WO2018018419A1 - Configuration file batch-obtaining and downloading method, and server and terminal - Google Patents

Configuration file batch-obtaining and downloading method, and server and terminal Download PDF

Info

Publication number
WO2018018419A1
WO2018018419A1 PCT/CN2016/091735 CN2016091735W WO2018018419A1 WO 2018018419 A1 WO2018018419 A1 WO 2018018419A1 CN 2016091735 W CN2016091735 W CN 2016091735W WO 2018018419 A1 WO2018018419 A1 WO 2018018419A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
euicc
configuration file
management data
data preparation
Prior art date
Application number
PCT/CN2016/091735
Other languages
French (fr)
Chinese (zh)
Inventor
程紫尧
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2016/091735 priority Critical patent/WO2018018419A1/en
Publication of WO2018018419A1 publication Critical patent/WO2018018419A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Definitions

  • the present invention relates to the field of smart card technologies, and in particular, to a method for batch obtaining and downloading configuration files, a server, and a terminal.
  • the first generation of smart cards - SIM card (English: Subscriber Identity Module) is a telecom smart card standard developed for Global System for Mobile communication (GSM), used to identify users on the network. Authentication.
  • the second generation of smart cards - UICC card (Universal Integrated Circuit Card, English: Universal Integrated Circuit Card) is a telecom smart card platform standard developed for 3G, separating the UICC platform and identity authentication applications.
  • the demand for Internet of Things has driven the evolution of UICC cards to embedded UICC cards (or embedded SIM cards, or eUICC), namely: allowing different subscription management data preparation.
  • the server's identity authentication application is dynamically loaded online.
  • the physical form of the eUICC is not limited, and may be a traditional SIM card of different sizes or an embedded card.
  • the GSMA Global Mobile System Alliance, English: Global Mobile System Alliance
  • the contract management data preparation server entity and the eUICC use the respective digital certificates to perform mutual authentication and key agreement (end-to-end security), and the profile is securely downloaded from the subscription management data preparation server entity to the eUICC.
  • the GSMA does not propose a solution for the enterprise or group user scenarios. Therefore, how to satisfy the enterprise or group users to obtain the profile for eUICC in batches becomes The problem that needs to be solved at this stage.
  • the embodiment of the invention provides a method for obtaining and downloading configuration files in batches, a server and a terminal, which can acquire configuration files in batches.
  • an embodiment of the present invention provides a method for batch obtaining and downloading a configuration file, including:
  • the subscription management data preparation server receives the matching information of the plurality of embedded universal integrated circuit cards eUICC sent by the first server, and checks whether there is a waiting configuration file download command corresponding to the matching information;
  • the contract management data preparation server acquires a plurality of configuration file profiles corresponding to the waiting configuration file download command in the case that the waiting for matching file download command exists;
  • the subscription management data preparation server generates a plurality of session keys respectively corresponding to the plurality of eUICCs; the subscription management data preparation server generates corresponding at least according to the plurality of session keys and the plurality of profile profiles Binding configuration package;
  • the subscription management data preparation server sends the plurality of binding configuration file packages to the first server, so that the eUICC downloads the binding configuration file package from the first server.
  • the subscription management data preparation server of the embodiment of the present invention sends a plurality of binding configuration file packages of the plurality of eUICCs to the first server in batches according to the requirements of the first server, thereby reducing the signaling overhead of the subscription management data preparation server and alleviating
  • the access pressure is used to prevent DoS attacks caused by a large number of users simultaneously launching a profile download request.
  • DoS is short for Denial of Service, that is, denial of service, and the DoS attack is called a DoS attack).
  • the subscription management data preparation server receives the matching information of the plurality of embedded universal integrated circuit cards eUICC sent by the first server, and further includes:
  • the subscription management data preparation server receives a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC sent by the first server; wherein the plurality of eUICCs and the plurality of presets The keys correspond to each other.
  • the subscription management data preparation server generates a plurality of session keys respectively corresponding to the plurality of eUICCs, including:
  • the subscription management data preparation server generates a one-time public-private key pair; the subscription management data preparation server generates corresponding to the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs and the one-time private key Multiple session keys.
  • the binding configuration file package includes at least the one-time public key, a public key included in the digital certificate of the subscription management data preparation server, a second digital signature of the subscription management data preparation server, and the preset public key.
  • the second digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least the one-time public key and the preset public key;
  • the hash value of the preset public key is generated by the contract management data preparation server hashing the preset public key.
  • the method includes:
  • the binding profile package includes at least a hash value of the preset public key, a public key included in a digital certificate of the subscription management data preparation server, the encrypted session key, the Signing a third digital signature of the data preparation server;
  • the third digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least a plurality of encrypted session keys and the preset public key;
  • the hash value of the preset public key is generated by the contract management data preparation server hashing the preset public key.
  • the subscription management data preparation server verifies the digital signature generated by the first server according to at least the plurality of preset public keys of the plurality of eUICCs and the matching information.
  • an embodiment of the present invention provides a method for batch obtaining and downloading configuration files, including:
  • the first server sends a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information corresponding to the plurality of eUICCs to the subscription management data preparation server, so that the subscription management data preparation server generates the matching Multiple binding configuration file packages corresponding to the information;
  • the plurality of eUICCs respectively correspond to the plurality of preset public keys
  • the first server receives an eUICC digital certificate from the eUICC, and checks whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server;
  • the first server searches for a hash value of the preset public key corresponding to the eUICC identity identifier EID, and further determines a location according to the hash value of the preset public key.
  • the binding configuration file package corresponding to the eUICC is sent, and the binding configuration file package is sent to the local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  • the first server of the embodiment of the present invention can obtain a plurality of binding configuration file packages corresponding to the plurality of eUICCs in batches from the subscription management data preparation server, and store the plurality of binding configuration file packages according to the specific requirements of the users of the subordinate eUICC terminals. It is sent to the corresponding eUICC terminal.
  • the method before the first server sends the plurality of preset public keys of the embedded universal integrated circuit card (eUICC) and the matching information of the plurality of eUICCs to the subscription management data preparation server, the method further includes:
  • the first server, the hash value of the plurality of preset public keys of the plurality of eUICCs, and the plurality of The eUICC identity EIDs are stored separately.
  • the obtaining the hash values of the plurality of preset public keys of the plurality of eUICCs includes: obtaining the hash values of the plurality of preset public keys of the plurality of eUICCs directly, or A server calculates a hash value of the plurality of preset public keys of the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs.
  • the first server sends a plurality of preset public keys of the embedded universal integrated circuit card (eUICC) and the matching information of the plurality of eUICCs to the subscription management data preparation server, and further includes:
  • the first server sends, to the subscription management data preparation server, a first server first digital signature generated according to at least a plurality of preset public keys of the plurality of eUICCs and the matching information, so that the subscription management data is
  • the preparation server verifies the first digital signature of the first server.
  • the method before verifying whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server, the method further includes:
  • the first server verifies the first digital signature generated by the eUICC according to at least the random number of the first server.
  • the multiple binding configuration file packets obtained by the first server in the embodiment of the present invention are all encrypted, and the first server cannot obtain the specific information of the binding configuration file package, thereby ensuring the security of the binding configuration file package.
  • an embodiment of the present invention provides a method for batch obtaining and downloading configuration files, including:
  • the embedded universal integrated circuit card eUICC terminal sends an eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package to the eUICC by repeatedly initiating a load binding configuration file package function. eUICC in the terminal.
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package by repeatedly initiating a load binding configuration file package function.
  • the eUICC in the eUICC terminal further includes:
  • the eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and verifies the digital signature of the subscription management data preparation server included in the initial security channel function, and performs verification.
  • the session key is generated according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function.
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package by repeatedly initiating a load binding configuration file package function.
  • the eUICC in the eUICC terminal further includes:
  • the eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and verifies the digital signature of the subscription management data preparation server included in the initial security channel function, and performs verification.
  • the encrypted session key included in the initialization secure channel function is decrypted by using the preset public key to obtain a session key.
  • an embodiment of the present invention provides a subscription management data preparation server, including:
  • a receiver configured to receive, by the first server, matching information of multiple embedded universal integrated circuit cards eUICC;
  • a processor configured to check whether there is a waiting configuration file download command corresponding to the matching information; and if there is the waiting for matching file download command, acquiring a plurality of configuration file profiles corresponding to the waiting configuration file downloading command Generating a plurality of session keys respectively corresponding to the plurality of eUICCs; generating at least a plurality of binding profile packages according to the plurality of session keys and the plurality of profile profiles;
  • a transmitter configured to send the multiple binding configuration file package to the first server, so that the eUICC downloads the binding configuration file package from the first server.
  • an embodiment of the present invention provides a server, including:
  • a transmitter configured to send a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information corresponding to the plurality of eUICCs, so that the subscription management data preparation server generates multiple bindings corresponding to the matching information.
  • Configuration file package
  • the plurality of eUICCs respectively correspond to the plurality of preset public keys
  • a receiver configured to receive an eUICC digital certificate from the eUICC
  • a processor configured to check whether the eUICC identity identifier EID in the eUICC digital certificate exists in the server, and to find a preset public key corresponding to the eUICC identity identifier EID in the presence of the eUICC identity identifier EID And determining a binding configuration file package corresponding to the eUICC according to the hash value of the preset public key;
  • a transmitter configured to send the binding configuration file package to a local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  • an embodiment of the present invention provides a terminal, including:
  • a transmitter configured to send an embedded universal integrated circuit card eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
  • a receiver configured to receive the binding configuration file package from the first server, and a processor, configured to repeatedly initiate a load binding configuration file package function by using the binding configuration file package;
  • a transmitter configured to send the binding configuration file package to an embedded universal integrated circuit card eUICC in the terminal.
  • an embodiment of the present invention provides a method for batch obtaining a configuration file, including:
  • the subscription management data preparation server SM-DP+ receives the matching information sent by the first server and the plurality of embedded universal integrated circuit cards eUICC, wherein the plurality of eUICCs comprise the first eUICC and the second eUICC;
  • the SM-DP+ checks whether there is a plurality of profile profiles corresponding to the matching information, wherein the plurality of profiles includes a first profile and a pair corresponding to the first eUICC Should be in the second profile of the second eUICC;
  • the SM-DP+ sends the first binding configuration file package and the second binding configuration file package to the first server.
  • the first eUICC is preset with a first public private key pair
  • the first public private key pair includes a first public key and a first private key
  • the second eUICC is preset with a second public private key.
  • a key pair, the second public private key pair includes a second public key and a second private key;
  • the method further includes:
  • the SM-DP+ receives a plurality of preset public keys sent by the first server, and the plurality of preset public keys includes the first public key and the second public key.
  • the SM-DP+ generates a first session key corresponding to the first eUICC and a second session key corresponding to the second eUICC, including:
  • the SM-DP+ generates a third public private key pair, where the third public private key pair includes a third public key and a third private key;
  • the SM-DP+ generates a first session key corresponding to the first eUICC by using the first public key and the third private key;
  • the SM-DP+ generates a second session key corresponding to the second eUICC using the second public key and the third private key.
  • the binding configuration file package includes at least the third public key, a public key included in the digital certificate of the subscription management data preparation server, a second digital signature of the subscription management data preparation server, and the The hash value of the first public key;
  • the second digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least the third public key and the first public key;
  • the hash value of the first public key is generated by the SM-DP+ hashing the first public key.
  • the SM-DP+ generates a first session key corresponding to the first eUICC and a second session key corresponding to the second eUICC, including:
  • the first binding profile package includes at least a hash value of the first public key, a public key included in a digital certificate of the subscription management data preparation server, the first encrypted session key, The third digital signature of the subscription management data preparation server;
  • the second binding configuration file package includes at least a hash value of the second public key, a public key included in the digital certificate of the subscription management data preparation server, The second encrypted session key, the third digital signature of the subscription management data preparation server;
  • the third digital signature of the subscription management data preparation server is that the SM-DP+ is based on the first encrypted session key, the first public key, and the second encrypted session key, Generated by the second public key;
  • the hash value of the first public key is generated by the SM-DP+ hashing the first public key; the hash value of the second public key is the SM-DP+ pair The second public key is generated by hashing.
  • the method before the verifying whether there are multiple profiles corresponding to the matching information, the method further includes:
  • the SM-DP+ verifies that the first server sends at least according to the first eUICC A digital signature generated by a public key, a second public key of the second eUICC, and the matching information.
  • an embodiment of the present invention provides a method for batch obtaining and downloading a configuration file, including:
  • the first server sends a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information associated with the plurality of eUICCs to the subscription management data preparation server SM-DP+, wherein the plurality of eUICCs includes a first eUICC and a second eUICC, the plurality of preset public keys including a first public key corresponding to the first eUICC and a second public key corresponding to the second eUICC, so that the SM-DP+ is generated a first binding configuration file package and a second binding configuration file package corresponding to the matching information;
  • the first server receives an eUICC digital certificate from the eUICC, and checks whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server;
  • the first server searches for a hash value of the preset public key corresponding to the eUICC identity identifier EID, and further determines a location according to the hash value of the preset public key.
  • the binding configuration file package corresponding to the eUICC is sent, and the binding configuration file package is sent to the local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  • the first eUICC is preset with a first public private key pair
  • the first public private key pair includes a first public key and a first private key
  • the second eUICC is preset with a second public private key.
  • a key pair, the second public private key pair includes a second public key and a second private key;
  • the method further includes:
  • the first server stores the hash value of the first public key and the identity identifier EID of the first eUICC, and the hash value of the second public key and the identity of the second eUICC EID Corresponding storage.
  • the hash value of the preset public key is obtained in the following manner:
  • the hash value of the preset public key is directly obtained, or the first server generates a hash value of the preset public key according to the preset public key.
  • the first server sends the plurality of preset public keys of the eUICC and the matching information associated with the multiple eUICCs to the SM-DP+, including:
  • the method before the checking whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server, the method further includes:
  • the first server verifies the first digital signature generated by the eUICC according to at least the random number of the first server.
  • a ninth aspect, the embodiment of the present invention provides a method for batch obtaining and downloading configuration files, including:
  • the embedded universal integrated circuit card eUICC terminal sends an eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package to the eUICC by repeatedly initiating a load binding configuration file package function. eUICC in the terminal.
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and the binding configuration file package is repeatedly triggered to load the binding configuration file package function.
  • the eUICC sent to the eUICC terminal further includes:
  • the eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and includes a signature included in the initial security channel function.
  • the management data preparation server digital signature is verified, and in the case of verification, the session is generated according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function. Key.
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and the binding configuration file package is repeatedly triggered to load the binding configuration file package function.
  • the eUICC sent to the eUICC terminal further includes:
  • the eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and verifies the digital signature of the subscription management data preparation server included in the initial security channel function, and performs verification.
  • the encrypted session key included in the initialization secure channel function is decrypted by using the preset public key to obtain a session key.
  • the tenth aspect of the present invention provides a subscription management data preparation server, including:
  • a receiver configured to receive matching information associated with a plurality of embedded universal integrated circuit card eUICCs, wherein the plurality of eUICCs comprise a first eUICC and a second eUICC;
  • a processor configured to check whether there is a plurality of profile profiles corresponding to the matching information, where the plurality of profiles includes a first profile corresponding to the first eUICC and a first profile corresponding to the second eUICC a second profile, generating a first session key corresponding to the first eUICC and a second session key corresponding to the second eUICC, respectively, based on the first session key and the first eUICC, The second session key and the second eUICC generate a first binding configuration file package and a second binding configuration file package;
  • a transmitter configured to send the first binding configuration file package and the second binding configuration file package to the first server.
  • the first eUICC is preset with a first public private key pair
  • the first public private key pair includes a first public key and a first private key
  • the second eUICC is preset with a second public private key.
  • a key pair, the second public private key pair including a second public key and a second private key;
  • the receiver is further configured to receive a plurality of preset public keys sent by the first server, where the multiple The preset public key includes the first public key and the second public key.
  • the processor is further configured to generate a third public private key pair, where the third public private key pair includes a third public key and a third private key, and is generated by using the first public key and the third private key Corresponding to the first session key of the first eUICC, using the second public key and the third private key to generate a second session key corresponding to the second eUICC.
  • the binding configuration file package includes at least the third public key, a public key included in the digital certificate of the subscription management data preparation server, a second digital signature of the subscription management data preparation server, and the The hash value of the first public key;
  • the second digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least the third public key and the first public key;
  • the hash value of the first public key is generated by the SM-DP+ hashing the first public key.
  • the processor is further configured to encrypt the first session key by using a first public key of the first eUICC to generate a first encrypted session key, by using the second eUICC
  • the second public key encrypts the second session key to generate a second encrypted session key, and generates a first binding profile package according to at least the first encrypted session key, at least according to the second encryption
  • the session key generates the second binding profile package.
  • the first binding profile package includes at least a hash value of the first public key, a public key included in a digital certificate of the subscription management data preparation server, the first encrypted session key, The third digital signature of the subscription management data preparation server;
  • the second binding configuration file package includes at least a hash value of the second public key, a public key included in the digital certificate of the subscription management data preparation server, The second encrypted session key, the third digital signature of the subscription management data preparation server;
  • the third digital signature of the subscription management data preparation server is that the processor is based at least on the first encrypted session key, the first public key, and the second encrypted session key, the first Generated by the second public key;
  • the hash value of the first public key is generated by the processor performing a hash operation on the first public key; the hash value of the second public key is the processor to the second public The key is generated by hashing.
  • the processor is further configured to verify a digital signature generated by the first server according to at least the first public key of the first eUICC, the second public key of the second eUICC, and the matching information.
  • an embodiment of the present invention provides a server, including:
  • a transmitter configured to send, to the subscription management data preparation server SM-DP+, a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information associated with the plurality of eUICCs, wherein the multiple The eUICC includes a first eUICC and a second eUICC, the plurality of preset public keys including a first public key corresponding to the first eUICC and a second public key corresponding to the second eUICC, so that the SM- DP+ generates a first binding configuration file package and a second binding configuration file package corresponding to the matching information;
  • a receiver configured to receive an eUICC digital certificate from the eUICC
  • a processor configured to check whether an eUICC identity identifier EID in the eUICC digital certificate exists, and in a case where the eUICC identity identifier EID exists, searching for a hash value of a preset public key corresponding to the eUICC identity identifier EID, And determining, according to the hash value of the preset public key, a binding configuration file package corresponding to the eUICC;
  • the transmitter is configured to send the binding configuration file package to a local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  • the first eUICC is preset with a first public private key pair
  • the first public private key pair includes a first public key and a first private key
  • the second eUICC is preset with a second public private key.
  • a key pair, the second public private key pair includes a second public key and a second private key;
  • the processor is further configured to obtain, in advance, the first public private key pair, the second public private key pair, the first identity identifier EID of the first eUICC, and the second identity identifier EID of the second eUICC And obtaining a hash value of the first public key and a hash value of the second public key;
  • the processor stores the hash value of the first public key and the identity identifier EID of the first eUICC, and the hash value of the second public key and the identity identifier EID of the second eUICC Corresponding storage.
  • the transmitter is further configured to send, to the SM-DP+, a first generated according to at least a first public key of the first eUICC, a second public key of the second eUICC, and the matching information.
  • the server first digitally signs the SM-DP+ to verify the first digital signature of the first server.
  • the processor is further configured to verify a first digital signature generated by the eUICC based on at least a random number of the first server.
  • the embodiment of the present invention provides a terminal, including:
  • a transmitter configured to send an embedded universal integrated circuit card eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
  • a receiver configured to receive the binding configuration file package from the first server
  • a processor configured to repeatedly initiate a load binding configuration file package function by using the binding configuration file package
  • a transmitter configured to send the binding configuration file package to an embedded universal integrated circuit card eUICC in the terminal.
  • the processor is further configured to: prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and perform subscription management on the initial security channel function.
  • the data preparation server performs digital verification to generate a session key according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function. .
  • the processor is further configured to: prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and perform subscription management on the initial security channel function.
  • the data preparation server digital signature is verified, and in the case of verification, the encrypted public key included in the initialization security channel function is utilized by the preset public key
  • the session key is decrypted to obtain the session key.
  • the configuration file batch obtaining and downloading method, the server, and the terminal provided by the embodiment of the present invention can deliver multiple binding configuration file packages at one time, which is equivalent to batch processing a large number of eUICC terminal download requests at one time, thereby reducing a large amount of signaling overhead. Alleviate the access pressure and prevent DoS attacks that may be caused when a large number of eUICC terminals initiate a profile download request at the same time.
  • OEM terminal equipment manufacturer
  • FIG. 1 is a schematic diagram of a batch acquisition and download system of a profile profile according to an embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of information acquisition of a first server according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a method for batch obtaining a profile profile according to Embodiment 1 of the present invention
  • FIG. 4 is a schematic diagram of a batch downloading method of a profile profile according to Embodiment 1 of the present invention.
  • FIG. 5 is a schematic diagram of a method for obtaining a batch profile file profile according to Embodiment 2 of the present invention.
  • FIG. 6 is a schematic diagram of a batch downloading method of a profile profile according to Embodiment 2 of the present invention.
  • FIG. 7 is a schematic diagram of a process of generating a binding configuration file package according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of a process for distinguishing multiple binding configuration file packages according to an embodiment of the present disclosure
  • FIG. 9 is a schematic diagram of a subscription management data preparation server according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of a first server according to an embodiment of the present disclosure.
  • FIG. 11 is a schematic diagram of an eUICC terminal according to an embodiment of the present invention.
  • the embodiment of the present invention provides a configuration file profile acquisition and download method, a device, and a system, so that a subscription management data preparation server (Subscription Manager Data Preparation+, SM-DP+) can bind multiple binding configuration files (bound profile).
  • the package is delivered to the first server (such as a server deployed by a third-party service provider), and the first server obtains multiple binding configuration files corresponding to multiple eUICCs, and then configures the multiple bindings.
  • the file package is sent to the corresponding eUICC via the corresponding Local Profile Assistant (LPA), and the download and installation of the binding configuration file package is completed by the eUICC.
  • LPA Local Profile Assistant
  • FIG. 1 is a schematic diagram of a batch acquisition and download system of a profile profile according to an embodiment of the present invention.
  • the system includes: a contract management data preparation server SM-DP+, a first server, a plurality of local profile assistants LPAs corresponding to the plurality of eUICC terminals, and a plurality of eUICCs.
  • the subscription management data preparation server SM-DP+ is configured to receive information such as multiple preset public keys of multiple eUICCs sent by the first server, matching information corresponding to multiple eUICCs (for example, The subscription management data preparation server SM-DP+ is further configured to receive the domain name of the subscription management data preparation server SM-DP+, the digital certificate of the first server, and the like, and acquire multiple profiles corresponding to the matching information (protected profile package protected profile) a package or an unprotected profile package, and generating a plurality of binding configuration file packages corresponding to the plurality of eUICCs according to the plurality of profiles, and the binding configuration file package includes at least the preset public key of the eUICC The hash value and the public key included in the digital certificate of the subscription management data preparation server SM-DP+; wherein the plurality of eUICCs respectively correspond to the plurality of eUICC terminals, that is, each eUICC terminal is configured with a corresponding eUICC, and
  • a first server configured to send (not limited to) a plurality of preset public keys of the plurality of eUICCs and matching information of the plurality of eUICCs to the subscription management data preparation server SM-DP+
  • the first server is further used for Sending a domain name of the subscription management data preparation server SM-DP+, a digital certificate of the first server, and the like, and receiving a plurality of binding configuration file packages corresponding to the plurality of eUICCs generated by the subscription management data preparation server SM-DP+; and receiving After the eUICC digital certificate sent by the local configuration file assistant LPA of the eUICC terminal, the eUICC identity identifier EID in the eUICC digital certificate is obtained, and it is checked whether the eUICC identity identifier EID obtained in the first database is the same as the eUICC identity identifier obtained from the digital certificate.
  • the EID obtains a hash value of the preset public key of the eUICC corresponding to the eUICC identity identifier EID according to the eUICC identity identifier EID, and determines the binding of the eUICC according to the hash value of the preset public key.
  • the configuration package is packaged and the binding configuration package is sent to the eUICC via the local configuration file assistant LPA.
  • the hash value of the preset public key of each eUICC is stored corresponding to the eUICC identity identifier EID, so that there is a corresponding relationship between the two.
  • the first server may be a server deployed by a third-party service provider (ie, a contract management secure routing server, English: Subscription Manager-Secure Routing+, referred to as SM-SR+), and the third-party service provider includes but is not limited to enterprise users and group users.
  • the first server may also be part of the subscription management data preparation server SM-DP+; the first server may also be a Subscription Manager-Discovery Server (SM-DS). Wait.
  • SM-SR+ Subscription Manager-Secure Routing+
  • the local profile assistant LPA is configured to forward the eUICC digital certificate and the like sent by the eUICC to the first server, and download the binding configuration file package corresponding to the eUICC from the first server, and split the binding configuration file package corresponding to the eUICC.
  • Different data blocks (functions) are sequentially sent to the corresponding eUICC through an Application Protocol Data Unit command.
  • the eUICC is configured to sequentially receive different data blocks (functions) of the binding configuration file package sent by the local configuration file assistant LPA through the application protocol data unit, and decrypt the data block according to the generated session key to complete the binding configuration file.
  • Package installation is configured to forward the eUICC digital certificate and the like sent by the eUICC to the first server, and download the binding configuration file package corresponding to the eUICC from the first server, and split the binding configuration file package corresponding to the eUICC.
  • Different data blocks (functions) are sequentially sent to the corresponding eUICC through an Application Protocol Data Unit command.
  • the eUICC terminal includes at least a local profile assistant LPA and an eUICC.
  • the eUICC terminal includes an LPA and a corresponding eUICC, and the information sent by the eUICC terminal to the first server is sent by the LPA.
  • the local configuration file assistant LPA is used to manage the eUICC, forward the information sent by the eUICC, obtain the intent of the eUICC terminal user, and actively request to download, activate, and delete the profile.
  • the eUICC is provided by the communication module manufacturer, the terminal manufacturer, or the M2M industry customer. The eUICC provider subscribes and finally embeds into the eUICC terminal.
  • the eUICC terminal embeds the eUICC digital certificate of the eUICC (eUICC digital certificate including eUICC identity EID), eUICC information set 1 (eUICC_info_1), eUICC information set 2 (eUICC_info_2), pre-
  • the eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, the signature algorithm supported in the subsequent verification process, the specification version number, and the like;
  • eUICC information set 2 (eUICC_info_2) ) Includes eUICC capability information, such as supported specification versions, storage capabilities, and more.
  • the digital certificate and the digital signature are used for mutual authentication between devices (for example, the bidirectional authentication of the contract management data preparation server SM-DP+ and the first server, and the first server and the eUICC terminal) Two-way authentication).
  • devices for example, the bidirectional authentication of the contract management data preparation server SM-DP+ and the first server, and the first server and the eUICC terminal
  • Two-way authentication Two-way authentication.
  • the first device holds a pair of public and private key pairs, including a first device public key and a first device private key, and the first device public key is a public key included in the digital certificate of the first device; Hold one
  • the public-private key pair includes a second device public key and a second device private key, and the second device public key is a public key included in the digital certificate of the second device.
  • the first device sends a message M to the second device, and the first device encrypts the hash value (or message digest) of the message M using the first private key to generate a digital signature A.
  • the message M is used as the digital information, and the first device generates a hash value of the digital information (for example, the message M) through a hash function, and then uses the first private key pair held by the first device itself.
  • the hash value is encrypted to generate the digital signature A.
  • the first device sends the message M (ie, an example of digital information) and the digital signature A to the second device, the digital information being plaintext information.
  • the first device sends its own digital certificate, that is, the digital certificate of the first device, to the second device, where the second device first verifies the digital certificate of the first device, and if the digital certificate of the first device is verified, the The first public key in the digital certificate of the first device decrypts the digital signature A to obtain a hash value of the message M.
  • the second device may perform a calculation using the hash function on the message M, and compare the obtained result with the hash value of the decrypted message M. If the two are consistent, it may be determined that the digital signature A is
  • the first device is calculated by using its own unique first private key, so that the second device verifies the identity of the first device, and can also prove that the message M protected by the digital signature A has not been tampered with.
  • the second device may also generate a digital signature B based on the method for generating the digital signature A. The first device verifies the digital signature B sent by the second device based on the method for verifying the digital signature A. For the sake of brevity, it will not be repeated here.
  • the first embodiment of the present invention provides a method for batch obtaining and downloading a profile profile, which mainly includes a first phase and a second phase of two work phases.
  • the first phase is a batch acquisition of a profile profile
  • the second phase is a configuration file. Batch download of profiles.
  • the following takes the first server as the contract management security routing server SM-SR+ as an example.
  • FIG. 3 is a schematic diagram of a method for obtaining a batch of a profile profile according to the first embodiment of the present invention.
  • the first server SM-SR+ from the subscription management data preparation server SM-DP+ is provided in the first embodiment of the present invention.
  • the working principle and process of obtaining multiple binding configuration file packages includes step S101 - step S108:
  • the first server SM-SR+ Before the first server SM-SR+ starts to obtain multiple binding configuration file packages in batches, it also includes:
  • the first server SM-SR+ needs to obtain a matching information (matching ID or Activation Code Token) corresponding to multiple eUICCs from the operator, and obtain a subscription management data preparation server domain name (SM-DP+addr);
  • the eUICC Manufacturer eUMCC obtains the preset public key (PK_eUICCi_ECKA) of each eUICC terminal and the hash value h (PK_eUICCi_ECKA) of the preset public key (may also be obtained by the first server SM-SR+)
  • Preset public key calculation generates a hash value of the preset public key), eUICC information set 1 (eUICC_info_1), eUICC information set 2 (eUICC_info_2), eUICC identity EID (eUICC-ID); and will be manufactured from the operator, eUICC
  • the information obtained by the quotient is stored in the first database of the first server SM-SR+, wherein the hash value of the preset public key of each
  • a waiting configuration file download command corresponding to the above matching information exists in the subscription management data preparation server SM-DP+, and the waiting configuration file download command corresponds to multiple profiles (protected configuration file package or not Protected profile package).
  • the specific generation process of multiple profile profiles is detailed in Figure 7 and related text descriptions.
  • step S101 the first server SM-SR+ initiates and establishes a first https (Hyper Text Transfer Protocol over Secure Socket Layer) connection to the subscription management data preparation server SM-DP+ for subsequent interaction.
  • the signaling is performed by the first server SM-SR+ through the first https connection to the subscription management data preparation server SM-DP+, and at least includes the subscription management data preparation server domain name (SM-DP+addr), the first Information such as the server first random number (SR_challenge_1) and eUICC information set 1 (eUICC_info_1).
  • the first server first random number (SR_challenge_1) is generated by the first server SM-SR+, and has uniqueness and randomness, and can ensure interaction information between the first server SM-SR+ and the subscription management data preparation server SM-DP+.
  • Freshness; eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, the signature algorithm supported in the subsequent verification process, the specification version number, and the like.
  • Step S102 the subscription management data preparation server SM-DP+ verifies the subscription management data preparation server domain name (SM-DP+addr) sent by the first server SM-SR+ (to verify whether the domain name corresponds to the subscription management data preparation server SM-DP+) Verifying the content in the eUICC information set 1 (eUICC_info_1), if the verification is successful, generating a first interaction identifier (TransactionID_1), a contract management data preparation server random number (DP_challenge), and a contract management data preparation server digital signature, which is referred to herein as The contract management data preparation server first digital signature (DP_sign1); wherein the subscription management data preparation server first digital signature (DP_sign1) is a subscription management data preparation server SM-DP+ at least according to the first server first random number (SR_challenge_1), The contract management data preparation server random number (DP_challenge), the contract management data preparation server domain name (SM-DP+addr), and the first interaction identifier (TransactionID_1)
  • Step S103 the subscription management data preparation server SM-DP+ at least the first interaction identifier (TransactionID_1), the contract management data preparation server random number (DP_challenge), the contract management data preparation server first digital signature (DP_sign1), and the contract management data preparation server Domain name (SM-DP+addr), contract management data preparation server digital certificate (CERT.DP.ECDSA), Curve To Be Used (here refers to the contracted management data preparation server SM-DP+ selected key
  • the parameter reference value is sent to the first server SM-SR+ through the first https connection.
  • Step S104 the first server SM-SR+ verifies the received subscription management data preparation server digital certificate (CERT.DP.ECDSA) and the contract management data preparation server first digital signature (DP_sign1), and if the verification is successful, the contract is signed.
  • the data preparation server SM-DP authenticates successfully, and generates a first server digital signature, which is referred to herein as a first server first digital signature (SR_sign1); wherein the first server first digital signature (SR_sign1) is the first server SM -SR+ according to at least a plurality of preset public keys (PK.eUICC1.ECKA...PK.eUICCn.ECKA), matching information (matchingID or Activation Code Token), first interaction identifier (TransactionID_1), and contract management data of a plurality of eUICCs
  • the eUICC information set 2 includes at least eUICC capability information, such as a supported specification version, and storage, such as the supported network access mode (2G/3G/4G). Force or the like; wherein the plurality of the plurality of preset eUICC corresponding public key respectively.
  • the signing management data preparation server generates a first digital signature (DP_sign1) and the first server SM-SR+ validates the first digital signature (DP_sign1) of the subscription management data preparation server, see the first device and The second device performs a two-way authentication process.
  • the specific verification process of the first server SM-SR+ for the first digital signature (DP_sign1) of the subscription management data preparation server needs to be verified according to a specific signature algorithm.
  • the embodiment of the present invention adopts an elliptic curve signature algorithm ECDSA (Curve To Be). Used).
  • Step S105 The first server SM-SR+ at least the first interaction identifier (TransactionID_1), the plurality of preset public keys of the plurality of eUICCs, the subscription management data preparation server domain name (SM-DP+addr), and the matching information (matchingID or Activation) Code Token), terminal information (Device_info), eUICC information set 2 (eUICC_info_2), first server first digital signature (SR_sign1), first server digital certificate (CERT.SR.ECDSA) are sent to the contract management through the first https connection a data preparation server SM-DP+; wherein the plurality of eUICCs and the plurality of preset public keys are respectively correspond.
  • Step S106 the subscription management data preparation server SM-DP+ verifies the first server digital certificate (CERT.SR.ECDSA) and the first server first digital signature (SR_sign1). If the verification passes, the first server SM-SR+ The authentication succeeds, and the eligibility verification is performed according to the eUICC information set 2 (eUICC_info_2) and the terminal information (Device_info).
  • eUICC_info_2 the eUICC information set 2
  • Device_info the terminal information
  • the first server SM-DP+ sends an error message prompt and ends the operation; Successfully, check whether the subscription management data preparation server SM-DP+ has a waiting configuration file download command corresponding to the matching information (matchingID or Activation Code Token), and if so, acquire multiple profiles corresponding to the matching information (unprotected configuration file) Package or protected configuration package).
  • the contract management data preparation server SM-DP+ generates a one-time public-private key pair including a one-time private key (otSK.DP.ECKA) and a one-time public key (otPK.DP.ECKA).
  • the contract management data preparation server SM-DP+ generates a plurality of session keys corresponding to the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs and the one-time private key (otSK.DP.ECKA) of the subscription management data preparation server (session) Keys), referred to herein as the first session key.
  • the one-time public-private key pair of the subscription management data preparation server used by the plurality of profiles corresponding to the same waiting profile download command is the same, and the subscription management data preparation used by the plurality of profiles corresponding to the different waiting profile download commands is prepared.
  • the server's one-time public and private key pairs are not the same.
  • the subscription management data preparation server SM-DP+ generates, for each eUICC, a digital signature of the subscription management data preparation server according to at least the generated one-time public key and the preset public key of the eUICC, which is referred to herein as a subscription management data preparation server.
  • Two digital signatures DP_sign2. Therefore, for a plurality of eUICCs, the contract management data preparation server SM-DP generates a corresponding plurality of DP_sign2.
  • the plurality of preset public keys of the plurality of eUICCs sent by the first server SM-SR+ are hashed to generate hash values of the plurality of preset public keys respectively corresponding to the plurality of eUICCs.
  • the subscription management data preparation server SM-DP+ generates a binding configuration file according to at least a first session key corresponding to each eUICC and a corresponding profile profile (for example, a protected profile). package. Therefore, for multiple eUICCs, multiple corresponding binding profile packages are generated.
