: PVA验证 M2ME的真实性和完整性。
步骤 315: PVA将验证结果发送给新的 SHO。
步骤 316: 如果验证成功, 新的 SHO联系 RO, 并授权 RO ( DPF功能) 提供 IMSI给 M2ME。 同时也可以授权 RO提供新的 SHO的签约密钥和对应 的新的 OTA密钥给 M2ME。
新的 SHO的 IMSI, 签约密钥和对应的 OTA密钥可以由新的 SHO发送 给 RO , 也可以在新的 SHO授权的情况下, 由 RO产生。
步骤 317: RO ( DPF功能)发送新的 SHO的 IMSI, 新的 SHO的签约密 钥和对应的 OTA密钥给 M2ME, 替换 UICC上旧的 IMSI, 旧的 SHO的签约 密钥和对应的旧的 OTA密钥, 在替换完成的最后阶段, 重置并激活 UICC上 的 MCIM。
步骤 318: RO ( DPF功能)向旧的 SHO和新的 SHO报告供应成功 /失败 状态信息。
图 4是本发明实施例通过旧的 SHO变更基于 UICC的 M2M设备归属网 络运营商的流程示意图。 如图 4所示, UICC和 TRE功能实体均位于 M2ME上, UICC上安装有 旧的 SHO的 MCIM。 由于 M2ME签约用户与旧的 SHO合约满或其它原因, M2ME签约用户想改变 SHO 时, M2ME签约用户联系旧的 SHO, 以改变 M2ME的归属网络运营商。 具体变更 M2M设备归属网络运营商的流程包括 以下步骤:
步骤 401: M2ME签约用户与旧的 SHO合约满,想改变 SHO时,则 M2ME 签约用户联系旧的 SHO,并发送需要改变 SHO的 M2ME的旧的 IMSI的信息 给旧的 SHO。 也可以联系新的 SHO, 并通过新的 SHO发送需要改变 SHO的 M2ME的旧的 IMSI的信息给旧的 SHO。
其中,当 M2ME签约用户有多个 M2M设备需要改变归属网络运营商时, M2ME签约用户可以将所有需要改变 SHO的 M2ME的 IMSI列表发送给旧的 SHO, 或通过新的 SHO发送给旧的 SHO。
步骤 402: 旧的 SHO通过正在使用的连接联系 M2ME, 激活 M2ME上 的 TRE功能实体。
正在使用的连接是指 M2ME通过旧的 MCIM正在使用的旧的 SHO连接。 步骤 403: M2ME通过 TRE功能实体与任意选择的 VNO建立初始连接。 M2ME通过标准的 GSM/UMTS 原则来解码网络信息并且附着到任意一个 VNO。 在附着消息中 , M2ME向 VNO发送一个 PCID。
步骤 404: VNO联系 RO ( ICF功能) , 并将 PCID发送给 RO ( ICF功 能) 。 注意, 在某些情况下, RO可以位于 VNO。
步骤 405: RO ( ICF功能)收到 PCID之后, 针对该 PCID生成一组认证 向量(AVs ) 。
步骤 406: RO将生成的认证向量(AVs )发送给 VNO。
步骤 407: VNO使用认证向量对 PCID/M2ME进行认证, 可以但不限于 釆用 AKA认证。
步骤 408: 认证成功后, VNO为 M2ME提供到 RO的 IP连接。 VNO为 M2ME分配 IP地址。
步骤 409: M2ME通过 VNO网络提供的 IP连接联系 RO。 步骤 410: M2ME通过 RO的帮助, 发现新的 SHO, 或者, RO 自己为 M2ME发现新的 SHO。 新的 SHO发现过程可以使用 OMA BOOTSTRAP。
步骤 411 : RO连接新的 SHO并在新的 SHO注册要连接新的 SHO网络 的 M2ME。
