WO2018018419A1 - Procédé d'obtention et de téléchargement de lots de fichiers de configuration, et serveur et terminal - Google Patents

Procédé d'obtention et de téléchargement de lots de fichiers de configuration, et serveur et terminal Download PDF

Info

Publication number
WO2018018419A1
WO2018018419A1 PCT/CN2016/091735 CN2016091735W WO2018018419A1 WO 2018018419 A1 WO2018018419 A1 WO 2018018419A1 CN 2016091735 W CN2016091735 W CN 2016091735W WO 2018018419 A1 WO2018018419 A1 WO 2018018419A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
euicc
configuration file
management data
data preparation
Prior art date
Application number
PCT/CN2016/091735
Other languages
English (en)
Chinese (zh)
Inventor
程紫尧
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2016/091735 priority Critical patent/WO2018018419A1/fr
Publication of WO2018018419A1 publication Critical patent/WO2018018419A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Definitions

  • the present invention relates to the field of smart card technologies, and in particular, to a method for batch obtaining and downloading configuration files, a server, and a terminal.
  • the first generation of smart cards - SIM card (English: Subscriber Identity Module) is a telecom smart card standard developed for Global System for Mobile communication (GSM), used to identify users on the network. Authentication.
  • the second generation of smart cards - UICC card (Universal Integrated Circuit Card, English: Universal Integrated Circuit Card) is a telecom smart card platform standard developed for 3G, separating the UICC platform and identity authentication applications.
  • the demand for Internet of Things has driven the evolution of UICC cards to embedded UICC cards (or embedded SIM cards, or eUICC), namely: allowing different subscription management data preparation.
  • the server's identity authentication application is dynamically loaded online.
  • the physical form of the eUICC is not limited, and may be a traditional SIM card of different sizes or an embedded card.
  • the GSMA Global Mobile System Alliance, English: Global Mobile System Alliance
  • the contract management data preparation server entity and the eUICC use the respective digital certificates to perform mutual authentication and key agreement (end-to-end security), and the profile is securely downloaded from the subscription management data preparation server entity to the eUICC.
  • the GSMA does not propose a solution for the enterprise or group user scenarios. Therefore, how to satisfy the enterprise or group users to obtain the profile for eUICC in batches becomes The problem that needs to be solved at this stage.
  • the embodiment of the invention provides a method for obtaining and downloading configuration files in batches, a server and a terminal, which can acquire configuration files in batches.
  • an embodiment of the present invention provides a method for batch obtaining and downloading a configuration file, including:
  • the subscription management data preparation server receives the matching information of the plurality of embedded universal integrated circuit cards eUICC sent by the first server, and checks whether there is a waiting configuration file download command corresponding to the matching information;
  • the contract management data preparation server acquires a plurality of configuration file profiles corresponding to the waiting configuration file download command in the case that the waiting for matching file download command exists;
  • the subscription management data preparation server generates a plurality of session keys respectively corresponding to the plurality of eUICCs; the subscription management data preparation server generates corresponding at least according to the plurality of session keys and the plurality of profile profiles Binding configuration package;
  • the subscription management data preparation server sends the plurality of binding configuration file packages to the first server, so that the eUICC downloads the binding configuration file package from the first server.
  • the subscription management data preparation server of the embodiment of the present invention sends a plurality of binding configuration file packages of the plurality of eUICCs to the first server in batches according to the requirements of the first server, thereby reducing the signaling overhead of the subscription management data preparation server and alleviating
  • the access pressure is used to prevent DoS attacks caused by a large number of users simultaneously launching a profile download request.
  • DoS is short for Denial of Service, that is, denial of service, and the DoS attack is called a DoS attack).
  • the subscription management data preparation server receives the matching information of the plurality of embedded universal integrated circuit cards eUICC sent by the first server, and further includes:
  • the subscription management data preparation server receives a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC sent by the first server; wherein the plurality of eUICCs and the plurality of presets The keys correspond to each other.
  • the subscription management data preparation server generates a plurality of session keys respectively corresponding to the plurality of eUICCs, including:
  • the subscription management data preparation server generates a one-time public-private key pair; the subscription management data preparation server generates corresponding to the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs and the one-time private key Multiple session keys.
  • the binding configuration file package includes at least the one-time public key, a public key included in the digital certificate of the subscription management data preparation server, a second digital signature of the subscription management data preparation server, and the preset public key.
  • the second digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least the one-time public key and the preset public key;
  • the hash value of the preset public key is generated by the contract management data preparation server hashing the preset public key.
  • the method includes:
  • the binding profile package includes at least a hash value of the preset public key, a public key included in a digital certificate of the subscription management data preparation server, the encrypted session key, the Signing a third digital signature of the data preparation server;
  • the third digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least a plurality of encrypted session keys and the preset public key;
  • the hash value of the preset public key is generated by the contract management data preparation server hashing the preset public key.
  • the subscription management data preparation server verifies the digital signature generated by the first server according to at least the plurality of preset public keys of the plurality of eUICCs and the matching information.
  • an embodiment of the present invention provides a method for batch obtaining and downloading configuration files, including:
  • the first server sends a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information corresponding to the plurality of eUICCs to the subscription management data preparation server, so that the subscription management data preparation server generates the matching Multiple binding configuration file packages corresponding to the information;
  • the plurality of eUICCs respectively correspond to the plurality of preset public keys
  • the first server receives an eUICC digital certificate from the eUICC, and checks whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server;
  • the first server searches for a hash value of the preset public key corresponding to the eUICC identity identifier EID, and further determines a location according to the hash value of the preset public key.
  • the binding configuration file package corresponding to the eUICC is sent, and the binding configuration file package is sent to the local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  • the first server of the embodiment of the present invention can obtain a plurality of binding configuration file packages corresponding to the plurality of eUICCs in batches from the subscription management data preparation server, and store the plurality of binding configuration file packages according to the specific requirements of the users of the subordinate eUICC terminals. It is sent to the corresponding eUICC terminal.
  • the method before the first server sends the plurality of preset public keys of the embedded universal integrated circuit card (eUICC) and the matching information of the plurality of eUICCs to the subscription management data preparation server, the method further includes:
  • the first server, the hash value of the plurality of preset public keys of the plurality of eUICCs, and the plurality of The eUICC identity EIDs are stored separately.
  • the obtaining the hash values of the plurality of preset public keys of the plurality of eUICCs includes: obtaining the hash values of the plurality of preset public keys of the plurality of eUICCs directly, or A server calculates a hash value of the plurality of preset public keys of the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs.
  • the first server sends a plurality of preset public keys of the embedded universal integrated circuit card (eUICC) and the matching information of the plurality of eUICCs to the subscription management data preparation server, and further includes:
  • the first server sends, to the subscription management data preparation server, a first server first digital signature generated according to at least a plurality of preset public keys of the plurality of eUICCs and the matching information, so that the subscription management data is
  • the preparation server verifies the first digital signature of the first server.
  • the method before verifying whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server, the method further includes:
  • the first server verifies the first digital signature generated by the eUICC according to at least the random number of the first server.
  • the multiple binding configuration file packets obtained by the first server in the embodiment of the present invention are all encrypted, and the first server cannot obtain the specific information of the binding configuration file package, thereby ensuring the security of the binding configuration file package.
  • an embodiment of the present invention provides a method for batch obtaining and downloading configuration files, including:
  • the embedded universal integrated circuit card eUICC terminal sends an eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package to the eUICC by repeatedly initiating a load binding configuration file package function. eUICC in the terminal.
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package by repeatedly initiating a load binding configuration file package function.
  • the eUICC in the eUICC terminal further includes:
  • the eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and verifies the digital signature of the subscription management data preparation server included in the initial security channel function, and performs verification.
  • the session key is generated according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function.
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package by repeatedly initiating a load binding configuration file package function.
  • the eUICC in the eUICC terminal further includes:
  • the eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and verifies the digital signature of the subscription management data preparation server included in the initial security channel function, and performs verification.
  • the encrypted session key included in the initialization secure channel function is decrypted by using the preset public key to obtain a session key.
  • an embodiment of the present invention provides a subscription management data preparation server, including:
  • a receiver configured to receive, by the first server, matching information of multiple embedded universal integrated circuit cards eUICC;
  • a processor configured to check whether there is a waiting configuration file download command corresponding to the matching information; and if there is the waiting for matching file download command, acquiring a plurality of configuration file profiles corresponding to the waiting configuration file downloading command Generating a plurality of session keys respectively corresponding to the plurality of eUICCs; generating at least a plurality of binding profile packages according to the plurality of session keys and the plurality of profile profiles;
  • a transmitter configured to send the multiple binding configuration file package to the first server, so that the eUICC downloads the binding configuration file package from the first server.
  • an embodiment of the present invention provides a server, including:
  • a transmitter configured to send a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information corresponding to the plurality of eUICCs, so that the subscription management data preparation server generates multiple bindings corresponding to the matching information.
  • Configuration file package
  • the plurality of eUICCs respectively correspond to the plurality of preset public keys
  • a receiver configured to receive an eUICC digital certificate from the eUICC
  • a processor configured to check whether the eUICC identity identifier EID in the eUICC digital certificate exists in the server, and to find a preset public key corresponding to the eUICC identity identifier EID in the presence of the eUICC identity identifier EID And determining a binding configuration file package corresponding to the eUICC according to the hash value of the preset public key;
  • a transmitter configured to send the binding configuration file package to a local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  • an embodiment of the present invention provides a terminal, including:
  • a transmitter configured to send an embedded universal integrated circuit card eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
  • a receiver configured to receive the binding configuration file package from the first server, and a processor, configured to repeatedly initiate a load binding configuration file package function by using the binding configuration file package;
  • a transmitter configured to send the binding configuration file package to an embedded universal integrated circuit card eUICC in the terminal.
  • an embodiment of the present invention provides a method for batch obtaining a configuration file, including:
  • the subscription management data preparation server SM-DP+ receives the matching information sent by the first server and the plurality of embedded universal integrated circuit cards eUICC, wherein the plurality of eUICCs comprise the first eUICC and the second eUICC;
  • the SM-DP+ checks whether there is a plurality of profile profiles corresponding to the matching information, wherein the plurality of profiles includes a first profile and a pair corresponding to the first eUICC Should be in the second profile of the second eUICC;
  • the SM-DP+ sends the first binding configuration file package and the second binding configuration file package to the first server.
  • the first eUICC is preset with a first public private key pair
  • the first public private key pair includes a first public key and a first private key
  • the second eUICC is preset with a second public private key.
  • a key pair, the second public private key pair includes a second public key and a second private key;