  • the binding configuration file package is generated by the subscription management data preparation server SM-DP+, and through a key agreement with the eUICC, that is, a first session key is generated by key negotiation, and one is The protected configuration file package is associated with a specific eUICC.
  • Each binding configuration file package is composed of consecutive TLV (Tag Length Value) commands, including the following TLV commands: initializing the secure channel data block ('InitialiseSecureChannel'block), Configure ISDP (Issuer Security Domain Profile) data block ('ConfigureISDP' block), store metadata data block ('StoreMetadata' block), and profile protection key data block ('Profile Protection Keys' block) and protected configuration file package.
  • TLV Tag Length Value
  • SCP03t payload TLVs of the Protected profile package wherein the data block configures an ISDP data block, a storage metadata data block, and a configuration file protection key data block (optional, when the subscription management data preparation server SM-DP+ When generating the profile key) Encryption and integrity guarantees through the first session keys .
  • the subscription management data preparation server SM-DP+ stores the hash values of the preset public keys of the plurality of eUICCs in the Initialise Secure Channel data blocks of the plurality of binding configuration file packages, and the initialization security channel data is initialized.
  • the block further includes at least a subscription management data preparation server one-time public key (otPK.DP.ECKA), a public key of the contract management data preparation server digital certificate (PK.DPpb.ECDSA), and a second digital signature of the contract management data preparation server ( DP_sign2) and the hash value of the preset public key corresponding to eUICC.
  • otPK.DP.ECKA a subscription management data preparation server one-time public key
  • PK.DPpb.ECDSA public key of the contract management data preparation server digital certificate
  • DP_sign2 second digital signature of the contract management data preparation server
  • step S107 the subscription management data preparation server SM-DP+ sends a plurality of binding configuration file packages to the first server SM-SR+.
  • Step S108 The first server SM-SR+ stores the acquired multiple binding configuration file packages in the first database. It should be noted that, because the hash value of the preset public key of the multiple eUICCs in the first database is correspondingly stored and the multiple eUICC identity identifiers EID, the first server SM-SR+ can obtain the corresponding information according to the eUICC identity identifier EID. The hash value of the pre-public key of the eUICC, and then the root According to the hash value of the preset public key of the eUICC, the binding configuration file package of the hash value of the same preset public key stored in the corresponding security channel data block is obtained, and the specific process is shown in FIG. 8 and related text description.
  • FIG. 4 is a schematic diagram of a batch downloading method of a profile profile according to Embodiment 1 of the present invention.
  • the first embodiment of the present invention provides an eUICC to download a binding profile package from a first server and implement installation.
  • the process and principle include step S201 - step S219:
  • step S201 the local profile assistant LPA sends a random number acquisition request to the eUICC.
  • Step S202 the eUICC receives the random number acquisition request, and generates an eUICC random number (eUICC_challenge).
  • Step S203 The eUICC sends at least the eUICC random number (eUICC_challenge) and the eUICC information set 1 (eUICC_info_1) to the local profile assistant LPA; wherein the eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, and is subsequently verified.
  • Step S204 the local profile assistant LPA establishes a second https connection with the first server SM-SR+ to perform encryption and integrity protection on the subsequent interaction signaling; the local profile assistant LPA connects at least the eUICC random number through the second https connection ( eUICC_challenge), the eUICC information set 1 (eUICC_info_1), and the first server domain name (SM-SR+addr) are sent to the first server SM-SR+; it should be noted that the local configuration file assistant LPA has previously learned the first server domain name (SM) -SR+addr), for example, when the first server domain name is preset in the LPA (when the eUICC terminal is shipped), or when the first server domain name is preset in the eUICC terminal for the LPA to access the first server SM-SR+.
  • SM server domain name
  • the first server SM-SR+ verifies the first server domain name (SM-SR+addr) and eUICC information set 1 (eUICC_info_1) sent by the local profile assistant LPA, and after the verification succeeds, generates a second interaction identifier ( TransactionID_2) and the first server digital signature, here referred to as the first server second digital signature (SR_sign2), the first server second random number (SR_challenge_2), if any of the above verification fails, the error message prompts and ends Fuck
  • the first server second random number (SR_challenge_2) is generated by the first server SM-SR+;
  • the first server second digital signature (SR_sign2) is determined by the first server SM-SR+ according to at least the eUICC random number (eUICC_challenge),
  • a server second random number (SR_challenge_2), a second interaction identifier (TransactionID_2), and a first server domain name (SM-SR+addr) are generated.
  • Step S206 the first server SM-SR+ at least the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), the first server second digital signature (SR_sign2), the first server digital certificate (CERT.SR) .ECDSA), Curve To Be Used (here referred to as the key parameter reference value selected by the first server) is sent to the local profile assistant LPA.
  • TransactionID_2 the second interaction identifier
  • SR_challenge_2 the first server second random number
  • SR_sign2 the first server second digital signature
  • CERT.SR the first server digital certificate
  • Curve To Be Used here referred to as the key parameter reference value selected by the first server
  • Step S207 the local profile assistant LPA sets a second interaction identifier (TransactionID_2), a first server second random number (SR_challenge_2), a first server second digital signature (SR_sign2), and a first server digital certificate (CERT.SR.ECDSA). ), elliptic curve type is forwarded to eUICC.
  • TransactionID_2 a second interaction identifier
  • SR_challenge_2 a first server second random number
  • SR_sign2 a first server second digital signature
  • CERT.SR.ECDSA first server digital certificate
  • Step S208 the eUICC verifies the first server digital certificate (CERT.SR.ECDSA) and the first server second digital signature (SR_sign2). If the verification succeeds, the eUICC authentication succeeds, and the eUICC digital signature is generated, which is referred to herein. It is an eUICC first digital signature (eUICCi_Sign1), and the eUICC first digital signature (eUICCi_Sign1) is based at least on the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), and the first server domain name (SM-SR+) Addr) and eUICC information set 2 (eUICC_info_2) are generated.
  • eUICCi_Sign1 eUICC first digital signature
  • TransactionID_2 the first server second random number
  • SR_challenge_2 the first server domain name
  • Addr eUICC information set 2
  • Step S209 the eUICC at least the second interaction identifier (TransactionID_2), the first server domain name (SM-SR+addr), the terminal information (Device_info), the eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1), eUICC
  • the digital certificate (CERT_EUICC_ECDSA) and the eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the local profile assistant LPA.
  • Step S210 The local profile assistant LPA sets at least a second interaction identifier (TransactionID_2), a first server domain name (SM-SR+addr), terminal information (Device_info), The eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1), the eUICC digital certificate (CERT_EUICC_ECDSA), and the eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the first server.
  • TransactionID_2 a second interaction identifier
  • SM-SR+addr terminal information
  • Device_info terminal information set 2
  • eUICC_info_2 The eUICC information set 2
  • eUICCi_Sign1 the eUICC first digital signature
  • CERT_EUICC_ECDSA the eUICC digital certificate
  • CERT_EUM_ECDSA eUICC manufacturer digital certificate
  • Step S211 the first server SM-SR+ verifies the eUICC manufacturer digital certificate (CERT_EUM_ECDSA), the eUICC digital certificate (CERT_EUICC_ECDSA), and the eUICC first digital signature (eUICCi_Sign1). If the verification succeeds, the eUICC authentication succeeds, and the verification is performed. Whether the EID of the eUICC identity EID included in the eUICC digital certificate is the same as the EID of the eUICC, and if so, the hash value of the preset public key of the eUICC corresponding to the eUICC identity EID is obtained, and then the preset of the eUICC is utilized. The hash value of the key determines the binding configuration file package corresponding to the eUICC (see Figure 8 and related text description for the determination process). If any of the above verification fails, the error message prompts and the operation ends.
  • CERT_EUM_ECDSA the eUICC digital certificate
  • Step S212 the first server SM-SR+ sends at least the binding configuration file package corresponding to the eUICC to the local configuration file assistant LPA; wherein the binding configuration file package includes at least the one-time public key of the subscription management data preparation server (otPK.DP) .ECKA), the contract management data preparation server digital certificate public key (PK.DP.ECDSA), the contract management data preparation server second digital signature (DP_sign2), and the hash value of the eUICC preset public key.
  • the binding configuration file package includes at least the one-time public key of the subscription management data preparation server (otPK.DP) .ECKA), the contract management data preparation server digital certificate public key (PK.DP.ECDSA), the contract management data preparation server second digital signature (DP_sign2), and the hash value of the eUICC preset public key.
  • Step S213 the local configuration file assistant LPA sends the different data blocks of the binding configuration file package to the eUICC by repeatedly initiating the load binding configuration file package function ("ES10b.LoadBoundProfilePackage" function), including initializing the secure channel data block/initialization security.
  • E10b.LoadBoundProfilePackage load binding configuration file package function
  • Step S214 after receiving the initial secure channel data block, the eUICC prepares the subscription management data in the secure channel data block by using the digital certificate public key (PK.DPpb.ECDSA) of the subscription management data preparation server in the secure channel data block.
  • the server second digital signature (DP_sign2) performs verification (ie, integrity verification is performed on the subscription management data preparation server one-time public key (otPK.DP.ECKA) protected in the second digital signature (DP_sign2) of the subscription management data preparation server), If If the verification is successful, the first session key is generated according to the preset private key (SK_eUICCi_ECKA) of the corresponding eUICC and the one-time public key (otPK.DP.ECKA) of the subscription management data preparation server, and is tied by the first session key.
  • the encrypted data block in the configuration file package is decrypted to complete the installation process.
  • step S215 the eUICC sends a profile installation result (Profile Installation Result) to the local profile assistant LPA.
  • Profile Installation Result a profile installation result
  • step S216 the local profile assistant LPA forwards the configuration file installation result to the first server SM-SR+.
  • Step S217 after receiving the configuration file installation result, the first server SM-SR+ sends an acknowledgement message to the local profile assistant LPA.
  • step S218 the local profile assistant LPA sends a list removal notification command (RemoveNotificationFromList) to the eUICC.
  • step 219 the eUICC receives the list removal notification command (RemoveNotificationFromList) and deletes the configuration file installation result.
  • the second embodiment of the present invention provides a method for batch obtaining and downloading a profile profile, which mainly includes a first phase and a second phase of two work phases.
  • the first phase is a batch acquisition of a profile profile
  • the second phase is a configuration file. Batch download of profiles.
  • FIG. 5 is a schematic diagram of a method for obtaining a profile profile in batches according to Embodiment 2 of the present invention.
  • the second embodiment of the present invention provides a first server SM-DP+ slave subscription management data preparation server SM-SR+ batch.
  • the working process and principle of acquiring multiple binding configuration file packages includes step S101'-step S108'.
  • Step S101' the first server SM-SR+ initiates and establishes a first https connection to the subscription management data preparation server SM-DP+ to perform encryption and integrity protection on the subsequent interaction signaling; the first server SM-SR+ passes the first https Connection to the contract management data preparation server SM-DP+ transmission At least the information including the contract management data preparation server domain name (SM-DP+addr), the first server first random number (SR_challenge_1), and the eUICC information set 1 (eUICC_info_1).
  • SM-DP+addr the contract management data preparation server domain name
  • SR_challenge_1 the first server first random number
  • eUICC_info_1 the eUICC information set 1
  • the first server first random number (SR_challenge_1) is generated by the first server SM-SR+, and has uniqueness and randomness, and can ensure interaction information between the first server SM-SR+ and the subscription management data preparation server SM-DP+.
  • Freshness; eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, the signature algorithm supported in the subsequent verification process, the specification version number, and the like.
  • Step S102' the subscription management data preparation server SM-DP+ verifies the subscription management data preparation server domain name (SM-DP+addr) sent by the first server SM-SR+ (verifies whether the domain name corresponds to the subscription management data preparation server SM-DP+) And verifying the content in the eUICC information set 1 (eUICC_info_1), if the verification is successful, generating a first interaction identifier (TransactionID_1), a contract management data preparation server random number (DP_challenge), and a contract management data preparation server first digital signature (DP_sign1)
  • the contract management data preparation server first digital signature (DP_sign1) is a contract management data preparation server SM-DP+ at least according to the first server first random number (SR_challenge_1), the contract management data preparation server random number (DP_challenge), signing Management data preparation server domain name (SM-DP+addr) and first interaction identifier (TransactionID_1) generation; if the subscription management data preparation server domain name (SM-DP+add
  • Step S103' the subscription management data preparation server SM-DP+ at least the first interaction identifier (TransactionID_1), the contract management data preparation server random number (DP_challenge), the contract management data preparation server first digital signature (DP_sign1), and the contract management data preparation
  • TransactionID_1 the first interaction identifier
  • DP_challenge the contract management data preparation server random number
  • DP_sign1 the contract management data preparation server first digital signature
  • DP_sign1 the contract management data preparation
  • the server domain name (SM-DP+addr), the contract management data preparation server digital certificate (CERT.DP.ECDSA), and the elliptic curve type is sent to the first server SM-SR+ through the first https connection.
  • Step S104' the first server SM-SR+ prepares the server digital certificate (CERT.DP.ECDSA) and the contract management data preparation server first digital signature for the received contract management data.
  • (DP_sign1) performs verification. If the verification is successful, the authentication of the subscription data preparation server SM-DP is successful, and the first digital signature of the first server (SR_sign1) is generated; wherein the first digital signature of the first server (SR_sign1) is the first
  • the server SM-SR+ is based on at least a plurality of preset public keys (PK.eUICC1.ECKA...PK.eUICCn.ECKA), matching information (matchingID or Activation Code Token), first interaction identifier (TransactionID_1), and subscription of a plurality of eUICCs.
  • the management data preparation server random number (DP_challenge), the subscription management data preparation server domain name (SM-DP+addr), the terminal information (Device_info), and the eUICC information set 2 (eUICC_info_2) are generated; wherein the terminal information (Device_info) includes at least the terminal Capabilities, such as supported network access methods (2G/3G/4G), etc., eUICC information set 2 (eUICC_info_2) includes at least eUICC capability information, such as supported specification versions, storage capabilities, and the like.
  • the signing management data preparation server generates a first digital signature (DP_sign1) and the first server SM-SR+ validates the first digital signature (DP_sign1) of the subscription management data preparation server, see the first device and The second device performs a two-way authentication process.
  • the specific verification process of the first server SM-SR+ for the first digital signature (DP_sign1) of the subscription management data preparation server needs to be verified according to a specific signature algorithm.
  • the embodiment of the present invention adopts an elliptic curve signature algorithm ECDSA (Curve To Be). Used).
  • Step S105' the first server SM-SR+ at least the first interaction identifier (TransactionID_1), the plurality of preset public keys of the plurality of eUICCs, the subscription management data preparation server domain name (SM-DP+addr), and the matching information (matchingID or Activation Code Token), terminal information (Device_info), eUICC information set 2 (eUICC_info_2), first server first digital signature (SR_sign1), first server digital certificate (CERT.SR.ECDSA) are sent to the contract via the first https connection Manage the data preparation server SM-DP+.
  • TransactionID_1 the first interaction identifier
  • SM-DP+addr the subscription management data preparation server domain name
  • matching information matchingID or Activation Code Token
  • terminal information Device_info
  • eUICC information set 2 eUICC information set 2
  • SR_sign1 first server first digital signature
  • CERT.SR.ECDSA first server digital certificate
  • steps S101' to S105' are the same as steps S101 to S105 in the first embodiment.
  • Step S106' the contract management data preparation server SM-DP+ verifies the first server digital certificate (CERT.SR.ECDSA) and the first server first digital signature (SR_sign1), if After the verification is passed, the first server SM-SR+ is successfully authenticated, and the eligibility verification is performed according to the eUICC information set 2 (eUICC_info_2) and the terminal information (Device_info). If any of the above verification fails, the first server SM-DP+ Send the error message prompt and end the operation; if the verification is successful, check whether the subscription management data preparation server SM-DP+ has a waiting configuration file download command corresponding to the matching information (matchingID or Activation Code Token), and if so, obtain and match the information. Corresponding multiple profiles (unprotected profile packages or protected profile packages).
  • the subscription management data preparation server SM-DP+ generates a plurality of session keys, where the session key is referred to as a second session key, and the generated second session key is a generated random number, the plurality of The second session key is respectively associated with the plurality of eUICCs, and the plurality of second session keys are separately encrypted by using the plurality of preset public keys of the plurality of eUICCs to obtain a plurality of encrypted second session keys (encrypted session keys).
  • the contract management data preparation server SM-DP+ generates a digital signature for each eUICC based on at least the encrypted second session key (encrypted session keys) and the preset public key of the eUICC, which is referred to herein as a contract management data preparation server.
  • a contract management data preparation server Three digital signatures (DP_sign3). Therefore, for a plurality of eUICCs, the contract management data preparation server SM-DP generates a corresponding plurality of DP_sign3s.
  • the subscription management data preparation server SM-DP+ generates a binding configuration file package according to at least a second session key corresponding to each eUICC and a corresponding profile profile (eg, a protected profile). Therefore, for multiple eUICCs, multiple corresponding binding profile packages are generated.
  • Each binding configuration file package is composed of consecutive TLV (Tag Length Value) commands, including the following TLV commands: initializing the secure channel data block ('InitialiseSecureChannel' block), configuring the ISDP data block ('ConfigureISDP'block), and storing the element Data block ('StoreMetadata' block) and profile protection key data block ('Profile Protection Keys' block) and protected profile package TLV command (SCP03t payload TLVs of the Protected profile Package), wherein the data block configures the ISDP data block, the storage metadata data block, and the configuration file protection key data block (optionally, when the subscription management data preparation server SM-DP+ generates the configuration file key) passes the second session Session keys for encryption and integrity protection.
  • TLV Tag Length Value
  • the contract management data preparation server SM-DP+ stores the hash values of the plurality of preset public keys of the plurality of eUICCs in the Initialise Secure Channel data block of the plurality of binding configuration files, respectively;
  • the channel data block further includes at least a subscription management data preparation server digital certificate public key (PK.DPpd.ECDSA), a contract management data preparation server third digital signature (DP_sign3), and an encrypted second session key.
  • PK.DPpd.ECDSA subscription management data preparation server digital certificate public key
  • DP_sign3 contract management data preparation server third digital signature
  • the specific generation process of the binding configuration file package is shown in Figure 7 and related text descriptions.
  • step S107' the contract management data preparation server SM-DP+ transmits a plurality of binding configuration file packages to the first server SM-SR+.
  • Step S108' the first server SM-SR+ stores the acquired plurality of binding configuration file packages in the first database.
  • the first server SM-SR+ can identify the EID according to the eUICC identity.
  • the file package, the specific process is shown in Figure 8 and related text description.
  • steps S107' and S108' are the same as steps S107 and S108 in the first embodiment.
  • FIG. 6 is a schematic diagram of a batch downloading method of a configuration file profile according to Embodiment 2 of the present invention.
  • the second embodiment of the present invention provides an eUICC downloading a binding configuration file package from a first server and implementing the installation work.
  • the process and principle include step S201'-step S219':
  • step S201' the local profile assistant LPA sends a random number acquisition request to the eUICC.
  • Step S202' the eUICC receives the random number acquisition request, and generates an eUICC random number. (eUICC_challenge).
  • Step S203' the eUICC sends at least the eUICC random number (eUICC_challenge) and the eUICC information set 1 (eUICC_info_1) to the local profile assistant LPA; wherein the eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, The signature algorithm, specification version number, etc. supported during the verification process.
  • eUICC_info_1 includes the format of the digital certificate supported by the eUICC, The signature algorithm, specification version number, etc. supported during the verification process.
  • Step S204' the local profile assistant LPA establishes a second https connection with the first server SM-SR+ to perform encryption and integrity protection on the subsequent interaction signaling; the local profile assistant LPA connects at least the eUICC random number through the second https connection.
  • eUICC_challenge eUICC information set 1 (eUICC_info_1)
  • first server domain name eUICC_SR+addr
  • the local profile assistant LPA has previously learned the first server domain name ( SM-SR+addr), for example, when the first server domain name is preset in the LPA (when the eUICC terminal is shipped), or when the first server domain name is preset in the eUICC terminal for the LPA to access the first server SM-SR+.
  • Step S205 ′ the first server SM-SR+ verifies the first server domain name (SM-SR+addr) and eUICC information set 1 (eUICC_info_1) sent by the local profile assistant LPA, and after the verification succeeds, generates a second interaction identifier.
  • TransactionID_2 the first server second digital signature (SR_sign2), the first server second random number (SR_challenge_2), if any of the above verification fails, replying with an error message prompting and ending the operation;
  • the first server second random number (SR_challenge_2) is generated by the first server SM-SR+;
  • the first server second digital signature (SR_sign2) is determined by the first server SM-SR+ according to at least the eUICC random number (eUICC_challenge), the first server second random number (SR_challenge_2),
  • the second interaction identifier (TransactionID_2) and the first server domain name (SM-SR+addr) are generated.
  • Step S206' the first server SM-SR+ at least the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), the first server second digital signature (SR_sign2), the first server digital certificate (CERT. SR.ECDSA), elliptic curve type is sent to the local profile assistant LPA.
  • TransactionID_2 the second interaction identifier
  • SR_challenge_2 the first server second random number
  • SR_sign2 the first server second digital signature
  • CERT. SR.ECDSA the first server digital certificate
  • elliptic curve type is sent to the local profile assistant LPA.
  • Step S207' the local profile assistant LPA sets a second interaction identifier (TransactionID_2), a first server second random number (SR_challenge_2), a first server second digital signature (SR_sign2), and a first server digital certificate (CERT.SR. ECDSA), elliptic curve type is forwarded to eUICC.
  • TransactionID_2 a second interaction identifier
  • SR_challenge_2 a first server second random number
  • SR_sign2 a first server second digital signature
  • CERT.SR. ECDSA a first server digital certificate
  • Step S208' the eUICC verifies the first server digital certificate (CERT.SR.ECDSA) and the first server second digital signature (SR_sign2). If the verification is successful, the eUICC authentication succeeds, and the eUICC first digital signature is generated ( eUICCi_Sign1), the eUICC first digital signature (eUICCi_Sign1) is based at least on the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), the first server domain name (SM-SR+addr), and the eUICC information set 2 ( eUICC_info_2) is generated.
  • TransactionID_2 the second interaction identifier
  • SR_challenge_2 the first server domain name
  • eUICC_info_2 the eUICC information set 2
  • Step S209' the eUICC at least the second interaction identifier (TransactionID_2), the first server domain name (SM-SR+addr), the terminal information (Device_info), the eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1),
  • the eUICC digital certificate (CERT_EUICC_ECDSA) and the eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the local profile assistant LPA.
  • Step S210' the local profile assistant LPA at least the second interaction identifier (TransactionID_2), the first server domain name (SM-SR+addr), the terminal information (Device_info), the eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1), eUICC digital certificate (CERT_EUICC_ECDSA), eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the first server SM-SR+.
  • TransactionID_2 the second interaction identifier
  • SM-SR+addr the terminal information
  • Device_info the terminal information set 2
  • eUICC_info_2 the eUICC first digital signature
  • CERT_EUICC_ECDSA eUICC digital certificate
  • CERT_EUM_ECDSA eUICC manufacturer digital certificate
  • Step S211' the first server SM-SR+ verifies the eUICC manufacturer digital certificate (CERT_EUM_ECDSA), the eUICC digital certificate (CERT_EUICC_ECDSA), and the eUICC first digital signature (eUICCi_Sign1). If the verification is successful, the eUICC authentication succeeds, and the verification is successful. Whether the EID of the eUICC identity EID included in the eUICC digital certificate (CERT_EUICC_ECDSA) is the same as the EID of the eUICC, and if so, the hash value of the preset public key of the eUICC corresponding to the eUICC identity EID is obtained.
  • the binding configuration file package corresponding to the eUICC is determined by using the hash value of the preset public key of the eUICC (the determination process is detailed in FIG. 8 and related text description), and if any of the above verification fails, the error information prompts and the operation ends.
  • Step S212' the first server SM-SR+ sends at least the binding configuration file package corresponding to the eUICC to the local configuration file assistant LPA; wherein the binding configuration file package includes at least the subscription management data preparation server digital certificate public key (PK. DP.ECDSA), encrypted second session key (encrypted session keys), subscription management data preparation server third digital signature (DP_sign3), hash value of the eUICC's preset public key.
  • PK. DP.ECDSA subscription management data preparation server digital certificate public key
  • DP_sign3 subscription management data preparation server third digital signature
  • Step S213' the local configuration file assistant LPA sends the different data blocks of the binding configuration file package to the eUICC by repeatedly initiating the load binding configuration file package function ("ES10b.LoadBoundProfilePackage" function), including initializing the secure channel data block/initialization.
  • Secure channel data block function configure ISDP data block/configuration ISDP function, store metadata data block/storage metadata function, and configuration file protection key data block/profile protection key function and profile element.
  • the steps S201' to S213' are the same as the steps S201 to S213 in the first embodiment.
  • Step S214' after receiving the initialization secure channel data block, the eUICC uses the digital certificate public key (PK.DPpb.ECDSA) of the subscription management data preparation server in the secure channel data block to sign the management data in the secure channel data block.
  • PK.DPpb.ECDSA digital certificate public key
  • DP_sign3 Preparing a server third digital signature (DP_sign3) for verification (ie, performing integrity verification on the encrypted second session key corresponding to the eUICC preset public key (PK_eUICCi_ECKA) in the third digital signature (DP_sign3) of the subscription management data preparation server)
  • SK_eUICCi_ECKA preset private key of the corresponding eUICC
  • the encrypted data block is decrypted to complete the installation process; wherein the preset private key (SK_eUICCi_ECKA) of the eUICC corresponds to the preset public key (PK_eUICCi_ECKA) of the eUICC, and the preset private key (SK_eUICCi_ECKA) and the preset public key ( PK_eUICCi_ECKA) is a pair of preset public and private key pairs, using the preset public key After (PK_eUICCi_ECKA) is encrypted, it needs to be decrypted with the preset private key (SK_eUICCi_ECKA).
  • step S215' the eUICC sends a profile installation result (Profile Installation Result) to the local profile assistant LPA.
  • Profile Installation Result a profile installation result
  • step S216' the local profile assistant LPA forwards the configuration file installation result to the first server SM-SR+.
  • Step S217' after receiving the configuration file installation result, the first server SM-SR+ sends an acknowledgement message to the local profile assistant LPA.
  • step S218' the local profile assistant LPA sends a list removal notification command (RemoveNotificationFromList) to the eUICC.
  • step 219' the eUICC receives the list removal notification command (RemoveNotificationFromList) and deletes the configuration file installation result.
  • steps S215' to S219' are the same as steps S215 to S219 in the first embodiment.
  • FIG. 7 is a schematic diagram of a process of generating a binding configuration file package according to an embodiment of the present invention. As shown in FIG. 7 , the process of generating a plurality of binding configuration file packages by the subscription management data preparation server SM-DP+ includes steps S71-S73. :
  • Step S71 Before the connection with the first server SM-SR+ is established, the subscription management data preparation server SM-DP+ generates multiple corresponding eUICCs according to the information provided by the operator contract (the service provider subscription information of the first server is deployed). Unprotected profile package, each unprotected profile package consists of multiple data blocks (PETLV1, PETLV2...PETLVn).
  • Step S72 the subscription management data preparation server SM-DP+ adopts multiple session keys (first session key or second session key) or multiple profile protection keys as corresponding multiple unprotected
  • the configuration file package is separately encrypted to generate multiple protected configuration file packages. (protected profile package), the generated protected configuration file package consists of multiple encrypted data blocks (Segment1, Segment2...Segmentn).
  • the subscription management data preparation server SM-DP+ can acquire a plurality of protected configuration file packages or a plurality of unprotected configuration file packages by waiting for the configuration file download command.
  • Step S73 after receiving the matching information sent by the first server SM-SR+, the subscription management data preparation server SM-DP+ determines, according to the matching information, whether there is a waiting configuration file download command corresponding to the matching information, and if so, acquires Wait for multiple profiles (multiple protected configuration files or multiple unprotected configuration files) corresponding to the configuration file download command.
  • the contract management data preparation server SM-DP+ generates an initial security channel data block ('Initialise Secure Channel' block, including a plaintext TLV command, such as a TLV command for key agreement related content), and an ISDP data block ('Configure ISDP'block, Contains TLV commands for ISDP generation and configuration), storage metadata blocks ('Store Metadata' block, TLV commands containing metadata for configuration files), and profile protection key blocks ('Profile Protection keys' block, including configuration) a TLV command for protecting a key; wherein the initializing the secure channel data block includes at least a subscription management data preparation server second digital signature (DP-sign2) or a contract management data preparation server third digital signature (DP-sign3), subscription management The public key (PK.DPpb.ECDSA) of the data preparation server digital certificate, the one-time public key or the encrypted second session key of the contract management data preparation server, and the subscription management data preparation server SM-DP+ according to the preset of the corresponding eUICC
  • Configure ISDP data blocks store metadata data blocks, and configure file protection key modules (optionally, when the subscription management data preparation server SM-DP+ generates the configuration file key, the corresponding session key (the first session key or the second session key) is used for encryption.
  • the contract management data preparation server SM-DP+ places the above-mentioned secure initialization channel data block, configuration ISDP data block, storage metadata data block, and configuration file protection key data block in the above-mentioned protected matching file package (protected configuration file package SCP03t payload) Before TLV), the binding configuration package is composed.
  • the local configuration file assistant LPA splits the binding configuration file package into different data blocks (as shown in Figure 7 for the split configuration file package, the specific split mode is as shown in the figure).
  • the data blocks are sent to the eUICC in sequence through the application protocol data unit command (APDU command).
  • APDU command application protocol data unit command
  • the Segmented Bound Profile Package (SBPP) is generated by the Local Profile Assistant LPA, and the Local Profile Assistant LPA passes each split segment through the APDU (Application Protocol).
  • the data unit, English: ApplicationProtocolDataUnit) command is sent to eUICC, where each split segment is up to 255 bytes (bytes).
  • the first server SM-SR+ can distinguish the binding configuration file package according to the hash value of the preset public key of the corresponding eUICC in the initialization security channel.
  • the specific differentiation process is shown in Figure 8 and related text descriptions.
  • FIG. 8 is a schematic diagram of a process for distinguishing multiple binding configuration file packages according to an embodiment of the present invention. As shown in FIG. 8, the specific process and principle of the first server SM-SR+ distinguishing multiple binding configuration file packages in the first database is :
  • the hash value of the preset public key of the plurality of eUICCs is correspondingly stored with the plurality of eUICC identity identifiers EID (as shown in part 01 in FIG. 8), and the first server SM-SR+ can be based on the eUICC
  • the hash value of the preset public key or the eUICC identity EID acquires another information, that is, the first server SM-SR+ can obtain the eUICC identity EID according to the hash value of the preset public key of the eUICC, the first server The SM-SR+ can also obtain the hash value of the preset public key of the eUICC according to the eUICC identity EID.
  • Step S81 After completing the identity verification of the eUICC, the first server SM-SR+ obtains the eUICC identity identifier EID from the eUICC digital certificate received by the local profile assistant LPA, and checks whether the eUICC identity identifier is stored in the first database. EID, if yes, execute step S82, otherwise send an error message to the local profile assistant LPA and end the operation.
  • Step S82 Search for a hash value of the preset public key of the eUICC corresponding to the eUICC identity identifier EID in the first database according to the eUICC identity identifier EID.
  • Step S83 searching for a corresponding initial security channel data block of the plurality of binding configuration file packets stored in the first database according to the hash value of the preset public key of the eUICC, and if the security channel data of the binding configuration file package is initialized
  • the block stores the hash value of the preset public key of the same eUICC, and determines that the binding configuration file package is the binding configuration file package corresponding to the eUICC, and sends the binding configuration file corresponding to the eUICC to the corresponding eUICC.
  • LPA Local Profile Assistant
  • an eUICC terminal needs to obtain a binding configuration file package corresponding to the eUICC on the eUICC terminal from the first database of the first server SM-SR+, and the eUICC sends the LSI to the first server SM-SR+ through the LPA of the eUICC terminal.
  • a plurality of preset public keys, matching information, and related information of the plurality of eUICCs wherein the related information includes at least a digital signature generated by the eUICC (ie, an eUICC first digital signature), an eUICC digital certificate, and an eUICC manufacturer digital certificate.
  • the server SM-SR+ After the server SM-SR+ verifies the digital signature generated by the eUICC manufacturer digital certificate, the eUICC digital certificate, and the eUICC, the eUICC identity EID is obtained from the eUICC digital certificate; the first server SM-SR+ searches the first database, and determines After the eUICC identity EID (for example, EID2) in the first database is the same as the eUICC identity identifier EID obtained from the eUICC digital certificate, the eUICC corresponding to the eUICC is searched in the first database according to the eUICC identity identifier EID2.
  • EID2 the eUICC identity identifier
  • the hash value of the key 2 because the hash value 2 of the preset public key of the corresponding eUICC is stored in the initialization security channel data block in the binding configuration file package 2, Determining the binding profile of the package 2 eUICC binding configuration corresponding to that package.
  • FIG. 9 is a schematic diagram of a subscription management data preparation server according to an embodiment of the present invention.
  • the subscription management data preparation server 900 includes at least a receiver 901, a processor 902, and a transmitter 903.
  • Figure 9 only shows a simplified design of the structure of the contract management data preparation server.
  • the contract management data preparation server structure shown in FIG. 9 does not constitute a limitation on the contract management data preparation server, and the contract management data preparation server may include more or less components than the illustration 9, for example, a contract management data preparation server.
  • a memory for storing instructions corresponding to the communication algorithm may also be included.
  • the receiver 901 and the transmitter 903 may also be integrated to form a transceiver.
  • the receiver 901 is configured to receive matching information of multiple embedded universal integrated circuit cards eUICC sent by the first server.
  • the processor 902 is configured to check whether there is a waiting configuration file download command corresponding to the matching information, and if there is the waiting for matching file download command, acquire a plurality of configuration file profiles corresponding to the waiting configuration file download command; a plurality of session keys respectively corresponding to the plurality of eUICCs; generating a plurality of binding profile packages according to the plurality of session keys and the plurality of profile profiles.
  • the transmitter 903 is configured to send the multiple binding configuration file package to the first server, so that the eUICC downloads the binding configuration file package from the first server.
  • the receiver 901 is further configured to receive a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC sent by the first server, where the plurality of eUICCs respectively correspond to the plurality of preset public keys.
  • the processor 902 is further configured to generate a one-time public-private key pair, and generate multiple session keys corresponding to the multiple eUICCs according to the multiple preset public keys of the multiple eUICCs and the one-time private key. .
  • the binding configuration file package includes at least the one-time public key and the subscription management data.
  • the public key generates a second digital signature of the subscription management data preparation server, and is used to hash the preset public key to obtain a hash value of the preset public key.
  • the processor 902 is further configured to separately encrypt the plurality of session keys by using a plurality of preset public keys of the plurality of eUICCs to generate a plurality of encrypted session keys, and at least according to the multiple encryptions.
  • the session key generates the multiple binding profile packages.
  • the binding configuration file package includes at least a hash value of the preset public key, a public key included in the digital certificate of the subscription management data preparation server, the encrypted session key, and the subscription management data preparation server.
  • the third digital signature is generated by the processor 902, and the third digital signature of the subscription management data preparation server is generated according to at least the plurality of encrypted session keys and the preset public key, and is used to perform the preset public key.
  • the hash operation generates a hash value of the preset public key.
  • the processor 902 is further configured to verify a digital signature generated by the first server according to at least a plurality of preset public keys of the plurality of eUICCs and the matching information.
  • FIG. 10 is a first server according to an embodiment of the present invention.
  • the first server may be a server deployed by a third-party service provider (ie, a subscription management-secure routing server, English: Subscription Manager-Secure Routing, referred to as SM-SR+), and the third-party service provider includes but is not limited to enterprise users and group users.
  • the first server may also be part of the subscription management data preparation server SM-DP+; the first server may also be a Subscription Manager-Discovery Server (SM-DS).
  • SM-SR+ subscription management-secure routing server
  • English: Subscription Manager-Secure Routing referred to as SM-SR+
  • the first server may also be part of the subscription management data preparation server SM-DP+; the first server may also be a Subscription Manager-Discovery Server (SM-DS).
  • SM-DS Subscription Manager-Discovery Server
  • the first server 1000 includes at least a transmitter 1001, a receiver 1002, and a processor 1003.
  • Figure 10 only shows a simplified design of the structure of the first server.
  • the first server structure shown in FIG. 10 does not constitute a limitation to the first server, and the first server may include more or less components than the illustration 10, for example, the first server may also include The memory storing the corresponding instructions of the communication algorithm, in addition, in order to save the chip area, the receiver 1002 and the transmitter 1001 can also be integrated to form a transceiver.
  • the transmitter 1001 is configured to send a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information corresponding to the plurality of eUICCs, so that the subscription management data preparation server generates the corresponding information corresponding to the matching information.
  • a plurality of binding configuration file packages wherein the plurality of eUICCs respectively correspond to the plurality of preset public keys.
  • the receiver 1002 is configured to receive an eUICC digital certificate from the eUICC.
  • the processor 1003 is configured to check whether the eUICC identity EID in the eUICC digital certificate exists in the server, and in the presence of the eUICC identity EID, search for a hash value of the preset public key corresponding to the eUICC identity identifier EID, And determining, according to the hash value of the preset public key, a binding configuration file package corresponding to the eUICC.
  • the transmitter 1001 is configured to send the binding configuration file package to a local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  • the processor 1003 is further configured to obtain a plurality of preset public private key pairs of the plurality of eUICCs and a plurality of the eUICC identity identifiers EID of the plurality of eUICCs, and obtain multiple presets of the multiple eUICCs.
  • the hash of the public key is further configured to obtain a plurality of preset public private key pairs of the plurality of eUICCs and a plurality of the eUICC identity identifiers EID of the plurality of eUICCs.
  • the processor 1003 is further configured to directly obtain a hash value of the plurality of preset public keys of the plurality of eUICCs, or calculate the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs.
  • the hash value of multiple preset public keys is further configured to directly obtain a hash value of the plurality of preset public keys of the plurality of eUICCs, or calculate the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs.
  • the hash value of multiple preset public keys is further configured to directly obtain a hash value of the plurality of preset public keys of the plurality of eUICCs, or calculate the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs. The hash value of multiple preset public keys.
  • the processor 1003 is further configured to generate a first server first digital signature according to at least the preset public key of the multiple eUICCs and the matching information; the transmitter 1001 is further configured to prepare the subscription management data.
  • the server sends the first digital signature of the first server, so that the subscription management data preparation server verifies the first digital signature of the first server.
  • the processor 1003 is further configured to generate the first server first digital signature according to at least the random number of the first server.
  • the transmitter 1001 is further configured to send the first digital signature of the first server.
  • FIG. 11 is a terminal provided by an embodiment of the present invention, such as an eUICC terminal, and the eUICC terminal includes an embedded universal integrated circuit card eUICC and a local configuration file assistant LPA.
  • the terminal 1100 includes at least a transmitter 1101, a receiver 1102, and a processor 1103.
  • Figure 11 only shows a simplified design of the structure of the terminal.
  • the terminal structure shown in FIG. 11 does not constitute a limitation to the terminal, and the terminal may include more or less components than the illustration 11, for example, the terminal may further include a memory for storing instructions corresponding to the communication algorithm,
  • the receiver 1102 and the transmitter 1101 can also be integrated to form a transceiver.
  • a transmitter 1101 is configured to send an embedded universal integrated circuit card eUICC digital certificate to a first server, so that the first server determines a binding configuration file package corresponding to an eUICC identity identifier EID included in the eUICC digital certificate. .
  • the receiver 1102 is configured to receive the binding configuration file package from the first server.
  • the processor 1103 is configured to repeatedly initiate a load binding configuration file package function by using the binding configuration file package.
  • the transmitter 1101 is configured to send the binding configuration file package to the embedded universal integrated circuit card eUICC in the terminal.
  • the processor 1103 is further configured to prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and prepare the server for the subscription management data included in the initial security channel function.
  • the digital signature is verified.
  • the session key is generated according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function.
  • the processor 1103 is further configured to prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and prepare the subscription management data included in the initial security channel function.
  • the server digital signature is verified, and in the case of verification, the encrypted session secret included in the initialization secure channel function is utilized by the preset public key.
  • the key is decrypted to get the session key.
  • the steps of a method or algorithm described in connection with the embodiments disclosed herein can be implemented in hardware, a software module executed by a processor, or a combination of both.
  • the software module can be placed in random access memory (RAM), memory, read only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or technical field. Any other form of storage medium known.