步骤 412: 新的 SHO请求 PVA (或通过 RO请求 PVA )验证 M2ME的 真实性和完整性。
步骤 413: PVA验证 M2ME的真实性和完整性。
步骤 414: PVA将验证结果发送给新的 SHO。
步骤 415: 如果验证成功, 新的 SHO联系 RO, 并授权 RO ( DPF功能) 提供 IMSI给 M2ME。 同时也可以授权 RO提供新的 SHO的签约密钥和对应 的新的 OTA密钥给 M2ME。
新的 SHO的 IMSI, 签约密钥和对应的 OTA密钥可以由新的 SHO发送 给 RO , 也可以在新的 SHO授权的情况下, 由 RO产生。
步骤 416: RO ( DPF功能)发送新的 SHO的 IMSI, 新的 SHO的签约密 钥和对应的 OTA密钥给 M2ME, 替换 UICC上旧的 IMSI, 旧的 SHO的签约 密钥和对应的旧的 OTA密钥, 在替换完成的最后阶段, 重置并激活 UICC上 的 MCIM。
步骤 417: RO ( DPF功能)向旧的 SHO和新的 SHO报告供应成功 /失败 状态信息。
图 5是本发明实施例的通过 RO釆用 OTA方式变更 M2M设备归属网络 运营商的流程示意图。
如图 5所示, UICC和 TRE功能实体均位于 M2ME上, UICC上安装有 旧的 SHO的 MCIM。 由于 M2ME签约用户与旧的 SHO合约满或其它原因, M2ME签约用户想改变 SHO时, M2ME签约用户联系旧的 SHO、 新的 SHO 和 RO, 以改变 M2ME的 SHO。 具体变更 M2M设备归属网络运营商的流程 包括以下步骤:
步骤 501: M2ME签约用户与旧的 SHO合约满,想改变 SHO时,则 M2ME 签约用户联系旧的 SHO,并发送需要改变 SHO的 M2ME的旧的 IMSI的信息 给旧的 SHO。 也可以联系新的 SHO, 并通过新的 SHO发送需要改变 SHO的 M2ME的旧的 IMSI的信息给旧的 SHO。
其中,当 M2ME签约用户有多个 M2M设备需要改变归属网络运营商时, M2ME签约用户可以将所有需要改变 SHO的 M2ME的 IMSI列表发送给旧的 SHO, 或通过新的 SHO发送给旧的 SHO。
步骤 502: M2ME签约用户联系 RO, 发送新签约的 SHO信息和需要变 更归属网络运营商的 M2ME的 IMSI信息。
步骤 503: RO联系旧的 SHO , 通知旧的 SHO要改变归属网络运营商的 M2ME的 IMSI信息。
步骤 504: 旧的 SHO通过 OTA方式激活 M2ME上的 TRE功能实体。 步骤 505: M2ME通过 TRE功能实体与任意选择的 VNO建立初始连接。 M2ME通过标准的 GSM/UMTS 原则来解码网络信息并且附着到任意一个 VNO。 在附着消息中 , M2ME向 VNO发送一个 PCID。
步骤 506: VNO联系 RO ( ICF功能) , 并将 PCID发送给 RO ( ICF功 能) 。 注意, 在某些情况下, RO可以位于 VNO。
步骤 507: RO ( ICF功能)收到 PCID之后, 针对该 PCID生成一组认证 向量(AVs ) 。
步骤 508: RO将生成的认证向量(AVs )发送给 VNO。
步骤 509: VNO使用认证向量对 PCID/M2ME进行认证, 可以但不限于 釆用 AKA认证。
步骤 510: 认证成功后, VNO为 M2ME提供到 RO的 IP连接。 VNO为 M2ME分配 IP地址。