  • the method further includes:
  • the SM-DP+ receives a plurality of preset public keys sent by the first server, and the plurality of preset public keys includes the first public key and the second public key.
  • the SM-DP+ generates a first session key corresponding to the first eUICC and a second session key corresponding to the second eUICC, including:
  • the SM-DP+ generates a third public private key pair, where the third public private key pair includes a third public key and a third private key;
  • the SM-DP+ generates a first session key corresponding to the first eUICC by using the first public key and the third private key;
  • the SM-DP+ generates a second session key corresponding to the second eUICC using the second public key and the third private key.
  • the binding configuration file package includes at least the third public key, a public key included in the digital certificate of the subscription management data preparation server, a second digital signature of the subscription management data preparation server, and the The hash value of the first public key;
  • the second digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least the third public key and the first public key;
  • the hash value of the first public key is generated by the SM-DP+ hashing the first public key.
  • the SM-DP+ generates a first session key corresponding to the first eUICC and a second session key corresponding to the second eUICC, including:
  • the first binding profile package includes at least a hash value of the first public key, a public key included in a digital certificate of the subscription management data preparation server, the first encrypted session key, The third digital signature of the subscription management data preparation server;
  • the second binding configuration file package includes at least a hash value of the second public key, a public key included in the digital certificate of the subscription management data preparation server, The second encrypted session key, the third digital signature of the subscription management data preparation server;
  • the third digital signature of the subscription management data preparation server is that the SM-DP+ is based on the first encrypted session key, the first public key, and the second encrypted session key, Generated by the second public key;
  • the hash value of the first public key is generated by the SM-DP+ hashing the first public key; the hash value of the second public key is the SM-DP+ pair The second public key is generated by hashing.
  • the method before the verifying whether there are multiple profiles corresponding to the matching information, the method further includes:
  • the SM-DP+ verifies that the first server sends at least according to the first eUICC A digital signature generated by a public key, a second public key of the second eUICC, and the matching information.
  • an embodiment of the present invention provides a method for batch obtaining and downloading a configuration file, including:
  • the first server sends a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information associated with the plurality of eUICCs to the subscription management data preparation server SM-DP+, wherein the plurality of eUICCs includes a first eUICC and a second eUICC, the plurality of preset public keys including a first public key corresponding to the first eUICC and a second public key corresponding to the second eUICC, so that the SM-DP+ is generated a first binding configuration file package and a second binding configuration file package corresponding to the matching information;
  • the first server receives an eUICC digital certificate from the eUICC, and checks whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server;
  • the first server searches for a hash value of the preset public key corresponding to the eUICC identity identifier EID, and further determines a location according to the hash value of the preset public key.
  • the binding configuration file package corresponding to the eUICC is sent, and the binding configuration file package is sent to the local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  • the first eUICC is preset with a first public private key pair
  • the first public private key pair includes a first public key and a first private key
  • the second eUICC is preset with a second public private key.
  • a key pair, the second public private key pair includes a second public key and a second private key;
  • the method further includes:
  • the first server stores the hash value of the first public key and the identity identifier EID of the first eUICC, and the hash value of the second public key and the identity of the second eUICC EID Corresponding storage.
  • the hash value of the preset public key is obtained in the following manner:
  • the hash value of the preset public key is directly obtained, or the first server generates a hash value of the preset public key according to the preset public key.
  • the first server sends the plurality of preset public keys of the eUICC and the matching information associated with the multiple eUICCs to the SM-DP+, including:
  • the method before the checking whether the eUICC identity identifier EID in the eUICC digital certificate exists in the first server, the method further includes:
  • the first server verifies the first digital signature generated by the eUICC according to at least the random number of the first server.
  • a ninth aspect, the embodiment of the present invention provides a method for batch obtaining and downloading configuration files, including:
  • the embedded universal integrated circuit card eUICC terminal sends an eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and sends the binding configuration file package to the eUICC by repeatedly initiating a load binding configuration file package function. eUICC in the terminal.
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and the binding configuration file package is repeatedly triggered to load the binding configuration file package function.
  • the eUICC sent to the eUICC terminal further includes:
  • the eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and includes a signature included in the initial security channel function.
  • the management data preparation server digital signature is verified, and in the case of verification, the session is generated according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function. Key.
  • the local profile assistant LPA in the eUICC terminal receives the binding configuration file package from the first server, and the binding configuration file package is repeatedly triggered to load the binding configuration file package function.
  • the eUICC sent to the eUICC terminal further includes:
  • the eUICC prepares a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and verifies the digital signature of the subscription management data preparation server included in the initial security channel function, and performs verification.
  • the encrypted session key included in the initialization secure channel function is decrypted by using the preset public key to obtain a session key.
  • the tenth aspect of the present invention provides a subscription management data preparation server, including:
  • a receiver configured to receive matching information associated with a plurality of embedded universal integrated circuit card eUICCs, wherein the plurality of eUICCs comprise a first eUICC and a second eUICC;
  • a processor configured to check whether there is a plurality of profile profiles corresponding to the matching information, where the plurality of profiles includes a first profile corresponding to the first eUICC and a first profile corresponding to the second eUICC a second profile, generating a first session key corresponding to the first eUICC and a second session key corresponding to the second eUICC, respectively, based on the first session key and the first eUICC, The second session key and the second eUICC generate a first binding configuration file package and a second binding configuration file package;
  • a transmitter configured to send the first binding configuration file package and the second binding configuration file package to the first server.
  • the first eUICC is preset with a first public private key pair
  • the first public private key pair includes a first public key and a first private key
  • the second eUICC is preset with a second public private key.
  • a key pair, the second public private key pair including a second public key and a second private key;
  • the receiver is further configured to receive a plurality of preset public keys sent by the first server, where the multiple The preset public key includes the first public key and the second public key.
  • the processor is further configured to generate a third public private key pair, where the third public private key pair includes a third public key and a third private key, and is generated by using the first public key and the third private key Corresponding to the first session key of the first eUICC, using the second public key and the third private key to generate a second session key corresponding to the second eUICC.
  • the binding configuration file package includes at least the third public key, a public key included in the digital certificate of the subscription management data preparation server, a second digital signature of the subscription management data preparation server, and the The hash value of the first public key;
  • the second digital signature of the subscription management data preparation server is that the subscription management data preparation server is generated according to at least the third public key and the first public key;
  • the hash value of the first public key is generated by the SM-DP+ hashing the first public key.
  • the processor is further configured to encrypt the first session key by using a first public key of the first eUICC to generate a first encrypted session key, by using the second eUICC
  • the second public key encrypts the second session key to generate a second encrypted session key, and generates a first binding profile package according to at least the first encrypted session key, at least according to the second encryption
  • the session key generates the second binding profile package.
  • the first binding profile package includes at least a hash value of the first public key, a public key included in a digital certificate of the subscription management data preparation server, the first encrypted session key, The third digital signature of the subscription management data preparation server;
  • the second binding configuration file package includes at least a hash value of the second public key, a public key included in the digital certificate of the subscription management data preparation server, The second encrypted session key, the third digital signature of the subscription management data preparation server;
  • the third digital signature of the subscription management data preparation server is that the processor is based at least on the first encrypted session key, the first public key, and the second encrypted session key, the first Generated by the second public key;
  • the hash value of the first public key is generated by the processor performing a hash operation on the first public key; the hash value of the second public key is the processor to the second public The key is generated by hashing.
  • the processor is further configured to verify a digital signature generated by the first server according to at least the first public key of the first eUICC, the second public key of the second eUICC, and the matching information.
  • an embodiment of the present invention provides a server, including:
  • a transmitter configured to send, to the subscription management data preparation server SM-DP+, a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information associated with the plurality of eUICCs, wherein the multiple The eUICC includes a first eUICC and a second eUICC, the plurality of preset public keys including a first public key corresponding to the first eUICC and a second public key corresponding to the second eUICC, so that the SM- DP+ generates a first binding configuration file package and a second binding configuration file package corresponding to the matching information;
  • a receiver configured to receive an eUICC digital certificate from the eUICC
  • a processor configured to check whether an eUICC identity identifier EID in the eUICC digital certificate exists, and in a case where the eUICC identity identifier EID exists, searching for a hash value of a preset public key corresponding to the eUICC identity identifier EID, And determining, according to the hash value of the preset public key, a binding configuration file package corresponding to the eUICC;
  • the transmitter is configured to send the binding configuration file package to a local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  • the first eUICC is preset with a first public private key pair
  • the first public private key pair includes a first public key and a first private key
  • the second eUICC is preset with a second public private key.
  • a key pair, the second public private key pair includes a second public key and a second private key;
  • the processor is further configured to obtain, in advance, the first public private key pair, the second public private key pair, the first identity identifier EID of the first eUICC, and the second identity identifier EID of the second eUICC And obtaining a hash value of the first public key and a hash value of the second public key;
  • the processor stores the hash value of the first public key and the identity identifier EID of the first eUICC, and the hash value of the second public key and the identity identifier EID of the second eUICC Corresponding storage.
  • the transmitter is further configured to send, to the SM-DP+, a first generated according to at least a first public key of the first eUICC, a second public key of the second eUICC, and the matching information.
  • the server first digitally signs the SM-DP+ to verify the first digital signature of the first server.
  • the processor is further configured to verify a first digital signature generated by the eUICC based on at least a random number of the first server.
  • the embodiment of the present invention provides a terminal, including:
  • a transmitter configured to send an embedded universal integrated circuit card eUICC digital certificate to the first server, so that the first server determines a binding configuration file package corresponding to the eUICC identity identifier EID included in the eUICC digital certificate;
  • a receiver configured to receive the binding configuration file package from the first server
  • a processor configured to repeatedly initiate a load binding configuration file package function by using the binding configuration file package
  • a transmitter configured to send the binding configuration file package to an embedded universal integrated circuit card eUICC in the terminal.
  • the processor is further configured to: prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and perform subscription management on the initial security channel function.
  • the data preparation server performs digital verification to generate a session key according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function. .
  • the processor is further configured to: prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and perform subscription management on the initial security channel function.
  • the data preparation server digital signature is verified, and in the case of verification, the encrypted public key included in the initialization security channel function is utilized by the preset public key