Abstract

The embodiments of the present invention relate to a configuration file batch-obtaining and downloading method, and a server and a terminal. The method comprises: a subscription management data preparation server SM-DP+ receiving eUICC matching information sent by a first server, and checking whether there is a configuration file downloading-waiting command corresponding to the matching information; if so, the SM-DP+ acquiring a plurality of profiles corresponding to the configuration file downloading-waiting command; the SM-DP+ generating a plurality of session keys corresponding to a plurality of eUICCs respectively; the SM-DP+ generating a plurality of corresponding binding configuration file packages at least according to the plurality of session keys and the plurality of profiles; and the SM-DP+ sending the plurality of binding configuration file packages to the first server, so that the eUICC downloads the binding configuration file packages from the first server. In the embodiments of the present invention, the SM-DP+ can issue a plurality of binding configuration file packages to the first server once, thereby reducing a large amount of signalling overheads.

Description

一种配置文件批量获取、下载方法、服务器及终端Configuration file batch acquisition, download method, server and terminal 技术领域Technical field
本发明涉及智能卡技术领域,具体涉及一种配置文件批量获取、下载方法、服务器及终端。The present invention relates to the field of smart card technologies, and in particular, to a method for batch obtaining and downloading configuration files, a server, and a terminal.
背景技术Background technique
随着科技的快速发展,智能卡技术也在逐渐升级和进步。第一代智能卡——SIM卡(客户识别模块的简称,英文:Subscriber Identity Module)是针对全球移动通信系统(Global System for Mobile communication,简称GSM)开发的电信智能卡标准,用于网络对用户进行身份鉴权。第二代智能卡——UICC卡(通用集成电路卡,英文:Universal Integrated Circuit Card)是针对3G开发的电信智能卡平台标准,分离UICC平台和身份鉴权应用。With the rapid development of technology, smart card technology is gradually upgrading and progressing. The first generation of smart cards - SIM card (English: Subscriber Identity Module) is a telecom smart card standard developed for Global System for Mobile communication (GSM), used to identify users on the network. Authentication. The second generation of smart cards - UICC card (Universal Integrated Circuit Card, English: Universal Integrated Circuit Card) is a telecom smart card platform standard developed for 3G, separating the UICC platform and identity authentication applications.
物联网(Internet Of Things,简称IoT)的需求推动了UICC卡向嵌入式UICC卡(或称嵌入式SIM卡,英文:Embedded Universal Integrated Circuit Card,简称eUICC)演进,即:允许不同签约管理数据准备服务器的身份鉴权应用在线动态加载。eUICC的物理形式不限,可以是传统的不同尺寸的SIM卡片,也可以是嵌入式卡。The demand for Internet of Things (IoT) has driven the evolution of UICC cards to embedded UICC cards (or embedded SIM cards, or eUICC), namely: allowing different subscription management data preparation. The server's identity authentication application is dynamically loaded online. The physical form of the eUICC is not limited, and may be a traditional SIM card of different sizes or an embedded card.
现阶段,GSMA(全球移动通信系统联盟,英文:Global Mobile System Alliance,)只定义了普通(单一)用户配置文件profile的下载机制和证书管理架构,该下载机制基于公钥基础设施(Public Key Infrastructure,简称PKI)方式,签约管理数据准备服务器实体和eUICC利用各自数字证书完成双向认证及密钥协商(端到端安全),实现profile从签约管理数据准备服务器实体安全下载到eUICC。但是,GSMA并未对企业或集团用户场景提出相应的解决方案。因此,如何满足企业或集团用户批量获取用于eUICC的profile成为 现阶段亟待解决的问题。At this stage, the GSMA (Global Mobile System Alliance, English: Global Mobile System Alliance) only defines the download mechanism and certificate management architecture of the common (single) user profile profile, which is based on the public key infrastructure (Public Key Infrastructure). In the PKI mode, the contract management data preparation server entity and the eUICC use the respective digital certificates to perform mutual authentication and key agreement (end-to-end security), and the profile is securely downloaded from the subscription management data preparation server entity to the eUICC. However, the GSMA does not propose a solution for the enterprise or group user scenarios. Therefore, how to satisfy the enterprise or group users to obtain the profile for eUICC in batches becomes The problem that needs to be solved at this stage.
发明内容Summary of the invention
本发明实施例提供了一种配置文件批量获取、下载方法、服务器及终端,能够批量获取配置文件。The embodiment of the invention provides a method for obtaining and downloading configuration files in batches, a server and a terminal, which can acquire configuration files in batches.
第一方面,本发明实施例提供一种配置文件的批量获取、下载方法,包括:In a first aspect, an embodiment of the present invention provides a method for batch obtaining and downloading a configuration file, including:
签约管理数据准备服务器接收第一服务器发送的多个嵌入式通用集成电路卡eUICC的匹配信息,并检验是否存在与所述匹配信息对应的等待配置文件下载命令;The subscription management data preparation server receives the matching information of the plurality of embedded universal integrated circuit cards eUICC sent by the first server, and checks whether there is a waiting configuration file download command corresponding to the matching information;
在存在所述等待匹配文件下载命令的情况下,所述签约管理数据准备服务器获取与所述等待配置文件下载命令对应的多个配置文件profile;The contract management data preparation server acquires a plurality of configuration file profiles corresponding to the waiting configuration file download command in the case that the waiting for matching file download command exists;
所述签约管理数据准备服务器生成与所述多个eUICC分别对应的多个会话密钥;所述签约管理数据准备服务器至少根据所述多个会话密钥以及所述多个配置文件profile生成相应多个绑定配置文件包;The subscription management data preparation server generates a plurality of session keys respectively corresponding to the plurality of eUICCs; the subscription management data preparation server generates corresponding at least according to the plurality of session keys and the plurality of profile profiles Binding configuration package;
所述签约管理数据准备服务器将所述多个绑定配置文件包发送给所述第一服务器,以便所述eUICC从所述第一服务器中下载所述绑定配置文件包。The subscription management data preparation server sends the plurality of binding configuration file packages to the first server, so that the eUICC downloads the binding configuration file package from the first server.
本发明实施例的签约管理数据准备服务器根据第一服务器的需求,批量地将多个eUICC的多个绑定配置文件包发送给第一服务器,减少了签约管理数据准备服务器的信令开销,缓解接入压力,防范大量用户同时发起profile下载请求时可能造成的DoS攻击(DoS是Denial of Service的简称,即拒绝服务,造成DoS的攻击行为被称为DoS攻击)。The subscription management data preparation server of the embodiment of the present invention sends a plurality of binding configuration file packages of the plurality of eUICCs to the first server in batches according to the requirements of the first server, thereby reducing the signaling overhead of the subscription management data preparation server and alleviating The access pressure is used to prevent DoS attacks caused by a large number of users simultaneously launching a profile download request. (DoS is short for Denial of Service, that is, denial of service, and the DoS attack is called a DoS attack).
在一个示例中,上述签约管理数据准备服务器接收第一服务器发送的多个嵌入式通用集成电路卡eUICC的匹配信息,还包括:In an example, the subscription management data preparation server receives the matching information of the plurality of embedded universal integrated circuit cards eUICC sent by the first server, and further includes:
所述签约管理数据准备服务器接收第一服务器发送的多个嵌入式通用集成电路卡eUICC的多个预置公钥;其中,所述多个eUICC与所述多个预置公 钥分别相对应。The subscription management data preparation server receives a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC sent by the first server; wherein the plurality of eUICCs and the plurality of presets The keys correspond to each other.
在一个示例中,上述签约管理数据准备服务器生成与所述多个eUICC分别对应的多个会话密钥,包括:In an example, the subscription management data preparation server generates a plurality of session keys respectively corresponding to the plurality of eUICCs, including:
所述签约管理数据准备服务器生成一次性公私钥对;所述签约管理数据准备服务器根据所述多个eUICC的多个预置公钥和所述一次性私钥,生成所述多个eUICC分别对应的多个会话密钥。The subscription management data preparation server generates a one-time public-private key pair; the subscription management data preparation server generates corresponding to the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs and the one-time private key Multiple session keys.
在一个示例中,上述绑定配置文件包至少包括该一次性公钥、该签约管理数据准备服务器的数字证书包含的公钥、该签约管理数据准备服务器的第二数字签名、该预置公钥的哈希值;In one example, the binding configuration file package includes at least the one-time public key, a public key included in the digital certificate of the subscription management data preparation server, a second digital signature of the subscription management data preparation server, and the preset public key. Hash value
且该签约管理数据准备服务器的第二数字签名是该签约管理数据准备服务器至少根据该一次性公钥和所述预置公钥生成的;And the second digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least the one-time public key and the preset public key;
所述预置公钥的哈希值是所述签约管理数据准备服务器对所述预置公钥进行哈希运算生成的。The hash value of the preset public key is generated by the contract management data preparation server hashing the preset public key.
在一个示例中,在所述签约管理数据准备服务器生成与所述多个eUICC分别对应的多个会话密钥之后,包括:In an example, after the subscription management data preparation server generates a plurality of session keys respectively corresponding to the plurality of eUICCs, the method includes:
利用所述多个eUICC的多个预置公钥对所述多个会话密钥分别进行加密生成多个加密的会话密钥,并至少根据所述多个加密的会话密钥生成所述多个绑定配置文件包。Separating the plurality of session keys by using a plurality of preset public keys of the plurality of eUICCs to generate a plurality of encrypted session keys, and generating the plurality of the at least one of the plurality of encrypted session keys Bind the configuration package.
在一个示例中,所述绑定配置文件包至少包括所述预置公钥的哈希值、所述签约管理数据准备服务器的数字证书包含的公钥、所述加密的会话密钥、所述签约管理数据准备服务器的第三数字签名;In one example, the binding profile package includes at least a hash value of the preset public key, a public key included in a digital certificate of the subscription management data preparation server, the encrypted session key, the Signing a third digital signature of the data preparation server;
且所述签约管理数据准备服务器的第三数字签名是所述签约管理数据准备服务器至少根据多个加密的会话密钥和所述预置公钥生成的;And the third digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least a plurality of encrypted session keys and the preset public key;
所述预置公钥的哈希值是所述签约管理数据准备服务器对所述预置公钥进行哈希运算生成的。The hash value of the preset public key is generated by the contract management data preparation server hashing the preset public key.
在一个示例中,在检验是否存在与所述匹配信息对应的等待配置文件下 载命令之前,还包括:In one example, under the check if there is a waiting configuration file corresponding to the matching information Before the command is included, it also includes:
签约管理数据准备服务器验证所述第一服务器发送的至少根据所述多个eUICC的多个预置公钥和所述匹配信息而生成的数字签名。The subscription management data preparation server verifies the digital signature generated by the first server according to at least the plurality of preset public keys of the plurality of eUICCs and the matching information.
第二方面,本发明实施例提供了一种配置文件批量获取、下载方法,包括:In a second aspect, an embodiment of the present invention provides a method for batch obtaining and downloading configuration files, including:
第一服务器向签约管理数据准备服务器发送多个嵌入式通用集成电路卡eUICC的多个预置公钥和对应所述多个eUICC的匹配信息,以便所述签约管理数据准备服务器生成与所述匹配信息对应的多个绑定配置文件包;The first server sends a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information corresponding to the plurality of eUICCs to the subscription management data preparation server, so that the subscription management data preparation server generates the matching Multiple binding configuration file packages corresponding to the information;
其中,所述多个eUICC与所述多个预置公钥分别相对应;The plurality of eUICCs respectively correspond to the plurality of preset public keys;
所述第一服务器接收来自所述eUICC的eUICC数字证书,检验所述第一服务器中是否存在所述eUICC数字证书中的eUICC身份标识EID;The first server receives an eUICC digital certificate from the eUICC, and checks whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server;
在存在所述eUICC身份标识EID情况下,所述第一服务器查找与所述eUICC身份标识EID对应的预置公钥的哈希值,进而根据所述预置公钥的哈希值确定与所述eUICC对应的绑定配置文件包,并将所述绑定配置文件包发送给所述eUICC对应的本地配置文件助手,以便所述eUICC下载所述绑定配置文件包。In the case that the eUICC identity identifier EID is present, the first server searches for a hash value of the preset public key corresponding to the eUICC identity identifier EID, and further determines a location according to the hash value of the preset public key. The binding configuration file package corresponding to the eUICC is sent, and the binding configuration file package is sent to the local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
本发明实施例的第一服务器能够从签约管理数据准备服务器批量获取对应多个eUICC的多个绑定配置文件包,并根据下属eUICC终端的用户的具体需求将存储的多个绑定配置文件包下发给对应的eUICC终端。The first server of the embodiment of the present invention can obtain a plurality of binding configuration file packages corresponding to the plurality of eUICCs in batches from the subscription management data preparation server, and store the plurality of binding configuration file packages according to the specific requirements of the users of the subordinate eUICC terminals. It is sent to the corresponding eUICC terminal.
在一个示例中,在第一服务器向签约管理数据准备服务器发送多个嵌入式通用集成电路卡eUICC的多个预置公钥和对应所述多个eUICC的匹配信息之前,还包括:In an example, before the first server sends the plurality of preset public keys of the embedded universal integrated circuit card (eUICC) and the matching information of the plurality of eUICCs to the subscription management data preparation server, the method further includes:
所述第一服务器预先获得所述多个eUICC的多个预置公私钥对和所述多个eUICC的多个所述eUICC身份标识EID,并得到所述多个eUICC的多个预置公钥的哈希值;Determining, by the first server, a plurality of preset public private key pairs of the plurality of eUICCs and a plurality of the eUICC identity identifiers EID of the plurality of eUICCs, and obtaining a plurality of preset public keys of the plurality of eUICCs Hash value
所述第一服务器将所述多个eUICC的多个预置公钥的哈希值和所述多个 eUICC身份标识EID分别相对应存储。The first server, the hash value of the plurality of preset public keys of the plurality of eUICCs, and the plurality of The eUICC identity EIDs are stored separately.
在一个示例中,上述得到所述多个eUICC的多个预置公钥的哈希值,包括:直接获得所述多个eUICC的多个预置公钥的哈希值,或者,所述第一服务器根据所述多个eUICC的多个预置公钥计算生成所述多个eUICC的多个预置公钥的哈希值。In an example, the obtaining the hash values of the plurality of preset public keys of the plurality of eUICCs includes: obtaining the hash values of the plurality of preset public keys of the plurality of eUICCs directly, or A server calculates a hash value of the plurality of preset public keys of the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs.
在一个示例中,上述第一服务器向签约管理数据准备服务器发送多个嵌入式通用集成电路卡eUICC的多个预置公钥和对应所述多个eUICC的匹配信息,还包括:In an example, the first server sends a plurality of preset public keys of the embedded universal integrated circuit card (eUICC) and the matching information of the plurality of eUICCs to the subscription management data preparation server, and further includes:
所述第一服务器向所述签约管理数据准备服务器发送至少根据所述多个eUICC的多个预置公钥及所述匹配信息而生成的第一服务器第一数字签名,以便所述签约管理数据准备服务器验证所述第一服务器第一数字签名。The first server sends, to the subscription management data preparation server, a first server first digital signature generated according to at least a plurality of preset public keys of the plurality of eUICCs and the matching information, so that the subscription management data is The preparation server verifies the first digital signature of the first server.
在一个示例中,在检验所述第一服务器中是否存在所述eUICC数字证书中的eUICC身份标识EID之前,还包括:In an example, before verifying whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server, the method further includes:
所述第一服务器验证所述eUICC发送的至少根据所述第一服务器的随机数生成的第一数字签名。The first server verifies the first digital signature generated by the eUICC according to at least the random number of the first server.
本发明实施例的第一服务器所获取的多个绑定配置文件包均进行了加密处理,第一服务器无法获得绑定配置文件包具体信息,保证了绑定配置文件包的安全性。The multiple binding configuration file packets obtained by the first server in the embodiment of the present invention are all encrypted, and the first server cannot obtain the specific information of the binding configuration file package, thereby ensuring the security of the binding configuration file package.
第三方面,本发明实施例提供了一种配置文件批量获取、下载方法,包括:In a third aspect, an embodiment of the present invention provides a method for batch obtaining and downloading configuration files, including:
嵌入式通用集成电路卡eUICC终端向第一服务器发送eUICC数字证书,以便所述第一服务器确定与所述eUICC数字证书中包含的eUICC身份标识EID对应的绑定配置文件包;The embedded universal integrated circuit card eUICC terminal sends an eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
所述eUICC终端中的本地配置文件助手LPA接收来自所述第一服务器的所述绑定配置文件包,将所述绑定配置文件包通过反复发起加载绑定配置文件包功能发送给所述eUICC终端中的eUICC。 The local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package to the eUICC by repeatedly initiating a load binding configuration file package function. eUICC in the terminal.
在一个示例中,上述eUICC终端中的本地配置文件助手LPA接收来自所述第一服务器的所述绑定配置文件包,将所述绑定配置文件包通过反复发起加载绑定配置文件包功能发送给所述eUICC终端中的eUICC,还包括:In an example, the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package by repeatedly initiating a load binding configuration file package function. The eUICC in the eUICC terminal further includes:
所述eUICC根据所述绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对所述初始化安全通道功能包含的签约管理数据准备服务器数字签名进行验证,在验证通过情况下,根据所述预置公钥对应的私钥和所述初始化安全通道功能包含的所述签约数据管理服务器的一次性公钥,生成会话密钥。The eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and verifies the digital signature of the subscription management data preparation server included in the initial security channel function, and performs verification. In this case, the session key is generated according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function.
在一个示例中,上述eUICC终端中的本地配置文件助手LPA接收来自所述第一服务器的所述绑定配置文件包,将所述绑定配置文件包通过反复发起加载绑定配置文件包功能发送给所述eUICC终端中的eUICC,还包括:In an example, the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package by repeatedly initiating a load binding configuration file package function. The eUICC in the eUICC terminal further includes:
所述eUICC根据所述绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对所述初始化安全通道功能包含的签约管理数据准备服务器数字签名进行验证,在验证通过情况下,则利用所述预置公钥对所述初始化安全通道功能包含的加密的会话密钥进行解密,得到会话密钥。The eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and verifies the digital signature of the subscription management data preparation server included in the initial security channel function, and performs verification. In this case, the encrypted session key included in the initialization secure channel function is decrypted by using the preset public key to obtain a session key.
第四方面,本发明实施例提供了一种签约管理数据准备服务器,包括:In a fourth aspect, an embodiment of the present invention provides a subscription management data preparation server, including:
接收器,用于接收第一服务器发送的多个嵌入式通用集成电路卡eUICC的匹配信息;a receiver, configured to receive, by the first server, matching information of multiple embedded universal integrated circuit cards eUICC;
处理器,用于检验是否存在与所述匹配信息对应的等待配置文件下载命令;在存在所述等待匹配文件下载命令的情况下,获取与所述等待配置文件下载命令对应的多个配置文件profile;生成与所述多个eUICC分别对应的多个会话密钥;至少根据所述多个会话密钥以及所述多个配置文件profile生成相应多个绑定配置文件包;a processor, configured to check whether there is a waiting configuration file download command corresponding to the matching information; and if there is the waiting for matching file download command, acquiring a plurality of configuration file profiles corresponding to the waiting configuration file downloading command Generating a plurality of session keys respectively corresponding to the plurality of eUICCs; generating at least a plurality of binding profile packages according to the plurality of session keys and the plurality of profile profiles;
发射器,用于将所述多个绑定配置文件包发送给所述第一服务器,以便所述eUICC从所述第一服务器中下载所述绑定配置文件包。 And a transmitter, configured to send the multiple binding configuration file package to the first server, so that the eUICC downloads the binding configuration file package from the first server.
在第五方面,本发明实施例提供了一种服务器,包括:In a fifth aspect, an embodiment of the present invention provides a server, including:
发射器,用于发送多个嵌入式通用集成电路卡eUICC的多个预置公钥和对应所述多个eUICC的匹配信息,以便签约管理数据准备服务器生成与所述匹配信息对应的多个绑定配置文件包;a transmitter, configured to send a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information corresponding to the plurality of eUICCs, so that the subscription management data preparation server generates multiple bindings corresponding to the matching information. Configuration file package;
其中,所述多个eUICC与所述多个预置公钥分别相对应;The plurality of eUICCs respectively correspond to the plurality of preset public keys;
接收器,用于接收来自所述eUICC的eUICC数字证书;a receiver, configured to receive an eUICC digital certificate from the eUICC;
处理器,用于检验所述服务器是否存在所述eUICC数字证书中的eUICC身份标识EID;在存在所述eUICC身份标识EID情况下,查找与所述eUICC身份标识EID对应的预置公钥的哈希值,进而根据所述预置公钥的哈希值确定与所述eUICC对应的绑定配置文件包;a processor, configured to check whether the eUICC identity identifier EID in the eUICC digital certificate exists in the server, and to find a preset public key corresponding to the eUICC identity identifier EID in the presence of the eUICC identity identifier EID And determining a binding configuration file package corresponding to the eUICC according to the hash value of the preset public key;
发射器,用于将所述绑定配置文件包发送给所述eUICC对应的本地配置文件助手,以便所述eUICC下载所述绑定配置文件包。And a transmitter, configured to send the binding configuration file package to a local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
在第六方面,本发明实施例提供了一种终端,包括:In a sixth aspect, an embodiment of the present invention provides a terminal, including:
发射器,用于向第一服务器发送嵌入式通用集成电路卡eUICC数字证书,以便所述第一服务器确定与所述eUICC数字证书中包含的eUICC身份标识EID对应的绑定配置文件包;a transmitter, configured to send an embedded universal integrated circuit card eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
接收器,用于接收来自所述第一服务器的所述绑定配置文件包;处理器,用于将所述绑定配置文件包反复发起加载绑定配置文件包功能;a receiver, configured to receive the binding configuration file package from the first server, and a processor, configured to repeatedly initiate a load binding configuration file package function by using the binding configuration file package;
发射器,用于将所述绑定配置文件包发送给所述终端中的嵌入式通用集成电路卡eUICC。And a transmitter, configured to send the binding configuration file package to an embedded universal integrated circuit card eUICC in the terminal.
在第七方面,本发明实施例提供了一种配置文件的批量获取方法,包括:In a seventh aspect, an embodiment of the present invention provides a method for batch obtaining a configuration file, including:
签约管理数据准备服务器SM-DP+接收第一服务器发送的和多个嵌入式通用集成电路卡eUICC相关联的匹配信息,其中所述多个eUICC包括第一eUICC和第二eUICC;The subscription management data preparation server SM-DP+ receives the matching information sent by the first server and the plurality of embedded universal integrated circuit cards eUICC, wherein the plurality of eUICCs comprise the first eUICC and the second eUICC;
所述SM-DP+检验是否存在和所述匹配信息相对应的多个配置文件profile,其中所述多个profile包括对应于所述第一eUICC的第一profile和对 应于所述第二eUICC的第二profile;The SM-DP+ checks whether there is a plurality of profile profiles corresponding to the matching information, wherein the plurality of profiles includes a first profile and a pair corresponding to the first eUICC Should be in the second profile of the second eUICC;
所述SM-DP+生成对应于所述第一eUICC的第一会话密钥和对应于所述第二eUICC的第二会话密钥;Generating, by the SM-DP+, a first session key corresponding to the first eUICC and a second session key corresponding to the second eUICC;
所述SM-DP+分别基于所述第一会话密钥和所述第一eUICC、所述第二会话密钥和所述第二eUICC生成第一绑定配置文件包和第二绑定配置文件包;Generating, by the SM-DP+, a first binding profile package and a second binding profile package based on the first session key and the first eUICC, the second session key, and the second eUICC, respectively ;
所述SM-DP+将所述第一绑定配置文件包和所述第二绑定配置文件包发送给所述第一服务器。The SM-DP+ sends the first binding configuration file package and the second binding configuration file package to the first server.
在一个示例中,所述第一eUICC中预置有第一公私钥对,所述第一公私钥对包括第一公钥和第一私钥,所述第二eUICC中预置有第二公私钥对,所述第二公私钥对包括第二公钥和第二私钥;In an example, the first eUICC is preset with a first public private key pair, the first public private key pair includes a first public key and a first private key, and the second eUICC is preset with a second public private key. a key pair, the second public private key pair includes a second public key and a second private key;
所述SM-DP+生成对应于所述第一eUICC的第一会话密钥和对应于所述第二eUICC的第二会话密钥之前,还包括:Before the SM-DP+ generates the first session key corresponding to the first eUICC and the second session key corresponding to the second eUICC, the method further includes:
所述SM-DP+接收所述第一服务器发送的多个预置公钥,所述多个预置公钥包括所述第一公钥和所述第二公钥。The SM-DP+ receives a plurality of preset public keys sent by the first server, and the plurality of preset public keys includes the first public key and the second public key.
进一步地,所述SM-DP+生成对应于所述第一eUICC的第一会话密钥和对应于所述第二eUICC的第二会话密钥,包括:Further, the SM-DP+ generates a first session key corresponding to the first eUICC and a second session key corresponding to the second eUICC, including:
所述SM-DP+生成第三公私钥对,所述第三公私钥对包括第三公钥和第三私钥;The SM-DP+ generates a third public private key pair, where the third public private key pair includes a third public key and a third private key;
所述SM-DP+使用所述第一公钥和所述第三私钥生成对应于所述第一eUICC的第一会话密钥;The SM-DP+ generates a first session key corresponding to the first eUICC by using the first public key and the third private key;
所述SM-DP+使用所述第二公钥和所述第三私钥生成对应于所述第二eUICC的第二会话密钥。The SM-DP+ generates a second session key corresponding to the second eUICC using the second public key and the third private key.
更进一步地,所述绑定配置文件包至少包括所述第三公钥、所述签约管理数据准备服务器的数字证书包含的公钥、所述签约管理数据准备服务器的第二数字签名、所述第一公钥的哈希值; Further, the binding configuration file package includes at least the third public key, a public key included in the digital certificate of the subscription management data preparation server, a second digital signature of the subscription management data preparation server, and the The hash value of the first public key;
且所述签约管理数据准备服务器的第二数字签名是所述签约管理数据准备服务器至少根据所述第三公钥和所述第一公钥生成的;And the second digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least the third public key and the first public key;
所述第一公钥的哈希值是所述SM-DP+对所述第一公钥进行哈希运算生成的。The hash value of the first public key is generated by the SM-DP+ hashing the first public key.
在一个示例中,所述SM-DP+生成对应于所述第一eUICC的第一会话密钥和对应于所述第二eUICC的第二会话密钥,包括:In an example, the SM-DP+ generates a first session key corresponding to the first eUICC and a second session key corresponding to the second eUICC, including:
利用所述第一eUICC的第一公钥对所述第一会话密钥进行加密生成第一加密的会话密钥,利用所述第二eUICC的第二公钥对所述第二会话密钥进行加密生成第二加密的会话密钥,并至少根据所述第一加密的会话密钥生成第一绑定配置文件包,至少根据所述第二加密的会话密钥生成所述第二绑定配置文件包。Encrypting the first session key with the first public key of the first eUICC to generate a first encrypted session key, and using the second public key of the second eUICC to perform the second session key Encrypting to generate a second encrypted session key, and generating a first binding profile package according to at least the first encrypted session key, and generating the second binding configuration according to at least the second encrypted session key File package.
进一步地,所述第一绑定配置文件包至少包括所述第一公钥的哈希值、所述签约管理数据准备服务器的数字证书包含的公钥、所述第一加密的会话密钥、所述签约管理数据准备服务器的第三数字签名;所述第二绑定配置文件包至少包括所述第二公钥的哈希值、所述签约管理数据准备服务器的数字证书包含的公钥、所述第二加密的会话密钥、所述签约管理数据准备服务器的第三数字签名;Further, the first binding profile package includes at least a hash value of the first public key, a public key included in a digital certificate of the subscription management data preparation server, the first encrypted session key, The third digital signature of the subscription management data preparation server; the second binding configuration file package includes at least a hash value of the second public key, a public key included in the digital certificate of the subscription management data preparation server, The second encrypted session key, the third digital signature of the subscription management data preparation server;
且所述签约管理数据准备服务器的第三数字签名是所述SM-DP+至少根据所述第一加密的会话密钥、所述第一公钥以及所述第二加密的会话密钥、所述第二公钥生成的;And the third digital signature of the subscription management data preparation server is that the SM-DP+ is based on the first encrypted session key, the first public key, and the second encrypted session key, Generated by the second public key;
所述第一公钥的哈希值是所述SM-DP+对所述第一公钥进行哈希运算生成的;所述第二公钥的哈希值是所述SM-DP+对所述第二公钥进行哈希运算生成的。The hash value of the first public key is generated by the SM-DP+ hashing the first public key; the hash value of the second public key is the SM-DP+ pair The second public key is generated by hashing.
在一个示例中,所述检验是否存在和所述匹配信息相对应的多个profile之前,还包括:In an example, before the verifying whether there are multiple profiles corresponding to the matching information, the method further includes:
所述SM-DP+验证所述第一服务器发送的至少根据所述第一eUICC的第 一公钥、第二eUICC的第二公钥和所述匹配信息而生成的数字签名。The SM-DP+ verifies that the first server sends at least according to the first eUICC A digital signature generated by a public key, a second public key of the second eUICC, and the matching information.
在第八方面,本发明实施例提供了一种配置文件批量获取、下载方法,包括:In an eighth aspect, an embodiment of the present invention provides a method for batch obtaining and downloading a configuration file, including:
第一服务器向签约管理数据准备服务器SM-DP+发送多个嵌入式通用集成电路卡eUICC的多个预置公钥和与所述多个eUICC相关联的匹配信息,其中,所述多个eUICC包括第一eUICC和第二eUICC,所述多个预置公钥包括对应于所述第一eUICC的第一公钥和对应于所述第二eUICC的第二公钥,以便所述SM-DP+生成与所述匹配信息对应的第一绑定配置文件包和第二绑定配置文件包;The first server sends a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information associated with the plurality of eUICCs to the subscription management data preparation server SM-DP+, wherein the plurality of eUICCs includes a first eUICC and a second eUICC, the plurality of preset public keys including a first public key corresponding to the first eUICC and a second public key corresponding to the second eUICC, so that the SM-DP+ is generated a first binding configuration file package and a second binding configuration file package corresponding to the matching information;
所述第一服务器接收来自所述eUICC的eUICC数字证书,检验所述第一服务器中是否存在所述eUICC数字证书中的eUICC身份标识EID;The first server receives an eUICC digital certificate from the eUICC, and checks whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server;
在存在所述eUICC身份标识EID情况下,所述第一服务器查找与所述eUICC身份标识EID对应的预置公钥的哈希值,进而根据所述预置公钥的哈希值确定与所述eUICC对应的绑定配置文件包,并将所述绑定配置文件包发送给所述eUICC对应的本地配置文件助手,以便所述eUICC下载所述绑定配置文件包。In the case that the eUICC identity identifier EID is present, the first server searches for a hash value of the preset public key corresponding to the eUICC identity identifier EID, and further determines a location according to the hash value of the preset public key. The binding configuration file package corresponding to the eUICC is sent, and the binding configuration file package is sent to the local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
在一个示例中,所述第一eUICC中预置有第一公私钥对,所述第一公私钥对包括第一公钥和第一私钥,所述第二eUICC中预置有第二公私钥对,所述第二公私钥对包括第二公钥和第二私钥;In an example, the first eUICC is preset with a first public private key pair, the first public private key pair includes a first public key and a first private key, and the second eUICC is preset with a second public private key. a key pair, the second public private key pair includes a second public key and a second private key;
所述第一服务器向SM-DP+发送多个eUICC的多个预置公钥和与所述多个eUICC相关联的匹配信息之前,还包括:Before the first server sends the plurality of preset public keys of the eUICC and the matching information associated with the multiple eUICCs to the SM-DP+, the method further includes:
所述第一服务器预先获得所述第一公私钥对、所述第二公私钥对和所述所述第一eUICC的第一身份标识EID、所述第二eUICC的第二身份标识EID,并得到所述第一公钥的哈希值和所述第二公钥的哈希值;Determining, by the first server, the first public private key pair, the second public private key pair, the first identity identifier EID of the first eUICC, and the second identity identifier EID of the second eUICC, and Obtaining a hash value of the first public key and a hash value of the second public key;
所述第一服务器将所述第一公钥的哈希值和所述第一eUICC的身份标识EID相对应存储,将所述第二公钥的哈希值和所述第二eUICC的身份标识EID 相对应存储。The first server stores the hash value of the first public key and the identity identifier EID of the first eUICC, and the hash value of the second public key and the identity of the second eUICC EID Corresponding storage.
在一个示例中,所述预置公钥的哈希值通过以下方式获得:In one example, the hash value of the preset public key is obtained in the following manner:
直接获得所述预置公钥的哈希值,或者,所述第一服务器根据所述预置公钥计算生成所述预置公钥的哈希值。The hash value of the preset public key is directly obtained, or the first server generates a hash value of the preset public key according to the preset public key.
在一个示例中,所述第一服务器向SM-DP+发送eUICC的多个预置公钥和与所述多个eUICC相关联的匹配信息,包括:In an example, the first server sends the plurality of preset public keys of the eUICC and the matching information associated with the multiple eUICCs to the SM-DP+, including:
所述第一服务器向所述SM-DP+发送至少根据所述第一eUICC的第一公钥、第二eUICC的第二公钥以及所述匹配信息而生成的第一服务器第一数字签名,以便所述SM-DP+验证所述第一服务器第一数字签名。Transmitting, by the first server, the first digital signature of the first server generated according to the first public key of the first eUICC, the second public key of the second eUICC, and the matching information to the SM-DP+, so that The SM-DP+ verifies the first digital signature of the first server.
在一个示例中,所述检验所述第一服务器中是否存在所述eUICC数字证书中的eUICC身份标识EID之前,还包括:In an example, before the checking whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server, the method further includes:
所述第一服务器验证所述eUICC发送的至少根据所述第一服务器的随机数生成的第一数字签名。The first server verifies the first digital signature generated by the eUICC according to at least the random number of the first server.
第九方面,本发明实施例提供了一种配置文件批量获取、下载方法,包括:A ninth aspect, the embodiment of the present invention provides a method for batch obtaining and downloading configuration files, including:
嵌入式通用集成电路卡eUICC终端向第一服务器发送eUICC数字证书,以便所述第一服务器确定与所述eUICC数字证书中包含的eUICC身份标识EID对应的绑定配置文件包;The embedded universal integrated circuit card eUICC terminal sends an eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
所述eUICC终端中的本地配置文件助手LPA接收来自所述第一服务器的所述绑定配置文件包,将所述绑定配置文件包通过反复发起加载绑定配置文件包功能发送给所述eUICC终端中的eUICC。The local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package to the eUICC by repeatedly initiating a load binding configuration file package function. eUICC in the terminal.
在一个示例中,所述eUICC终端中的本地配置文件助手LPA接收来自所述第一服务器的所述绑定配置文件包,将所述绑定配置文件包通过反复发起加载绑定配置文件包功能发送给所述eUICC终端中的eUICC,还包括:In one example, the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and the binding configuration file package is repeatedly triggered to load the binding configuration file package function. The eUICC sent to the eUICC terminal further includes:
所述eUICC根据所述绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对所述初始化安全通道功能包含的签 约管理数据准备服务器数字签名进行验证,在验证通过情况下,根据所述预置公钥对应的私钥和所述初始化安全通道功能包含的所述签约数据管理服务器的一次性公钥,生成会话密钥。The eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and includes a signature included in the initial security channel function. The management data preparation server digital signature is verified, and in the case of verification, the session is generated according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function. Key.
在一个示例中,所述eUICC终端中的本地配置文件助手LPA接收来自所述第一服务器的所述绑定配置文件包,将所述绑定配置文件包通过反复发起加载绑定配置文件包功能发送给所述eUICC终端中的eUICC,还包括:In one example, the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and the binding configuration file package is repeatedly triggered to load the binding configuration file package function. The eUICC sent to the eUICC terminal further includes:
所述eUICC根据所述绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对所述初始化安全通道功能包含的签约管理数据准备服务器数字签名进行验证,在验证通过情况下,则利用所述预置公钥对所述初始化安全通道功能包含的加密的会话密钥进行解密,得到会话密钥。The eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and verifies the digital signature of the subscription management data preparation server included in the initial security channel function, and performs verification. In this case, the encrypted session key included in the initialization secure channel function is decrypted by using the preset public key to obtain a session key.
第十方面,本发明实施例提供了一种签约管理数据准备服务器,包括:The tenth aspect of the present invention provides a subscription management data preparation server, including:
接收器,用于接收和多个嵌入式通用集成电路卡eUICC相关联的匹配信息,其中所述多个eUICC包括第一eUICC和第二eUICC;a receiver, configured to receive matching information associated with a plurality of embedded universal integrated circuit card eUICCs, wherein the plurality of eUICCs comprise a first eUICC and a second eUICC;
处理器,用于检验是否存在和所述匹配信息相对应的多个配置文件profile,其中所述多个profile包括对应于所述第一eUICC的第一profile和对应于所述第二eUICC的第二profile,生成对应于所述第一eUICC的第一会话密钥和对应于所述第二eUICC的第二会话密钥,分别基于所述第一会话密钥和所述第一eUICC、所述第二会话密钥和所述第二eUICC生成第一绑定配置文件包和第二绑定配置文件包;a processor, configured to check whether there is a plurality of profile profiles corresponding to the matching information, where the plurality of profiles includes a first profile corresponding to the first eUICC and a first profile corresponding to the second eUICC a second profile, generating a first session key corresponding to the first eUICC and a second session key corresponding to the second eUICC, respectively, based on the first session key and the first eUICC, The second session key and the second eUICC generate a first binding configuration file package and a second binding configuration file package;
发射器,用于将所述第一绑定配置文件包和所述第二绑定配置文件包发送给所述第一服务器。And a transmitter, configured to send the first binding configuration file package and the second binding configuration file package to the first server.
在一个示例中,所述第一eUICC中预置有第一公私钥对,所述第一公私钥对包括第一公钥和第一私钥,所述第二eUICC中预置有第二公私钥对,所述第二公私钥对包括第二公钥和第二私钥;且In an example, the first eUICC is preset with a first public private key pair, the first public private key pair includes a first public key and a first private key, and the second eUICC is preset with a second public private key. a key pair, the second public private key pair including a second public key and a second private key;
所述接收器还用于接收所述第一服务器发送的多个预置公钥,所述多个 预置公钥包括所述第一公钥和所述第二公钥。The receiver is further configured to receive a plurality of preset public keys sent by the first server, where the multiple The preset public key includes the first public key and the second public key.