步骤 511 : M2ME通过 VNO网络提供的 IP连接联系 RO。
步骤 512: M2ME通过 RO的帮助, 发现新的 SHO, 或者, RO 自己为 M2ME发现新的 SHO。 新的 SHO发现过程可以使用 OMA BOOTSTRAP。
步骤 513: RO连接新的 SHO并在新的 SHO注册要连接新的 SHO网络 的 M2ME。 步骤 514: 新的 SHO请求 PVA (或通过 RO请求 PVA )验证 M2ME的 真实性和完整性。
步骤 515: PVA验证 M2ME的真实性和完整性。
步骤 516: PVA将验证结果发送给新的 SHO。
步骤 517: 如果验证成功, 新的 SHO联系 RO ( DPF功能), 并授权 RO 提供 IMSI给 M2ME。 同时也可以授权 RO提供新的 SHO的签约密钥和对应 的新的 OTA密钥给 M2ME。
新的 SHO的 IMSI, 签约密钥和对应的 OTA密钥可以由新的 SHO发送 给 RO , 也可以在新的 SHO授权的情况下, 由 RO产生。
步骤 518: RO ( DPF功能)发送新的 SHO的 IMSI, 新的 SHO的签约密 钥和对应的 OTA密钥给 M2ME, 替换 UICC上旧的 IMSI, 旧的 SHO的签约 密钥和对应的旧的 OTA密钥, 在替换完成的最后阶段, 重置并激活 UICC上 的 MCIM。
步骤 519: RO ( DPF功能)向旧的 SHO和新的 SHO报告供应成功 /失败 状态信息。
图 6是本发明实施例的通过旧的 SHO釆用 OTA方式变更 M2M设备归 属网络运营商的流程示意图。
如图 6所示, UICC和 TRE功能实体均位于 M2ME上, UICC上安装有 旧的 SHO的 MCIM。 由于 M2ME签约用户与旧的 SHO合约满或其它原因, M2ME签约用户想改变归属网络运营商时, M2ME签约用户联系旧的 SHO , 以改变 M2ME的 SHO。具体变更 M2M设备归属网络运营商的流程包括以下 步骤:
步骤 601: M2ME签约用户与旧的 SHO合约满,想改变 SHO时,则 M2ME 签约用户联系旧的 SHO,并发送需要改变 SHO的 M2ME的旧的 IMSI的信息 给旧的 SHO。 也可以联系新的 SHO, 并通过新的 SHO发送需要改变 SHO的 M2ME的旧的 IMSI的信息给旧的 SHO。
其中,当 M2ME签约用户有多个 M2M设备需要改变归属网络运营商时, M2ME签约用户可以将所有需要改变 SHO的 M2ME的 IMSI列表发送给旧的 SHO, 或通过新的 SHO发送给旧的 SHO。
步骤 602: 旧的 SHO通过 OTA方式激活 M2ME上的 TRE功能实体。 步骤 603: M2ME通过 TRE功能实体与任意选择的 VNO建立初始连接。 M2ME通过标准的 GSM/UMTS 原则来解码网络信息并且附着到任意一个 VNO。 在附着消息中 , M2ME向 VNO发送一个 PCID。
步骤 604: VNO联系 RO ( ICF功能) , 并将 PCID发送给 RO ( ICF功 能) 。 注意, 在某些情况下, RO可以位于 VNO。
步骤 605: RO ( ICF功能)收到 PCID之后, 针对该 PCID生成一组认证 向量(AVs ) 。
步骤 606: RO将生成的认证向量(AVs )发送给 VNO。
步骤 607: VNO使用认证向量对 PCID/M2ME进行认证, 可以但不限于 釆用 AKA认证。
步骤 608: 认证成功后, VNO为 M2ME提供到 RO的 IP连接。 VNO为 M2ME分配 IP地址。