  • the session key is decrypted to obtain the session key.
  • the configuration file batch obtaining and downloading method, the server, and the terminal provided by the embodiment of the present invention can deliver multiple binding configuration file packages at one time, which is equivalent to batch processing a large number of eUICC terminal download requests at one time, thereby reducing a large amount of signaling overhead. Alleviate the access pressure and prevent DoS attacks that may be caused when a large number of eUICC terminals initiate a profile download request at the same time.
  • OEM terminal equipment manufacturer
  • FIG. 1 is a schematic diagram of a batch acquisition and download system of a profile profile according to an embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of information acquisition of a first server according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a method for batch obtaining a profile profile according to Embodiment 1 of the present invention
  • FIG. 4 is a schematic diagram of a batch downloading method of a profile profile according to Embodiment 1 of the present invention.
  • FIG. 5 is a schematic diagram of a method for obtaining a batch profile file profile according to Embodiment 2 of the present invention.
  • FIG. 6 is a schematic diagram of a batch downloading method of a profile profile according to Embodiment 2 of the present invention.
  • FIG. 7 is a schematic diagram of a process of generating a binding configuration file package according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of a process for distinguishing multiple binding configuration file packages according to an embodiment of the present disclosure
  • FIG. 9 is a schematic diagram of a subscription management data preparation server according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of a first server according to an embodiment of the present disclosure.
  • FIG. 11 is a schematic diagram of an eUICC terminal according to an embodiment of the present invention.
  • the embodiment of the present invention provides a configuration file profile acquisition and download method, a device, and a system, so that a subscription management data preparation server (Subscription Manager Data Preparation+, SM-DP+) can bind multiple binding configuration files (bound profile).
  • the package is delivered to the first server (such as a server deployed by a third-party service provider), and the first server obtains multiple binding configuration files corresponding to multiple eUICCs, and then configures the multiple bindings.
  • the file package is sent to the corresponding eUICC via the corresponding Local Profile Assistant (LPA), and the download and installation of the binding configuration file package is completed by the eUICC.
  • LPA Local Profile Assistant
  • FIG. 1 is a schematic diagram of a batch acquisition and download system of a profile profile according to an embodiment of the present invention.
  • the system includes: a contract management data preparation server SM-DP+, a first server, a plurality of local profile assistants LPAs corresponding to the plurality of eUICC terminals, and a plurality of eUICCs.
  • the subscription management data preparation server SM-DP+ is configured to receive information such as multiple preset public keys of multiple eUICCs sent by the first server, matching information corresponding to multiple eUICCs (for example, The subscription management data preparation server SM-DP+ is further configured to receive the domain name of the subscription management data preparation server SM-DP+, the digital certificate of the first server, and the like, and acquire multiple profiles corresponding to the matching information (protected profile package protected profile) a package or an unprotected profile package, and generating a plurality of binding configuration file packages corresponding to the plurality of eUICCs according to the plurality of profiles, and the binding configuration file package includes at least the preset public key of the eUICC The hash value and the public key included in the digital certificate of the subscription management data preparation server SM-DP+; wherein the plurality of eUICCs respectively correspond to the plurality of eUICC terminals, that is, each eUICC terminal is configured with a corresponding eUICC, and
  • a first server configured to send (not limited to) a plurality of preset public keys of the plurality of eUICCs and matching information of the plurality of eUICCs to the subscription management data preparation server SM-DP+
  • the first server is further used for Sending a domain name of the subscription management data preparation server SM-DP+, a digital certificate of the first server, and the like, and receiving a plurality of binding configuration file packages corresponding to the plurality of eUICCs generated by the subscription management data preparation server SM-DP+; and receiving After the eUICC digital certificate sent by the local configuration file assistant LPA of the eUICC terminal, the eUICC identity identifier EID in the eUICC digital certificate is obtained, and it is checked whether the eUICC identity identifier EID obtained in the first database is the same as the eUICC identity identifier obtained from the digital certificate.
  • the EID obtains a hash value of the preset public key of the eUICC corresponding to the eUICC identity identifier EID according to the eUICC identity identifier EID, and determines the binding of the eUICC according to the hash value of the preset public key.
  • the configuration package is packaged and the binding configuration package is sent to the eUICC via the local configuration file assistant LPA.
  • the hash value of the preset public key of each eUICC is stored corresponding to the eUICC identity identifier EID, so that there is a corresponding relationship between the two.
  • the first server may be a server deployed by a third-party service provider (ie, a contract management secure routing server, English: Subscription Manager-Secure Routing+, referred to as SM-SR+), and the third-party service provider includes but is not limited to enterprise users and group users.
  • the first server may also be part of the subscription management data preparation server SM-DP+; the first server may also be a Subscription Manager-Discovery Server (SM-DS). Wait.
  • SM-SR+ Subscription Manager-Secure Routing+
  • the local profile assistant LPA is configured to forward the eUICC digital certificate and the like sent by the eUICC to the first server, and download the binding configuration file package corresponding to the eUICC from the first server, and split the binding configuration file package corresponding to the eUICC.
  • Different data blocks (functions) are sequentially sent to the corresponding eUICC through an Application Protocol Data Unit command.
  • the eUICC is configured to sequentially receive different data blocks (functions) of the binding configuration file package sent by the local configuration file assistant LPA through the application protocol data unit, and decrypt the data block according to the generated session key to complete the binding configuration file.
  • Package installation is configured to forward the eUICC digital certificate and the like sent by the eUICC to the first server, and download the binding configuration file package corresponding to the eUICC from the first server, and split the binding configuration file package corresponding to the eUICC.
  • Different data blocks (functions) are sequentially sent to the corresponding eUICC through an Application Protocol Data Unit command.
  • the eUICC terminal includes at least a local profile assistant LPA and an eUICC.
  • the eUICC terminal includes an LPA and a corresponding eUICC, and the information sent by the eUICC terminal to the first server is sent by the LPA.
  • the local configuration file assistant LPA is used to manage the eUICC, forward the information sent by the eUICC, obtain the intent of the eUICC terminal user, and actively request to download, activate, and delete the profile.
  • the eUICC is provided by the communication module manufacturer, the terminal manufacturer, or the M2M industry customer. The eUICC provider subscribes and finally embeds into the eUICC terminal.
  • the eUICC terminal embeds the eUICC digital certificate of the eUICC (eUICC digital certificate including eUICC identity EID), eUICC information set 1 (eUICC_info_1), eUICC information set 2 (eUICC_info_2), pre-
  • the eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, the signature algorithm supported in the subsequent verification process, the specification version number, and the like;
  • eUICC information set 2 (eUICC_info_2) ) Includes eUICC capability information, such as supported specification versions, storage capabilities, and more.
  • the digital certificate and the digital signature are used for mutual authentication between devices (for example, the bidirectional authentication of the contract management data preparation server SM-DP+ and the first server, and the first server and the eUICC terminal) Two-way authentication).
  • devices for example, the bidirectional authentication of the contract management data preparation server SM-DP+ and the first server, and the first server and the eUICC terminal
  • Two-way authentication Two-way authentication.
  • the first device holds a pair of public and private key pairs, including a first device public key and a first device private key, and the first device public key is a public key included in the digital certificate of the first device; Hold one
  • the public-private key pair includes a second device public key and a second device private key, and the second device public key is a public key included in the digital certificate of the second device.
  • the first device sends a message M to the second device, and the first device encrypts the hash value (or message digest) of the message M using the first private key to generate a digital signature A.
  • the message M is used as the digital information, and the first device generates a hash value of the digital information (for example, the message M) through a hash function, and then uses the first private key pair held by the first device itself.
  • the hash value is encrypted to generate the digital signature A.
  • the first device sends the message M (ie, an example of digital information) and the digital signature A to the second device, the digital information being plaintext information.
  • the first device sends its own digital certificate, that is, the digital certificate of the first device, to the second device, where the second device first verifies the digital certificate of the first device, and if the digital certificate of the first device is verified, the The first public key in the digital certificate of the first device decrypts the digital signature A to obtain a hash value of the message M.
  • the second device may perform a calculation using the hash function on the message M, and compare the obtained result with the hash value of the decrypted message M. If the two are consistent, it may be determined that the digital signature A is
  • the first device is calculated by using its own unique first private key, so that the second device verifies the identity of the first device, and can also prove that the message M protected by the digital signature A has not been tampered with.
  • the second device may also generate a digital signature B based on the method for generating the digital signature A. The first device verifies the digital signature B sent by the second device based on the method for verifying the digital signature A. For the sake of brevity, it will not be repeated here.
  • the first embodiment of the present invention provides a method for batch obtaining and downloading a profile profile, which mainly includes a first phase and a second phase of two work phases.
  • the first phase is a batch acquisition of a profile profile
  • the second phase is a configuration file. Batch download of profiles.
  • the following takes the first server as the contract management security routing server SM-SR+ as an example.
  • FIG. 3 is a schematic diagram of a method for obtaining a batch of a profile profile according to the first embodiment of the present invention.
  • the first server SM-SR+ from the subscription management data preparation server SM-DP+ is provided in the first embodiment of the present invention.
  • the working principle and process of obtaining multiple binding configuration file packages includes step S101 - step S108:
  • the first server SM-SR+ Before the first server SM-SR+ starts to obtain multiple binding configuration file packages in batches, it also includes:
  • the first server SM-SR+ needs to obtain a matching information (matching ID or Activation Code Token) corresponding to multiple eUICCs from the operator, and obtain a subscription management data preparation server domain name (SM-DP+addr);
  • the eUICC Manufacturer eUMCC obtains the preset public key (PK_eUICCi_ECKA) of each eUICC terminal and the hash value h (PK_eUICCi_ECKA) of the preset public key (may also be obtained by the first server SM-SR+)
  • Preset public key calculation generates a hash value of the preset public key), eUICC information set 1 (eUICC_info_1), eUICC information set 2 (eUICC_info_2), eUICC identity EID (eUICC-ID); and will be manufactured from the operator, eUICC
  • the information obtained by the quotient is stored in the first database of the first server SM-SR+, wherein the hash value of the preset public key of each
  • a waiting configuration file download command corresponding to the above matching information exists in the subscription management data preparation server SM-DP+, and the waiting configuration file download command corresponds to multiple profiles (protected configuration file package or not Protected profile package).
  • the specific generation process of multiple profile profiles is detailed in Figure 7 and related text descriptions.
  • step S101 the first server SM-SR+ initiates and establishes a first https (Hyper Text Transfer Protocol over Secure Socket Layer) connection to the subscription management data preparation server SM-DP+ for subsequent interaction.
  • the signaling is performed by the first server SM-SR+ through the first https connection to the subscription management data preparation server SM-DP+, and at least includes the subscription management data preparation server domain name (SM-DP+addr), the first Information such as the server first random number (SR_challenge_1) and eUICC information set 1 (eUICC_info_1).
  • the first server first random number (SR_challenge_1) is generated by the first server SM-SR+, and has uniqueness and randomness, and can ensure interaction information between the first server SM-SR+ and the subscription management data preparation server SM-DP+.
  • Freshness; eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, the signature algorithm supported in the subsequent verification process, the specification version number, and the like.