进一步地,所述处理器还用于生成第三公私钥对,所述第三公私钥对包括第三公钥和第三私钥,使用所述第一公钥和所述第三私钥生成对应于所述第一eUICC的第一会话密钥,使用所述第二公钥和所述第三私钥生成对应于所述第二eUICC的第二会话密钥。Further, the processor is further configured to generate a third public private key pair, where the third public private key pair includes a third public key and a third private key, and is generated by using the first public key and the third private key Corresponding to the first session key of the first eUICC, using the second public key and the third private key to generate a second session key corresponding to the second eUICC.
更进一步地,所述绑定配置文件包至少包括所述第三公钥、所述签约管理数据准备服务器的数字证书包含的公钥、所述签约管理数据准备服务器的第二数字签名、所述第一公钥的哈希值;Further, the binding configuration file package includes at least the third public key, a public key included in the digital certificate of the subscription management data preparation server, a second digital signature of the subscription management data preparation server, and the The hash value of the first public key;
且所述签约管理数据准备服务器的第二数字签名是所述签约管理数据准备服务器至少根据所述第三公钥和所述第一公钥生成的;And the second digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least the third public key and the first public key;
所述第一公钥的哈希值是所述SM-DP+对所述第一公钥进行哈希运算生成的。The hash value of the first public key is generated by the SM-DP+ hashing the first public key.
在一个示例中,所述处理器还用于利用所述第一eUICC的第一公钥对所述第一会话密钥进行加密生成第一加密的会话密钥,利用所述第二eUICC的第二公钥对所述第二会话密钥进行加密生成第二加密的会话密钥,并至少根据所述第一加密的会话密钥生成第一绑定配置文件包,至少根据所述第二加密的会话密钥生成所述第二绑定配置文件包。In one example, the processor is further configured to encrypt the first session key by using a first public key of the first eUICC to generate a first encrypted session key, by using the second eUICC The second public key encrypts the second session key to generate a second encrypted session key, and generates a first binding profile package according to at least the first encrypted session key, at least according to the second encryption The session key generates the second binding profile package.
进一步地,所述第一绑定配置文件包至少包括所述第一公钥的哈希值、所述签约管理数据准备服务器的数字证书包含的公钥、所述第一加密的会话密钥、所述签约管理数据准备服务器的第三数字签名;所述第二绑定配置文件包至少包括所述第二公钥的哈希值、所述签约管理数据准备服务器的数字证书包含的公钥、所述第二加密的会话密钥、所述签约管理数据准备服务器的第三数字签名;Further, the first binding profile package includes at least a hash value of the first public key, a public key included in a digital certificate of the subscription management data preparation server, the first encrypted session key, The third digital signature of the subscription management data preparation server; the second binding configuration file package includes at least a hash value of the second public key, a public key included in the digital certificate of the subscription management data preparation server, The second encrypted session key, the third digital signature of the subscription management data preparation server;
且所述签约管理数据准备服务器的第三数字签名是所述处理器至少根据所述第一加密的会话密钥、所述第一公钥以及所述第二加密的会话密钥、所述第二公钥生成的; And the third digital signature of the subscription management data preparation server is that the processor is based at least on the first encrypted session key, the first public key, and the second encrypted session key, the first Generated by the second public key;
所述第一公钥的哈希值是所述处理器对所述第一公钥进行哈希运算生成的;所述第二公钥的哈希值是所述处理器对所述第二公钥进行哈希运算生成的。The hash value of the first public key is generated by the processor performing a hash operation on the first public key; the hash value of the second public key is the processor to the second public The key is generated by hashing.
在一个示例中,处理器还用于验证所述第一服务器发送的至少根据所述第一eUICC的第一公钥、第二eUICC的第二公钥和所述匹配信息而生成的数字签名。In one example, the processor is further configured to verify a digital signature generated by the first server according to at least the first public key of the first eUICC, the second public key of the second eUICC, and the matching information.
第十一方面,本发明实施例提供了一种服务器,包括:In an eleventh aspect, an embodiment of the present invention provides a server, including:
发射器,用于向签约管理数据准备服务器SM-DP+发送多个嵌入式通用集成电路卡eUICC的多个预置公钥和与所述多个eUICC相关联的匹配信息,其中,所述多个eUICC包括第一eUICC和第二eUICC,所述多个预置公钥包括对应于所述第一eUICC的第一公钥和对应于所述第二eUICC的第二公钥,以便所述SM-DP+生成与所述匹配信息对应的第一绑定配置文件包和第二绑定配置文件包;a transmitter, configured to send, to the subscription management data preparation server SM-DP+, a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information associated with the plurality of eUICCs, wherein the multiple The eUICC includes a first eUICC and a second eUICC, the plurality of preset public keys including a first public key corresponding to the first eUICC and a second public key corresponding to the second eUICC, so that the SM- DP+ generates a first binding configuration file package and a second binding configuration file package corresponding to the matching information;
接收器,用于接收来自所述eUICC的eUICC数字证书;a receiver, configured to receive an eUICC digital certificate from the eUICC;
处理器,用于检验是否存在所述eUICC数字证书中的eUICC身份标识EID,在存在所述eUICC身份标识EID情况下,查找与所述eUICC身份标识EID对应的预置公钥的哈希值,进而根据所述预置公钥的哈希值确定与所述eUICC对应的绑定配置文件包;a processor, configured to check whether an eUICC identity identifier EID in the eUICC digital certificate exists, and in a case where the eUICC identity identifier EID exists, searching for a hash value of a preset public key corresponding to the eUICC identity identifier EID, And determining, according to the hash value of the preset public key, a binding configuration file package corresponding to the eUICC;
所述发射器,用于将所述绑定配置文件包发送给所述eUICC对应的本地配置文件助手,以便所述eUICC下载所述绑定配置文件包。The transmitter is configured to send the binding configuration file package to a local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
在一个示例中,所述第一eUICC中预置有第一公私钥对,所述第一公私钥对包括第一公钥和第一私钥,所述第二eUICC中预置有第二公私钥对,所述第二公私钥对包括第二公钥和第二私钥;In an example, the first eUICC is preset with a first public private key pair, the first public private key pair includes a first public key and a first private key, and the second eUICC is preset with a second public private key. a key pair, the second public private key pair includes a second public key and a second private key;
所述处理器还用于预先获得所述第一公私钥对、所述第二公私钥对和所述所述第一eUICC的第一身份标识EID、所述第二eUICC的第二身份标识EID,并得到所述第一公钥的哈希值和所述第二公钥的哈希值; The processor is further configured to obtain, in advance, the first public private key pair, the second public private key pair, the first identity identifier EID of the first eUICC, and the second identity identifier EID of the second eUICC And obtaining a hash value of the first public key and a hash value of the second public key;
所述处理器将所述第一公钥的哈希值和所述第一eUICC的身份标识EID相对应存储,将所述第二公钥的哈希值和所述第二eUICC的身份标识EID相对应存储。The processor stores the hash value of the first public key and the identity identifier EID of the first eUICC, and the hash value of the second public key and the identity identifier EID of the second eUICC Corresponding storage.
在一个示例中,所述发射器还用于向所述SM-DP+发送至少根据所述第一eUICC的第一公钥、第二eUICC的第二公钥以及所述匹配信息而生成的第一服务器第一数字签名,以便所述SM-DP+验证所述第一服务器第一数字签名。In one example, the transmitter is further configured to send, to the SM-DP+, a first generated according to at least a first public key of the first eUICC, a second public key of the second eUICC, and the matching information. The server first digitally signs the SM-DP+ to verify the first digital signature of the first server.
在一个示例中,所述处理器还用于验证所述eUICC发送的至少根据所述第一服务器的随机数生成的第一数字签名。In one example, the processor is further configured to verify a first digital signature generated by the eUICC based on at least a random number of the first server.
第十二方面,本发明实施例提供了一种终端,包括:A twelfth aspect, the embodiment of the present invention provides a terminal, including:
发射器,用于向第一服务器发送嵌入式通用集成电路卡eUICC数字证书,以便所述第一服务器确定与所述eUICC数字证书中包含的eUICC身份标识EID对应的绑定配置文件包;a transmitter, configured to send an embedded universal integrated circuit card eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
接收器,用于接收来自所述第一服务器的所述绑定配置文件包;a receiver, configured to receive the binding configuration file package from the first server;
处理器,用于将所述绑定配置文件包反复发起加载绑定配置文件包功能;a processor, configured to repeatedly initiate a load binding configuration file package function by using the binding configuration file package;
发射器,用于将所述绑定配置文件包发送给所述终端中的嵌入式通用集成电路卡eUICC。And a transmitter, configured to send the binding configuration file package to an embedded universal integrated circuit card eUICC in the terminal.
在一个示例中,所述处理器还用于,根据所述绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对所述初始化安全通道功能包含的签约管理数据准备服务器数字签名进行验证,在验证通过情况下,根据所述预置公钥对应的私钥和所述初始化安全通道功能包含的所述签约数据管理服务器的一次性公钥,生成会话密钥。In an example, the processor is further configured to: prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and perform subscription management on the initial security channel function. The data preparation server performs digital verification to generate a session key according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function. .
在一个示例中,所述处理器还用于,根据所述绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对所述初始化安全通道功能包含的签约管理数据准备服务器数字签名进行验证,在验证通过情况下,则利用所述预置公钥对所述初始化安全通道功能包含的加密的 会话密钥进行解密,得到会话密钥。In an example, the processor is further configured to: prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and perform subscription management on the initial security channel function. The data preparation server digital signature is verified, and in the case of verification, the encrypted public key included in the initialization security channel function is utilized by the preset public key The session key is decrypted to obtain the session key.
本发明实施例提供的配置文件批量获取、下载方法、服务器及终端,能够一次性下发多个绑定配置文件包,相当于一次将大量eUICC终端的下载请求批量处理,减少大量信令开销,缓解接入压力,防范大量eUICC终端同时发起profile下载请求时可能造成的DoS攻击。此外,对于嵌入eUICC的终端原始设备制造商(Original Equipment Manufacturer,简称OEM)而言,不再需要每个终端在出厂测试时都接入不同签约管理数据准备服务器的网络进行测试联调,减少测试成本;并且对于签约管理数据准备服务器而言,仅需对接一个OEM平台,后续测试联调由OEM内部就能够解决。The configuration file batch obtaining and downloading method, the server, and the terminal provided by the embodiment of the present invention can deliver multiple binding configuration file packages at one time, which is equivalent to batch processing a large number of eUICC terminal download requests at one time, thereby reducing a large amount of signaling overhead. Alleviate the access pressure and prevent DoS attacks that may be caused when a large number of eUICC terminals initiate a profile download request at the same time. In addition, for the terminal equipment manufacturer (OEM) embedded in the eUICC, it is no longer necessary for each terminal to access the network of different contract management data preparation servers during the factory test for test joint debugging, reducing the test. Cost; and for the contract management data preparation server, only one OEM platform needs to be docked, and subsequent test joint debugging can be solved internally by the OEM.
附图说明DRAWINGS
为了更清楚地说明本发明实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the present invention, Those skilled in the art can also obtain other drawings based on these drawings without any creative work.
图1为本发明实施例提供的一种配置文件profile的批量获取、下载系统示意图;FIG. 1 is a schematic diagram of a batch acquisition and download system of a profile profile according to an embodiment of the present disclosure;
图2为本发明实施例提供的第一服务器的信息获取示意图;2 is a schematic diagram of information acquisition of a first server according to an embodiment of the present invention;
图3为本发明实施例一提供的一种配置文件profile的批量获取方法示意图;FIG. 3 is a schematic diagram of a method for batch obtaining a profile profile according to Embodiment 1 of the present invention;
图4为本发明实施例一提供的一种配置文件profile的批量下载方法示意图;4 is a schematic diagram of a batch downloading method of a profile profile according to Embodiment 1 of the present invention;
图5为本发明实施例二提供的一种配置文件profile的批量获取方法示意图;FIG. 5 is a schematic diagram of a method for obtaining a batch profile file profile according to Embodiment 2 of the present invention;
图6为本发明实施例二提供的一种配置文件profile的批量下载方法示意图; FIG. 6 is a schematic diagram of a batch downloading method of a profile profile according to Embodiment 2 of the present invention; FIG.
图7为本发明实施例提供的绑定配置文件包的生成过程示意图;FIG. 7 is a schematic diagram of a process of generating a binding configuration file package according to an embodiment of the present invention;
图8为本发明实施例提供的多个绑定配置文件包区分过程示意图;FIG. 8 is a schematic diagram of a process for distinguishing multiple binding configuration file packages according to an embodiment of the present disclosure;
图9为本发明实施例提供的签约管理数据准备服务器示意图;FIG. 9 is a schematic diagram of a subscription management data preparation server according to an embodiment of the present invention;
图10为本发明实施例提供的第一服务器示意图;FIG. 10 is a schematic diagram of a first server according to an embodiment of the present disclosure;
图11为本发明实施例提供的eUICC终端示意图。FIG. 11 is a schematic diagram of an eUICC terminal according to an embodiment of the present invention.
具体实施方式detailed description
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be described in conjunction with the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are part of the present invention. Embodiments, but not all of the embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
当本发明实施例提及“第一”、“第二”等序数词时,除非根据上下文其确实表达顺序之意,应当理解为仅仅起区分的作用。When the embodiments of the present invention refer to ordinal numbers such as "first", "second" and the like, unless it is intended to express the order according to the context, it should be understood that it only serves as a distinction.
本发明实施例提供了一种配置文件profile批量获取、下载方法、装置及系统,使得签约管理数据准备服务器(Subscription Manager Data Preparation+,简称SM-DP+)能够将多个绑定配置文件包(bound profile package)批量下发给第一服务器(如第三方服务提供商部署的服务器),该第一服务器在获取与多个eUICC分别对应的多个绑定配置文件包后,将该多个绑定配置文件包分别经由对应的本地配置文件助手(Local Profile Assistant,简称LPA)发送给对应的eUICC,并由该eUICC完成对该绑定配置文件包的下载和安装。The embodiment of the present invention provides a configuration file profile acquisition and download method, a device, and a system, so that a subscription management data preparation server (Subscription Manager Data Preparation+, SM-DP+) can bind multiple binding configuration files (bound profile). The package is delivered to the first server (such as a server deployed by a third-party service provider), and the first server obtains multiple binding configuration files corresponding to multiple eUICCs, and then configures the multiple bindings. The file package is sent to the corresponding eUICC via the corresponding Local Profile Assistant (LPA), and the download and installation of the binding configuration file package is completed by the eUICC.
图1为本发明实施例提供的一种配置文件profile的批量获取、下载系统示意图。该系统包括:签约管理数据准备服务器SM-DP+、第一服务器、多个eUICC终端所对应的多个本地配置文件助手LPA和多个eUICC。FIG. 1 is a schematic diagram of a batch acquisition and download system of a profile profile according to an embodiment of the present invention. The system includes: a contract management data preparation server SM-DP+, a first server, a plurality of local profile assistants LPAs corresponding to the plurality of eUICC terminals, and a plurality of eUICCs.
图1中,签约管理数据准备服务器SM-DP+,用于接收第一服务器发送的多个eUICC的多个预置公钥、对应多个eUICC的匹配信息等信息(例如, 签约管理数据准备服务器SM-DP+还用于接收签约管理数据准备服务器SM-DP+的域名、第一服务器的数字证书等),获取与匹配信息对应的多个profile(受保护的配置文件包protected profile package或者未受保护的配置文件包unprotected profile package),并至少根据该多个profile生成对应多个eUICC的多个绑定配置文件包,且上述绑定配置文件包至少包括eUICC的预置公钥的哈希值和签约管理数据准备服务器SM-DP+的数字证书包含的公钥;其中,该多个eUICC与多个eUICC终端分别对应,即每个eUICC终端都配置一个对应的eUICC,且多个eUICC与多个预置公钥分别相对应。In FIG. 1, the subscription management data preparation server SM-DP+ is configured to receive information such as multiple preset public keys of multiple eUICCs sent by the first server, matching information corresponding to multiple eUICCs (for example, The subscription management data preparation server SM-DP+ is further configured to receive the domain name of the subscription management data preparation server SM-DP+, the digital certificate of the first server, and the like, and acquire multiple profiles corresponding to the matching information (protected profile package protected profile) a package or an unprotected profile package, and generating a plurality of binding configuration file packages corresponding to the plurality of eUICCs according to the plurality of profiles, and the binding configuration file package includes at least the preset public key of the eUICC The hash value and the public key included in the digital certificate of the subscription management data preparation server SM-DP+; wherein the plurality of eUICCs respectively correspond to the plurality of eUICC terminals, that is, each eUICC terminal is configured with a corresponding eUICC, and multiple The eUICC corresponds to a plurality of preset public keys respectively.
第一服务器,用于对签约管理数据准备服务器SM-DP+发送(并不限于)多个eUICC的多个预置公钥和对应多个eUICC的匹配信息等信息(例如,第一服务器还用于发送签约管理数据准备服务器SM-DP+的域名、第一服务器的数字证书等),并接收签约管理数据准备服务器SM-DP+生成的对应多个eUICC的多个绑定配置文件包;并且,在接收eUICC终端的本地配置文件助手LPA发送的eUICC数字证书后,获取该eUICC数字证书中的eUICC身份标识EID,检验在该第一数据库中是否存在与从该数字证书中获取到的eUICC身份标识EID相同的EID,若存在,则根据该eUICC身份标识EID获取与该eUICC身份标识EID存在对应关系的eUICC的预置公钥的哈希值,进而根据预置公钥的哈希值确定eUICC对应的绑定配置文件包,并将绑定配置文件包经由本地配置文件助手LPA发送给eUICC。其中,在第一服务器中,每个eUICC的预置公钥的哈希值与eUICC身份标识EID相对应存储,使得二者存在对应关系。a first server, configured to send (not limited to) a plurality of preset public keys of the plurality of eUICCs and matching information of the plurality of eUICCs to the subscription management data preparation server SM-DP+ (for example, the first server is further used for Sending a domain name of the subscription management data preparation server SM-DP+, a digital certificate of the first server, and the like, and receiving a plurality of binding configuration file packages corresponding to the plurality of eUICCs generated by the subscription management data preparation server SM-DP+; and receiving After the eUICC digital certificate sent by the local configuration file assistant LPA of the eUICC terminal, the eUICC identity identifier EID in the eUICC digital certificate is obtained, and it is checked whether the eUICC identity identifier EID obtained in the first database is the same as the eUICC identity identifier obtained from the digital certificate. The EID, if yes, obtains a hash value of the preset public key of the eUICC corresponding to the eUICC identity identifier EID according to the eUICC identity identifier EID, and determines the binding of the eUICC according to the hash value of the preset public key. The configuration package is packaged and the binding configuration package is sent to the eUICC via the local configuration file assistant LPA. In the first server, the hash value of the preset public key of each eUICC is stored corresponding to the eUICC identity identifier EID, so that there is a corresponding relationship between the two.
该第一服务器可以是第三方服务提供商部署的服务器(即签约管理安全路由服务器,英文:Subscription Manager-Secure Routing+,简称SM-SR+),第三方服务提供商包括但不限于企业用户、集团用户、行业应用;第一服务器也可以是签约管理数据准备服务器SM-DP+的一部分;第一服务器还可以是签约管理发现服务器(Subscription Manager-Discovery Server,简称SM-DS) 等。The first server may be a server deployed by a third-party service provider (ie, a contract management secure routing server, English: Subscription Manager-Secure Routing+, referred to as SM-SR+), and the third-party service provider includes but is not limited to enterprise users and group users. The first server may also be part of the subscription management data preparation server SM-DP+; the first server may also be a Subscription Manager-Discovery Server (SM-DS). Wait.
本地配置文件助手LPA,用于向第一服务器转发eUICC发送的eUICC数字证书等信息,并从第一服务器下载对应eUICC的绑定配置文件包,并将对应eUICC的绑定配置文件包拆分为不同数据块(功能),通过应用协议数据单元(Application Protocol Data Unit)命令按顺序发送给对应的eUICC。eUICC,用于顺序接收本地配置文件助手LPA通过应用协议数据单元发送的绑定配置文件包的不同数据块(功能),并根据生成的会话密钥对数据块进行解密,完成对绑定配置文件包的安装。The local profile assistant LPA is configured to forward the eUICC digital certificate and the like sent by the eUICC to the first server, and download the binding configuration file package corresponding to the eUICC from the first server, and split the binding configuration file package corresponding to the eUICC. Different data blocks (functions) are sequentially sent to the corresponding eUICC through an Application Protocol Data Unit command. The eUICC is configured to sequentially receive different data blocks (functions) of the binding configuration file package sent by the local configuration file assistant LPA through the application protocol data unit, and decrypt the data block according to the generated session key to complete the binding configuration file. Package installation.
该eUICC终端至少包含本地配置文件助手LPA和eUICC,eUICC终端包含LPA和对应eUICC,eUICC终端向第一服务器发送的信息都是通过LPA发送的。本地配置文件助手LPA用于对eUICC进行管理,转发eUICC对外发送的信息,获取eUICC终端用户的意图,主动请求下载、激活以及删除profile等操作;eUICC由通信模块厂家、终端厂家或M2M行业客户向eUICC供应商订购,并最终嵌入到eUICC终端中,eUICC终端内嵌eUICC的eUICC数字证书(eUICC数字证书包括eUICC身份标识EID)、eUICC信息集1(eUICC_info_1)、eUICC信息集2(eUICC_info_2)、预置公私钥对等eUICC的基本信息;其中,eUICC信息集1(eUICC_info_1)包括eUICC所支持的数字证书的格式、在后续验证过程中支持的签名算法、规范版本号等;eUICC信息集2(eUICC_info_2)包括eUICC能力信息,如支持的规范版本,存储能力等。The eUICC terminal includes at least a local profile assistant LPA and an eUICC. The eUICC terminal includes an LPA and a corresponding eUICC, and the information sent by the eUICC terminal to the first server is sent by the LPA. The local configuration file assistant LPA is used to manage the eUICC, forward the information sent by the eUICC, obtain the intent of the eUICC terminal user, and actively request to download, activate, and delete the profile. The eUICC is provided by the communication module manufacturer, the terminal manufacturer, or the M2M industry customer. The eUICC provider subscribes and finally embeds into the eUICC terminal. The eUICC terminal embeds the eUICC digital certificate of the eUICC (eUICC digital certificate including eUICC identity EID), eUICC information set 1 (eUICC_info_1), eUICC information set 2 (eUICC_info_2), pre- The eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, the signature algorithm supported in the subsequent verification process, the specification version number, and the like; eUICC information set 2 (eUICC_info_2) ) Includes eUICC capability information, such as supported specification versions, storage capabilities, and more.
此外,由于在本发明实施例中,采用了数字证书和数字签名进行设备间的双向认证(例如,签约管理数据准备服务器SM-DP+和第一服务器的双向认证,以及第一服务器和eUICC终端的双向认证)。为便于理解,详细描述设备间通过数字证书和数字签名进行双向认证的具体过程。In addition, in the embodiment of the present invention, the digital certificate and the digital signature are used for mutual authentication between devices (for example, the bidirectional authentication of the contract management data preparation server SM-DP+ and the first server, and the first server and the eUICC terminal) Two-way authentication). For ease of understanding, the specific process of two-way authentication between devices through digital certificates and digital signatures is described in detail.
假设,第一设备持有一对公私钥对,包括第一设备公钥和第一设备私钥,该第一设备公钥为该第一设备的数字证书中包含的公钥;第二设备也持有一 对公私钥对,包括第二设备公钥和第二设备私钥,该第二设备公钥为该第二设备的数字证书中包含的公钥。Assume that the first device holds a pair of public and private key pairs, including a first device public key and a first device private key, and the first device public key is a public key included in the digital certificate of the first device; Hold one The public-private key pair includes a second device public key and a second device private key, and the second device public key is a public key included in the digital certificate of the second device.
第一设备向第二设备发送消息M,且该第一设备使用第一私钥对消息M的散列值(或者说,消息摘要)进行加密,生成数字签名A。具体地,以消息M作为数字信息,第一设备通过哈希(Hash)函数生成该数字信息(例如,消息M)的散列值后,再利用第一设备自身持有的第一私钥对该散列值进行加密,从而生成该数字签名A。第一设备将该消息M(即,数字信息的一例)和该数字签名A发送给第二设备,该数字信息为明文信息。The first device sends a message M to the second device, and the first device encrypts the hash value (or message digest) of the message M using the first private key to generate a digital signature A. Specifically, the message M is used as the digital information, and the first device generates a hash value of the digital information (for example, the message M) through a hash function, and then uses the first private key pair held by the first device itself. The hash value is encrypted to generate the digital signature A. The first device sends the message M (ie, an example of digital information) and the digital signature A to the second device, the digital information being plaintext information.
该第一设备将自身的数字证书即第一设备的数字证书发送给第二设备,该第二设备首先验证该第一设备的数字证书,若该第一设备的数字证书验证通过,则基于该第一设备的数字证书中的第一公钥对该数字签名A进行解密,得到该消息M的散列值。The first device sends its own digital certificate, that is, the digital certificate of the first device, to the second device, where the second device first verifies the digital certificate of the first device, and if the digital certificate of the first device is verified, the The first public key in the digital certificate of the first device decrypts the digital signature A to obtain a hash value of the message M.
该第二设备可以对该消息M使用哈希(Hash)函数进行计算,将得到的结果与上述解密后得到的消息M的散列值进行对比,若两者一致,可以确定该数字签名A是第一设备利用自身唯一的第一私钥计算出的,从而该第二设备验证了该第一设备的身份,同时也可证明该数字签名A保护的该消息M未被篡改。同理,该第二设备也可以基于上述生成该数字签名A的方法生成数字签名B,该第一设备基于上述验证数字签名A的方法,对第二设备发送的数字签名B进行验证。为了简洁,这里不再赘述。The second device may perform a calculation using the hash function on the message M, and compare the obtained result with the hash value of the decrypted message M. If the two are consistent, it may be determined that the digital signature A is The first device is calculated by using its own unique first private key, so that the second device verifies the identity of the first device, and can also prove that the message M protected by the digital signature A has not been tampered with. Similarly, the second device may also generate a digital signature B based on the method for generating the digital signature A. The first device verifies the digital signature B sent by the second device based on the method for verifying the digital signature A. For the sake of brevity, it will not be repeated here.
下面结合实施例一、实施例二对本发明提供的一种配置文件profile的批量获取、下载方法进行描述。A method for batch obtaining and downloading a profile profile provided by the present invention will be described below with reference to the first embodiment and the second embodiment.
实施例一 Embodiment 1
本发明实施例一提供了一种配置文件profile的批量获取、下载方法,主要包括两个工作阶段第一阶段和第二阶段,第一阶段为配置文件profile的批量获取,第二阶段为配置文件profile的批量下载。 The first embodiment of the present invention provides a method for batch obtaining and downloading a profile profile, which mainly includes a first phase and a second phase of two work phases. The first phase is a batch acquisition of a profile profile, and the second phase is a configuration file. Batch download of profiles.
下面以第一服务器为签约管理安全路由服务器SM-SR+为例进行阐述。The following takes the first server as the contract management security routing server SM-SR+ as an example.
图3为本发明实施例一提供了一种配置文件profile的批量获取方法示意图,如图3所示,本发明实施例一提供的第一服务器SM-SR+从签约管理数据准备服务器SM-DP+批量获取多个绑定配置文件包的工作原理和过程包括步骤S101-步骤S108:FIG. 3 is a schematic diagram of a method for obtaining a batch of a profile profile according to the first embodiment of the present invention. As shown in FIG. 3, the first server SM-SR+ from the subscription management data preparation server SM-DP+ is provided in the first embodiment of the present invention. The working principle and process of obtaining multiple binding configuration file packages includes step S101 - step S108:
在第一服务器SM-SR+开始批量获取多个绑定配置文件包之前,还包括:Before the first server SM-SR+ starts to obtain multiple binding configuration file packages in batches, it also includes:
参见图2,第一服务器SM-SR+需从运营商处获得多个eUICC所对应的一个匹配信息(matchingID或Activation Code Token)以及获取签约管理数据准备服务器域名(SM-DP+addr);并从eUICC制造商(eUICC Manufacturer,简称EUM)处获取每个eUICC终端的预置公钥(PK_eUICCi_ECKA)、预置公钥的哈希值h(PK_eUICCi_ECKA)(还可以是第一服务器SM-SR+根据获得的预置公钥计算生成预置公钥的哈希值)、eUICC信息集1(eUICC_info_1)、eUICC信息集2(eUICC_info_2)、eUICC身份标识EID(eUICC-ID);并将从运营商、eUICC制造商获取的信息存储于第一服务器SM-SR+的第一数据库中,其中,每个eUICC的预置公钥的哈希值与eUICC身份标识EID进行对应存储,使得二者存在对应关系。第一服务器SM-SR+需从GMSA授权核准的数字证书授权机构CI申请并获得第一服务器SM-SR+的数字证书。Referring to FIG. 2, the first server SM-SR+ needs to obtain a matching information (matching ID or Activation Code Token) corresponding to multiple eUICCs from the operator, and obtain a subscription management data preparation server domain name (SM-DP+addr); The eUICC Manufacturer (eUMCC) obtains the preset public key (PK_eUICCi_ECKA) of each eUICC terminal and the hash value h (PK_eUICCi_ECKA) of the preset public key (may also be obtained by the first server SM-SR+) Preset public key calculation generates a hash value of the preset public key), eUICC information set 1 (eUICC_info_1), eUICC information set 2 (eUICC_info_2), eUICC identity EID (eUICC-ID); and will be manufactured from the operator, eUICC The information obtained by the quotient is stored in the first database of the first server SM-SR+, wherein the hash value of the preset public key of each eUICC is stored correspondingly with the eUICC identity identifier EID, so that there is a corresponding relationship between the two. The first server SM-SR+ needs to apply for and obtain the digital certificate of the first server SM-SR+ from the digital certificate authority CI approved by the GMSA.
此外,如图1所示,在签约管理数据准备服务器SM-DP+中存在与上述匹配信息对应的等待配置文件下载命令,且该等待配置文件下载命令对应多个profile(保护的配置文件包或未保护的配置文件包)。多个配置文件profile的具体生成过程详见图7及相关文字说明。In addition, as shown in FIG. 1, a waiting configuration file download command corresponding to the above matching information exists in the subscription management data preparation server SM-DP+, and the waiting configuration file download command corresponds to multiple profiles (protected configuration file package or not Protected profile package). The specific generation process of multiple profile profiles is detailed in Figure 7 and related text descriptions.
步骤S101,第一服务器SM-SR+对签约管理数据准备服务器SM-DP+发起并建立第一https(Hyper Text Transfer Protocol over Secure Socket Layer,在安全套接层的超文本传输协议)连接,以便对后续交互信令进行加密和完整性保护;第一服务器SM-SR+通过第一https连接对签约管理数据准备服务器SM-DP+发送至少包括签约管理数据准备服务器域名(SM-DP+addr)、第一 服务器第一随机数(SR_challenge_1)、eUICC信息集1(eUICC_info_1)在内的信息。In step S101, the first server SM-SR+ initiates and establishes a first https (Hyper Text Transfer Protocol over Secure Socket Layer) connection to the subscription management data preparation server SM-DP+ for subsequent interaction. The signaling is performed by the first server SM-SR+ through the first https connection to the subscription management data preparation server SM-DP+, and at least includes the subscription management data preparation server domain name (SM-DP+addr), the first Information such as the server first random number (SR_challenge_1) and eUICC information set 1 (eUICC_info_1).
其中,第一服务器第一随机数(SR_challenge_1)由第一服务器SM-SR+产生,具有唯一性和随机性,能够保证第一服务器SM-SR+与签约管理数据准备服务器SM-DP+之间交互信息的新鲜性;eUICC信息集1(eUICC_info_1)包括eUICC所支持的数字证书的格式、在后续验证过程中支持的签名算法、规范版本号等。The first server first random number (SR_challenge_1) is generated by the first server SM-SR+, and has uniqueness and randomness, and can ensure interaction information between the first server SM-SR+ and the subscription management data preparation server SM-DP+. Freshness; eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, the signature algorithm supported in the subsequent verification process, the specification version number, and the like.
步骤S102,签约管理数据准备服务器SM-DP+验证第一服务器SM-SR+发送的签约管理数据准备服务器域名(SM-DP+addr)(验证该域名是否与签约管理数据准备服务器SM-DP+对应)以及验证eUICC信息集1(eUICC_info_1)中的内容,若验证成功,则生成第一交互标识(TransactionID_1)、签约管理数据准备服务器随机数(DP_challenge)和签约管理数据准备服务器数字签名,在此称其为签约管理数据准备服务器第一数字签名(DP_sign1);其中,该签约管理数据准备服务器第一数字签名(DP_sign1)是签约管理数据准备服务器SM-DP+至少根据第一服务器第一随机数(SR_challenge_1)、签约管理数据准备服务器随机数(DP_challenge)、签约管理数据准备服务器域名(SM-DP+addr)以及第一交互标识(TransactionID_1)生成;若签约管理数据准备服务器域名(SM-DP+addr)和eUICC信息集1(eUICC_info_1)验证失败,则对第一服务器SM-SR+发送错误信息提示,并结束操作。Step S102, the subscription management data preparation server SM-DP+ verifies the subscription management data preparation server domain name (SM-DP+addr) sent by the first server SM-SR+ (to verify whether the domain name corresponds to the subscription management data preparation server SM-DP+) Verifying the content in the eUICC information set 1 (eUICC_info_1), if the verification is successful, generating a first interaction identifier (TransactionID_1), a contract management data preparation server random number (DP_challenge), and a contract management data preparation server digital signature, which is referred to herein as The contract management data preparation server first digital signature (DP_sign1); wherein the subscription management data preparation server first digital signature (DP_sign1) is a subscription management data preparation server SM-DP+ at least according to the first server first random number (SR_challenge_1), The contract management data preparation server random number (DP_challenge), the contract management data preparation server domain name (SM-DP+addr), and the first interaction identifier (TransactionID_1) are generated; if the subscription management data preparation server domain name (SM-DP+addr) and eUICC If the information set 1 (eUICC_info_1) fails to be verified, an error message is sent to the first server SM-SR+. Shown, and ends the operation.
步骤S103,签约管理数据准备服务器SM-DP+至少将第一交互标识(TransactionID_1),签约管理数据准备服务器随机数(DP_challenge),签约管理数据准备服务器第一数字签名(DP_sign1),签约管理数据准备服务器域名(SM-DP+addr),签约管理数据准备服务器数字证书(CERT.DP.ECDSA),椭圆曲线类型(Curve To Be Used,此处指代签约管理数据准备服务器SM-DP+选定的密钥参数参考值)通过第一https连接发送给第一服务器SM-SR+。 Step S103, the subscription management data preparation server SM-DP+ at least the first interaction identifier (TransactionID_1), the contract management data preparation server random number (DP_challenge), the contract management data preparation server first digital signature (DP_sign1), and the contract management data preparation server Domain name (SM-DP+addr), contract management data preparation server digital certificate (CERT.DP.ECDSA), Curve To Be Used (here refers to the contracted management data preparation server SM-DP+ selected key The parameter reference value is sent to the first server SM-SR+ through the first https connection.
步骤S104,第一服务器SM-SR+对接收到的签约管理数据准备服务器数字证书(CERT.DP.ECDSA)和签约管理数据准备服务器第一数字签名(DP_sign1)进行验证,若验证成功,则对签约数据准备服务器SM-DP认证成功,并生成第一服务器数字签名,在此称其为第一服务器第一数字签名(SR_sign1);其中,第一服务器第一数字签名(SR_sign1)为第一服务器SM-SR+至少根据多个eUICC的多个预置公钥(PK.eUICC1.ECKA……PK.eUICCn.ECKA)、匹配信息(matchingID或Activation Code Token)、第一交互标识(TransactionID_1)、签约管理数据准备服务器随机数(DP_challenge)、签约管理数据准备服务器域名(SM-DP+addr)、终端信息(Device_info)、eUICC信息集2(eUICC_info_2)生成;其中,该终端信息(Device_info)至少包括终端能力,如所支持的网络接入方式(2G/3G/4G)等,eUICC信息集2(eUICC_info_2)中至少包括eUICC能力信息,如支持的规范版本,存储能力等;其中,上述多个eUICC与多个预置公钥分别相对应。Step S104, the first server SM-SR+ verifies the received subscription management data preparation server digital certificate (CERT.DP.ECDSA) and the contract management data preparation server first digital signature (DP_sign1), and if the verification is successful, the contract is signed. The data preparation server SM-DP authenticates successfully, and generates a first server digital signature, which is referred to herein as a first server first digital signature (SR_sign1); wherein the first server first digital signature (SR_sign1) is the first server SM -SR+ according to at least a plurality of preset public keys (PK.eUICC1.ECKA...PK.eUICCn.ECKA), matching information (matchingID or Activation Code Token), first interaction identifier (TransactionID_1), and contract management data of a plurality of eUICCs The server random number (DP_challenge), the subscription management data preparation server domain name (SM-DP+addr), the terminal information (Device_info), and the eUICC information set 2 (eUICC_info_2) are generated; wherein the terminal information (Device_info) includes at least the terminal capability. The eUICC information set 2 (eUICC_info_2) includes at least eUICC capability information, such as a supported specification version, and storage, such as the supported network access mode (2G/3G/4G). Force or the like; wherein the plurality of the plurality of preset eUICC corresponding public key respectively.
具体的该签约管理数据准备服务器第一数字签名(DP_sign1)的生成以及该第一服务器SM-SR+对该签约管理数据准备服务器第一数字签名(DP_sign1)的验证原理,参见上文第一设备和第二设备进行双向认证过程。该第一服务器SM-SR+对该签约管理数据准备服务器第一数字签名(DP_sign1)的具体验证过程,需要根据具体签名算法进行验证,本发明实施例采用的是椭圆曲线签名算法ECDSA(Curve To Be Used)。Specifically, the signing management data preparation server generates a first digital signature (DP_sign1) and the first server SM-SR+ validates the first digital signature (DP_sign1) of the subscription management data preparation server, see the first device and The second device performs a two-way authentication process. The specific verification process of the first server SM-SR+ for the first digital signature (DP_sign1) of the subscription management data preparation server needs to be verified according to a specific signature algorithm. The embodiment of the present invention adopts an elliptic curve signature algorithm ECDSA (Curve To Be). Used).
步骤S105,第一服务器SM-SR+至少将第一交互标识(TransactionID_1)、多个eUICC的多个预置公钥、签约管理数据准备服务器域名(SM-DP+addr)、匹配信息(matchingID或Activation Code Token)、终端信息(Device_info)、eUICC信息集2(eUICC_info_2)、第一服务器第一数字签名(SR_sign1)、第一服务器数字证书(CERT.SR.ECDSA)通过第一https连接发送给签约管理数据准备服务器SM-DP+;其中,该多个eUICC与该多个预置公钥分别相 对应。Step S105: The first server SM-SR+ at least the first interaction identifier (TransactionID_1), the plurality of preset public keys of the plurality of eUICCs, the subscription management data preparation server domain name (SM-DP+addr), and the matching information (matchingID or Activation) Code Token), terminal information (Device_info), eUICC information set 2 (eUICC_info_2), first server first digital signature (SR_sign1), first server digital certificate (CERT.SR.ECDSA) are sent to the contract management through the first https connection a data preparation server SM-DP+; wherein the plurality of eUICCs and the plurality of preset public keys are respectively correspond.