步骤 609: M2ME通过 VNO网络提供的 IP连接联系 RO。
步骤 610: M2ME通过 RO的帮助, 发现新的 SHO, 或者, RO 自己为 M2ME发现新的 SHO。 新的 SHO发现过程可以使用 OMA BOOTSTRAP。
步骤 611 : RO连接新的 SHO并在新的 SHO注册要连接新的 SHO网络 的 M2ME。
步骤 612: 新的 SHO请求 PVA (或通过 RO请求 PVA )验证 M2ME的 真实性和完整性。
步骤 613: PVA验证 M2ME的真实性和完整性。
步骤 614: PVA将验证结果发送给新的 SHO。
步骤 615: 如果验证成功, 新的 SHO联系 RO ( DPF功能), 并授权 RO ( DPF功能)提供 IMSI给 M2ME。 同时也可以授权 RO提供新的 SHO的签 约密钥和对应的新的 OTA密钥给 M2ME。
新的 SHO的 IMSI, 签约密钥和对应的 OTA密钥可以由新的 SHO发送 给 RO , 也可以在新的 SHO授权的情况下, 由 RO产生。
步骤 616: RO ( DPF功能)发送新的 SHO的 IMSI, 新的 SHO的签约密 钥和对应的 ΟΤΑ密钥给 Μ2ΜΕ, 替换 UICC上旧的 IMSI, 旧的 SHO的签约 密钥和对应的旧的 ΟΤΑ密钥, 在替换完成的最后阶段, 重置并激活 UICC上 的 MCIM。
步骤 617: RO ( DPF功能) 向旧的 SHO、 新的 SHO报告供应成功 /失败 状态信息。
本发明实施例的 M2M设备归属网络运营商变更的系统, 包括: M2ME、 新的 SHO、 旧的 SHO、 PVA和 RO, 其中:
所述 M2ME设置成通过 TRE功能实体与 RO建立连接, 以及,用接收到 的新的 IMSI替换 UICC上旧的 IMSI;
所述 RO设置成在新的 SHO注册所述 M2ME, 以及, 当接收到所述新的 SHO发送的新的 IMSI或者接收到所述新的 SHO的授权后,通过 TRE功能实 体建立的连接, 将所述新的 IMSI发送给所述 M2ME;
所述新的 SHO设置成经 PVA验证所述 M2ME通过后, 将新的 IMSI发 送给 RO或者授权 RO提供新的 IMSI给所述 M2ME;
其中, 所述 UICC和 TRE功能实体均位于所述 M2ME上。
优选地, 所述 RO进一步设置成接收到所述 M2ME的旧的 IMSI的信息 后, 通过旧的 SHO提供的连接, 激活 M2ME上的 TRE功能实体。
优选地,所述旧的 SHO设置成接收到所述 M2ME的旧的 IMSI的信息后, 通过正在使用的连接或者通过无线下载( OTA )方式, 激活 M2ME上的 TRE 功能实体。
优选地, 所述新的 SHO进一步设置成将新的 SHO的签约密钥和对应的 OTA密钥发送给 RO,或者授权 RO提供新的 SHO的签约密钥和对应的 OTA 密钥给所述 M2ME;所述 RO进一步设置成将所述新的 SHO的签约密钥和对 应的 OTA密钥发送给所述 M2ME。 尽管本发明结合特定实施例进行了描述, 但是对于本领域的技术人员来 说, 可以在不背离本发明的精神或范围的情况下进行修改和变化。 这样的修 改和变化被视作在本发明的范围和附加的权利要求书范围之内。
工业实用性
本发明提供一种 M2M设备归属网络运营商变更的方法和系统, 使 M2M 设备结合 TRE 功能实体提供的初始连接和 UICC 的高安全性, 实现变更 M2ME的归属网络运营商, 并保证 IMSI及 MCIM的安全性。