  • Step S102 the subscription management data preparation server SM-DP+ verifies the subscription management data preparation server domain name (SM-DP+addr) sent by the first server SM-SR+ (to verify whether the domain name corresponds to the subscription management data preparation server SM-DP+) Verifying the content in the eUICC information set 1 (eUICC_info_1), if the verification is successful, generating a first interaction identifier (TransactionID_1), a contract management data preparation server random number (DP_challenge), and a contract management data preparation server digital signature, which is referred to herein as The contract management data preparation server first digital signature (DP_sign1); wherein the subscription management data preparation server first digital signature (DP_sign1) is a subscription management data preparation server SM-DP+ at least according to the first server first random number (SR_challenge_1), The contract management data preparation server random number (DP_challenge), the contract management data preparation server domain name (SM-DP+addr), and the first interaction identifier (TransactionID_1)
  • Step S103 the subscription management data preparation server SM-DP+ at least the first interaction identifier (TransactionID_1), the contract management data preparation server random number (DP_challenge), the contract management data preparation server first digital signature (DP_sign1), and the contract management data preparation server Domain name (SM-DP+addr), contract management data preparation server digital certificate (CERT.DP.ECDSA), Curve To Be Used (here refers to the contracted management data preparation server SM-DP+ selected key
  • the parameter reference value is sent to the first server SM-SR+ through the first https connection.
  • Step S104 the first server SM-SR+ verifies the received subscription management data preparation server digital certificate (CERT.DP.ECDSA) and the contract management data preparation server first digital signature (DP_sign1), and if the verification is successful, the contract is signed.
  • the data preparation server SM-DP authenticates successfully, and generates a first server digital signature, which is referred to herein as a first server first digital signature (SR_sign1); wherein the first server first digital signature (SR_sign1) is the first server SM -SR+ according to at least a plurality of preset public keys (PK.eUICC1.ECKA...PK.eUICCn.ECKA), matching information (matchingID or Activation Code Token), first interaction identifier (TransactionID_1), and contract management data of a plurality of eUICCs
  • the eUICC information set 2 includes at least eUICC capability information, such as a supported specification version, and storage, such as the supported network access mode (2G/3G/4G). Force or the like; wherein the plurality of the plurality of preset eUICC corresponding public key respectively.
  • the signing management data preparation server generates a first digital signature (DP_sign1) and the first server SM-SR+ validates the first digital signature (DP_sign1) of the subscription management data preparation server, see the first device and The second device performs a two-way authentication process.
  • the specific verification process of the first server SM-SR+ for the first digital signature (DP_sign1) of the subscription management data preparation server needs to be verified according to a specific signature algorithm.
  • the embodiment of the present invention adopts an elliptic curve signature algorithm ECDSA (Curve To Be). Used).
  • Step S105 The first server SM-SR+ at least the first interaction identifier (TransactionID_1), the plurality of preset public keys of the plurality of eUICCs, the subscription management data preparation server domain name (SM-DP+addr), and the matching information (matchingID or Activation) Code Token), terminal information (Device_info), eUICC information set 2 (eUICC_info_2), first server first digital signature (SR_sign1), first server digital certificate (CERT.SR.ECDSA) are sent to the contract management through the first https connection a data preparation server SM-DP+; wherein the plurality of eUICCs and the plurality of preset public keys are respectively correspond.
  • Step S106 the subscription management data preparation server SM-DP+ verifies the first server digital certificate (CERT.SR.ECDSA) and the first server first digital signature (SR_sign1). If the verification passes, the first server SM-SR+ The authentication succeeds, and the eligibility verification is performed according to the eUICC information set 2 (eUICC_info_2) and the terminal information (Device_info).
  • eUICC_info_2 the eUICC information set 2
  • Device_info the terminal information
  • the first server SM-DP+ sends an error message prompt and ends the operation; Successfully, check whether the subscription management data preparation server SM-DP+ has a waiting configuration file download command corresponding to the matching information (matchingID or Activation Code Token), and if so, acquire multiple profiles corresponding to the matching information (unprotected configuration file) Package or protected configuration package).
  • the contract management data preparation server SM-DP+ generates a one-time public-private key pair including a one-time private key (otSK.DP.ECKA) and a one-time public key (otPK.DP.ECKA).
  • the contract management data preparation server SM-DP+ generates a plurality of session keys corresponding to the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs and the one-time private key (otSK.DP.ECKA) of the subscription management data preparation server (session) Keys), referred to herein as the first session key.
  • the one-time public-private key pair of the subscription management data preparation server used by the plurality of profiles corresponding to the same waiting profile download command is the same, and the subscription management data preparation used by the plurality of profiles corresponding to the different waiting profile download commands is prepared.
  • the server's one-time public and private key pairs are not the same.
  • the subscription management data preparation server SM-DP+ generates, for each eUICC, a digital signature of the subscription management data preparation server according to at least the generated one-time public key and the preset public key of the eUICC, which is referred to herein as a subscription management data preparation server.
  • Two digital signatures DP_sign2. Therefore, for a plurality of eUICCs, the contract management data preparation server SM-DP generates a corresponding plurality of DP_sign2.
  • the plurality of preset public keys of the plurality of eUICCs sent by the first server SM-SR+ are hashed to generate hash values of the plurality of preset public keys respectively corresponding to the plurality of eUICCs.
  • the subscription management data preparation server SM-DP+ generates a binding configuration file according to at least a first session key corresponding to each eUICC and a corresponding profile profile (for example, a protected profile). package. Therefore, for multiple eUICCs, multiple corresponding binding profile packages are generated.
  • the binding configuration file package is generated by the subscription management data preparation server SM-DP+, and through a key agreement with the eUICC, that is, a first session key is generated by key negotiation, and one is The protected configuration file package is associated with a specific eUICC.
  • Each binding configuration file package is composed of consecutive TLV (Tag Length Value) commands, including the following TLV commands: initializing the secure channel data block ('InitialiseSecureChannel'block), Configure ISDP (Issuer Security Domain Profile) data block ('ConfigureISDP' block), store metadata data block ('StoreMetadata' block), and profile protection key data block ('Profile Protection Keys' block) and protected configuration file package.
  • TLV Tag Length Value
  • SCP03t payload TLVs of the Protected profile package wherein the data block configures an ISDP data block, a storage metadata data block, and a configuration file protection key data block (optional, when the subscription management data preparation server SM-DP+ When generating the profile key) Encryption and integrity guarantees through the first session keys .
  • the subscription management data preparation server SM-DP+ stores the hash values of the preset public keys of the plurality of eUICCs in the Initialise Secure Channel data blocks of the plurality of binding configuration file packages, and the initialization security channel data is initialized.
  • the block further includes at least a subscription management data preparation server one-time public key (otPK.DP.ECKA), a public key of the contract management data preparation server digital certificate (PK.DPpb.ECDSA), and a second digital signature of the contract management data preparation server ( DP_sign2) and the hash value of the preset public key corresponding to eUICC.
  • otPK.DP.ECKA a subscription management data preparation server one-time public key
  • PK.DPpb.ECDSA public key of the contract management data preparation server digital certificate
  • DP_sign2 second digital signature of the contract management data preparation server
  • step S107 the subscription management data preparation server SM-DP+ sends a plurality of binding configuration file packages to the first server SM-SR+.
  • Step S108 The first server SM-SR+ stores the acquired multiple binding configuration file packages in the first database. It should be noted that, because the hash value of the preset public key of the multiple eUICCs in the first database is correspondingly stored and the multiple eUICC identity identifiers EID, the first server SM-SR+ can obtain the corresponding information according to the eUICC identity identifier EID. The hash value of the pre-public key of the eUICC, and then the root According to the hash value of the preset public key of the eUICC, the binding configuration file package of the hash value of the same preset public key stored in the corresponding security channel data block is obtained, and the specific process is shown in FIG. 8 and related text description.
  • FIG. 4 is a schematic diagram of a batch downloading method of a profile profile according to Embodiment 1 of the present invention.
  • the first embodiment of the present invention provides an eUICC to download a binding profile package from a first server and implement installation.
  • the process and principle include step S201 - step S219:
  • step S201 the local profile assistant LPA sends a random number acquisition request to the eUICC.
  • Step S202 the eUICC receives the random number acquisition request, and generates an eUICC random number (eUICC_challenge).
  • Step S203 The eUICC sends at least the eUICC random number (eUICC_challenge) and the eUICC information set 1 (eUICC_info_1) to the local profile assistant LPA; wherein the eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, and is subsequently verified.
  • Step S204 the local profile assistant LPA establishes a second https connection with the first server SM-SR+ to perform encryption and integrity protection on the subsequent interaction signaling; the local profile assistant LPA connects at least the eUICC random number through the second https connection ( eUICC_challenge), the eUICC information set 1 (eUICC_info_1), and the first server domain name (SM-SR+addr) are sent to the first server SM-SR+; it should be noted that the local configuration file assistant LPA has previously learned the first server domain name (SM) -SR+addr), for example, when the first server domain name is preset in the LPA (when the eUICC terminal is shipped), or when the first server domain name is preset in the eUICC terminal for the LPA to access the first server SM-SR+.
  • SM server domain name
  • the first server SM-SR+ verifies the first server domain name (SM-SR+addr) and eUICC information set 1 (eUICC_info_1) sent by the local profile assistant LPA, and after the verification succeeds, generates a second interaction identifier ( TransactionID_2) and the first server digital signature, here referred to as the first server second digital signature (SR_sign2), the first server second random number (SR_challenge_2), if any of the above verification fails, the error message prompts and ends Fuck
  • the first server second random number (SR_challenge_2) is generated by the first server SM-SR+;
  • the first server second digital signature (SR_sign2) is determined by the first server SM-SR+ according to at least the eUICC random number (eUICC_challenge),
  • a server second random number (SR_challenge_2), a second interaction identifier (TransactionID_2), and a first server domain name (SM-SR+addr) are generated.
  • Step S206 the first server SM-SR+ at least the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), the first server second digital signature (SR_sign2), the first server digital certificate (CERT.SR) .ECDSA), Curve To Be Used (here referred to as the key parameter reference value selected by the first server) is sent to the local profile assistant LPA.
  • TransactionID_2 the second interaction identifier
  • SR_challenge_2 the first server second random number
  • SR_sign2 the first server second digital signature
  • CERT.SR the first server digital certificate
  • Curve To Be Used here referred to as the key parameter reference value selected by the first server
  • Step S207 the local profile assistant LPA sets a second interaction identifier (TransactionID_2), a first server second random number (SR_challenge_2), a first server second digital signature (SR_sign2), and a first server digital certificate (CERT.SR.ECDSA). ), elliptic curve type is forwarded to eUICC.
  • TransactionID_2 a second interaction identifier
  • SR_challenge_2 a first server second random number
  • SR_sign2 a first server second digital signature
  • CERT.SR.ECDSA first server digital certificate
  • Step S208 the eUICC verifies the first server digital certificate (CERT.SR.ECDSA) and the first server second digital signature (SR_sign2). If the verification succeeds, the eUICC authentication succeeds, and the eUICC digital signature is generated, which is referred to herein. It is an eUICC first digital signature (eUICCi_Sign1), and the eUICC first digital signature (eUICCi_Sign1) is based at least on the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), and the first server domain name (SM-SR+) Addr) and eUICC information set 2 (eUICC_info_2) are generated.
  • eUICCi_Sign1 eUICC first digital signature
  • TransactionID_2 the first server second random number
  • SR_challenge_2 the first server domain name
  • Addr eUICC information set 2
  • Step S209 the eUICC at least the second interaction identifier (TransactionID_2), the first server domain name (SM-SR+addr), the terminal information (Device_info), the eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1), eUICC
  • the digital certificate (CERT_EUICC_ECDSA) and the eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the local profile assistant LPA.
  • Step S210 The local profile assistant LPA sets at least a second interaction identifier (TransactionID_2), a first server domain name (SM-SR+addr), terminal information (Device_info), The eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1), the eUICC digital certificate (CERT_EUICC_ECDSA), and the eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the first server.
  • TransactionID_2 a second interaction identifier
  • SM-SR+addr terminal information
  • Device_info terminal information set 2
  • eUICC_info_2 The eUICC information set 2
  • eUICCi_Sign1 the eUICC first digital signature
  • CERT_EUICC_ECDSA the eUICC digital certificate
  • CERT_EUM_ECDSA eUICC manufacturer digital certificate