步骤S106,签约管理数据准备服务器SM-DP+对第一服务器数字证书(CERT.SR.ECDSA)、第一服务器第一数字签名(SR_sign1)进行验证,若验证通过,则对第一服务器SM-SR+认证成功,并根据eUICC信息集2(eUICC_info_2)和终端信息(Device_info)进行可用性(eligibility)验证,如果以上任何验证失败,则对第一服务器SM-DP+发送错误信息提示并结束操作;若均验证成功,检验签约管理数据准备服务器SM-DP+是否存在与匹配信息(matchingID或Activation Code Token)对应的等待配置文件下载命令,若存在,则获取与匹配信息对应的多个profile(未保护的配置文件包或保护的配置文件包)。Step S106, the subscription management data preparation server SM-DP+ verifies the first server digital certificate (CERT.SR.ECDSA) and the first server first digital signature (SR_sign1). If the verification passes, the first server SM-SR+ The authentication succeeds, and the eligibility verification is performed according to the eUICC information set 2 (eUICC_info_2) and the terminal information (Device_info). If any of the above verification fails, the first server SM-DP+ sends an error message prompt and ends the operation; Successfully, check whether the subscription management data preparation server SM-DP+ has a waiting configuration file download command corresponding to the matching information (matchingID or Activation Code Token), and if so, acquire multiple profiles corresponding to the matching information (unprotected configuration file) Package or protected configuration package).
签约管理数据准备服务器SM-DP+生成一次性公私钥对,一次性公私钥对包括一次性私钥(otSK.DP.ECKA)和一次性公钥(otPK.DP.ECKA)。The contract management data preparation server SM-DP+ generates a one-time public-private key pair including a one-time private key (otSK.DP.ECKA) and a one-time public key (otPK.DP.ECKA).
签约管理数据准备服务器SM-DP+根据多个eUICC的多个预置公钥和签约管理数据准备服务器的一次性私钥(otSK.DP.ECKA)生成多个eUICC对应的多个会话密钥(session keys),在此称其为第一会话密钥。对于同一等待配置文件下载命令所对应的多个profile所使用的签约管理数据准备服务器的一次性公私钥对均相同,而不同等待配置文件下载命令所对应的多个profile所使用的签约管理数据准备服务器的一次性公私钥对不相同。The contract management data preparation server SM-DP+ generates a plurality of session keys corresponding to the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs and the one-time private key (otSK.DP.ECKA) of the subscription management data preparation server (session) Keys), referred to herein as the first session key. The one-time public-private key pair of the subscription management data preparation server used by the plurality of profiles corresponding to the same waiting profile download command is the same, and the subscription management data preparation used by the plurality of profiles corresponding to the different waiting profile download commands is prepared. The server's one-time public and private key pairs are not the same.
签约管理数据准备服务器SM-DP+针对每个eUICC,至少根据上述生成的一次性公钥和该eUICC的预置公钥生成签约管理数据准备服务器数字签名,在此称其为签约管理数据准备服务器第二数字签名(DP_sign2)。因此,针对多个eUICC,签约管理数据准备服务器SM-DP生成相应多个DP_sign2。The subscription management data preparation server SM-DP+ generates, for each eUICC, a digital signature of the subscription management data preparation server according to at least the generated one-time public key and the preset public key of the eUICC, which is referred to herein as a subscription management data preparation server. Two digital signatures (DP_sign2). Therefore, for a plurality of eUICCs, the contract management data preparation server SM-DP generates a corresponding plurality of DP_sign2.
对第一服务器SM-SR+发送的多个eUICC的多个预置公钥进行哈希运算,生成分别对应多个eUICC的多个预置公钥的哈希值。The plurality of preset public keys of the plurality of eUICCs sent by the first server SM-SR+ are hashed to generate hash values of the plurality of preset public keys respectively corresponding to the plurality of eUICCs.
签约管理数据准备服务器SM-DP+至少根据每个eUICC对应的第一会话密钥以及相应配置文件profile(例如,保护的配置文件)生成绑定配置文件 包。因此,针对多个eUICC,则生成多个相应绑定配置文件包。该绑定配置文件包是由签约管理数据准备服务器SM-DP+生成,通过与eUICC之间的密钥协商(key agreement),即通过密钥协商生成第一会话密钥(session keys),将一个保护的配置文件包与一个特定的eUICC进行关联,每个绑定配置文件包是由连续的TLV(Tag Length Value)命令组成,包括如下TLV命令:初始化安全通道数据块(‘InitialiseSecureChannel’block)、配置ISDP(Issuer Security Domain Profile)数据块(‘ConfigureISDP’block)、存储元数据数据块(‘StoreMetadata’block)及配置文件保护密钥数据块(‘Profile Protection Keys’block)和保护的配置文件包TLV命令(SCP03t payload TLVs of the Protected profile package),其中,数据块配置ISDP数据块、存储元数据数据块、及配置文件保护密钥数据块(可选的,当签约管理数据准备服务器SM-DP+生成配置文件密钥时)通过第一会话密钥(session keys)进行加密和完整性保护。The subscription management data preparation server SM-DP+ generates a binding configuration file according to at least a first session key corresponding to each eUICC and a corresponding profile profile (for example, a protected profile). package. Therefore, for multiple eUICCs, multiple corresponding binding profile packages are generated. The binding configuration file package is generated by the subscription management data preparation server SM-DP+, and through a key agreement with the eUICC, that is, a first session key is generated by key negotiation, and one is The protected configuration file package is associated with a specific eUICC. Each binding configuration file package is composed of consecutive TLV (Tag Length Value) commands, including the following TLV commands: initializing the secure channel data block ('InitialiseSecureChannel'block), Configure ISDP (Issuer Security Domain Profile) data block ('ConfigureISDP' block), store metadata data block ('StoreMetadata' block), and profile protection key data block ('Profile Protection Keys' block) and protected configuration file package. SCP03t payload TLVs of the Protected profile package, wherein the data block configures an ISDP data block, a storage metadata data block, and a configuration file protection key data block (optional, when the subscription management data preparation server SM-DP+ When generating the profile key) Encryption and integrity guarantees through the first session keys .
签约管理数据准备服务器SM-DP+将多个eUICC的预置公钥的哈希值分别对应存放在多个绑定配置文件包的初始化安全通道(Initialise Secure Channel)数据块里,该初始化安全通道数据块中至少还包括签约管理数据准备服务器一次性公钥(otPK.DP.ECKA)、签约管理数据准备服务器数字证书的公钥(PK.DPpb.ECDSA)、签约管理数据准备服务器第二数字签名(DP_sign2)和对应eUICC的预置公钥的哈希值。绑定配置文件包的具体生成过程详见图7及相关文字说明。The subscription management data preparation server SM-DP+ stores the hash values of the preset public keys of the plurality of eUICCs in the Initialise Secure Channel data blocks of the plurality of binding configuration file packages, and the initialization security channel data is initialized. The block further includes at least a subscription management data preparation server one-time public key (otPK.DP.ECKA), a public key of the contract management data preparation server digital certificate (PK.DPpb.ECDSA), and a second digital signature of the contract management data preparation server ( DP_sign2) and the hash value of the preset public key corresponding to eUICC. The specific generation process of the binding configuration file package is shown in Figure 7 and related text descriptions.
步骤S107,签约管理数据准备服务器SM-DP+将多个绑定配置文件包发送给第一服务器SM-SR+。In step S107, the subscription management data preparation server SM-DP+ sends a plurality of binding configuration file packages to the first server SM-SR+.
步骤S108,第一服务器SM-SR+将获取的多个绑定配置文件包存储于第一数据库。需要说明的是,由于第一数据库中的多个eUICC的预置公钥的哈希值和该多个eUICC身份标识EID相对应存储,因此第一服务器SM-SR+能够根据eUICC身份标识EID获取对应的eUICC的预置公钥的哈希值,进而根 据eUICC的预置公钥的哈希值获取对应的初始化安全通道数据块中存储的相同预置公钥的哈希值的绑定配置文件包,具体过程详见图8及相关文字说明。Step S108: The first server SM-SR+ stores the acquired multiple binding configuration file packages in the first database. It should be noted that, because the hash value of the preset public key of the multiple eUICCs in the first database is correspondingly stored and the multiple eUICC identity identifiers EID, the first server SM-SR+ can obtain the corresponding information according to the eUICC identity identifier EID. The hash value of the pre-public key of the eUICC, and then the root According to the hash value of the preset public key of the eUICC, the binding configuration file package of the hash value of the same preset public key stored in the corresponding security channel data block is obtained, and the specific process is shown in FIG. 8 and related text description.
图4为本发明实施例一提供的一种配置文件profile的批量下载方法示意图,如图4所示,本发明实施例一提供了eUICC从第一服务器下载绑定配置文件包并实现安装的工作过程及原理包括步骤S201-步骤S219:FIG. 4 is a schematic diagram of a batch downloading method of a profile profile according to Embodiment 1 of the present invention. As shown in FIG. 4, the first embodiment of the present invention provides an eUICC to download a binding profile package from a first server and implement installation. The process and principle include step S201 - step S219:
步骤S201,本地配置文件助手LPA对eUICC发送随机数获取请求。In step S201, the local profile assistant LPA sends a random number acquisition request to the eUICC.
步骤S202,eUICC接收该随机数获取请求,并生成eUICC随机数(eUICC_challenge)。Step S202, the eUICC receives the random number acquisition request, and generates an eUICC random number (eUICC_challenge).
步骤S203,eUICC至少将eUICC随机数(eUICC_challenge)、eUICC信息集1(eUICC_info_1)发送给本地配置文件助手LPA;其中,eUICC信息集1(eUICC_info_1)包括eUICC所支持的数字证书的格式、在后续验证过程中支持的签名算法、规范版本号等。Step S203: The eUICC sends at least the eUICC random number (eUICC_challenge) and the eUICC information set 1 (eUICC_info_1) to the local profile assistant LPA; wherein the eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, and is subsequently verified. The signature algorithm, specification version number, etc. supported in the process.
步骤S204,本地配置文件助手LPA与第一服务器SM-SR+建立第二https连接,以便对后续交互信令进行加密和完整性保护;本地配置文件助手LPA通过第二https连接至少将eUICC随机数(eUICC_challenge)、eUICC信息集1(eUICC_info_1)、第一服务器域名(SM-SR+addr)发送给第一服务器SM-SR+;需要说明的是,本地配置文件助手LPA已预先获知第一服务器域名(SM-SR+addr),例如,LPA中预置第一服务器域名(在eUICC终端出厂时),或在eUICC终端中预置第一服务器域名供LPA接入第一服务器SM-SR+时调用。Step S204, the local profile assistant LPA establishes a second https connection with the first server SM-SR+ to perform encryption and integrity protection on the subsequent interaction signaling; the local profile assistant LPA connects at least the eUICC random number through the second https connection ( eUICC_challenge), the eUICC information set 1 (eUICC_info_1), and the first server domain name (SM-SR+addr) are sent to the first server SM-SR+; it should be noted that the local configuration file assistant LPA has previously learned the first server domain name (SM) -SR+addr), for example, when the first server domain name is preset in the LPA (when the eUICC terminal is shipped), or when the first server domain name is preset in the eUICC terminal for the LPA to access the first server SM-SR+.
步骤S205,第一服务器SM-SR+对本地配置文件助手LPA发送的第一服务器域名(SM-SR+addr)、eUICC信息集1(eUICC_info_1)进行验证,当验证成功后,生成第二交互标识(TransactionID_2)和第一服务器第数字签名,在此称其为第一服务器第二数字签名(SR_sign2)、第一服务器第二随机数(SR_challenge_2),如果上述任何验证失败,则回复错误信息提示并结束操 作;其中,第一服务器第二随机数(SR_challenge_2)由第一服务器SM-SR+生成;第一服务器第二数字签名(SR_sign2)由第一服务器SM-SR+至少根据eUICC随机数(eUICC_challenge)、第一服务器第二随机数(SR_challenge_2)、第二交互标识(TransactionID_2)、第一服务器域名(SM-SR+addr)生成。In step S205, the first server SM-SR+ verifies the first server domain name (SM-SR+addr) and eUICC information set 1 (eUICC_info_1) sent by the local profile assistant LPA, and after the verification succeeds, generates a second interaction identifier ( TransactionID_2) and the first server digital signature, here referred to as the first server second digital signature (SR_sign2), the first server second random number (SR_challenge_2), if any of the above verification fails, the error message prompts and ends Fuck The first server second random number (SR_challenge_2) is generated by the first server SM-SR+; the first server second digital signature (SR_sign2) is determined by the first server SM-SR+ according to at least the eUICC random number (eUICC_challenge), A server second random number (SR_challenge_2), a second interaction identifier (TransactionID_2), and a first server domain name (SM-SR+addr) are generated.
步骤S206,第一服务器SM-SR+至少将第二交互标识(TransactionID_2)、第一服务器第二随机数(SR_challenge_2)、第一服务器第二数字签名(SR_sign2)、第一服务器数字证书(CERT.SR.ECDSA)、椭圆曲线类型(Curve To Be Used,此处指代第一服务器选定的密钥参数参考值)发送给本地配置文件助手LPA。Step S206, the first server SM-SR+ at least the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), the first server second digital signature (SR_sign2), the first server digital certificate (CERT.SR) .ECDSA), Curve To Be Used (here referred to as the key parameter reference value selected by the first server) is sent to the local profile assistant LPA.
步骤S207,本地配置文件助手LPA将第二交互标识(TransactionID_2)、第一服务器第二随机数(SR_challenge_2)、第一服务器第二数字签名(SR_sign2)、第一服务器数字证书(CERT.SR.ECDSA)、椭圆曲线类型转发给eUICC。Step S207, the local profile assistant LPA sets a second interaction identifier (TransactionID_2), a first server second random number (SR_challenge_2), a first server second digital signature (SR_sign2), and a first server digital certificate (CERT.SR.ECDSA). ), elliptic curve type is forwarded to eUICC.
步骤S208,eUICC对第一服务器数字证书(CERT.SR.ECDSA)、第一服务器第二数字签名(SR_sign2)进行验证,若验证成功,则对eUICC认证成功,并生成eUICC数字签名,在此称其为eUICC第一数字签名(eUICCi_Sign1),该eUICC第一数字签名(eUICCi_Sign1)至少根据第二交互标识(TransactionID_2)、第一服务器第二随机数(SR_challenge_2)、第一服务器域名(SM-SR+addr)和eUICC信息集2(eUICC_info_2)生成。Step S208, the eUICC verifies the first server digital certificate (CERT.SR.ECDSA) and the first server second digital signature (SR_sign2). If the verification succeeds, the eUICC authentication succeeds, and the eUICC digital signature is generated, which is referred to herein. It is an eUICC first digital signature (eUICCi_Sign1), and the eUICC first digital signature (eUICCi_Sign1) is based at least on the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), and the first server domain name (SM-SR+) Addr) and eUICC information set 2 (eUICC_info_2) are generated.
步骤S209,eUICC至少将第二交互标识(TransactionID_2)、第一服务器域名(SM-SR+addr)、终端信息(Device_info)、eUICC信息集2(eUICC_info_2)、eUICC第一数字签名(eUICCi_Sign1)、eUICC数字证书(CERT_EUICC_ECDSA)、eUICC制造商数字证书(CERT_EUM_ECDSA)发送给本地配置文件助手LPA。Step S209, the eUICC at least the second interaction identifier (TransactionID_2), the first server domain name (SM-SR+addr), the terminal information (Device_info), the eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1), eUICC The digital certificate (CERT_EUICC_ECDSA) and the eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the local profile assistant LPA.
步骤S210,本地配置文件助手LPA至少将第二交互标识(TransactionID_2)、第一服务器域名(SM-SR+addr)、终端信息(Device_info)、 eUICC信息集2(eUICC_info_2)、eUICC第一数字签名(eUICCi_Sign1)、eUICC数字证书(CERT_EUICC_ECDSA)、eUICC制造商数字证书(CERT_EUM_ECDSA)发送给第一服务器。Step S210: The local profile assistant LPA sets at least a second interaction identifier (TransactionID_2), a first server domain name (SM-SR+addr), terminal information (Device_info), The eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1), the eUICC digital certificate (CERT_EUICC_ECDSA), and the eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the first server.
步骤S211,第一服务器SM-SR+对eUICC制造商数字证书(CERT_EUM_ECDSA)、eUICC数字证书(CERT_EUICC_ECDSA)、eUICC第一数字签名(eUICCi_Sign1)进行验证,若验证成功,则对eUICC认证成功,则检验第一数据库中是否存在与eUICC数字证书中包含的eUICC身份标识EID相同的EID,若存在,则获取与eUICC身份标识EID对应的eUICC的预置公钥的哈希值,进而利用eUICC的预置公钥的哈希值确定与eUICC对应的绑定配置文件包(确定过程详见图8及相关文字说明),如果上述任何验证失败,则回复错误信息提示并结束操作。Step S211, the first server SM-SR+ verifies the eUICC manufacturer digital certificate (CERT_EUM_ECDSA), the eUICC digital certificate (CERT_EUICC_ECDSA), and the eUICC first digital signature (eUICCi_Sign1). If the verification succeeds, the eUICC authentication succeeds, and the verification is performed. Whether the EID of the eUICC identity EID included in the eUICC digital certificate is the same as the EID of the eUICC, and if so, the hash value of the preset public key of the eUICC corresponding to the eUICC identity EID is obtained, and then the preset of the eUICC is utilized. The hash value of the key determines the binding configuration file package corresponding to the eUICC (see Figure 8 and related text description for the determination process). If any of the above verification fails, the error message prompts and the operation ends.
步骤S212,第一服务器SM-SR+至少将对应eUICC的绑定配置文件包发送给本地配置文件助手LPA;其中,该绑定配置文件包至少包含签约管理数据准备服务器一次性公钥(otPK.DP.ECKA)、签约管理数据准备服务器数字证书公钥(PK.DP.ECDSA)、签约管理数据准备服务器第二数字签名(DP_sign2)、eUICC的预置公钥的哈希值。Step S212, the first server SM-SR+ sends at least the binding configuration file package corresponding to the eUICC to the local configuration file assistant LPA; wherein the binding configuration file package includes at least the one-time public key of the subscription management data preparation server (otPK.DP) .ECKA), the contract management data preparation server digital certificate public key (PK.DP.ECDSA), the contract management data preparation server second digital signature (DP_sign2), and the hash value of the eUICC preset public key.
步骤S213,本地配置文件助手LPA通过反复发起加载绑定配置文件包功能(“ES10b.LoadBoundProfilePackage”function)将该绑定配置文件包的不同数据块发送给eUICC,包括初始化安全通道数据块/初始化安全通道数据块功能、配置ISDP数据块/配置ISDP功能、存储元数据数据块/存储元数据功能以及配置文件保护密钥数据块/配置文件保护密钥功能和配置文件元素。Step S213, the local configuration file assistant LPA sends the different data blocks of the binding configuration file package to the eUICC by repeatedly initiating the load binding configuration file package function ("ES10b.LoadBoundProfilePackage" function), including initializing the secure channel data block/initialization security. Channel data block function, configuration ISDP data block/configuration ISDP function, storage metadata data block/storage metadata function, and configuration file protection key data block/profile protection key function and profile element.
步骤S214,eUICC在接收到初始化安全通道数据块后,eUICC利用安全通道数据块中的签约管理数据准备服务器的数字证书公钥(PK.DPpb.ECDSA)对安全通道数据块中的签约管理数据准备服务器第二数字签名(DP_sign2)进行验证(即对签约管理数据准备服务器第二数字签名(DP_sign2)中保护的签约管理数据准备服务器一次性公钥(otPK.DP.ECKA)进行完整性验证),若 验证成功,则根据对应的eUICC的预置私钥(SK_eUICCi_ECKA)以及签约管理数据准备服务器一次性公钥(otPK.DP.ECKA)生成第一会话密钥,并利用第一会话密钥对该绑定配置文件包中加密的数据块进行解密,进而完成安装过程。Step S214, after receiving the initial secure channel data block, the eUICC prepares the subscription management data in the secure channel data block by using the digital certificate public key (PK.DPpb.ECDSA) of the subscription management data preparation server in the secure channel data block. The server second digital signature (DP_sign2) performs verification (ie, integrity verification is performed on the subscription management data preparation server one-time public key (otPK.DP.ECKA) protected in the second digital signature (DP_sign2) of the subscription management data preparation server), If If the verification is successful, the first session key is generated according to the preset private key (SK_eUICCi_ECKA) of the corresponding eUICC and the one-time public key (otPK.DP.ECKA) of the subscription management data preparation server, and is tied by the first session key. The encrypted data block in the configuration file package is decrypted to complete the installation process.
步骤S215,eUICC对本地配置文件助手LPA发送配置文件安装结果(Profile Installation Result)。In step S215, the eUICC sends a profile installation result (Profile Installation Result) to the local profile assistant LPA.
步骤S216,本地配置文件助手LPA将配置文件安装结果转发给第一服务器SM-SR+。In step S216, the local profile assistant LPA forwards the configuration file installation result to the first server SM-SR+.
步骤S217,第一服务器SM-SR+在接收到配置文件安装结果后,发送确认消息给本地配置文件助手LPA。Step S217, after receiving the configuration file installation result, the first server SM-SR+ sends an acknowledgement message to the local profile assistant LPA.
步骤S218,本地配置文件助手LPA发送列表移除告知命令(RemoveNotificationFromList)给eUICC。In step S218, the local profile assistant LPA sends a list removal notification command (RemoveNotificationFromList) to the eUICC.
步骤219,eUICC接收列表移除告知命令(RemoveNotificationFromList),删除配置文件安装结果。In step 219, the eUICC receives the list removal notification command (RemoveNotificationFromList) and deletes the configuration file installation result.
实施例二 Embodiment 2
本发明实施例二提供了一种配置文件profile的批量获取、下载方法,主要包括两个工作阶段第一阶段和第二阶段,第一阶段为配置文件profile的批量获取,第二阶段为配置文件profile的批量下载。The second embodiment of the present invention provides a method for batch obtaining and downloading a profile profile, which mainly includes a first phase and a second phase of two work phases. The first phase is a batch acquisition of a profile profile, and the second phase is a configuration file. Batch download of profiles.
图5为本发明实施例二提供的一种配置文件profile的批量获取方法示意图,如图5所示,本发明实施例二提供了第一服务器SM-DP+从签约管理数据准备服务器SM-SR+批量获取多个绑定配置文件包的工作过程及原理包括步骤S101’-步骤S108’。FIG. 5 is a schematic diagram of a method for obtaining a profile profile in batches according to Embodiment 2 of the present invention. As shown in FIG. 5, the second embodiment of the present invention provides a first server SM-DP+ slave subscription management data preparation server SM-SR+ batch. The working process and principle of acquiring multiple binding configuration file packages includes step S101'-step S108'.
步骤S101’,第一服务器SM-SR+对签约管理数据准备服务器SM-DP+发起并建立第一https连接,以便对后续交互信令进行加密和完整性保护;第一服务器SM-SR+通过第一https连接对签约管理数据准备服务器SM-DP+发送 至少包括签约管理数据准备服务器域名(SM-DP+addr)、第一服务器第一随机数(SR_challenge_1)、eUICC信息集1(eUICC_info_1)在内的信息。Step S101', the first server SM-SR+ initiates and establishes a first https connection to the subscription management data preparation server SM-DP+ to perform encryption and integrity protection on the subsequent interaction signaling; the first server SM-SR+ passes the first https Connection to the contract management data preparation server SM-DP+ transmission At least the information including the contract management data preparation server domain name (SM-DP+addr), the first server first random number (SR_challenge_1), and the eUICC information set 1 (eUICC_info_1).
其中,第一服务器第一随机数(SR_challenge_1)由第一服务器SM-SR+产生,具有唯一性和随机性,能够保证第一服务器SM-SR+与签约管理数据准备服务器SM-DP+之间交互信息的新鲜性;eUICC信息集1(eUICC_info_1)包括eUICC所支持的数字证书的格式、在后续验证过程中支持的签名算法、规范版本号等。The first server first random number (SR_challenge_1) is generated by the first server SM-SR+, and has uniqueness and randomness, and can ensure interaction information between the first server SM-SR+ and the subscription management data preparation server SM-DP+. Freshness; eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, the signature algorithm supported in the subsequent verification process, the specification version number, and the like.
步骤S102’,签约管理数据准备服务器SM-DP+验证第一服务器SM-SR+发送的签约管理数据准备服务器域名(SM-DP+addr)(验证该域名是否与签约管理数据准备服务器SM-DP+对应)以及验证eUICC信息集1(eUICC_info_1)中的内容,若验证成功,则生成第一交互标识(TransactionID_1)、签约管理数据准备服务器随机数(DP_challenge)和签约管理数据准备服务器第一数字签名(DP_sign1);其中,该签约管理数据准备服务器第一数字签名(DP_sign1)是签约管理数据准备服务器SM-DP+至少根据第一服务器第一随机数(SR_challenge_1)、签约管理数据准备服务器随机数(DP_challenge)、签约管理数据准备服务器域名(SM-DP+addr)以及第一交互标识(TransactionID_1)生成;若签约管理数据准备服务器域名(SM-DP+addr)和eUICC信息集1(eUICC_info_1)验证失败,则对第一服务器SM-SR+发送错误信息提示,并结束操作。Step S102', the subscription management data preparation server SM-DP+ verifies the subscription management data preparation server domain name (SM-DP+addr) sent by the first server SM-SR+ (verifies whether the domain name corresponds to the subscription management data preparation server SM-DP+) And verifying the content in the eUICC information set 1 (eUICC_info_1), if the verification is successful, generating a first interaction identifier (TransactionID_1), a contract management data preparation server random number (DP_challenge), and a contract management data preparation server first digital signature (DP_sign1) The contract management data preparation server first digital signature (DP_sign1) is a contract management data preparation server SM-DP+ at least according to the first server first random number (SR_challenge_1), the contract management data preparation server random number (DP_challenge), signing Management data preparation server domain name (SM-DP+addr) and first interaction identifier (TransactionID_1) generation; if the subscription management data preparation server domain name (SM-DP+addr) and eUICC information set 1 (eUICC_info_1) fail to be verified, then A server SM-SR+ sends an error message and ends the operation.
步骤S103’,签约管理数据准备服务器SM-DP+至少将第一交互标识(TransactionID_1),签约管理数据准备服务器随机数(DP_challenge),签约管理数据准备服务器第一数字签名(DP_sign1),签约管理数据准备服务器域名(SM-DP+addr),签约管理数据准备服务器数字证书(CERT.DP.ECDSA),椭圆曲线类型通过第一https连接发送给第一服务器SM-SR+。Step S103', the subscription management data preparation server SM-DP+ at least the first interaction identifier (TransactionID_1), the contract management data preparation server random number (DP_challenge), the contract management data preparation server first digital signature (DP_sign1), and the contract management data preparation The server domain name (SM-DP+addr), the contract management data preparation server digital certificate (CERT.DP.ECDSA), and the elliptic curve type is sent to the first server SM-SR+ through the first https connection.
步骤S104’,第一服务器SM-SR+对接收到的签约管理数据准备服务器数字证书(CERT.DP.ECDSA)和签约管理数据准备服务器第一数字签名 (DP_sign1)进行验证,若验证成功,则对签约数据准备服务器SM-DP认证成功,并生成第一服务器第一数字签名(SR_sign1);其中,第一服务器第一数字签名(SR_sign1)为第一服务器SM-SR+至少根据多个eUICC的多个预置公钥(PK.eUICC1.ECKA……PK.eUICCn.ECKA)、匹配信息(matchingID或Activation Code Token)、第一交互标识(TransactionID_1)、签约管理数据准备服务器随机数(DP_challenge)、签约管理数据准备服务器域名(SM-DP+addr)、终端信息(Device_info)、eUICC信息集2(eUICC_info_2)生成;其中,该终端信息(Device_info)至少包括终端能力,如所支持的网络接入方式(2G/3G/4G)等,eUICC信息集2(eUICC_info_2)中至少包括eUICC能力信息,如支持的规范版本,存储能力等。Step S104', the first server SM-SR+ prepares the server digital certificate (CERT.DP.ECDSA) and the contract management data preparation server first digital signature for the received contract management data. (DP_sign1) performs verification. If the verification is successful, the authentication of the subscription data preparation server SM-DP is successful, and the first digital signature of the first server (SR_sign1) is generated; wherein the first digital signature of the first server (SR_sign1) is the first The server SM-SR+ is based on at least a plurality of preset public keys (PK.eUICC1.ECKA...PK.eUICCn.ECKA), matching information (matchingID or Activation Code Token), first interaction identifier (TransactionID_1), and subscription of a plurality of eUICCs. The management data preparation server random number (DP_challenge), the subscription management data preparation server domain name (SM-DP+addr), the terminal information (Device_info), and the eUICC information set 2 (eUICC_info_2) are generated; wherein the terminal information (Device_info) includes at least the terminal Capabilities, such as supported network access methods (2G/3G/4G), etc., eUICC information set 2 (eUICC_info_2) includes at least eUICC capability information, such as supported specification versions, storage capabilities, and the like.
具体的该签约管理数据准备服务器第一数字签名(DP_sign1)的生成以及该第一服务器SM-SR+对该签约管理数据准备服务器第一数字签名(DP_sign1)的验证原理,参见上文第一设备和第二设备进行双向认证过程。该第一服务器SM-SR+对该签约管理数据准备服务器第一数字签名(DP_sign1)的具体验证过程,需要根据具体签名算法进行验证,本发明实施例采用的是椭圆曲线签名算法ECDSA(Curve To Be Used)。Specifically, the signing management data preparation server generates a first digital signature (DP_sign1) and the first server SM-SR+ validates the first digital signature (DP_sign1) of the subscription management data preparation server, see the first device and The second device performs a two-way authentication process. The specific verification process of the first server SM-SR+ for the first digital signature (DP_sign1) of the subscription management data preparation server needs to be verified according to a specific signature algorithm. The embodiment of the present invention adopts an elliptic curve signature algorithm ECDSA (Curve To Be). Used).
步骤S105’,第一服务器SM-SR+至少将第一交互标识(TransactionID_1)、多个eUICC的多个预置公钥、签约管理数据准备服务器域名(SM-DP+addr)、匹配信息(matchingID或Activation Code Token)、终端信息(Device_info)、eUICC信息集2(eUICC_info_2)、第一服务器第一数字签名(SR_sign1)、第一服务器数字证书(CERT.SR.ECDSA)通过第一https连接发送给签约管理数据准备服务器SM-DP+。Step S105', the first server SM-SR+ at least the first interaction identifier (TransactionID_1), the plurality of preset public keys of the plurality of eUICCs, the subscription management data preparation server domain name (SM-DP+addr), and the matching information (matchingID or Activation Code Token), terminal information (Device_info), eUICC information set 2 (eUICC_info_2), first server first digital signature (SR_sign1), first server digital certificate (CERT.SR.ECDSA) are sent to the contract via the first https connection Manage the data preparation server SM-DP+.
由以上内容可知,在实施例二中,步骤S101’-步骤S105’与实施例一中步骤S101-步骤S105相同。As apparent from the above, in the second embodiment, steps S101' to S105' are the same as steps S101 to S105 in the first embodiment.
步骤S106’,签约管理数据准备服务器SM-DP+对第一服务器数字证书(CERT.SR.ECDSA)、第一服务器第一数字签名(SR_sign1)进行验证,若 验证通过,则对第一服务器SM-SR+认证成功,并根据eUICC信息集2(eUICC_info_2)和终端信息(Device_info)进行可用性(eligibility)验证,如果以上任何验证失败,则对第一服务器SM-DP+发送错误信息提示并结束操作;若均验证成功,检验签约管理数据准备服务器SM-DP+是否存在与匹配信息(matchingID或Activation Code Token)对应的等待配置文件下载命令,若存在,则获取与匹配信息对应的多个profile(未保护的配置文件包或保护的配置文件包)。Step S106', the contract management data preparation server SM-DP+ verifies the first server digital certificate (CERT.SR.ECDSA) and the first server first digital signature (SR_sign1), if After the verification is passed, the first server SM-SR+ is successfully authenticated, and the eligibility verification is performed according to the eUICC information set 2 (eUICC_info_2) and the terminal information (Device_info). If any of the above verification fails, the first server SM-DP+ Send the error message prompt and end the operation; if the verification is successful, check whether the subscription management data preparation server SM-DP+ has a waiting configuration file download command corresponding to the matching information (matchingID or Activation Code Token), and if so, obtain and match the information. Corresponding multiple profiles (unprotected profile packages or protected profile packages).
签约管理数据准备服务器SM-DP+生成多个会话密钥(session keys),在此称该会话密钥为第二会话密钥,该生成的第二会话密钥如生成的随机数,该多个第二会话密钥与多个eUICC分别对应,并用多个eUICC的多个预置公钥对多个第二会话密钥分别进行加密获得多个加密的第二会话密钥(encrypted session keys)。The subscription management data preparation server SM-DP+ generates a plurality of session keys, where the session key is referred to as a second session key, and the generated second session key is a generated random number, the plurality of The second session key is respectively associated with the plurality of eUICCs, and the plurality of second session keys are separately encrypted by using the plurality of preset public keys of the plurality of eUICCs to obtain a plurality of encrypted second session keys (encrypted session keys).
签约管理数据准备服务器SM-DP+针对每个eUICC,至少根据加密的第二会话密钥(encrypted session keys)和该eUICC的预置公钥生成数字签名,在此称其为签约管理数据准备服务器第三数字签名(DP_sign3)。因此,针对多个eUICC,签约管理数据准备服务器SM-DP生成相应多个DP_sign3。The contract management data preparation server SM-DP+ generates a digital signature for each eUICC based on at least the encrypted second session key (encrypted session keys) and the preset public key of the eUICC, which is referred to herein as a contract management data preparation server. Three digital signatures (DP_sign3). Therefore, for a plurality of eUICCs, the contract management data preparation server SM-DP generates a corresponding plurality of DP_sign3s.
对该多个eUICC的多个预置公钥进行哈希运算,生成分别对应多个eUICC的多个预置公钥的哈希值。Performing a hash operation on the plurality of preset public keys of the plurality of eUICCs to generate hash values of the plurality of preset public keys respectively corresponding to the plurality of eUICCs.
签约管理数据准备服务器SM-DP+至少根据每个eUICC对应的第二会话密钥以及相应配置文件profile(例如,保护的配置文件)生成绑定配置文件包。因此,针对多个eUICC,则生成多个相应绑定配置文件包。每个绑定配置文件包是由连续的TLV(Tag Length Value)命令组成,包括如下TLV命令:初始化安全通道数据块(‘InitialiseSecureChannel’block)、配置ISDP数据块(‘ConfigureISDP’block)、存储元数据数据块(‘StoreMetadata’block)及配置文件保护密钥数据块(‘Profile Protection Keys’block)和保护的配置文件包TLV命令(SCP03t payload TLVs of the Protected profile  package),其中,数据块配置ISDP数据块、存储元数据数据块及配置文件保护密钥数据块(可选的,当签约管理数据准备服务器SM-DP+生成配置文件密钥时)通过第二会话密钥(session keys)进行加密和完整性保护。The subscription management data preparation server SM-DP+ generates a binding configuration file package according to at least a second session key corresponding to each eUICC and a corresponding profile profile (eg, a protected profile). Therefore, for multiple eUICCs, multiple corresponding binding profile packages are generated. Each binding configuration file package is composed of consecutive TLV (Tag Length Value) commands, including the following TLV commands: initializing the secure channel data block ('InitialiseSecureChannel' block), configuring the ISDP data block ('ConfigureISDP'block), and storing the element Data block ('StoreMetadata' block) and profile protection key data block ('Profile Protection Keys' block) and protected profile package TLV command (SCP03t payload TLVs of the Protected profile Package), wherein the data block configures the ISDP data block, the storage metadata data block, and the configuration file protection key data block (optionally, when the subscription management data preparation server SM-DP+ generates the configuration file key) passes the second session Session keys for encryption and integrity protection.
签约管理数据准备服务器SM-DP+将多个eUICC的多个预置公钥的哈希值分别对应存放在多个绑定配置文件包的初始化安全通道(Initialise Secure Channel)数据块中;该初始化安全通道数据块中至少还包括签约管理数据准备服务器数字证书公钥(PK.DPpd.ECDSA)、签约管理数据准备服务器第三数字签名(DP_sign3)、加密的第二会话密钥。该绑定配置文件包的具体生成过程详见图7及相关文字说明。The contract management data preparation server SM-DP+ stores the hash values of the plurality of preset public keys of the plurality of eUICCs in the Initialise Secure Channel data block of the plurality of binding configuration files, respectively; The channel data block further includes at least a subscription management data preparation server digital certificate public key (PK.DPpd.ECDSA), a contract management data preparation server third digital signature (DP_sign3), and an encrypted second session key. The specific generation process of the binding configuration file package is shown in Figure 7 and related text descriptions.
步骤S107’,签约管理数据准备服务器SM-DP+将多个绑定配置文件包发送给第一服务器SM-SR+。In step S107', the contract management data preparation server SM-DP+ transmits a plurality of binding configuration file packages to the first server SM-SR+.
步骤S108’,第一服务器SM-SR+将获取的该多个绑定配置文件包存储于第一数据库。需要说明的是,由于第一数据库中的多个eUICC的多个预置公钥的哈希值和该多个eUICC身份标识EID相对应存储,因此第一服务器SM-SR+能够根据eUICC身份标识EID获取对应的eUICC的预置公钥的哈希值,进而根据eUICC的预置公钥的哈希值获取对应的初始化安全通道数据块中存储的相同预置公钥的哈希值的绑定配置文件包,具体过程详见图8及相关文字说明。Step S108', the first server SM-SR+ stores the acquired plurality of binding configuration file packages in the first database. It should be noted that, since the hash values of the multiple preset public keys of the multiple eUICCs in the first database are correspondingly stored and the multiple eUICC identity identifiers EID, the first server SM-SR+ can identify the EID according to the eUICC identity. Obtaining a hash value of the preset public key of the corresponding eUICC, and acquiring a binding configuration of the hash value of the same preset public key stored in the corresponding initialized secure channel data block according to the hash value of the preset public key of the eUICC The file package, the specific process is shown in Figure 8 and related text description.
由以上内容可知,在实施例二中,步骤S107’、步骤S108’与实施例一中步骤S107、步骤S108相同。As apparent from the above, in the second embodiment, steps S107' and S108' are the same as steps S107 and S108 in the first embodiment.
图6为本发明实施例二提供的一种配置文件profile的批量下载方法示意图,如图6所示,本发明实施例二提供了eUICC从第一服务器下载绑定配置文件包并实现安装的工作过程及原理包括步骤S201’-步骤S219’:FIG. 6 is a schematic diagram of a batch downloading method of a configuration file profile according to Embodiment 2 of the present invention. As shown in FIG. 6 , the second embodiment of the present invention provides an eUICC downloading a binding configuration file package from a first server and implementing the installation work. The process and principle include step S201'-step S219':
步骤S201’,本地配置文件助手LPA对eUICC发送随机数获取请求。In step S201', the local profile assistant LPA sends a random number acquisition request to the eUICC.
步骤S202’,eUICC接收该随机数获取请求,并生成eUICC随机数 (eUICC_challenge)。Step S202', the eUICC receives the random number acquisition request, and generates an eUICC random number. (eUICC_challenge).
步骤S203’,eUICC至少将eUICC随机数(eUICC_challenge)、eUICC信息集1(eUICC_info_1)发送给本地配置文件助手LPA;其中,eUICC信息集1(eUICC_info_1)包括eUICC所支持的数字证书的格式、在后续验证过程中支持的签名算法、规范版本号等。Step S203', the eUICC sends at least the eUICC random number (eUICC_challenge) and the eUICC information set 1 (eUICC_info_1) to the local profile assistant LPA; wherein the eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, The signature algorithm, specification version number, etc. supported during the verification process.
步骤S204’,本地配置文件助手LPA与第一服务器SM-SR+建立第二https连接,以便对后续交互信令进行加密和完整性保护;本地配置文件助手LPA通过第二https连接至少将eUICC随机数(eUICC_challenge)、eUICC信息集1(eUICC_info_1)、第一服务器域名(SM-SR+addr)发送给第一服务器SM-SR+;需要说明的是,本地配置文件助手LPA已预先获知第一服务器域名(SM-SR+addr),例如,LPA中预置第一服务器域名(在eUICC终端出厂时),或在eUICC终端中预置第一服务器域名供LPA接入第一服务器SM-SR+时调用。Step S204', the local profile assistant LPA establishes a second https connection with the first server SM-SR+ to perform encryption and integrity protection on the subsequent interaction signaling; the local profile assistant LPA connects at least the eUICC random number through the second https connection. (eUICC_challenge), eUICC information set 1 (eUICC_info_1), and first server domain name (SM-SR+addr) are sent to the first server SM-SR+; it should be noted that the local profile assistant LPA has previously learned the first server domain name ( SM-SR+addr), for example, when the first server domain name is preset in the LPA (when the eUICC terminal is shipped), or when the first server domain name is preset in the eUICC terminal for the LPA to access the first server SM-SR+.