Claims

权 利 要 求 书
1、 一种机器到机器(M2M )设备归属网络运营商变更的方法, 包括: 机器到机器设备(M2ME )通过可信环境(TRE ) 功能实体与注册运营 商 (RO )建立连接, RO在新的归属网络运营商 (SHO ) 注册所述 M2ME;
所述新的 SHO经平台验证授权中心 (PVA )验证所述 M2ME通过后, 将新的国际移动用户识别码( IMSI )发送给 RO或者授权 RO提供新的 IMSI;
所述 RO通过 TRE功能实体建立的连接,将新的 IMSI发送给所述 M2ME; 所述 M2ME用所述新的 IMSI替换通用集成电路卡( UICC )上旧的 IMSI; 其中, 所述 UICC和 TRE功能实体均位于所述 M2ME上。
2、 如权利要求 1所述的方法, 其中:
在所述 M2ME通过 TRE功能实体与 RO建立连接的步骤执行之前,还执 行:
所述 RO接收到所述 M2ME的旧的 IMSI的信息后, 通过旧的 SHO提供 的连接, 激活 M2ME上的 TRE功能实体。
3、 如权利要求 1所述的方法, 其中:
在所述 M2ME通过 TRE功能实体与 RO建立连接的步骤执行之前,还执 行:
旧的 SHO接收到所述 M2ME的旧的 IMSI的信息后,通过正在使用的连 接或者通过无线下载(OTA )方式, 激活 M2ME上的 TRE功能实体。
4、 如权利要求 1所述的方法, 其中:
所述 M2ME通过 TRE功能实体与 RO建立连接, RO在新的 SHO注册 所述 M2ME的步骤包括:
所述 M2ME通过 TRE功能实体与任意选择的拜访网络运营商 ( VNO ) 建立初始连接;
所述 VNO联系 RO , 并将从所述 M2ME接收到的临时连接标识( PCID ) 发送给所述 RO;
所述 RO针对所述 PCID生成一组认证向量, 并发送给所述 VNO;
所述 VNO使用所述认证向量对所述 PCID和 M2ME进行认证, 认证通 过后 , VNO为所述 M2ME提供到 RO的 IP连接;
所述 M2ME通过 VNO提供的 IP连接联系 RO;
所述 RO为 M2ME发现新的 SHO, 或者, 所述 M2ME通过 RO发现新 的 SHO;
所述 RO连接所述新的 SHO, 并在所述新的 SHO注册所述 M2ME。
5、 如权利要求 1 ~ 4中任意一项所述的方法, 其中:
在所述新的 SHO将新的 IMSI发送给 RO或者授权 RO提供新的 IMSI的 步骤中,所述新的 SHO还将新的 SHO的签约密钥和对应的 OTA密钥发送给 RO, 或者新的 SHO授权 RO提供新的 SHO的签约密钥和对应的 OTA密钥 给所述 M2ME;
在所述 RO将新的 IMSI发送给所述 M2ME的步骤中, 所述 RO还将新 的 SHO的签约密钥和对应的 OTA密钥发送给所述 M2ME。
6、 如权利要求 1 ~ 4中任意一项所述的方法, 其中:
在所述 M2ME用所述新的 IMSI替换 UICC上旧的 IMSI的步骤执行之后, 还执行:
所述 M2ME重置并激活 UICC上的 MCIM。
7、 一种机器到机器 (M2M )设备归属网络运营商变更的系统, 包括: 机器到机器设备 ( M2ME ) 、 新的归属网络运营商 (SHO ) 、 旧的 SHO、 平 台验证授权中心 (PVA )和注册运营商 (RO ) , 其中:
所述 M2ME设置成通过可信环境(TRE )功能实体与 RO建立连接, 以 及,用接收到的新的国际移动用户识别码( IMSI )替换通用集成电路卡( UICC ) 上旧的 IMSI;
所述 RO设置成在新的 SHO注册所述 M2ME, 以及, 当接收到所述新的 SHO发送的新的 IMSI或者接收到所述新的 SHO的授权后,通过 TRE功能实 体建立的连接, 将所述新的 IMSI发送给所述 M2ME;
所述新的 SHO设置成经 PVA验证所述 M2ME通过后, 将新的 IMSI发 送给 RO或者授权 RO提供新的 IMSI给所述 M2ME;
其中, 所述 UICC和 TRE功能实体均位于所述 M2ME上。
8、 如权利要求 7所述的系统, 其中:
所述 RO进一步设置成接收到所述 M2ME的旧的 IMSI的信息后, 通过 旧的 SHO提供的连接, 激活 M2ME上的 TRE功能实体。
9、 如权利要求 7所述的系统, 其中:
所述旧的 SHO设置成接收到所述 M2ME的旧的 IMSI的信息后,通过正 在使用的连接或者通过无线下载(OTA )方式, 激活 M2ME上的 TRE功能 实体。
10、 如权利要求 7 ~ 9中任意一项所述的系统, 其中:
所述新的 SHO进一步设置成将新的 SHO的签约密钥和对应的 OTA密钥 发送给 RO,或者授权 RO提供新的 SHO的签约密钥和对应的 OTA密钥给所 述 M2ME;
所述 RO进一步设置成将所述新的 SHO的签约密钥和对应的 OTA密钥 发送给所述 M2ME。
PCT/CN2010/071461 2009-09-25 2010-03-31 一种m2m设备归属网络运营商变更的方法和系统 WO2011035572A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP10818266.8A EP2448298B1 (en) 2009-09-25 2010-03-31 Method and system for changing selected home operator of machine to machine equipment
US13/383,877 US8468260B2 (en) 2009-09-25 2010-03-31 Method and system for changing selected home operator of machine to machine equipment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910177843.8A CN102036222B (zh) 2009-09-25 2009-09-25 一种m2m设备归属网络运营商变更的方法和系统
CN200910177843.8 2009-09-25