  • Step S211 the first server SM-SR+ verifies the eUICC manufacturer digital certificate (CERT_EUM_ECDSA), the eUICC digital certificate (CERT_EUICC_ECDSA), and the eUICC first digital signature (eUICCi_Sign1). If the verification succeeds, the eUICC authentication succeeds, and the verification is performed. Whether the EID of the eUICC identity EID included in the eUICC digital certificate is the same as the EID of the eUICC, and if so, the hash value of the preset public key of the eUICC corresponding to the eUICC identity EID is obtained, and then the preset of the eUICC is utilized. The hash value of the key determines the binding configuration file package corresponding to the eUICC (see Figure 8 and related text description for the determination process). If any of the above verification fails, the error message prompts and the operation ends.
  • CERT_EUM_ECDSA the eUICC digital certificate
  • Step S212 the first server SM-SR+ sends at least the binding configuration file package corresponding to the eUICC to the local configuration file assistant LPA; wherein the binding configuration file package includes at least the one-time public key of the subscription management data preparation server (otPK.DP) .ECKA), the contract management data preparation server digital certificate public key (PK.DP.ECDSA), the contract management data preparation server second digital signature (DP_sign2), and the hash value of the eUICC preset public key.
  • the binding configuration file package includes at least the one-time public key of the subscription management data preparation server (otPK.DP) .ECKA), the contract management data preparation server digital certificate public key (PK.DP.ECDSA), the contract management data preparation server second digital signature (DP_sign2), and the hash value of the eUICC preset public key.
  • Step S213 the local configuration file assistant LPA sends the different data blocks of the binding configuration file package to the eUICC by repeatedly initiating the load binding configuration file package function ("ES10b.LoadBoundProfilePackage" function), including initializing the secure channel data block/initialization security.
  • E10b.LoadBoundProfilePackage load binding configuration file package function
  • Step S214 after receiving the initial secure channel data block, the eUICC prepares the subscription management data in the secure channel data block by using the digital certificate public key (PK.DPpb.ECDSA) of the subscription management data preparation server in the secure channel data block.
  • the server second digital signature (DP_sign2) performs verification (ie, integrity verification is performed on the subscription management data preparation server one-time public key (otPK.DP.ECKA) protected in the second digital signature (DP_sign2) of the subscription management data preparation server), If If the verification is successful, the first session key is generated according to the preset private key (SK_eUICCi_ECKA) of the corresponding eUICC and the one-time public key (otPK.DP.ECKA) of the subscription management data preparation server, and is tied by the first session key.
  • the encrypted data block in the configuration file package is decrypted to complete the installation process.
  • step S215 the eUICC sends a profile installation result (Profile Installation Result) to the local profile assistant LPA.
  • Profile Installation Result a profile installation result
  • step S216 the local profile assistant LPA forwards the configuration file installation result to the first server SM-SR+.
  • Step S217 after receiving the configuration file installation result, the first server SM-SR+ sends an acknowledgement message to the local profile assistant LPA.
  • step S218 the local profile assistant LPA sends a list removal notification command (RemoveNotificationFromList) to the eUICC.
  • step 219 the eUICC receives the list removal notification command (RemoveNotificationFromList) and deletes the configuration file installation result.
  • the second embodiment of the present invention provides a method for batch obtaining and downloading a profile profile, which mainly includes a first phase and a second phase of two work phases.
  • the first phase is a batch acquisition of a profile profile
  • the second phase is a configuration file. Batch download of profiles.
  • FIG. 5 is a schematic diagram of a method for obtaining a profile profile in batches according to Embodiment 2 of the present invention.
  • the second embodiment of the present invention provides a first server SM-DP+ slave subscription management data preparation server SM-SR+ batch.
  • the working process and principle of acquiring multiple binding configuration file packages includes step S101'-step S108'.
  • Step S101' the first server SM-SR+ initiates and establishes a first https connection to the subscription management data preparation server SM-DP+ to perform encryption and integrity protection on the subsequent interaction signaling; the first server SM-SR+ passes the first https Connection to the contract management data preparation server SM-DP+ transmission At least the information including the contract management data preparation server domain name (SM-DP+addr), the first server first random number (SR_challenge_1), and the eUICC information set 1 (eUICC_info_1).
  • SM-DP+addr the contract management data preparation server domain name
  • SR_challenge_1 the first server first random number
  • eUICC_info_1 the eUICC information set 1
  • the first server first random number (SR_challenge_1) is generated by the first server SM-SR+, and has uniqueness and randomness, and can ensure interaction information between the first server SM-SR+ and the subscription management data preparation server SM-DP+.
  • Freshness; eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, the signature algorithm supported in the subsequent verification process, the specification version number, and the like.
  • Step S102' the subscription management data preparation server SM-DP+ verifies the subscription management data preparation server domain name (SM-DP+addr) sent by the first server SM-SR+ (verifies whether the domain name corresponds to the subscription management data preparation server SM-DP+) And verifying the content in the eUICC information set 1 (eUICC_info_1), if the verification is successful, generating a first interaction identifier (TransactionID_1), a contract management data preparation server random number (DP_challenge), and a contract management data preparation server first digital signature (DP_sign1)
  • the contract management data preparation server first digital signature (DP_sign1) is a contract management data preparation server SM-DP+ at least according to the first server first random number (SR_challenge_1), the contract management data preparation server random number (DP_challenge), signing Management data preparation server domain name (SM-DP+addr) and first interaction identifier (TransactionID_1) generation; if the subscription management data preparation server domain name (SM-DP+add
  • Step S103' the subscription management data preparation server SM-DP+ at least the first interaction identifier (TransactionID_1), the contract management data preparation server random number (DP_challenge), the contract management data preparation server first digital signature (DP_sign1), and the contract management data preparation
  • TransactionID_1 the first interaction identifier
  • DP_challenge the contract management data preparation server random number
  • DP_sign1 the contract management data preparation server first digital signature
  • DP_sign1 the contract management data preparation
  • the server domain name (SM-DP+addr), the contract management data preparation server digital certificate (CERT.DP.ECDSA), and the elliptic curve type is sent to the first server SM-SR+ through the first https connection.
  • Step S104' the first server SM-SR+ prepares the server digital certificate (CERT.DP.ECDSA) and the contract management data preparation server first digital signature for the received contract management data.
  • (DP_sign1) performs verification. If the verification is successful, the authentication of the subscription data preparation server SM-DP is successful, and the first digital signature of the first server (SR_sign1) is generated; wherein the first digital signature of the first server (SR_sign1) is the first
  • the server SM-SR+ is based on at least a plurality of preset public keys (PK.eUICC1.ECKA...PK.eUICCn.ECKA), matching information (matchingID or Activation Code Token), first interaction identifier (TransactionID_1), and subscription of a plurality of eUICCs.
  • the management data preparation server random number (DP_challenge), the subscription management data preparation server domain name (SM-DP+addr), the terminal information (Device_info), and the eUICC information set 2 (eUICC_info_2) are generated; wherein the terminal information (Device_info) includes at least the terminal Capabilities, such as supported network access methods (2G/3G/4G), etc., eUICC information set 2 (eUICC_info_2) includes at least eUICC capability information, such as supported specification versions, storage capabilities, and the like.
  • the signing management data preparation server generates a first digital signature (DP_sign1) and the first server SM-SR+ validates the first digital signature (DP_sign1) of the subscription management data preparation server, see the first device and The second device performs a two-way authentication process.
  • the specific verification process of the first server SM-SR+ for the first digital signature (DP_sign1) of the subscription management data preparation server needs to be verified according to a specific signature algorithm.
  • the embodiment of the present invention adopts an elliptic curve signature algorithm ECDSA (Curve To Be). Used).
  • Step S105' the first server SM-SR+ at least the first interaction identifier (TransactionID_1), the plurality of preset public keys of the plurality of eUICCs, the subscription management data preparation server domain name (SM-DP+addr), and the matching information (matchingID or Activation Code Token), terminal information (Device_info), eUICC information set 2 (eUICC_info_2), first server first digital signature (SR_sign1), first server digital certificate (CERT.SR.ECDSA) are sent to the contract via the first https connection Manage the data preparation server SM-DP+.
  • TransactionID_1 the first interaction identifier
  • SM-DP+addr the subscription management data preparation server domain name
  • matching information matchingID or Activation Code Token
  • terminal information Device_info
  • eUICC information set 2 eUICC information set 2
  • SR_sign1 first server first digital signature
  • CERT.SR.ECDSA first server digital certificate
  • steps S101' to S105' are the same as steps S101 to S105 in the first embodiment.
  • Step S106' the contract management data preparation server SM-DP+ verifies the first server digital certificate (CERT.SR.ECDSA) and the first server first digital signature (SR_sign1), if After the verification is passed, the first server SM-SR+ is successfully authenticated, and the eligibility verification is performed according to the eUICC information set 2 (eUICC_info_2) and the terminal information (Device_info). If any of the above verification fails, the first server SM-DP+ Send the error message prompt and end the operation; if the verification is successful, check whether the subscription management data preparation server SM-DP+ has a waiting configuration file download command corresponding to the matching information (matchingID or Activation Code Token), and if so, obtain and match the information. Corresponding multiple profiles (unprotected profile packages or protected profile packages).
  • the subscription management data preparation server SM-DP+ generates a plurality of session keys, where the session key is referred to as a second session key, and the generated second session key is a generated random number, the plurality of The second session key is respectively associated with the plurality of eUICCs, and the plurality of second session keys are separately encrypted by using the plurality of preset public keys of the plurality of eUICCs to obtain a plurality of encrypted second session keys (encrypted session keys).
  • the contract management data preparation server SM-DP+ generates a digital signature for each eUICC based on at least the encrypted second session key (encrypted session keys) and the preset public key of the eUICC, which is referred to herein as a contract management data preparation server.
  • a contract management data preparation server Three digital signatures (DP_sign3). Therefore, for a plurality of eUICCs, the contract management data preparation server SM-DP generates a corresponding plurality of DP_sign3s.
  • the subscription management data preparation server SM-DP+ generates a binding configuration file package according to at least a second session key corresponding to each eUICC and a corresponding profile profile (eg, a protected profile). Therefore, for multiple eUICCs, multiple corresponding binding profile packages are generated.
  • Each binding configuration file package is composed of consecutive TLV (Tag Length Value) commands, including the following TLV commands: initializing the secure channel data block ('InitialiseSecureChannel' block), configuring the ISDP data block ('ConfigureISDP'block), and storing the element Data block ('StoreMetadata' block) and profile protection key data block ('Profile Protection Keys' block) and protected profile package TLV command (SCP03t payload TLVs of the Protected profile Package), wherein the data block configures the ISDP data block, the storage metadata data block, and the configuration file protection key data block (optionally, when the subscription management data preparation server SM-DP+ generates the configuration file key) passes the second session Session keys for encryption and integrity protection.
  • TLV Tag Length Value
  • the contract management data preparation server SM-DP+ stores the hash values of the plurality of preset public keys of the plurality of eUICCs in the Initialise Secure Channel data block of the plurality of binding configuration files, respectively;
  • the channel data block further includes at least a subscription management data preparation server digital certificate public key (PK.DPpd.ECDSA), a contract management data preparation server third digital signature (DP_sign3), and an encrypted second session key.
  • PK.DPpd.ECDSA subscription management data preparation server digital certificate public key
  • DP_sign3 contract management data preparation server third digital signature
  • the specific generation process of the binding configuration file package is shown in Figure 7 and related text descriptions.
  • step S107' the contract management data preparation server SM-DP+ transmits a plurality of binding configuration file packages to the first server SM-SR+.
  • Step S108' the first server SM-SR+ stores the acquired plurality of binding configuration file packages in the first database.
  • the first server SM-SR+ can identify the EID according to the eUICC identity.
  • the file package, the specific process is shown in Figure 8 and related text description.
  • steps S107' and S108' are the same as steps S107 and S108 in the first embodiment.
  • FIG. 6 is a schematic diagram of a batch downloading method of a configuration file profile according to Embodiment 2 of the present invention.
  • the second embodiment of the present invention provides an eUICC downloading a binding configuration file package from a first server and implementing the installation work.
  • the process and principle include step S201'-step S219':
  • step S201' the local profile assistant LPA sends a random number acquisition request to the eUICC.
  • Step S202' the eUICC receives the random number acquisition request, and generates an eUICC random number. (eUICC_challenge).