步骤S205’,第一服务器SM-SR+对本地配置文件助手LPA发送的第一服务器域名(SM-SR+addr)、eUICC信息集1(eUICC_info_1)进行验证,当验证成功后,生成第二交互标识(TransactionID_2)、第一服务器第二数字签名(SR_sign2)、第一服务器第二随机数(SR_challenge_2),如果上述任何验证失败,则回复错误信息提示并结束操作;其中,第一服务器第二随机数(SR_challenge_2)由第一服务器SM-SR+生成;第一服务器第二数字签名(SR_sign2)由第一服务器SM-SR+至少根据eUICC随机数(eUICC_challenge)、第一服务器第二随机数(SR_challenge_2)、第二交互标识(TransactionID_2)、第一服务器域名(SM-SR+addr)生成。Step S205 ′, the first server SM-SR+ verifies the first server domain name (SM-SR+addr) and eUICC information set 1 (eUICC_info_1) sent by the local profile assistant LPA, and after the verification succeeds, generates a second interaction identifier. (TransactionID_2), the first server second digital signature (SR_sign2), the first server second random number (SR_challenge_2), if any of the above verification fails, replying with an error message prompting and ending the operation; wherein, the first server second random number (SR_challenge_2) is generated by the first server SM-SR+; the first server second digital signature (SR_sign2) is determined by the first server SM-SR+ according to at least the eUICC random number (eUICC_challenge), the first server second random number (SR_challenge_2), The second interaction identifier (TransactionID_2) and the first server domain name (SM-SR+addr) are generated.
步骤S206’,第一服务器SM-SR+至少将第二交互标识(TransactionID_2)、第一服务器第二随机数(SR_challenge_2)、第一服务器第二数字签名(SR_sign2)、第一服务器数字证书(CERT.SR.ECDSA)、椭圆曲线类型发送给本地配置文件助手LPA。 Step S206', the first server SM-SR+ at least the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), the first server second digital signature (SR_sign2), the first server digital certificate (CERT. SR.ECDSA), elliptic curve type is sent to the local profile assistant LPA.
步骤S207’,本地配置文件助手LPA将第二交互标识(TransactionID_2)、第一服务器第二随机数(SR_challenge_2)、第一服务器第二数字签名(SR_sign2)、第一服务器数字证书(CERT.SR.ECDSA)、椭圆曲线类型转发给eUICC。Step S207', the local profile assistant LPA sets a second interaction identifier (TransactionID_2), a first server second random number (SR_challenge_2), a first server second digital signature (SR_sign2), and a first server digital certificate (CERT.SR. ECDSA), elliptic curve type is forwarded to eUICC.
步骤S208’,eUICC对第一服务器数字证书(CERT.SR.ECDSA)、第一服务器第二数字签名(SR_sign2)进行验证,若验证成功,则对eUICC认证成功,并生成eUICC第一数字签名(eUICCi_Sign1),该eUICC第一数字签名(eUICCi_Sign1)至少根据第二交互标识(TransactionID_2)、第一服务器第二随机数(SR_challenge_2)、第一服务器域名(SM-SR+addr)和eUICC信息集2(eUICC_info_2)生成。Step S208', the eUICC verifies the first server digital certificate (CERT.SR.ECDSA) and the first server second digital signature (SR_sign2). If the verification is successful, the eUICC authentication succeeds, and the eUICC first digital signature is generated ( eUICCi_Sign1), the eUICC first digital signature (eUICCi_Sign1) is based at least on the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), the first server domain name (SM-SR+addr), and the eUICC information set 2 ( eUICC_info_2) is generated.
步骤S209’,eUICC至少将第二交互标识(TransactionID_2)、第一服务器域名(SM-SR+addr)、终端信息(Device_info)、eUICC信息集2(eUICC_info_2)、eUICC第一数字签名(eUICCi_Sign1)、eUICC数字证书(CERT_EUICC_ECDSA)、eUICC制造商数字证书(CERT_EUM_ECDSA)发送给本地配置文件助手LPA。Step S209', the eUICC at least the second interaction identifier (TransactionID_2), the first server domain name (SM-SR+addr), the terminal information (Device_info), the eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1), The eUICC digital certificate (CERT_EUICC_ECDSA) and the eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the local profile assistant LPA.
步骤S210’,本地配置文件助手LPA至少将第二交互标识(TransactionID_2)、第一服务器域名(SM-SR+addr)、终端信息(Device_info)、eUICC信息集2(eUICC_info_2)、eUICC第一数字签名(eUICCi_Sign1)、eUICC数字证书(CERT_EUICC_ECDSA)、eUICC制造商数字证书(CERT_EUM_ECDSA)发送给第一服务器SM-SR+。Step S210', the local profile assistant LPA at least the second interaction identifier (TransactionID_2), the first server domain name (SM-SR+addr), the terminal information (Device_info), the eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1), eUICC digital certificate (CERT_EUICC_ECDSA), eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the first server SM-SR+.
步骤S211’,第一服务器SM-SR+对eUICC制造商数字证书(CERT_EUM_ECDSA)、eUICC数字证书(CERT_EUICC_ECDSA)、eUICC第一数字签名(eUICCi_Sign1)进行验证,若验证成功,则对eUICC认证成功,并检验第一数据库中是否存在与eUICC数字证书(CERT_EUICC_ECDSA)中包含的eUICC身份标识EID相同的EID,若存在,则获取与eUICC身份标识EID对应的eUICC的预置公钥的哈希值,进而 利用eUICC的预置公钥的哈希值确定与eUICC对应的绑定配置文件包(确定过程详见图8及相关文字说明),如果上述任何验证失败,则回复错误信息提示并结束操作。Step S211', the first server SM-SR+ verifies the eUICC manufacturer digital certificate (CERT_EUM_ECDSA), the eUICC digital certificate (CERT_EUICC_ECDSA), and the eUICC first digital signature (eUICCi_Sign1). If the verification is successful, the eUICC authentication succeeds, and the verification is successful. Whether the EID of the eUICC identity EID included in the eUICC digital certificate (CERT_EUICC_ECDSA) is the same as the EID of the eUICC, and if so, the hash value of the preset public key of the eUICC corresponding to the eUICC identity EID is obtained. The binding configuration file package corresponding to the eUICC is determined by using the hash value of the preset public key of the eUICC (the determination process is detailed in FIG. 8 and related text description), and if any of the above verification fails, the error information prompts and the operation ends.
步骤S212’,第一服务器SM-SR+至少将对应eUICC的绑定配置文件包发送给本地配置文件助手LPA;其中,该绑定配置文件包至少包含签约管理数据准备服务器数字证书公钥(PK.DP.ECDSA)、加密的第二会话密钥(encrypted session keys)、签约管理数据准备服务器第三数字签名(DP_sign3)、该eUICC的预置公钥的哈希值。Step S212', the first server SM-SR+ sends at least the binding configuration file package corresponding to the eUICC to the local configuration file assistant LPA; wherein the binding configuration file package includes at least the subscription management data preparation server digital certificate public key (PK. DP.ECDSA), encrypted second session key (encrypted session keys), subscription management data preparation server third digital signature (DP_sign3), hash value of the eUICC's preset public key.
步骤S213’,本地配置文件助手LPA通过反复发起加载绑定配置文件包功能(“ES10b.LoadBoundProfilePackage”function)将该绑定配置文件包的不同数据块发送给eUICC,包括初始化安全通道数据块/初始化安全通道数据块功能、配置ISDP数据块/配置ISDP功能、存储元数据数据块/存储元数据功能以及配置文件保护密钥数据块/配置文件保护密钥功能和配置文件元素。Step S213', the local configuration file assistant LPA sends the different data blocks of the binding configuration file package to the eUICC by repeatedly initiating the load binding configuration file package function ("ES10b.LoadBoundProfilePackage" function), including initializing the secure channel data block/initialization. Secure channel data block function, configure ISDP data block/configuration ISDP function, store metadata data block/storage metadata function, and configuration file protection key data block/profile protection key function and profile element.
由以上内容可知,在实施例二中,步骤S201’-步骤S213’与实施例一中步骤S201-步骤S213分别相同。As apparent from the above, in the second embodiment, the steps S201' to S213' are the same as the steps S201 to S213 in the first embodiment.
步骤S214’,eUICC在接收到初始化安全通道数据块后,eUICC利用安全通道数据块中的签约管理数据准备服务器的数字证书公钥(PK.DPpb.ECDSA)对安全通道数据块中的签约管理数据准备服务器第三数字签名(DP_sign3)进行验证(即对签约管理数据准备服务器第三数字签名(DP_sign3)中的eUICC预置公钥(PK_eUICCi_ECKA)对应的加密的第二会话密钥进行完整性验证),若验证成功,则根据对应的eUICC的预置私钥(SK_eUICCi_ECKA)对对应的加密的第二会话密钥进行解密得到第二会话密钥,再利用第二会话密钥对绑定配置文件包中加密的数据块进行解密,进而完成安装过程;其中,eUICC的预置私钥(SK_eUICCi_ECKA)与eUICC的预置公钥(PK_eUICCi_ECKA)相对应,预置私钥(SK_eUICCi_ECKA)与预置公钥(PK_eUICCi_ECKA)是一对预置公私钥对,在用预置公钥 (PK_eUICCi_ECKA)进行加密后,需要用预置私钥(SK_eUICCi_ECKA)进行解密。Step S214', after receiving the initialization secure channel data block, the eUICC uses the digital certificate public key (PK.DPpb.ECDSA) of the subscription management data preparation server in the secure channel data block to sign the management data in the secure channel data block. Preparing a server third digital signature (DP_sign3) for verification (ie, performing integrity verification on the encrypted second session key corresponding to the eUICC preset public key (PK_eUICCi_ECKA) in the third digital signature (DP_sign3) of the subscription management data preparation server) If the verification is successful, decrypt the corresponding encrypted second session key according to the preset private key (SK_eUICCi_ECKA) of the corresponding eUICC to obtain the second session key, and then use the second session key pair to bind the configuration file package. The encrypted data block is decrypted to complete the installation process; wherein the preset private key (SK_eUICCi_ECKA) of the eUICC corresponds to the preset public key (PK_eUICCi_ECKA) of the eUICC, and the preset private key (SK_eUICCi_ECKA) and the preset public key ( PK_eUICCi_ECKA) is a pair of preset public and private key pairs, using the preset public key After (PK_eUICCi_ECKA) is encrypted, it needs to be decrypted with the preset private key (SK_eUICCi_ECKA).
步骤S215’,eUICC对本地配置文件助手LPA发送配置文件安装结果(Profile Installation Result)。In step S215', the eUICC sends a profile installation result (Profile Installation Result) to the local profile assistant LPA.
步骤S216’,本地配置文件助手LPA将配置文件安装结果转发给第一服务器SM-SR+。In step S216', the local profile assistant LPA forwards the configuration file installation result to the first server SM-SR+.
步骤S217’,第一服务器SM-SR+在接收到配置文件安装结果后,发送确认消息给本地配置文件助手LPA。Step S217', after receiving the configuration file installation result, the first server SM-SR+ sends an acknowledgement message to the local profile assistant LPA.
步骤S218’,本地配置文件助手LPA发送列表移除告知命令(RemoveNotificationFromList)给eUICC。In step S218', the local profile assistant LPA sends a list removal notification command (RemoveNotificationFromList) to the eUICC.
步骤219’,eUICC接收列表移除告知命令(RemoveNotificationFromList),删除配置文件安装结果。由以上内容可知,在实施例二中,步骤S215’-步骤S219’与实施例一中步骤S215-步骤S219分别相同。In step 219', the eUICC receives the list removal notification command (RemoveNotificationFromList) and deletes the configuration file installation result. As apparent from the above, in the second embodiment, steps S215' to S219' are the same as steps S215 to S219 in the first embodiment.
图7为本发明实施例提供的绑定配置文件包的生成过程示意图,如图7所示,签约管理数据准备服务器SM-DP+生成多个绑定配置文件包的过程具体包括步骤S71-步骤S73:FIG. 7 is a schematic diagram of a process of generating a binding configuration file package according to an embodiment of the present invention. As shown in FIG. 7 , the process of generating a plurality of binding configuration file packages by the subscription management data preparation server SM-DP+ includes steps S71-S73. :
步骤S71,签约管理数据准备服务器SM-DP+在与第一服务器SM-SR+建立连接前,根据运营商签约提供的信息(部署第一服务器的业务提供商签约信息)生成对应多个eUICC的多个未保护的配置文件包(unprotected profile package),每个未保护的配置文件包由多个数据块(PETLV1、PETLV2……PETLVn)组成。Step S71: Before the connection with the first server SM-SR+ is established, the subscription management data preparation server SM-DP+ generates multiple corresponding eUICCs according to the information provided by the operator contract (the service provider subscription information of the first server is deployed). Unprotected profile package, each unprotected profile package consists of multiple data blocks (PETLV1, PETLV2...PETLVn).
步骤S72,签约管理数据准备服务器SM-DP+采用多个会话密钥(第一会话密钥或第二会话密钥)或多个配置文件保护密钥(profile protection key)为对应的多个未保护的配置文件包分别进行加密生成多个保护的配置文件包 (protected profile package),生成的保护的配置文件包由多个加密后的数据块(Segment1、Segment2……Segmentn)组成。Step S72, the subscription management data preparation server SM-DP+ adopts multiple session keys (first session key or second session key) or multiple profile protection keys as corresponding multiple unprotected The configuration file package is separately encrypted to generate multiple protected configuration file packages. (protected profile package), the generated protected configuration file package consists of multiple encrypted data blocks (Segment1, Segment2...Segmentn).
可选地,若在签约管理数据准备服务器SM-DP+与第一服务器SM-SR+建立连接前,签约管理数据准备服务器SM-DP+已经生成多个保护的配置文件包,则等待配置文件下载命令与多个保护的配置文件包存在对应关系;若在签约管理数据准备服务器SM-DP+与第一服务器SM-SR+建立连接前,签约管理数据准备服务器SM-DP+未生成多个保护的配置文件包,等待配置文件下载命令与多个未保护的配置文件包存在对应关系。因此,签约管理数据准备服务器SM-DP+可通过等待配置文件下载命令获取多个保护的配置文件包或多个未保护的配置文件包。Optionally, if the subscription management data preparation server SM-DP+ has generated multiple protected configuration file packages before the subscription management data preparation server SM-DP+ establishes a connection with the first server SM-SR+, wait for the configuration file download command and A plurality of protected configuration file packages have a corresponding relationship; if the subscription management data preparation server SM-DP+ establishes a connection with the first server SM-SR+, the subscription management data preparation server SM-DP+ does not generate a plurality of protected configuration file packages. Wait for the configuration file download command to correspond to multiple unprotected configuration file packages. Therefore, the subscription management data preparation server SM-DP+ can acquire a plurality of protected configuration file packages or a plurality of unprotected configuration file packages by waiting for the configuration file download command.
步骤S73,签约管理数据准备服务器SM-DP+在接收到第一服务器SM-SR+发送的匹配信息后,根据匹配信息判断自身是否存在与匹配信息对应的等待配置文件下载命令,若有,则获取与等待配置文件下载命令对应的多个profile(多个保护的配置文件包或多个未保护的配置文件包)。Step S73, after receiving the matching information sent by the first server SM-SR+, the subscription management data preparation server SM-DP+ determines, according to the matching information, whether there is a waiting configuration file download command corresponding to the matching information, and if so, acquires Wait for multiple profiles (multiple protected configuration files or multiple unprotected configuration files) corresponding to the configuration file download command.
签约管理数据准备服务器SM-DP+生成初始化安全通道数据块('Initialise Secure Channel'block,包含明文的TLV命令,如密钥协商相关内容的TLV命令)、配置ISDP数据块('Configure ISDP'block,包含ISDP生成和配置的TLV命令)、存储元数据数据块('Store Metadata'block,包含配置文件的元数据的TLV命令)、配置文件保护密钥数据块('Profile Protection keys'block,包含配置文件保护密钥的TLV命令);其中,初始化安全通道数据块至少包括签约管理数据准备服务器第二数字签名(DP-sign2)或签约管理数据准备服务器第三数字签名(DP-sign3),签约管理数据准备服务器数字证书的公钥(PK.DPpb.ECDSA),签约管理数据准备服务器的一次性公私钥或加密的第二会话密钥,以及签约管理数据准备服务器SM-DP+根据对应eUICC的预置公钥生成的eUICC的预置公钥的哈希值。The contract management data preparation server SM-DP+ generates an initial security channel data block ('Initialise Secure Channel' block, including a plaintext TLV command, such as a TLV command for key agreement related content), and an ISDP data block ('Configure ISDP'block, Contains TLV commands for ISDP generation and configuration), storage metadata blocks ('Store Metadata' block, TLV commands containing metadata for configuration files), and profile protection key blocks ('Profile Protection keys' block, including configuration) a TLV command for protecting a key; wherein the initializing the secure channel data block includes at least a subscription management data preparation server second digital signature (DP-sign2) or a contract management data preparation server third digital signature (DP-sign3), subscription management The public key (PK.DPpb.ECDSA) of the data preparation server digital certificate, the one-time public key or the encrypted second session key of the contract management data preparation server, and the subscription management data preparation server SM-DP+ according to the preset of the corresponding eUICC The hash value of the preset public key of the eUICC generated by the public key.
配置ISDP数据块、存储元数据数据块,以及配置文件保护密钥模块(可 选的,当签约管理数据准备服务器SM-DP+生成配置文件密钥时)均采用对应的会话密钥(第一会话密钥或第二会话密钥)进行加密。Configure ISDP data blocks, store metadata data blocks, and configure file protection key modules ( Optionally, when the subscription management data preparation server SM-DP+ generates the configuration file key, the corresponding session key (the first session key or the second session key) is used for encryption.
签约管理数据准备服务器SM-DP+将上述安全初始化通道数据块、配置ISDP数据块、存储元数据数据块、配置文件保护密钥数据块放在上述保护的匹配文件包(保护的配置文件包SCP03t载荷TLV)前,组成绑定配置文件包。本地配置文件助手LPA在接收到绑定配置文件包后,将绑定配置文件包拆分成不同数据块(如图7中拆分的绑定配置文件包,其具体拆分方式如图),并通过应用协议数据单元命令(APDU command)将数据块依序发送给eUICC。The contract management data preparation server SM-DP+ places the above-mentioned secure initialization channel data block, configuration ISDP data block, storage metadata data block, and configuration file protection key data block in the above-mentioned protected matching file package (protected configuration file package SCP03t payload) Before TLV), the binding configuration package is composed. After receiving the binding configuration file package, the local configuration file assistant LPA splits the binding configuration file package into different data blocks (as shown in Figure 7 for the split configuration file package, the specific split mode is as shown in the figure). The data blocks are sent to the eUICC in sequence through the application protocol data unit command (APDU command).
在一个示例中,拆分绑定配置文件包(Segmented bound profile package,简称SBPP)是由本地配置文件助手LPA生成,本地配置文件助手LPA将每个拆分的部分(segment)通过APDU(应用协议数据单元,英文:ApplicationProtocolDataUnit)命令发送给eUICC,其中每个拆分部分(segment)最多为255bytes(字节)。In one example, the Segmented Bound Profile Package (SBPP) is generated by the Local Profile Assistant LPA, and the Local Profile Assistant LPA passes each split segment through the APDU (Application Protocol). The data unit, English: ApplicationProtocolDataUnit) command is sent to eUICC, where each split segment is up to 255 bytes (bytes).
由于并没有对初始化安全通道进行加密,其包含内容为明文,第一服务器SM-SR+可以根据初始化安全通道中的对应的eUICC的预置公钥的哈希值对绑定配置文件包进行区分,具体区分过程详见图8及相关文字说明。Since the initialization security channel is not encrypted, and the content thereof is plaintext, the first server SM-SR+ can distinguish the binding configuration file package according to the hash value of the preset public key of the corresponding eUICC in the initialization security channel. The specific differentiation process is shown in Figure 8 and related text descriptions.
图8为本发明实施例提供的多个绑定配置文件包区分过程示意图,如图8所示,第一服务器SM-SR+区分第一数据库中多个绑定配置文件包的具体过程及原理为:FIG. 8 is a schematic diagram of a process for distinguishing multiple binding configuration file packages according to an embodiment of the present invention. As shown in FIG. 8, the specific process and principle of the first server SM-SR+ distinguishing multiple binding configuration file packages in the first database is :
在第一数据库中,多个eUICC的预置公钥的哈希值与多个eUICC身份标识EID是对应存储的(如图8中的01部分所示),第一服务器SM-SR+能根据eUICC的预置公钥的哈希值或eUICC身份标识EID获取另一信息,也就是说,第一服务器SM-SR+能够根据eUICC的预置公钥的哈希值得到eUICC身份标识EID,第一服务器SM-SR+也能够根据eUICC身份标识EID得到eUICC的预置公钥的哈希值。 In the first database, the hash value of the preset public key of the plurality of eUICCs is correspondingly stored with the plurality of eUICC identity identifiers EID (as shown in part 01 in FIG. 8), and the first server SM-SR+ can be based on the eUICC The hash value of the preset public key or the eUICC identity EID acquires another information, that is, the first server SM-SR+ can obtain the eUICC identity EID according to the hash value of the preset public key of the eUICC, the first server The SM-SR+ can also obtain the hash value of the preset public key of the eUICC according to the eUICC identity EID.
步骤S81,第一服务器SM-SR+在完成了对eUICC的身份认证后,通过本地配置文件助手LPA接收的eUICC数字证书中获取eUICC身份标识EID,并检验第一数据库中是否存储了该eUICC身份标识EID,若存在,则执行步骤S82,否则对本地配置文件助手LPA发送错误信息提示,并结束操作。Step S81: After completing the identity verification of the eUICC, the first server SM-SR+ obtains the eUICC identity identifier EID from the eUICC digital certificate received by the local profile assistant LPA, and checks whether the eUICC identity identifier is stored in the first database. EID, if yes, execute step S82, otherwise send an error message to the local profile assistant LPA and end the operation.
步骤S82,根据eUICC身份标识EID,查找第一数据库中与该eUICC身份标识EID存在对应关系的该eUICC的预置公钥的哈希值。Step S82: Search for a hash value of the preset public key of the eUICC corresponding to the eUICC identity identifier EID in the first database according to the eUICC identity identifier EID.
步骤S83,根据该eUICC的预置公钥的哈希值查找第一数据库中存储的多个绑定配置文件包的对应初始化安全通道数据块,若某个绑定配置文件包的初始化安全通道数据块中存储了相同eUICC的预置公钥的哈希值,则确定该绑定配置文件包为该eUICC对应的绑定配置文件包,并将该eUICC对应的绑定配置文件发送给对应该eUICC的本地配置文件助手LPA。Step S83, searching for a corresponding initial security channel data block of the plurality of binding configuration file packets stored in the first database according to the hash value of the preset public key of the eUICC, and if the security channel data of the binding configuration file package is initialized The block stores the hash value of the preset public key of the same eUICC, and determines that the binding configuration file package is the binding configuration file package corresponding to the eUICC, and sends the binding configuration file corresponding to the eUICC to the corresponding eUICC. Local Profile Assistant LPA.
举例进行说明,某eUICC终端需从第一服务器SM-SR+的第一数据库中,获得与eUICC终端上eUICC对应的绑定配置文件包,eUICC通过该eUICC终端的LPA向第一服务器SM-SR+发送多个eUICC的多个预置公钥、匹配信息及相关信息,其中,该相关信息至少包括eUICC生成的数字签名(即eUICC第一数字签名)、eUICC数字证书和eUICC制造商数字证书,在第一服务器SM-SR+对该eUICC制造商数字证书、eUICC数字证书及eUICC生成的数字签名验证通过后,则从eUICC数字证书中获取eUICC身份标识EID;第一服务器SM-SR+查找第一数据库,确定第一数据库中的eUICC身份标识EID(例如EID2)与从eUICC数字证书中获取eUICC身份标识EID相同后,则根据eUICC身份标识EID2在第一数据库中查找到该eUICC所对应的eUICC的预置公钥的哈希值2,由于绑定配置文件包2中初始化安全通道数据块中存储了对应的eUICC的预置公钥的哈希值2,因此确定该绑定配置文件包2为该eUICC的对应绑定配置文件包。For example, an eUICC terminal needs to obtain a binding configuration file package corresponding to the eUICC on the eUICC terminal from the first database of the first server SM-SR+, and the eUICC sends the LSI to the first server SM-SR+ through the LPA of the eUICC terminal. a plurality of preset public keys, matching information, and related information of the plurality of eUICCs, wherein the related information includes at least a digital signature generated by the eUICC (ie, an eUICC first digital signature), an eUICC digital certificate, and an eUICC manufacturer digital certificate. After the server SM-SR+ verifies the digital signature generated by the eUICC manufacturer digital certificate, the eUICC digital certificate, and the eUICC, the eUICC identity EID is obtained from the eUICC digital certificate; the first server SM-SR+ searches the first database, and determines After the eUICC identity EID (for example, EID2) in the first database is the same as the eUICC identity identifier EID obtained from the eUICC digital certificate, the eUICC corresponding to the eUICC is searched in the first database according to the eUICC identity identifier EID2. The hash value of the key 2, because the hash value 2 of the preset public key of the corresponding eUICC is stored in the initialization security channel data block in the binding configuration file package 2, Determining the binding profile of the package 2 eUICC binding configuration corresponding to that package.
需要说明的是,前文描述了本发明实施例的批量获取、下载配置文件profile的方法。本领域的技术人员意识到,所述方法实施例以及各步骤过程, 能够以硬件方式来实现。本领域技术人员根据上述方法实施例,能够构建相应模块及变形,这些模块以及变形应归于本发明保护范围。It should be noted that the foregoing describes a method for acquiring and downloading a profile profile in batches according to an embodiment of the present invention. Those skilled in the art are aware of the method embodiments and the various steps, Can be implemented in hardware. Those skilled in the art can construct corresponding modules and deformations according to the above method embodiments, and these modules and deformations are attributed to the protection scope of the present invention.
图9是本发明实施例提供的一种签约管理数据准备服务器示意图。该签约管理数据准备服务器900至少包括接收器901、处理器902、发射器903。FIG. 9 is a schematic diagram of a subscription management data preparation server according to an embodiment of the present invention. The subscription management data preparation server 900 includes at least a receiver 901, a processor 902, and a transmitter 903.
本领域技术人员可以理解,图9仅仅示出了签约管理数据准备服务器的结构的简化设计。图9中示出的签约管理数据准备服务器结构并不构成对签约管理数据准备服务器的限定,签约管理数据准备服务器可以包括比图示9更多或更少的部件,例如,签约管理数据准备服务器还可以包括用于存储通信算法相应的指令的存储器,此外,为了节省芯片面积,接收器901和发射器903还可以集成在一起,形成收发信机。Those skilled in the art will appreciate that Figure 9 only shows a simplified design of the structure of the contract management data preparation server. The contract management data preparation server structure shown in FIG. 9 does not constitute a limitation on the contract management data preparation server, and the contract management data preparation server may include more or less components than the illustration 9, for example, a contract management data preparation server. A memory for storing instructions corresponding to the communication algorithm may also be included. Further, to save chip area, the receiver 901 and the transmitter 903 may also be integrated to form a transceiver.
图9中,接收器901,用于接收第一服务器发送的多个嵌入式通用集成电路卡eUICC的匹配信息。In FIG. 9, the receiver 901 is configured to receive matching information of multiple embedded universal integrated circuit cards eUICC sent by the first server.
处理器902,用于检验是否存在与该匹配信息对应的等待配置文件下载命令;在存在该等待匹配文件下载命令的情况下,获取与该等待配置文件下载命令对应的多个配置文件profile;生成与该多个eUICC分别对应的多个会话密钥;至少根据该多个会话密钥以及该多个配置文件profile生成相应多个绑定配置文件包。The processor 902 is configured to check whether there is a waiting configuration file download command corresponding to the matching information, and if there is the waiting for matching file download command, acquire a plurality of configuration file profiles corresponding to the waiting configuration file download command; a plurality of session keys respectively corresponding to the plurality of eUICCs; generating a plurality of binding profile packages according to the plurality of session keys and the plurality of profile profiles.
发射器903,用于将该多个绑定配置文件包发送给该第一服务器,以便该eUICC从该第一服务器中下载该绑定配置文件包。The transmitter 903 is configured to send the multiple binding configuration file package to the first server, so that the eUICC downloads the binding configuration file package from the first server.
接收器901,还用于接收该第一服务器发送的多个嵌入式通用集成电路卡eUICC的多个预置公钥;其中,该多个eUICC与该多个预置公钥分别相对应。The receiver 901 is further configured to receive a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC sent by the first server, where the plurality of eUICCs respectively correspond to the plurality of preset public keys.
在一个示例中,处理器902还用于生成一次性公私钥对,根据该多个eUICC的多个预置公钥和该一次性私钥,生成该多个eUICC分别对应的多个会话密钥。In an example, the processor 902 is further configured to generate a one-time public-private key pair, and generate multiple session keys corresponding to the multiple eUICCs according to the multiple preset public keys of the multiple eUICCs and the one-time private key. .
进一步地,该绑定配置文件包至少包括该一次性公钥、该签约管理数据 准备服务器的数字证书包含的公钥、该签约管理数据准备服务器的第二数字签名、该预置公钥的哈希值;且处理器902还用于至少根据该一次性公钥和该预置公钥生成该签约管理数据准备服务器的第二数字签名,并用于对该预置公钥进行哈希运算得到该预置公钥的哈希值。Further, the binding configuration file package includes at least the one-time public key and the subscription management data. Preparing a public key of the digital certificate of the server, a second digital signature of the subscription management data preparation server, a hash value of the preset public key; and the processor 902 is further configured to select the at least the one-time public key and the preset The public key generates a second digital signature of the subscription management data preparation server, and is used to hash the preset public key to obtain a hash value of the preset public key.
在另一个示例中,处理器902还用于利用该多个eUICC的多个预置公钥对该多个会话密钥分别进行加密生成多个加密的会话密钥,并至少根据该多个加密的会话密钥生成该多个绑定配置文件包。In another example, the processor 902 is further configured to separately encrypt the plurality of session keys by using a plurality of preset public keys of the plurality of eUICCs to generate a plurality of encrypted session keys, and at least according to the multiple encryptions. The session key generates the multiple binding profile packages.
进一步地,该绑定配置文件包至少包括该预置公钥的哈希值、该签约管理数据准备服务器的数字证书包含的公钥、该加密的会话密钥、该签约管理数据准备服务器的第三数字签名;且处理器902还用于至少根据多个加密的会话密钥和该预置公钥生成该签约管理数据准备服务器的第三数字签名,且用于对该预置公钥进行哈希运算生成该预置公钥的哈希值。Further, the binding configuration file package includes at least a hash value of the preset public key, a public key included in the digital certificate of the subscription management data preparation server, the encrypted session key, and the subscription management data preparation server. The third digital signature is generated by the processor 902, and the third digital signature of the subscription management data preparation server is generated according to at least the plurality of encrypted session keys and the preset public key, and is used to perform the preset public key. The hash operation generates a hash value of the preset public key.
在一个示例中,处理器902还用于验证该第一服务器发送的至少根据该多个eUICC的多个预置公钥和该匹配信息而生成的数字签名。In one example, the processor 902 is further configured to verify a digital signature generated by the first server according to at least a plurality of preset public keys of the plurality of eUICCs and the matching information.
图10是本发明实施例提供的一种第一服务器。FIG. 10 is a first server according to an embodiment of the present invention.
该第一服务器可以是第三方服务提供商部署的服务器(即签约管理安全路由服务器,英文:Subscription Manager-Secure Routing,简称SM-SR+),第三方服务提供商包括但不限于企业用户、集团用户、行业应用;第一服务器也可以是签约管理数据准备服务器SM-DP+的一部分;第一服务器还可以是签约管理发现服务器(Subscription Manager-Discovery Server,简称SM-DS)等。The first server may be a server deployed by a third-party service provider (ie, a subscription management-secure routing server, English: Subscription Manager-Secure Routing, referred to as SM-SR+), and the third-party service provider includes but is not limited to enterprise users and group users. The first server may also be part of the subscription management data preparation server SM-DP+; the first server may also be a Subscription Manager-Discovery Server (SM-DS).
该第一服务器1000至少包括发射器1001、接收器1002、处理器1003。The first server 1000 includes at least a transmitter 1001, a receiver 1002, and a processor 1003.
本领域技术人员可以理解,图10仅仅示出了第一服务器的结构的简化设计。图10中示出的第一服务器结构并不构成对第一服务器的限定,第一服务器可以包括比图示10更多或更少的部件,例如,第一服务器还可以包括用于 存储通信算法相应的指令的存储器,此外,为了节省芯片面积,接收器1002和发射器1001还可以集成在一起,形成收发信机。Those skilled in the art will appreciate that Figure 10 only shows a simplified design of the structure of the first server. The first server structure shown in FIG. 10 does not constitute a limitation to the first server, and the first server may include more or less components than the illustration 10, for example, the first server may also include The memory storing the corresponding instructions of the communication algorithm, in addition, in order to save the chip area, the receiver 1002 and the transmitter 1001 can also be integrated to form a transceiver.
图10中,发射器1001,用于发送多个嵌入式通用集成电路卡eUICC的多个预置公钥和对应该多个eUICC的匹配信息,以便签约管理数据准备服务器生成与该匹配信息对应的多个绑定配置文件包;其中,该多个eUICC与该多个预置公钥分别相对应。In FIG. 10, the transmitter 1001 is configured to send a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information corresponding to the plurality of eUICCs, so that the subscription management data preparation server generates the corresponding information corresponding to the matching information. a plurality of binding configuration file packages; wherein the plurality of eUICCs respectively correspond to the plurality of preset public keys.
接收器1002,用于接收来自该eUICC的eUICC数字证书。The receiver 1002 is configured to receive an eUICC digital certificate from the eUICC.
处理器1003,用于检验该服务器是否存在该eUICC数字证书中的eUICC身份标识EID;在存在该eUICC身份标识EID情况下,查找与该eUICC身份标识EID对应的预置公钥的哈希值,进而根据该预置公钥的哈希值确定与该eUICC对应的绑定配置文件包。The processor 1003 is configured to check whether the eUICC identity EID in the eUICC digital certificate exists in the server, and in the presence of the eUICC identity EID, search for a hash value of the preset public key corresponding to the eUICC identity identifier EID, And determining, according to the hash value of the preset public key, a binding configuration file package corresponding to the eUICC.
发射器1001,用于将该绑定配置文件包发送给该eUICC对应的本地配置文件助手,以便该eUICC下载该绑定配置文件包。The transmitter 1001 is configured to send the binding configuration file package to a local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
在一个示例中,处理器1003还用于预先获得该多个eUICC的多个预置公私钥对和该多个eUICC的多个该eUICC身份标识EID,并得到该多个eUICC的多个预置公钥的哈希值。In an example, the processor 1003 is further configured to obtain a plurality of preset public private key pairs of the plurality of eUICCs and a plurality of the eUICC identity identifiers EID of the plurality of eUICCs, and obtain multiple presets of the multiple eUICCs. The hash of the public key.
在一个示例中,处理器1003还用于直接获得该多个eUICC的多个预置公钥的哈希值,或者,据该多个eUICC的多个预置公钥计算生成该多个eUICC的多个预置公钥的哈希值。In an example, the processor 1003 is further configured to directly obtain a hash value of the plurality of preset public keys of the plurality of eUICCs, or calculate the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs. The hash value of multiple preset public keys.
在一个示例中,处理器1003还用于至少根据该多个eUICC的多个预置公钥及该匹配信息而生成第一服务器第一数字签名;发射器1001还用于向该签约管理数据准备服务器发送该第一服务器第一数字签名,以便该签约管理数据准备服务器验证该第一服务器第一数字签名。In an example, the processor 1003 is further configured to generate a first server first digital signature according to at least the preset public key of the multiple eUICCs and the matching information; the transmitter 1001 is further configured to prepare the subscription management data. The server sends the first digital signature of the first server, so that the subscription management data preparation server verifies the first digital signature of the first server.
在一个示例中,处理器1003还用于,至少根据该第一服务器的随机数生成第一服务器第一数字签名。In one example, the processor 1003 is further configured to generate the first server first digital signature according to at least the random number of the first server.
发射器1001还用于发送该第一服务器第一数字签名。 The transmitter 1001 is further configured to send the first digital signature of the first server.
图11是本发明实施例提供的一种终端,该终端如eUICC终端,且该eUICC终端包括嵌入式通用集成电路卡eUICC和本地配置文件助手LPA。FIG. 11 is a terminal provided by an embodiment of the present invention, such as an eUICC terminal, and the eUICC terminal includes an embedded universal integrated circuit card eUICC and a local configuration file assistant LPA.
图11中,该终端1100至少包括发射器1101、接收器1102、处理器1103。In FIG. 11, the terminal 1100 includes at least a transmitter 1101, a receiver 1102, and a processor 1103.
本领域技术人员可以理解,图11仅仅示出了终端的结构的简化设计。图11中示出的终端结构并不构成对终端的限定,该终端可以包括比图示11更多或更少的部件,例如,该终端还可以包括用于存储通信算法相应的指令的存储器,此外,为了节省芯片面积,接收器1102和发射器1101还可以集成在一起,形成收发信机。Those skilled in the art will appreciate that Figure 11 only shows a simplified design of the structure of the terminal. The terminal structure shown in FIG. 11 does not constitute a limitation to the terminal, and the terminal may include more or less components than the illustration 11, for example, the terminal may further include a memory for storing instructions corresponding to the communication algorithm, In addition, to save chip area, the receiver 1102 and the transmitter 1101 can also be integrated to form a transceiver.
图11中,发射器1101,用于向第一服务器发送嵌入式通用集成电路卡eUICC数字证书,以便该第一服务器确定与该eUICC数字证书中包含的eUICC身份标识EID对应的绑定配置文件包。In FIG. 11, a transmitter 1101 is configured to send an embedded universal integrated circuit card eUICC digital certificate to a first server, so that the first server determines a binding configuration file package corresponding to an eUICC identity identifier EID included in the eUICC digital certificate. .
接收器1102,用于接收来自该第一服务器的该绑定配置文件包。The receiver 1102 is configured to receive the binding configuration file package from the first server.
处理器1103,用于将该绑定配置文件包反复发起加载绑定配置文件包功能。The processor 1103 is configured to repeatedly initiate a load binding configuration file package function by using the binding configuration file package.
发射器1101,用于将该绑定配置文件包发送给该终端中的嵌入式通用集成电路卡eUICC。The transmitter 1101 is configured to send the binding configuration file package to the embedded universal integrated circuit card eUICC in the terminal.
在一个示例中,处理器1103还用于,根据该绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对该初始化安全通道功能包含的签约管理数据准备服务器数字签名进行验证,在验证通过情况下,根据该预置公钥对应的私钥和该初始化安全通道功能包含的该签约数据管理服务器的一次性公钥,生成会话密钥。In an example, the processor 1103 is further configured to prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and prepare the server for the subscription management data included in the initial security channel function. The digital signature is verified. In the case of verification, the session key is generated according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function.
在另一个示例中,处理器1103还用于,根据该绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对该初始化安全通道功能包含的签约管理数据准备服务器数字签名进行验证,在验证通过情况下,则利用该预置公钥对该初始化安全通道功能包含的加密的会话密 钥进行解密,得到会话密钥。In another example, the processor 1103 is further configured to prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and prepare the subscription management data included in the initial security channel function. The server digital signature is verified, and in the case of verification, the encrypted session secret included in the initialization secure channel function is utilized by the preset public key. The key is decrypted to get the session key.
结合本文中所公开的实施例描述的方法或算法的步骤可以用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。The steps of a method or algorithm described in connection with the embodiments disclosed herein can be implemented in hardware, a software module executed by a processor, or a combination of both. The software module can be placed in random access memory (RAM), memory, read only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or technical field. Any other form of storage medium known.
以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 The specific embodiments of the present invention have been described in detail with reference to the preferred embodiments of the present invention. All modifications, equivalent substitutions, improvements, etc., made within the spirit and scope of the invention are intended to be included within the scope of the invention.