Publications (1)

Publication Number Publication Date
WO2011035572A1 true WO2011035572A1 (zh) 2011-03-31

Family

ID=43795340

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/071461 WO2011035572A1 (zh) 2009-09-25 2010-03-31 一种m2m设备归属网络运营商变更的方法和系统

Country Status (4)

Country Link
US (1) US8468260B2 (zh)
EP (1) EP2448298B1 (zh)
CN (1) CN102036222B (zh)
WO (1) WO2011035572A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103902938A (zh) * 2012-12-27 2014-07-02 中国移动通信集团江苏有限公司 实现一卡多应用自适应识别的方法、系统及卡片
EP2721859A4 (en) * 2011-06-15 2015-05-06 Ericsson Telefon Ab L M HANDLING OF OPERATOR CONNECTIONS IN A COMMUNICATION NETWORK

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011153714A1 (zh) 2010-06-12 2011-12-15 华为终端有限公司 支持多imsi的方法、装置和系统
US9009269B2 (en) * 2010-07-23 2015-04-14 Telefonaktiebolaget L M Ericsson (Publ) Mediation server, control method therefor, communication device, control method therefor, account provisioning server, and control method therefor
WO2012112085A1 (en) * 2011-02-14 2012-08-23 Telefonaktiebolaget L M Ericsson (Publ) Wireless device, registration server and method for provisioning of wireless devices
CN103370950A (zh) * 2011-02-17 2013-10-23 瑞典爱立信有限公司 用于机器到机器设备管理的系统、服务器、方法和计算机程序
ES2535386T3 (es) * 2011-06-08 2015-05-11 Giesecke & Devrient Gmbh Procedimientos y dispositivos para gestión durante la comunicación (OTA) de módulos de identificación de abonado
JP5942374B2 (ja) * 2011-09-30 2016-06-29 ソニー株式会社 情報処理装置、通信システムおよび情報処理装置の制御方法
CN103634791B (zh) * 2012-08-27 2018-03-09 华为终端(东莞)有限公司 切换运营商网络的方法、用户设备及远程管理平台
EP2704466A1 (en) * 2012-09-03 2014-03-05 Alcatel Lucent Smart card personnalization with local generation of keys
EP2712222B1 (en) * 2012-09-25 2020-04-01 Alcatel Lucent Confidential provisioning of secret keys over the air
CN103813303B (zh) * 2012-11-12 2018-02-23 中国移动通信集团公司 一种eSIM卡更新签约关系的方法、系统及相应设备
EP2747466B1 (en) 2012-12-21 2017-10-04 Giesecke+Devrient Mobile Security GmbH Methods and devices for ota subscription management
JP6062828B2 (ja) 2013-08-26 2017-01-18 株式会社Nttドコモ 加入者プロファイル転送方法、加入者プロファイル転送システム及びユーザ装置
EP3057350A1 (en) * 2015-02-13 2016-08-17 Gemalto Sa Method for remote subscription management of an eUICC, corresponding terminal
US9967732B2 (en) 2016-08-15 2018-05-08 At&T Intellectual Property I, L.P. Method and apparatus for managing mobile subscriber identification information according to registration errors
US9838991B1 (en) 2016-08-15 2017-12-05 At&T Intellectual Property I, L.P. Method and apparatus for managing mobile subscriber identification information according to registration requests
US9924347B1 (en) 2016-09-14 2018-03-20 At&T Intellectual Property I, L.P. Method and apparatus for reassigning mobile subscriber identification information
US9794905B1 (en) 2016-09-14 2017-10-17 At&T Mobility Ii Llc Method and apparatus for assigning mobile subscriber identification information to multiple devices according to location