  • Step S203' the eUICC sends at least the eUICC random number (eUICC_challenge) and the eUICC information set 1 (eUICC_info_1) to the local profile assistant LPA; wherein the eUICC information set 1 (eUICC_info_1) includes the format of the digital certificate supported by the eUICC, The signature algorithm, specification version number, etc. supported during the verification process.
  • eUICC_info_1 includes the format of the digital certificate supported by the eUICC, The signature algorithm, specification version number, etc. supported during the verification process.
  • Step S204' the local profile assistant LPA establishes a second https connection with the first server SM-SR+ to perform encryption and integrity protection on the subsequent interaction signaling; the local profile assistant LPA connects at least the eUICC random number through the second https connection.
  • eUICC_challenge eUICC information set 1 (eUICC_info_1)
  • first server domain name eUICC_SR+addr
  • the local profile assistant LPA has previously learned the first server domain name ( SM-SR+addr), for example, when the first server domain name is preset in the LPA (when the eUICC terminal is shipped), or when the first server domain name is preset in the eUICC terminal for the LPA to access the first server SM-SR+.
  • Step S205 ′ the first server SM-SR+ verifies the first server domain name (SM-SR+addr) and eUICC information set 1 (eUICC_info_1) sent by the local profile assistant LPA, and after the verification succeeds, generates a second interaction identifier.
  • TransactionID_2 the first server second digital signature (SR_sign2), the first server second random number (SR_challenge_2), if any of the above verification fails, replying with an error message prompting and ending the operation;
  • the first server second random number (SR_challenge_2) is generated by the first server SM-SR+;
  • the first server second digital signature (SR_sign2) is determined by the first server SM-SR+ according to at least the eUICC random number (eUICC_challenge), the first server second random number (SR_challenge_2),
  • the second interaction identifier (TransactionID_2) and the first server domain name (SM-SR+addr) are generated.
  • Step S206' the first server SM-SR+ at least the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), the first server second digital signature (SR_sign2), the first server digital certificate (CERT. SR.ECDSA), elliptic curve type is sent to the local profile assistant LPA.
  • TransactionID_2 the second interaction identifier
  • SR_challenge_2 the first server second random number
  • SR_sign2 the first server second digital signature
  • CERT. SR.ECDSA the first server digital certificate
  • elliptic curve type is sent to the local profile assistant LPA.
  • Step S207' the local profile assistant LPA sets a second interaction identifier (TransactionID_2), a first server second random number (SR_challenge_2), a first server second digital signature (SR_sign2), and a first server digital certificate (CERT.SR. ECDSA), elliptic curve type is forwarded to eUICC.
  • TransactionID_2 a second interaction identifier
  • SR_challenge_2 a first server second random number
  • SR_sign2 a first server second digital signature
  • CERT.SR. ECDSA a first server digital certificate
  • Step S208' the eUICC verifies the first server digital certificate (CERT.SR.ECDSA) and the first server second digital signature (SR_sign2). If the verification is successful, the eUICC authentication succeeds, and the eUICC first digital signature is generated ( eUICCi_Sign1), the eUICC first digital signature (eUICCi_Sign1) is based at least on the second interaction identifier (TransactionID_2), the first server second random number (SR_challenge_2), the first server domain name (SM-SR+addr), and the eUICC information set 2 ( eUICC_info_2) is generated.
  • TransactionID_2 the second interaction identifier
  • SR_challenge_2 the first server domain name
  • eUICC_info_2 the eUICC information set 2
  • Step S209' the eUICC at least the second interaction identifier (TransactionID_2), the first server domain name (SM-SR+addr), the terminal information (Device_info), the eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1),
  • the eUICC digital certificate (CERT_EUICC_ECDSA) and the eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the local profile assistant LPA.
  • Step S210' the local profile assistant LPA at least the second interaction identifier (TransactionID_2), the first server domain name (SM-SR+addr), the terminal information (Device_info), the eUICC information set 2 (eUICC_info_2), the eUICC first digital signature (eUICCi_Sign1), eUICC digital certificate (CERT_EUICC_ECDSA), eUICC manufacturer digital certificate (CERT_EUM_ECDSA) are sent to the first server SM-SR+.
  • TransactionID_2 the second interaction identifier
  • SM-SR+addr the terminal information
  • Device_info the terminal information set 2
  • eUICC_info_2 the eUICC first digital signature
  • CERT_EUICC_ECDSA eUICC digital certificate
  • CERT_EUM_ECDSA eUICC manufacturer digital certificate
  • Step S211' the first server SM-SR+ verifies the eUICC manufacturer digital certificate (CERT_EUM_ECDSA), the eUICC digital certificate (CERT_EUICC_ECDSA), and the eUICC first digital signature (eUICCi_Sign1). If the verification is successful, the eUICC authentication succeeds, and the verification is successful. Whether the EID of the eUICC identity EID included in the eUICC digital certificate (CERT_EUICC_ECDSA) is the same as the EID of the eUICC, and if so, the hash value of the preset public key of the eUICC corresponding to the eUICC identity EID is obtained.
  • the binding configuration file package corresponding to the eUICC is determined by using the hash value of the preset public key of the eUICC (the determination process is detailed in FIG. 8 and related text description), and if any of the above verification fails, the error information prompts and the operation ends.
  • Step S212' the first server SM-SR+ sends at least the binding configuration file package corresponding to the eUICC to the local configuration file assistant LPA; wherein the binding configuration file package includes at least the subscription management data preparation server digital certificate public key (PK. DP.ECDSA), encrypted second session key (encrypted session keys), subscription management data preparation server third digital signature (DP_sign3), hash value of the eUICC's preset public key.
  • PK. DP.ECDSA subscription management data preparation server digital certificate public key
  • DP_sign3 subscription management data preparation server third digital signature
  • Step S213' the local configuration file assistant LPA sends the different data blocks of the binding configuration file package to the eUICC by repeatedly initiating the load binding configuration file package function ("ES10b.LoadBoundProfilePackage" function), including initializing the secure channel data block/initialization.
  • Secure channel data block function configure ISDP data block/configuration ISDP function, store metadata data block/storage metadata function, and configuration file protection key data block/profile protection key function and profile element.
  • the steps S201' to S213' are the same as the steps S201 to S213 in the first embodiment.
  • Step S214' after receiving the initialization secure channel data block, the eUICC uses the digital certificate public key (PK.DPpb.ECDSA) of the subscription management data preparation server in the secure channel data block to sign the management data in the secure channel data block.
  • PK.DPpb.ECDSA digital certificate public key
  • DP_sign3 Preparing a server third digital signature (DP_sign3) for verification (ie, performing integrity verification on the encrypted second session key corresponding to the eUICC preset public key (PK_eUICCi_ECKA) in the third digital signature (DP_sign3) of the subscription management data preparation server)
  • SK_eUICCi_ECKA preset private key of the corresponding eUICC
  • the encrypted data block is decrypted to complete the installation process; wherein the preset private key (SK_eUICCi_ECKA) of the eUICC corresponds to the preset public key (PK_eUICCi_ECKA) of the eUICC, and the preset private key (SK_eUICCi_ECKA) and the preset public key ( PK_eUICCi_ECKA) is a pair of preset public and private key pairs, using the preset public key After (PK_eUICCi_ECKA) is encrypted, it needs to be decrypted with the preset private key (SK_eUICCi_ECKA).
  • step S215' the eUICC sends a profile installation result (Profile Installation Result) to the local profile assistant LPA.
  • Profile Installation Result a profile installation result
  • step S216' the local profile assistant LPA forwards the configuration file installation result to the first server SM-SR+.
  • Step S217' after receiving the configuration file installation result, the first server SM-SR+ sends an acknowledgement message to the local profile assistant LPA.
  • step S218' the local profile assistant LPA sends a list removal notification command (RemoveNotificationFromList) to the eUICC.
  • step 219' the eUICC receives the list removal notification command (RemoveNotificationFromList) and deletes the configuration file installation result.
  • steps S215' to S219' are the same as steps S215 to S219 in the first embodiment.
  • FIG. 7 is a schematic diagram of a process of generating a binding configuration file package according to an embodiment of the present invention. As shown in FIG. 7 , the process of generating a plurality of binding configuration file packages by the subscription management data preparation server SM-DP+ includes steps S71-S73. :
  • Step S71 Before the connection with the first server SM-SR+ is established, the subscription management data preparation server SM-DP+ generates multiple corresponding eUICCs according to the information provided by the operator contract (the service provider subscription information of the first server is deployed). Unprotected profile package, each unprotected profile package consists of multiple data blocks (PETLV1, PETLV2...PETLVn).
  • Step S72 the subscription management data preparation server SM-DP+ adopts multiple session keys (first session key or second session key) or multiple profile protection keys as corresponding multiple unprotected
  • the configuration file package is separately encrypted to generate multiple protected configuration file packages. (protected profile package), the generated protected configuration file package consists of multiple encrypted data blocks (Segment1, Segment2...Segmentn).
  • the subscription management data preparation server SM-DP+ can acquire a plurality of protected configuration file packages or a plurality of unprotected configuration file packages by waiting for the configuration file download command.
  • Step S73 after receiving the matching information sent by the first server SM-SR+, the subscription management data preparation server SM-DP+ determines, according to the matching information, whether there is a waiting configuration file download command corresponding to the matching information, and if so, acquires Wait for multiple profiles (multiple protected configuration files or multiple unprotected configuration files) corresponding to the configuration file download command.
  • the contract management data preparation server SM-DP+ generates an initial security channel data block ('Initialise Secure Channel' block, including a plaintext TLV command, such as a TLV command for key agreement related content), and an ISDP data block ('Configure ISDP'block, Contains TLV commands for ISDP generation and configuration), storage metadata blocks ('Store Metadata' block, TLV commands containing metadata for configuration files), and profile protection key blocks ('Profile Protection keys' block, including configuration) a TLV command for protecting a key; wherein the initializing the secure channel data block includes at least a subscription management data preparation server second digital signature (DP-sign2) or a contract management data preparation server third digital signature (DP-sign3), subscription management The public key (PK.DPpb.ECDSA) of the data preparation server digital certificate, the one-time public key or the encrypted second session key of the contract management data preparation server, and the subscription management data preparation server SM-DP+ according to the preset of the corresponding eUICC
  • Configure ISDP data blocks store metadata data blocks, and configure file protection key modules (optionally, when the subscription management data preparation server SM-DP+ generates the configuration file key, the corresponding session key (the first session key or the second session key) is used for encryption.
  • the contract management data preparation server SM-DP+ places the above-mentioned secure initialization channel data block, configuration ISDP data block, storage metadata data block, and configuration file protection key data block in the above-mentioned protected matching file package (protected configuration file package SCP03t payload) Before TLV), the binding configuration package is composed.
  • the local configuration file assistant LPA splits the binding configuration file package into different data blocks (as shown in Figure 7 for the split configuration file package, the specific split mode is as shown in the figure).
  • the data blocks are sent to the eUICC in sequence through the application protocol data unit command (APDU command).
  • APDU command application protocol data unit command
  • the Segmented Bound Profile Package (SBPP) is generated by the Local Profile Assistant LPA, and the Local Profile Assistant LPA passes each split segment through the APDU (Application Protocol).
  • the data unit, English: ApplicationProtocolDataUnit) command is sent to eUICC, where each split segment is up to 255 bytes (bytes).
  • the first server SM-SR+ can distinguish the binding configuration file package according to the hash value of the preset public key of the corresponding eUICC in the initialization security channel.
  • the specific differentiation process is shown in Figure 8 and related text descriptions.
  • FIG. 8 is a schematic diagram of a process for distinguishing multiple binding configuration file packages according to an embodiment of the present invention. As shown in FIG. 8, the specific process and principle of the first server SM-SR+ distinguishing multiple binding configuration file packages in the first database is :
  • the hash value of the preset public key of the plurality of eUICCs is correspondingly stored with the plurality of eUICC identity identifiers EID (as shown in part 01 in FIG. 8), and the first server SM-SR+ can be based on the eUICC
  • the hash value of the preset public key or the eUICC identity EID acquires another information, that is, the first server SM-SR+ can obtain the eUICC identity EID according to the hash value of the preset public key of the eUICC, the first server The SM-SR+ can also obtain the hash value of the preset public key of the eUICC according to the eUICC identity EID.
  • Step S81 After completing the identity verification of the eUICC, the first server SM-SR+ obtains the eUICC identity identifier EID from the eUICC digital certificate received by the local profile assistant LPA, and checks whether the eUICC identity identifier is stored in the first database. EID, if yes, execute step S82, otherwise send an error message to the local profile assistant LPA and end the operation.
  • Step S82 Search for a hash value of the preset public key of the eUICC corresponding to the eUICC identity identifier EID in the first database according to the eUICC identity identifier EID.