Claims (30)

  1. 一种配置文件的批量获取、下载方法,其特征在于,所述方法包括:A method for batch obtaining and downloading a configuration file, wherein the method includes:
    签约管理数据准备服务器接收第一服务器发送的多个嵌入式通用集成电路卡eUICC的匹配信息,并检验是否存在与所述匹配信息对应的等待配置文件下载命令;The subscription management data preparation server receives the matching information of the plurality of embedded universal integrated circuit cards eUICC sent by the first server, and checks whether there is a waiting configuration file download command corresponding to the matching information;
    在存在所述等待匹配文件下载命令的情况下,所述签约管理数据准备服务器获取与所述等待配置文件下载命令对应的多个配置文件profile;The contract management data preparation server acquires a plurality of configuration file profiles corresponding to the waiting configuration file download command in the case that the waiting for matching file download command exists;
    所述签约管理数据准备服务器生成与所述多个eUICC分别对应的多个会话密钥;The subscription management data preparation server generates a plurality of session keys respectively corresponding to the plurality of eUICCs;
    所述签约管理数据准备服务器至少根据所述多个会话密钥以及所述多个配置文件profile生成相应多个绑定配置文件包;The subscription management data preparation server generates at least a plurality of binding configuration file packages according to the plurality of session keys and the plurality of configuration file profiles;
    所述签约管理数据准备服务器将所述多个绑定配置文件包发送给所述第一服务器,以便所述eUICC从所述第一服务器中下载所述绑定配置文件包。The subscription management data preparation server sends the plurality of binding configuration file packages to the first server, so that the eUICC downloads the binding configuration file package from the first server.
  2. 根据权利要求1所述的方法,其特征在于,所述签约管理数据准备服务器接收第一服务器发送的多个嵌入式通用集成电路卡eUICC的匹配信息,还包括:The method according to claim 1, wherein the subscription management data preparation server receives the matching information of the plurality of embedded universal integrated circuit cards eUICC sent by the first server, and further includes:
    所述签约管理数据准备服务器接收第一服务器发送的多个嵌入式通用集成电路卡eUICC的多个预置公钥;The subscription management data preparation server receives a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC sent by the first server;
    其中,所述多个eUICC与所述多个预置公钥分别相对应。The plurality of eUICCs respectively correspond to the plurality of preset public keys.
  3. 根据权利要求2所述的方法,其特征在于,所述签约管理数据准备服务器生成与所述多个eUICC分别对应的多个会话密钥,包括:The method according to claim 2, wherein the subscription management data preparation server generates a plurality of session keys respectively corresponding to the plurality of eUICCs, including:
    所述签约管理数据准备服务器生成一次性公私钥对;The subscription management data preparation server generates a one-time public-private key pair;
    所述签约管理数据准备服务器根据所述多个eUICC的多个预置公钥和所述一次性私钥,生成所述多个eUICC分别对应的多个会话密钥。The contract management data preparation server generates a plurality of session keys respectively corresponding to the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs and the one-time private key.
  4. 根据权利要求3所述的方法,其特征在于,所述绑定配置文件包至少包括所述一次性公钥、所述签约管理数据准备服务器的数字证书包含的公钥、 所述签约管理数据准备服务器的第二数字签名、所述预置公钥的哈希值;The method according to claim 3, wherein the binding profile package comprises at least the one-time public key, a public key included in a digital certificate of the subscription management data preparation server, a second digital signature of the subscription management data preparation server, and a hash value of the preset public key;
    且所述签约管理数据准备服务器的第二数字签名是所述签约管理数据准备服务器至少根据所述一次性公钥和所述预置公钥生成的;And the second digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least the one-time public key and the preset public key;
    所述预置公钥的哈希值是所述签约管理数据准备服务器对所述预置公钥进行哈希运算生成的。The hash value of the preset public key is generated by the contract management data preparation server hashing the preset public key.
  5. 根据权利要求2所述的方法,其特征在于,在所述签约管理数据准备服务器生成与所述多个eUICC分别对应的多个会话密钥之后,包括:The method according to claim 2, after the contract management data preparation server generates a plurality of session keys respectively corresponding to the plurality of eUICCs, including:
    利用所述多个eUICC的多个预置公钥对所述多个会话密钥分别进行加密生成多个加密的会话密钥,并至少根据所述多个加密的会话密钥生成所述多个绑定配置文件包。Separating the plurality of session keys by using a plurality of preset public keys of the plurality of eUICCs to generate a plurality of encrypted session keys, and generating the plurality of the at least one of the plurality of encrypted session keys Bind the configuration package.
  6. 根据权利要求5所述的方法,其特征在于,所述绑定配置文件包至少包括所述预置公钥的哈希值、所述签约管理数据准备服务器的数字证书包含的公钥、所述加密的会话密钥、所述签约管理数据准备服务器的第三数字签名;The method according to claim 5, wherein the binding profile package includes at least a hash value of the preset public key, a public key included in a digital certificate of the subscription management data preparation server, and the An encrypted session key, a third digital signature of the subscription management data preparation server;
    且所述签约管理数据准备服务器的第三数字签名是所述签约管理数据准备服务器至少根据多个加密的会话密钥和所述预置公钥生成的;And the third digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least a plurality of encrypted session keys and the preset public key;
    所述预置公钥的哈希值是所述签约管理数据准备服务器对所述预置公钥进行哈希运算生成的。The hash value of the preset public key is generated by the contract management data preparation server hashing the preset public key.
  7. 根据权利要求2至6任意一项所述的方法,其特征在于,在所述检验是否存在与所述匹配信息对应的等待配置文件下载命令之前,还包括:The method according to any one of claims 2 to 6, further comprising: before the checking whether there is a waiting configuration file download command corresponding to the matching information, further comprising:
    所述签约管理数据准备服务器验证所述第一服务器发送的至少根据所述多个eUICC的多个预置公钥和所述匹配信息而生成的数字签名。The subscription management data preparation server verifies the digital signature generated by the first server according to at least a plurality of preset public keys of the plurality of eUICCs and the matching information.
  8. 一种配置文件批量获取、下载方法,其特征在于,所述方法包括:A method for batch obtaining and downloading a configuration file, wherein the method includes:
    第一服务器向签约管理数据准备服务器发送多个嵌入式通用集成电路卡eUICC的多个预置公钥和对应所述多个eUICC的匹配信息,以便所述签约管理数据准备服务器生成与所述匹配信息对应的多个绑定配置文件包; The first server sends a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information corresponding to the plurality of eUICCs to the subscription management data preparation server, so that the subscription management data preparation server generates the matching Multiple binding configuration file packages corresponding to the information;
    其中,所述多个eUICC与所述多个预置公钥分别相对应;The plurality of eUICCs respectively correspond to the plurality of preset public keys;
    所述第一服务器接收来自所述eUICC的eUICC数字证书,检验所述第一服务器中是否存在所述eUICC数字证书中的eUICC身份标识EID;The first server receives an eUICC digital certificate from the eUICC, and checks whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server;
    在存在所述eUICC身份标识EID情况下,所述第一服务器查找与所述eUICC身份标识EID对应的预置公钥的哈希值,进而根据所述预置公钥的哈希值确定与所述eUICC对应的绑定配置文件包,并将所述绑定配置文件包发送给所述eUICC对应的本地配置文件助手,以便所述eUICC下载所述绑定配置文件包。In the case that the eUICC identity identifier EID is present, the first server searches for a hash value of the preset public key corresponding to the eUICC identity identifier EID, and further determines a location according to the hash value of the preset public key. The binding configuration file package corresponding to the eUICC is sent, and the binding configuration file package is sent to the local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  9. 根据权利要求8所述的方法,其特征在于,在所述第一服务器向签约管理数据准备服务器发送多个嵌入式通用集成电路卡eUICC的多个预置公钥和对应所述多个eUICC的匹配信息之前,还包括:The method according to claim 8, wherein the first server sends a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and the plurality of eUICCs to the subscription management data preparation server. Before matching the information, it also includes:
    所述第一服务器预先获得所述多个eUICC的多个预置公私钥对和所述多个eUICC的多个所述eUICC身份标识EID,并得到所述多个eUICC的多个预置公钥的哈希值;Determining, by the first server, a plurality of preset public private key pairs of the plurality of eUICCs and a plurality of the eUICC identity identifiers EID of the plurality of eUICCs, and obtaining a plurality of preset public keys of the plurality of eUICCs Hash value
    所述第一服务器将所述多个eUICC的多个预置公钥的哈希值和所述多个eUICC身份标识EID分别相对应存储。The first server stores the hash values of the plurality of preset public keys of the plurality of eUICCs and the plurality of eUICC identity identifiers EID respectively.
  10. 根据权利要求8或9所述的方法,其特征在于,所述得到所述多个eUICC的多个预置公钥的哈希值,包括:The method according to claim 8 or 9, wherein the obtaining the hash values of the plurality of preset public keys of the plurality of eUICCs comprises:
    直接获得所述多个eUICC的多个预置公钥的哈希值,或者,所述第一服务器根据所述多个eUICC的多个预置公钥计算生成所述多个eUICC的多个预置公钥的哈希值。Directly obtaining the hash values of the plurality of preset public keys of the plurality of eUICCs, or the first server calculating, by using the plurality of preset public keys of the plurality of eUICCs, multiple presets of the plurality of eUICCs Set the hash value of the public key.
  11. 根据权利要求8至10任意一项所述的方法,其特征在于,所述第一服务器向签约管理数据准备服务器发送多个嵌入式通用集成电路卡eUICC的多个预置公钥和对应所述多个eUICC的匹配信息,还包括:The method according to any one of claims 8 to 10, wherein the first server sends a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC to the subscription management data preparation server and corresponding to the Matching information of multiple eUICCs, including:
    所述第一服务器向所述签约管理数据准备服务器发送至少根据所述多个eUICC的多个预置公钥及所述匹配信息而生成的第一服务器第一数字签名, 以便所述签约管理数据准备服务器验证所述第一服务器第一数字签名。The first server sends, to the subscription management data preparation server, a first server first digital signature generated according to at least a plurality of preset public keys of the plurality of eUICCs and the matching information, In order for the subscription management data preparation server to verify the first digital signature of the first server.
  12. 根据权利要求8至11任意一项所述的方法,其特征在于,在所述检验所述第一服务器中是否存在所述eUICC数字证书中的eUICC身份标识EID之前,还包括:The method according to any one of claims 8 to 11, wherein before the checking whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server, the method further includes:
    所述第一服务器验证所述eUICC发送的至少根据所述第一服务器的随机数生成的第一数字签名。The first server verifies the first digital signature generated by the eUICC according to at least the random number of the first server.
  13. 一种配置文件批量获取、下载方法,其特征在于,包括:A method for batch obtaining and downloading configuration files, which is characterized in that:
    嵌入式通用集成电路卡eUICC终端向第一服务器发送eUICC数字证书,以便所述第一服务器确定与所述eUICC数字证书中包含的eUICC身份标识EID对应的绑定配置文件包;The embedded universal integrated circuit card eUICC terminal sends an eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
    所述eUICC终端中的本地配置文件助手LPA接收来自所述第一服务器的所述绑定配置文件包,将所述绑定配置文件包通过反复发起加载绑定配置文件包功能发送给所述eUICC终端中的eUICC。The local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package to the eUICC by repeatedly initiating a load binding configuration file package function. eUICC in the terminal.
  14. 根据权利要求13所述的方法,其特征在于,所述eUICC终端中的本地配置文件助手LPA接收来自所述第一服务器的所述绑定配置文件包,将所述绑定配置文件包通过反复发起加载绑定配置文件包功能发送给所述eUICC终端中的eUICC,还包括:The method according to claim 13, wherein the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and the binding configuration file package is repeated. The function of initiating the load binding configuration file package is sent to the eUICC in the eUICC terminal, and further includes:
    所述eUICC根据所述绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对所述初始化安全通道功能包含的签约管理数据准备服务器数字签名进行验证,在验证通过情况下,根据所述预置公钥对应的私钥和所述初始化安全通道功能包含的所述签约数据管理服务器的一次性公钥,生成会话密钥。The eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and verifies the digital signature of the subscription management data preparation server included in the initial security channel function, and performs verification. In this case, the session key is generated according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function.
  15. 根据权利要求13或14所述的方法,其特征在于,所述eUICC终端中的本地配置文件助手LPA接收来自所述第一服务器的所述绑定配置文件包,将所述绑定配置文件包通过反复发起加载绑定配置文件包功能发送给所述eUICC终端中的eUICC,还包括: The method according to claim 13 or 14, wherein the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and the binding configuration file package The eUICC is sent to the eUICC in the eUICC terminal by repeatedly initiating the load binding configuration file package function, and further includes:
    所述eUICC根据所述绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对所述初始化安全通道功能包含的签约管理数据准备服务器数字签名进行验证,在验证通过情况下,则利用所述预置公钥对所述初始化安全通道功能包含的加密的会话密钥进行解密,得到会话密钥。The eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and verifies the digital signature of the subscription management data preparation server included in the initial security channel function, and performs verification. In this case, the encrypted session key included in the initialization secure channel function is decrypted by using the preset public key to obtain a session key.
  16. 一种签约管理数据准备服务器,其特征在于,包括:A contract management data preparation server, comprising:
    接收器,用于接收第一服务器发送的多个嵌入式通用集成电路卡eUICC的匹配信息;a receiver, configured to receive, by the first server, matching information of multiple embedded universal integrated circuit cards eUICC;
    处理器,用于检验是否存在与所述匹配信息对应的等待配置文件下载命令;在存在所述等待匹配文件下载命令的情况下,获取与所述等待配置文件下载命令对应的多个配置文件profile;生成与所述多个eUICC分别对应的多个会话密钥;至少根据所述多个会话密钥以及所述多个配置文件profile生成相应多个绑定配置文件包;a processor, configured to check whether there is a waiting configuration file download command corresponding to the matching information; and if there is the waiting for matching file download command, acquiring a plurality of configuration file profiles corresponding to the waiting configuration file downloading command Generating a plurality of session keys respectively corresponding to the plurality of eUICCs; generating at least a plurality of binding profile packages according to the plurality of session keys and the plurality of profile profiles;
    发射器,用于将所述多个绑定配置文件包发送给所述第一服务器,以便所述eUICC从所述第一服务器中下载所述绑定配置文件包。And a transmitter, configured to send the multiple binding configuration file package to the first server, so that the eUICC downloads the binding configuration file package from the first server.
  17. 根据权利要求16所述的签约管理数据准备服务器,其特征在于,所述接收器,还用于接收所述第一服务器发送的多个嵌入式通用集成电路卡eUICC的多个预置公钥;The subscription management data preparation server according to claim 16, wherein the receiver is further configured to receive a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC sent by the first server;
    其中,所述多个eUICC与所述多个预置公钥分别相对应。The plurality of eUICCs respectively correspond to the plurality of preset public keys.
  18. 根据权利要求17所述的签约管理数据准备服务器,其特征在于,所述处理器,还用于生成一次性公私钥对,根据所述多个eUICC的多个预置公钥和所述一次性私钥,生成所述多个eUICC分别对应的多个会话密钥。The contract management data preparation server according to claim 17, wherein the processor is further configured to generate a one-time public-private key pair, according to the plurality of preset public keys of the plurality of eUICCs and the one-time The private key generates a plurality of session keys respectively corresponding to the plurality of eUICCs.
  19. 根据权利要求18所述的签约管理数据准备服务器,其特征在于,所述绑定配置文件包至少包括所述一次性公钥、所述签约管理数据准备服务器的数字证书包含的公钥、所述签约管理数据准备服务器的第二数字签名、所述预置公钥的哈希值; The contract management data preparation server according to claim 18, wherein the binding configuration file package includes at least the one-time public key, a public key included in a digital certificate of the contract management data preparation server, and the Signing a second digital signature of the data preparation server, and a hash value of the preset public key;
    且所述处理器还用于至少根据所述一次性公钥和所述预置公钥生成所述签约管理数据准备服务器的第二数字签名,并用于对所述预置公钥进行哈希运算得到所述预置公钥的哈希值。And the processor is further configured to generate, according to the one-time public key and the preset public key, a second digital signature of the subscription management data preparation server, and perform a hash operation on the preset public key. Obtaining a hash value of the preset public key.
  20. 根据权利要求17所述的签约管理数据准备服务器,其特征在于,所述处理器,还用于利用所述多个eUICC的多个预置公钥对所述多个会话密钥分别进行加密生成多个加密的会话密钥,并至少根据所述多个加密的会话密钥生成所述多个绑定配置文件包。The subscription management data preparation server according to claim 17, wherein the processor is further configured to separately encrypt the plurality of session keys by using a plurality of preset public keys of the plurality of eUICCs a plurality of encrypted session keys and generating the plurality of binding profile packages based on at least the plurality of encrypted session keys.
  21. 根据权利要求20所述的签约管理数据准备服务器,其特征在于,所述绑定配置文件包至少包括所述预置公钥的哈希值、所述签约管理数据准备服务器的数字证书包含的公钥、所述加密的会话密钥、所述签约管理数据准备服务器的第三数字签名;The subscription management data preparation server according to claim 20, wherein the binding configuration file package includes at least a hash value of the preset public key, and a public certificate included in the digital certificate of the subscription management data preparation server a key, the encrypted session key, and a third digital signature of the subscription management data preparation server;
    且所述处理器还用于至少根据多个加密的会话密钥和所述预置公钥生成所述签约管理数据准备服务器的第三数字签名,且用于对所述预置公钥进行哈希运算生成所述预置公钥的哈希值。And the processor is further configured to generate a third digital signature of the subscription management data preparation server according to at least the plurality of encrypted session keys and the preset public key, and configured to perform the preset public key The hash operation generates a hash value of the preset public key.
  22. 根据权利要求17至21任意一项所述的签约管理数据准备服务器,其特征在于,处理器还用于验证所述第一服务器发送的至少根据所述多个eUICC的多个预置公钥和所述匹配信息而生成的数字签名。The subscription management data preparation server according to any one of claims 17 to 21, wherein the processor is further configured to verify, by the first server, at least a plurality of preset public keys according to the plurality of eUICCs The digital signature generated by the matching information.
  23. 一种服务器,其特征在于,包括:A server, comprising:
    发射器,用于发送多个嵌入式通用集成电路卡eUICC的多个预置公钥和对应所述多个eUICC的匹配信息,以便签约管理数据准备服务器生成与所述匹配信息对应的多个绑定配置文件包;其中,所述多个eUICC与所述多个预置公钥分别相对应;a transmitter, configured to send a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information corresponding to the plurality of eUICCs, so that the subscription management data preparation server generates multiple bindings corresponding to the matching information. a configuration file package; wherein the plurality of eUICCs respectively correspond to the plurality of preset public keys;
    接收器,用于接收来自所述eUICC的eUICC数字证书;a receiver, configured to receive an eUICC digital certificate from the eUICC;
    处理器,用于检验所述服务器是否存在所述eUICC数字证书中的eUICC身份标识EID;在存在所述eUICC身份标识EID情况下,查找与所述eUICC身份标识EID对应的预置公钥的哈希值,进而根据所述预置公钥的哈希值确 定与所述eUICC对应的绑定配置文件包;a processor, configured to check whether the eUICC identity identifier EID in the eUICC digital certificate exists in the server, and to find a preset public key corresponding to the eUICC identity identifier EID in the presence of the eUICC identity identifier EID The hash value, and then based on the hash value of the preset public key Binding a configuration file package corresponding to the eUICC;
    所述发射器,用于将所述绑定配置文件包发送给所述eUICC对应的本地配置文件助手,以便所述eUICC下载所述绑定配置文件包。The transmitter is configured to send the binding configuration file package to a local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  24. 根据权利要求23所述的服务器,其特征在于,所述处理器还用于预先获得所述多个eUICC的多个预置公私钥对和所述多个eUICC的多个所述eUICC身份标识EID,并得到所述多个eUICC的多个预置公钥的哈希值。The server according to claim 23, wherein the processor is further configured to obtain a plurality of preset public private key pairs of the plurality of eUICCs and a plurality of the eUICC identity identifiers EID of the plurality of eUICCs in advance. And obtaining hash values of the plurality of preset public keys of the plurality of eUICCs.
  25. 根据权利要求23或24所述的服务器,其特征在于,所述处理器还用于直接获得所述多个eUICC的多个预置公钥的哈希值,或者,据所述多个eUICC的多个预置公钥计算生成所述多个eUICC的多个预置公钥的哈希值。The server according to claim 23 or 24, wherein the processor is further configured to directly obtain a hash value of a plurality of preset public keys of the plurality of eUICCs, or according to the plurality of eUICCs The plurality of preset public keys calculate a hash value of the plurality of preset public keys of the plurality of eUICCs.
  26. 根据权利要求23至25任意一项所述的服务器,其特征在于,所述处理器还用于至少根据所述多个eUICC的多个预置公钥及所述匹配信息而生成第一服务器第一数字签名;The server according to any one of claims 23 to 25, wherein the processor is further configured to generate a first server according to at least a plurality of preset public keys of the plurality of eUICCs and the matching information. a digital signature;
    所述发射器还用于向所述签约管理数据准备服务器发送所述第一服务器第一数字签名,以便所述签约管理数据准备服务器验证所述第一服务器第一数字签名。The transmitter is further configured to send the first digital signature of the first server to the subscription management data preparation server, so that the subscription management data preparation server verifies the first digital signature of the first server.
  27. 根据权利要求23至26任意一项所述的服务器,其特征在于,所述处理器还用于,至少根据所述第一服务器的随机数生成第一服务器第一数字签名;The server according to any one of claims 23 to 26, wherein the processor is further configured to generate a first digital signature of the first server according to at least a random number of the first server;
    所述发射器还用于发送所述第一服务器第一数字签名。The transmitter is further configured to send the first digital signature of the first server.
  28. 一种终端,其特征在于,包括:A terminal, comprising:
    发射器,用于向第一服务器发送嵌入式通用集成电路卡eUICC数字证书,以便所述第一服务器确定与所述eUICC数字证书中包含的eUICC身份标识EID对应的绑定配置文件包;a transmitter, configured to send an embedded universal integrated circuit card eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
    接收器,用于接收来自所述第一服务器的所述绑定配置文件包;a receiver, configured to receive the binding configuration file package from the first server;
    处理器,用于将所述绑定配置文件包反复发起加载绑定配置文件包功能;a processor, configured to repeatedly initiate a load binding configuration file package function by using the binding configuration file package;
    发射器,用于将所述绑定配置文件包发送给所述终端中的嵌入式通用集 成电路卡eUICC。a transmitter, configured to send the binding configuration file package to an embedded universal set in the terminal Into the circuit card eUICC.
  29. 根据权利要求28所述的终端,其特征在于,所述处理器还用于,根据所述绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对所述初始化安全通道功能包含的签约管理数据准备服务器数字签名进行验证,在验证通过情况下,根据所述预置公钥对应的私钥和所述初始化安全通道功能包含的所述签约数据管理服务器的一次性公钥,生成会话密钥。The terminal according to claim 28, wherein the processor is further configured to: prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, Initializing the security management function included in the secure channel function to prepare the server digital signature for verification. In the case of verification, the private key corresponding to the preset public key and the subscription data management server included in the initialization security channel function are once A public key that generates a session key.
  30. 根据权利要求28或29所述的终端,其特征在于,所述处理器还用于,根据所述绑定配置文件包包含的初始化安全通道功能中的签约管理数据准备服务器数字证书公钥,对所述初始化安全通道功能包含的签约管理数据准备服务器数字签名进行验证,在验证通过情况下,则利用所述预置公钥对所述初始化安全通道功能包含的加密的会话密钥进行解密,得到会话密钥。 The terminal according to claim 28 or 29, wherein the processor is further configured to prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, The initial management security channel includes a subscription management data preparation server digital signature for verification, and in the case of verification, the encrypted session key included in the initialization security channel function is decrypted by using the preset public key. Session key.
PCT/CN2016/091735 2016-07-26 2016-07-26 Configuration file batch-obtaining and downloading method, and server and terminal WO2018018419A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/091735 WO2018018419A1 (en) 2016-07-26 2016-07-26 Configuration file batch-obtaining and downloading method, and server and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/091735 WO2018018419A1 (en) 2016-07-26 2016-07-26 Configuration file batch-obtaining and downloading method, and server and terminal