US9843922B1 (en) 2016-09-14 2017-12-12 At&T Intellectual Property I, L.P. Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration errors
US9814010B1 (en) 2016-09-14 2017-11-07 At&T Intellectual Property I, L.P. Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration requests
US9906943B1 (en) 2016-09-29 2018-02-27 At&T Intellectual Property I, L.P. Method and apparatus for provisioning mobile subscriber identification information to multiple devices and provisioning network elements
US9918220B1 (en) 2016-10-17 2018-03-13 At&T Intellectual Property I, L.P. Method and apparatus for managing and reusing mobile subscriber identification information to multiple devices
US10070303B2 (en) 2016-11-11 2018-09-04 At&T Intellectual Property I, L.P. Method and apparatus for provisioning of multiple devices with mobile subscriber identification information
US10341842B2 (en) 2016-12-01 2019-07-02 At&T Intellectual Property I, L.P. Method and apparatus for using temporary mobile subscriber identification information in a device to provide services for a limited time period
US10070407B2 (en) 2016-12-01 2018-09-04 At&T Intellectual Property I, L.P. Method and apparatus for using active and inactive mobile subscriber identification information in a device to provide services for a limited time period
US10136305B2 (en) 2016-12-01 2018-11-20 At&T Intellectual Property I, L.P. Method and apparatus for using mobile subscriber identification information for multiple device profiles for a device
US10231204B2 (en) 2016-12-05 2019-03-12 At&T Intellectual Property I, L.P. Methods, systems, and devices for registering a communication device utilizing a virtual network
CN109842877B (zh) * 2019-04-09 2022-03-18 中国电子科技集团公司第三十研究所 一种在sim卡中实现imsi变更功能的方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132567A (zh) * 2006-08-25 2008-02-27 佛山市顺德区顺达电脑厂有限公司 移动通讯端的服务设定方法
CN101409945A (zh) * 2008-11-13 2009-04-15 深圳华为通信技术有限公司 无线上网卡的客户端软件切换方法、装置及终端
US20090191857A1 (en) * 2008-01-30 2009-07-30 Nokia Siemens Networks Oy Universal subscriber identity module provisioning for machine-to-machine communications

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI114276B (fi) * 2002-01-11 2004-09-15 Nokia Corp Verkkovierailun järjestäminen
CN100525186C (zh) * 2004-11-05 2009-08-05 华为技术有限公司 通用鉴权框架及更新bsf中用户安全描述信息的方法
US7289805B2 (en) * 2005-03-14 2007-10-30 Newstep Networks Inc. Method and system for providing a temporary subscriber identity to a roaming mobile communications device
CN100473216C (zh) * 2006-04-03 2009-03-25 中兴通讯股份有限公司 一种移动通信系统中的路由更新方法
US8666366B2 (en) * 2007-06-22 2014-03-04 Apple Inc. Device activation and access
KR100862749B1 (ko) * 2007-10-15 2008-10-10 주식회사 케이티프리텔 Uicc 응용 파일 제어 방법 및 그 장치
KR101861607B1 (ko) * 2008-01-18 2018-05-29 인터디지탈 패튼 홀딩스, 인크 M2m 통신을 인에이블하는 방법 및 장치
KR20170001731A (ko) * 2009-03-05 2017-01-04 인터디지탈 패튼 홀딩스, 인크 안전한 원격 가입 관리