  • Step S83 searching for a corresponding initial security channel data block of the plurality of binding configuration file packets stored in the first database according to the hash value of the preset public key of the eUICC, and if the security channel data of the binding configuration file package is initialized
  • the block stores the hash value of the preset public key of the same eUICC, and determines that the binding configuration file package is the binding configuration file package corresponding to the eUICC, and sends the binding configuration file corresponding to the eUICC to the corresponding eUICC.
  • LPA Local Profile Assistant
  • an eUICC terminal needs to obtain a binding configuration file package corresponding to the eUICC on the eUICC terminal from the first database of the first server SM-SR+, and the eUICC sends the LSI to the first server SM-SR+ through the LPA of the eUICC terminal.
  • a plurality of preset public keys, matching information, and related information of the plurality of eUICCs wherein the related information includes at least a digital signature generated by the eUICC (ie, an eUICC first digital signature), an eUICC digital certificate, and an eUICC manufacturer digital certificate.
  • the server SM-SR+ After the server SM-SR+ verifies the digital signature generated by the eUICC manufacturer digital certificate, the eUICC digital certificate, and the eUICC, the eUICC identity EID is obtained from the eUICC digital certificate; the first server SM-SR+ searches the first database, and determines After the eUICC identity EID (for example, EID2) in the first database is the same as the eUICC identity identifier EID obtained from the eUICC digital certificate, the eUICC corresponding to the eUICC is searched in the first database according to the eUICC identity identifier EID2.
  • EID2 the eUICC identity identifier
  • the hash value of the key 2 because the hash value 2 of the preset public key of the corresponding eUICC is stored in the initialization security channel data block in the binding configuration file package 2, Determining the binding profile of the package 2 eUICC binding configuration corresponding to that package.
  • FIG. 9 is a schematic diagram of a subscription management data preparation server according to an embodiment of the present invention.
  • the subscription management data preparation server 900 includes at least a receiver 901, a processor 902, and a transmitter 903.
  • Figure 9 only shows a simplified design of the structure of the contract management data preparation server.
  • the contract management data preparation server structure shown in FIG. 9 does not constitute a limitation on the contract management data preparation server, and the contract management data preparation server may include more or less components than the illustration 9, for example, a contract management data preparation server.
  • a memory for storing instructions corresponding to the communication algorithm may also be included.
  • the receiver 901 and the transmitter 903 may also be integrated to form a transceiver.
  • the receiver 901 is configured to receive matching information of multiple embedded universal integrated circuit cards eUICC sent by the first server.
  • the processor 902 is configured to check whether there is a waiting configuration file download command corresponding to the matching information, and if there is the waiting for matching file download command, acquire a plurality of configuration file profiles corresponding to the waiting configuration file download command; a plurality of session keys respectively corresponding to the plurality of eUICCs; generating a plurality of binding profile packages according to the plurality of session keys and the plurality of profile profiles.
  • the transmitter 903 is configured to send the multiple binding configuration file package to the first server, so that the eUICC downloads the binding configuration file package from the first server.
  • the receiver 901 is further configured to receive a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC sent by the first server, where the plurality of eUICCs respectively correspond to the plurality of preset public keys.
  • the processor 902 is further configured to generate a one-time public-private key pair, and generate multiple session keys corresponding to the multiple eUICCs according to the multiple preset public keys of the multiple eUICCs and the one-time private key. .
  • the binding configuration file package includes at least the one-time public key and the subscription management data.
  • the public key generates a second digital signature of the subscription management data preparation server, and is used to hash the preset public key to obtain a hash value of the preset public key.
  • the processor 902 is further configured to separately encrypt the plurality of session keys by using a plurality of preset public keys of the plurality of eUICCs to generate a plurality of encrypted session keys, and at least according to the multiple encryptions.
  • the session key generates the multiple binding profile packages.
  • the binding configuration file package includes at least a hash value of the preset public key, a public key included in the digital certificate of the subscription management data preparation server, the encrypted session key, and the subscription management data preparation server.
  • the third digital signature is generated by the processor 902, and the third digital signature of the subscription management data preparation server is generated according to at least the plurality of encrypted session keys and the preset public key, and is used to perform the preset public key.
  • the hash operation generates a hash value of the preset public key.
  • the processor 902 is further configured to verify a digital signature generated by the first server according to at least a plurality of preset public keys of the plurality of eUICCs and the matching information.
  • FIG. 10 is a first server according to an embodiment of the present invention.
  • the first server may be a server deployed by a third-party service provider (ie, a subscription management-secure routing server, English: Subscription Manager-Secure Routing, referred to as SM-SR+), and the third-party service provider includes but is not limited to enterprise users and group users.
  • the first server may also be part of the subscription management data preparation server SM-DP+; the first server may also be a Subscription Manager-Discovery Server (SM-DS).
  • SM-SR+ subscription management-secure routing server
  • English: Subscription Manager-Secure Routing referred to as SM-SR+
  • the first server may also be part of the subscription management data preparation server SM-DP+; the first server may also be a Subscription Manager-Discovery Server (SM-DS).
  • SM-DS Subscription Manager-Discovery Server
  • the first server 1000 includes at least a transmitter 1001, a receiver 1002, and a processor 1003.
  • Figure 10 only shows a simplified design of the structure of the first server.
  • the first server structure shown in FIG. 10 does not constitute a limitation to the first server, and the first server may include more or less components than the illustration 10, for example, the first server may also include The memory storing the corresponding instructions of the communication algorithm, in addition, in order to save the chip area, the receiver 1002 and the transmitter 1001 can also be integrated to form a transceiver.
  • the transmitter 1001 is configured to send a plurality of preset public keys of the plurality of embedded universal integrated circuit cards eUICC and matching information corresponding to the plurality of eUICCs, so that the subscription management data preparation server generates the corresponding information corresponding to the matching information.
  • a plurality of binding configuration file packages wherein the plurality of eUICCs respectively correspond to the plurality of preset public keys.
  • the receiver 1002 is configured to receive an eUICC digital certificate from the eUICC.
  • the processor 1003 is configured to check whether the eUICC identity EID in the eUICC digital certificate exists in the server, and in the presence of the eUICC identity EID, search for a hash value of the preset public key corresponding to the eUICC identity identifier EID, And determining, according to the hash value of the preset public key, a binding configuration file package corresponding to the eUICC.
  • the transmitter 1001 is configured to send the binding configuration file package to a local configuration file assistant corresponding to the eUICC, so that the eUICC downloads the binding configuration file package.
  • the processor 1003 is further configured to obtain a plurality of preset public private key pairs of the plurality of eUICCs and a plurality of the eUICC identity identifiers EID of the plurality of eUICCs, and obtain multiple presets of the multiple eUICCs.
  • the hash of the public key is further configured to obtain a plurality of preset public private key pairs of the plurality of eUICCs and a plurality of the eUICC identity identifiers EID of the plurality of eUICCs.
  • the processor 1003 is further configured to directly obtain a hash value of the plurality of preset public keys of the plurality of eUICCs, or calculate the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs.
  • the hash value of multiple preset public keys is further configured to directly obtain a hash value of the plurality of preset public keys of the plurality of eUICCs, or calculate the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs.
  • the hash value of multiple preset public keys is further configured to directly obtain a hash value of the plurality of preset public keys of the plurality of eUICCs, or calculate the plurality of eUICCs according to the plurality of preset public keys of the plurality of eUICCs. The hash value of multiple preset public keys.
  • the processor 1003 is further configured to generate a first server first digital signature according to at least the preset public key of the multiple eUICCs and the matching information; the transmitter 1001 is further configured to prepare the subscription management data.
  • the server sends the first digital signature of the first server, so that the subscription management data preparation server verifies the first digital signature of the first server.
  • the processor 1003 is further configured to generate the first server first digital signature according to at least the random number of the first server.
  • the transmitter 1001 is further configured to send the first digital signature of the first server.
  • FIG. 11 is a terminal provided by an embodiment of the present invention, such as an eUICC terminal, and the eUICC terminal includes an embedded universal integrated circuit card eUICC and a local configuration file assistant LPA.
  • the terminal 1100 includes at least a transmitter 1101, a receiver 1102, and a processor 1103.
  • Figure 11 only shows a simplified design of the structure of the terminal.
  • the terminal structure shown in FIG. 11 does not constitute a limitation to the terminal, and the terminal may include more or less components than the illustration 11, for example, the terminal may further include a memory for storing instructions corresponding to the communication algorithm,
  • the receiver 1102 and the transmitter 1101 can also be integrated to form a transceiver.
  • a transmitter 1101 is configured to send an embedded universal integrated circuit card eUICC digital certificate to a first server, so that the first server determines a binding configuration file package corresponding to an eUICC identity identifier EID included in the eUICC digital certificate. .
  • the receiver 1102 is configured to receive the binding configuration file package from the first server.
  • the processor 1103 is configured to repeatedly initiate a load binding configuration file package function by using the binding configuration file package.
  • the transmitter 1101 is configured to send the binding configuration file package to the embedded universal integrated circuit card eUICC in the terminal.
  • the processor 1103 is further configured to prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and prepare the server for the subscription management data included in the initial security channel function.
  • the digital signature is verified.
  • the session key is generated according to the private key corresponding to the preset public key and the one-time public key of the subscription data management server included in the initialization security channel function.
  • the processor 1103 is further configured to prepare a server digital certificate public key according to the subscription management data in the initial security channel function included in the binding configuration file package, and prepare the subscription management data included in the initial security channel function.
  • the server digital signature is verified, and in the case of verification, the encrypted session secret included in the initialization secure channel function is utilized by the preset public key.
  • the key is decrypted to get the session key.
  • the steps of a method or algorithm described in connection with the embodiments disclosed herein can be implemented in hardware, a software module executed by a processor, or a combination of both.
  • the software module can be placed in random access memory (RAM), memory, read only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or technical field. Any other form of storage medium known.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Les modes de réalisation de la présente invention concernent un procédé d'obtention et de téléchargement de lots de fichiers de configuration, et un serveur et un terminal. Le procédé comprend les étapes suivantes : un serveur de préparation de données de gestion d'abonnement SM-DP+ reçoit des informations de mise en correspondance d'eUICC envoyées par un premier serveur, et vérifie s'il existe une commande d'attente de téléchargement de fichier de configuration correspondant aux informations de mise en correspondance ; si tel est le cas, le SM-DP+ acquiert une pluralité de profils correspondant à la commande d'attente de téléchargement de fichier de configuration ; le SM-DP+ génère une pluralité de clés de session correspondant respectivement à une pluralité d'eUICC ; le SM-DP+ génère une pluralité de paquets correspondants de fichiers de configuration de liaison au moins en fonction de la pluralité de clés de session et de la pluralité de profils ; et le SM-DP+ envoie la pluralité de paquets de fichiers de configuration de liaison au premier serveur, de telle sorte que l'eUICC télécharge les paquets de fichiers de configuration de liaison à partir du premier serveur. Dans les modes de réalisation de la présente invention, le SM-DP+ peut distribuer une pluralité de paquets de fichiers de configuration de liaison au premier serveur une fois, ce qui permet de réduire une grande quantité de surdébits de signalisation.
PCT/CN2016/091735 2016-07-26 2016-07-26 Procédé d'obtention et de téléchargement de lots de fichiers de configuration, et serveur et terminal WO2018018419A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/091735 WO2018018419A1 (fr) 2016-07-26 2016-07-26 Procédé d'obtention et de téléchargement de lots de fichiers de configuration, et serveur et terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/091735 WO2018018419A1 (fr) 2016-07-26 2016-07-26 Procédé d'obtention et de téléchargement de lots de fichiers de configuration, et serveur et terminal

Publications (1)

Publication Number Publication Date
WO2018018419A1 true WO2018018419A1 (fr) 2018-02-01

Family

ID=61015320

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/091735 WO2018018419A1 (fr) 2016-07-26 2016-07-26 Procédé d'obtention et de téléchargement de lots de fichiers de configuration, et serveur et terminal

Country Status (1)

Country Link
WO (1) WO2018018419A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848496A (zh) * 2018-06-12 2018-11-20 中国联合网络通信集团有限公司 基于TEE的虚拟eSIM卡的认证方法、TEE终端和管理平台
WO2021001035A1 (fr) * 2019-07-03 2021-01-07 Telefonaktiebolaget Lm Ericsson (Publ) Partie 2 de fourniture de sim à distance à une entité d'abonné
CN114513787A (zh) * 2021-12-29 2022-05-17 博鼎实华(北京)技术有限公司 eSIM终端码号下载流程一致性测试方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103974250A (zh) * 2013-01-30 2014-08-06 华为终端有限公司 配置方法和设备
CN104703199A (zh) * 2013-12-05 2015-06-10 华为终端有限公司 嵌入式通用集成电路卡的管理方法、相关设备及系统
CN104703170A (zh) * 2013-12-05 2015-06-10 华为终端有限公司 下载运营商的文件的方法及设备
EP2986044A1 (fr) * 2014-08-14 2016-02-17 Samsung Electronics Co., Ltd. Procédé et appareil pour dispositifs de groupe de téléchargement de profil
CN105530107A (zh) * 2015-12-03 2016-04-27 中国联合网络通信集团有限公司 基于eUICC的批量开户方法和平台

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103974250A (zh) * 2013-01-30 2014-08-06 华为终端有限公司 配置方法和设备
CN104703199A (zh) * 2013-12-05 2015-06-10 华为终端有限公司 嵌入式通用集成电路卡的管理方法、相关设备及系统
CN104703170A (zh) * 2013-12-05 2015-06-10 华为终端有限公司 下载运营商的文件的方法及设备
EP2986044A1 (fr) * 2014-08-14 2016-02-17 Samsung Electronics Co., Ltd. Procédé et appareil pour dispositifs de groupe de téléchargement de profil
CN105530107A (zh) * 2015-12-03 2016-04-27 中国联合网络通信集团有限公司 基于eUICC的批量开户方法和平台

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848496A (zh) * 2018-06-12 2018-11-20 中国联合网络通信集团有限公司 基于TEE的虚拟eSIM卡的认证方法、TEE终端和管理平台
WO2021001035A1 (fr) * 2019-07-03 2021-01-07 Telefonaktiebolaget Lm Ericsson (Publ) Partie 2 de fourniture de sim à distance à une entité d'abonné
CN114513787A (zh) * 2021-12-29 2022-05-17 博鼎实华(北京)技术有限公司 eSIM终端码号下载流程一致性测试方法及装置

Similar Documents

Publication Publication Date Title
US11930360B2 (en) Method and system for updating certificate issuer public key, and related device
JP7227919B2 (ja) モノのインターネット(iot)デバイスの管理
CN109756447B (zh) 一种安全认证方法及相关设备
EP3800909B1 (fr) Procédé et dispositif de gestion à distance
CN108241517B (zh) 一种软件升级方法、客户端及电子设备
EP3476097B1 (fr) Technique de téléchargement d'un profil d'accès à un réseau
WO2018176430A1 (fr) Procédé pour ajouter un programme d'algorithme d'authentification, et dispositif et système associés
US9900161B2 (en) Method for certifying android client application by local service unit
EP2954448B1 (fr) Transmission de données sensibles à des dispositifs tiers compatibles réseau
WO2015165325A1 (fr) Procédé, dispositif et système d'authentification sécurisée de terminal
US10904015B2 (en) Post-manufacture generation of device certificate and private key for public key infrastructure
EP3866004A1 (fr) Procédé de mise à niveau par voie hertzienne et dispositif associé
CN104753674A (zh) 一种应用身份的验证方法和设备
WO2019071650A1 (fr) Procédé de mise à niveau d'une application dans un élément de sécurité, et dispositif associé
US8081758B2 (en) Communication support server, communication support method, and communication support system
WO2018129753A1 (fr) Procédé et dispositif de chargement aval d'un ensemble d'informations d'abonnement, et équipement associé
JP2016111660A (ja) 認証サーバ、端末及び認証方法
CN112134889A (zh) 一种基于ssl的通信方法、装置及系统
WO2018018419A1 (fr) Procédé d'obtention et de téléchargement de lots de fichiers de configuration, et serveur et terminal
CN112632573A (zh) 智能合约执行方法、装置、系统、存储介质及电子设备
JP2023015376A (ja) 認証情報の設定を仲介するための装置及び方法
CN111414640A (zh) 秘钥访问控制方法和装置
US20220256349A1 (en) Provision of Application Level Identity
US20240031805A1 (en) Download of a subscription profile to a communication device
CN108156162B (zh) 面向移动应用程序的认证方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16910000

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16910000

Country of ref document: EP

Kind code of ref document: A1