Publications (1)

Publication Number Publication Date
WO2018018419A1 true WO2018018419A1 (en) 2018-02-01

Family

ID=61015320

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/091735 WO2018018419A1 (en) 2016-07-26 2016-07-26 Configuration file batch-obtaining and downloading method, and server and terminal

Country Status (1)

Country Link
WO (1) WO2018018419A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848496A (en) * 2018-06-12 2018-11-20 中国联合网络通信集团有限公司 Authentication method, TEE terminal and the management platform of virtual eSIM card based on TEE
WO2021001035A1 (en) * 2019-07-03 2021-01-07 Telefonaktiebolaget Lm Ericsson (Publ) Part 1 of remote sim provisioning of a subscriber entity
CN114513787A (en) * 2021-12-29 2022-05-17 博鼎实华(北京)技术有限公司 Method and device for testing consistency of code number downloading process of eSIM (embedded subscriber identity Module) terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103974250A (en) * 2013-01-30 2014-08-06 华为终端有限公司 Configuration method and equipment
CN104703170A (en) * 2013-12-05 2015-06-10 华为终端有限公司 Methods and equipment for downloading file of operator
CN104703199A (en) * 2013-12-05 2015-06-10 华为终端有限公司 Management method for embedded universal integrated circuit card, related equipment and system
EP2986044A1 (en) * 2014-08-14 2016-02-17 Samsung Electronics Co., Ltd. Method and apparatus for profile download of group devices
CN105530107A (en) * 2015-12-03 2016-04-27 中国联合网络通信集团有限公司 Batched account opening method based on eUICCs and platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103974250A (en) * 2013-01-30 2014-08-06 华为终端有限公司 Configuration method and equipment
CN104703170A (en) * 2013-12-05 2015-06-10 华为终端有限公司 Methods and equipment for downloading file of operator
CN104703199A (en) * 2013-12-05 2015-06-10 华为终端有限公司 Management method for embedded universal integrated circuit card, related equipment and system
EP2986044A1 (en) * 2014-08-14 2016-02-17 Samsung Electronics Co., Ltd. Method and apparatus for profile download of group devices
CN105530107A (en) * 2015-12-03 2016-04-27 中国联合网络通信集团有限公司 Batched account opening method based on eUICCs and platform

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848496A (en) * 2018-06-12 2018-11-20 中国联合网络通信集团有限公司 Authentication method, TEE terminal and the management platform of virtual eSIM card based on TEE
WO2021001035A1 (en) * 2019-07-03 2021-01-07 Telefonaktiebolaget Lm Ericsson (Publ) Part 1 of remote sim provisioning of a subscriber entity
CN114513787A (en) * 2021-12-29 2022-05-17 博鼎实华(北京)技术有限公司 Method and device for testing consistency of code number downloading process of eSIM (embedded subscriber identity Module) terminal

Similar Documents

Publication Publication Date Title
US11930360B2 (en) Method and system for updating certificate issuer public key, and related device
JP7227919B2 (en) Internet of Things (IOT) device management
CN109756447B (en) Security authentication method and related equipment
EP3800909B1 (en) Remote management method, and device
EP3476097B1 (en) Technique for downloading a network access profile
CN108241517B (en) Software upgrading method, client and electronic equipment
US9900161B2 (en) Method for certifying android client application by local service unit
WO2018176430A1 (en) Method for adding authentication algorithm program, and related device and system
US10904015B2 (en) Post-manufacture generation of device certificate and private key for public key infrastructure
EP2954448B1 (en) Provisioning sensitive data into third party network-enabled devices
WO2015165325A1 (en) Secure terminal authentication method, device and system
EP3866004A1 (en) Over-the-air upgrade method and related device
CN104753674A (en) Application identity authentication method and device
WO2019071650A1 (en) Method for upgrading application in security element and related device
US8081758B2 (en) Communication support server, communication support method, and communication support system
WO2018129753A1 (en) Method and device for downloading subscription information set, and related equipment
JP2016111660A (en) Authentication server, terminal and authentication method
WO2018018419A1 (en) Configuration file batch-obtaining and downloading method, and server and terminal
CN112134889A (en) SSL-based communication method, device and system
JP2023015376A (en) Device and method for mediating setting of authentication information
CN111414640A (en) Key access control method and device
CN112632573A (en) Intelligent contract execution method, device and system, storage medium and electronic equipment
US20220256349A1 (en) Provision of Application Level Identity
US20240031805A1 (en) Download of a subscription profile to a communication device
CN108156162B (en) Authentication method and device for mobile application program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16910000

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16910000

Country of ref document: EP

Kind code of ref document: A1