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132567A (zh) * 2006-08-25 2008-02-27 佛山市顺德区顺达电脑厂有限公司 移动通讯端的服务设定方法
US20090191857A1 (en) * 2008-01-30 2009-07-30 Nokia Siemens Networks Oy Universal subscriber identity module provisioning for machine-to-machine communications
CN101409945A (zh) * 2008-11-13 2009-04-15 深圳华为通信技术有限公司 无线上网卡的客户端软件切换方法、装置及终端

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2448298A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2721859A4 (en) * 2011-06-15 2015-05-06 Ericsson Telefon Ab L M HANDLING OF OPERATOR CONNECTIONS IN A COMMUNICATION NETWORK
CN103902938A (zh) * 2012-12-27 2014-07-02 中国移动通信集团江苏有限公司 实现一卡多应用自适应识别的方法、系统及卡片
CN103902938B (zh) * 2012-12-27 2017-08-25 中国移动通信集团江苏有限公司 实现一卡多应用自适应识别的方法、系统及卡片

Also Published As

Publication number Publication date
US20120173743A1 (en) 2012-07-05
CN102036222A (zh) 2011-04-27
EP2448298A4 (en) 2013-03-27
EP2448298A1 (en) 2012-05-02
US8468260B2 (en) 2013-06-18
CN102036222B (zh) 2015-05-13
EP2448298B1 (en) 2015-06-17

Similar Documents

Publication Publication Date Title
WO2011035572A1 (zh) 一种m2m设备归属网络运营商变更的方法和系统
WO2011029299A1 (zh) 一种变更机器到机器设备的归属网络运营商的方法和系统
JP4864094B2 (ja) 通信制御システム
WO2013067772A1 (zh) 一种mtc设备与uicc绑定的方法、装置及系统
US20090253409A1 (en) Method of Authenticating Home Operator for Over-the-Air Provisioning of a Wireless Device
TWI713544B (zh) 驗證對設備使用特徵集合的授權
JP2016506152A (ja) タグ付けによるデバイスの認証
WO2012094879A1 (zh) 一种mtc服务器共享密钥的方法及系统
CN109561429B (zh) 一种鉴权方法及设备
WO2012062077A1 (zh) 基于通用引导架构的机器类通信设备分组管理方法及系统
WO2013071707A1 (zh) 移动用户身份识别卡与机器类通信设备绑定的方法及装置
WO2011029296A1 (zh) 向机器到机器设备提供机器通信身份模块的系统及方法
WO2012075814A1 (zh) 一种mtc组设备的应用密钥管理方法及系统
WO2014183535A1 (zh) 一种用于mtc设备组的小数据安全传输方法和系统
CA2690017C (en) A method for releasing a high rate packet data session
WO2010130118A1 (zh) 一种对家用基站用户实施鉴权的系统及方法
WO2011029308A1 (zh) 一种m2m设备归属网络运营商变更的方法和系统
WO2010124569A1 (zh) 用户接入控制方法和系统
WO2011029297A1 (zh) 向机器到机器设备提供机器通信身份模块的系统及方法
EP2656573A1 (en) Remote provisioning of a downloadable identity module into one of several trusted environments
WO2015100874A1 (zh) 家庭网关接入管理方法和系统
WO2012139623A1 (en) Mobile terminal multiple network registration
WO2011157041A1 (zh) 一种机器对机器设备自我管理的方法及系统
WO2013113185A1 (zh) 业务签约信息处理方法及装置
WO2023126296A1 (en) Authentication support for an electronic device to connect to a telecommunications network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10818266

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 13383877

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2010818266

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE