WO2018107718A1 - 智能卡的空中配号方法及装置 - Google Patents

智能卡的空中配号方法及装置 Download PDF

Info

Publication number
WO2018107718A1
WO2018107718A1 PCT/CN2017/090367 CN2017090367W WO2018107718A1 WO 2018107718 A1 WO2018107718 A1 WO 2018107718A1 CN 2017090367 W CN2017090367 W CN 2017090367W WO 2018107718 A1 WO2018107718 A1 WO 2018107718A1
Authority
WO
WIPO (PCT)
Prior art keywords
euicc
subscription data
data
authentication
isd
Prior art date
Application number
PCT/CN2017/090367
Other languages
English (en)
French (fr)
Inventor
吴传喜
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018107718A1 publication Critical patent/WO2018107718A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier

Definitions

  • the present application relates to, but is not limited to, an Internet of Things communication technology, and more particularly to a method and device for air tagging of a smart card, and a smart card.
  • the Internet of Things is called the third wave of the world information industry after the computer and the Internet. It represents the development direction of the next generation of information technology.
  • the United States, the European Union, China and other countries have introduced the development plan of the Internet of Things, and the related technology and industry prospective layout.
  • eUICC embedded universal integrated circuit card
  • IoT technology more and more traditional products such as automobiles, smart watches, and monitoring devices are embedded in an embedded universal integrated circuit card (eUICC), that is, the smart card chip is directly soldered to the terminal's circuit board or Direct packaging such as communication modules becomes an Internet of Things terminal.
  • eUICC embedded universal integrated circuit card
  • eUICC As an authentication tool for IoT terminals to access carrier networks, and as a security carrier for carrying various applications (APPs) and data, eUICC has become a key core technology for the development of the Internet of Things.
  • eUICC applied to the Internet of Things business is not only a new UICC card form or user terminal device form, but also an overall system established to support this new form of device, in which eUICC activation, deactivation management, user relationship Management, remote management, business management, and security management are all likely to be essential features in the system.
  • the telecommunications smart card in the current mobile network adopts a network management area (provincial, prefecture) method according to the place of issue, the place of use, and the use of the card.
  • network management area provincial, prefecture
  • the smart card since the smart card is usually present in the Internet of Things terminal or soldered in the terminal, the place of its issuance and the place of use are difficult to determine when the IoT terminal is produced.
  • UICC card usage process and the traditional UICC card usage process have undergone major changes.
  • Traditional UICC cards need to be produced, selected, customized, distributed, activated, used, terminated, etc. before release.
  • the UICC card only needs to be personalized before the release, such as the UICC card identifier (ID, IDentity) write, write of UICC card basic authentication and authorization parameters, initial contract data or related parameters, after the release, the user can sign the data management according to the new registration description information provided by the operator—data preparation (SM- DP, SubscriptionManager-Data Preparation) Regenerate new subscription data and download it to eUICC to implement carrier replacement.
  • ID UICC card identifier
  • UICC card basic authentication and authorization parameters initial contract data or related parameters
  • the key information was intercepted. Another example is the risk of device use.
  • the eUICC still has the risk of insecure key information storage.
  • eUICC can switch the subscription data, it may be incorrectly installed or activated an incomplete contract data during use, which may make it unusable. How to ensure that the subscription data in the registration process is not known by the relevant network element, and there is currently no effective solution.
  • Embodiments of the present invention provide a method and apparatus for air tagging of a smart card.
  • a method for air tagging of smart cards comprising:
  • User subscription data management-data preparation SM-DP receives a download request sent by the operator, and performs mutual authentication authentication with the SM-SR based on the ID of the user equipment card and the pre-registered SM-SR identifier in the download request;
  • the SM-DP receives the embedded smart card eUICC preset information extracted by the SM-SR sent by the SM-SR according to the ID of the user equipment card;
  • the SM-DP determines that the eUICC can download the subscription data based on the eUICC preset information, notify the eUICC through the SM-SR to establish a new ISD-P (Issuer Security Domain Profile, certificate issuer security domain configuration). And after receiving the notification that the eUICC establishes a new ISD-P, the SM-SR negotiates a transmission key of the subscription data with the new ISD-P of the eUICC;
  • ISD-P Issuer Security Domain Profile, certificate issuer security domain configuration
  • the SM-DP selects one of the generated subscription data, encrypts the selected subscription data by using the transmission key, and transmits the encrypted subscription data to the new ISD-P of the eUICC.
  • the method further includes:
  • the SM-DP receives a subscription data pre-generation instruction sent by the operator, and generates subscription data according to the related data carried in the pre-generated instruction.
  • the related data includes at least one of the following data:
  • the method further includes:
  • the SM-DP After receiving the installation result of the subscription data sent by the new ISD-P, the SM-DP sends the installation result to the SM-SR.
  • the method further includes:
  • the SM-DP performs key agreement to determine an encryption key before transmitting the key personal information in the signed data to the eUICC, and encrypts the key personal information by using the encryption key, and encrypts the key
  • the personal information is transmitted through a secure transmission channel established by the web service web service or the secure socket layer SSL.
  • the method further includes:
  • a counter is set inside the SM-DP and the SM-SR respectively, and the SM-DP and the SM-SR follow the data when transmitting The set sequence is sent, and the same data is not allowed to be repeatedly transmitted.
  • the SM-DP and the SM-SR each maintain their own counter, and the counter participates in the authentication calculation as a parameter.
  • the method further includes:
  • the SM-DP automatically returns the eUICC to the initial subscription data.
  • the method further includes:
  • the eUICC or the Internet of Things terminal where the eUICC is located is set to read or modify key personal information data without permission; the key personal information data is stored in a single independent space, and the separate independent space includes hardware security Module.
  • a method for air tagging of smart cards comprising:
  • the secure route SM-SR performs authentication authentication with the SM-DP after receiving the SM-DP authentication request.
  • the SM-SR receives the ID of the user equipment card sent by the SM-DP, and extracts eUICC preset information corresponding to the user equipment card based on the ID of the user equipment card, and pre-processes the eUICC. Sending information to the SM-DP;
  • the SM-SR After the SM-SR receives the signing and installing the new ISD-P request sent by the SM-DP, the SM-SR performs bidirectional authentication and authentication with the ISD-R in the eUICC.
  • the SM-SR After receiving the response message for establishing a new ISD-P sent by the ISD-R, the SM-SR sends the response message to the SM-DP.
  • the method further includes:
  • the SM-SR After receiving the installation result of the subscription data of the new ISD-P sent by the SM-DP, the SM-SR updates the database, stores the subscription data in the eUICC subscription data set, and sets the subscription data as Inactive state.
  • the method further includes:
  • the SM-SR After the SM-SR receives the activation request of the subscription data sent by the operator, determining that the SM-SR determines Whether the rule information in the eUICC subscription data set allows handover; when allowed, sends a registration activation request to the eUICC;
  • the SM-SR When receiving the message that the ISD-R subscription data is successfully switched, the SM-SR sets the subscription data to an active state, and notifies the operator of the handover result.
  • the method further includes:
  • the SM-SR After receiving the registration request of the eUICC manufacturer, the SM-SR registers the subscription data in the registration request, and the subscription data includes at least one of the following information:
  • Contract data category Contract data category, application ID, eUICC ID, eUICC card number, contract data status, memory allocation, and management policy.
  • a smart card air distribution device comprising:
  • a first receiving unit configured to receive a download request sent by an operator
  • An authentication unit configured to perform mutual authentication with the SM-SR based on an ID of the user equipment card in the download request and a pre-registered SM-SR identifier
  • the second receiving unit is configured to: after the authentication is passed, receive, by the SM-SR, the embedded smart card eUICC preset information extracted by the SM-SR according to the ID of the user equipment card;
  • a determining unit configured to determine, according to the eUICC preset information, whether the eUICC can download subscription data
  • a notification unit configured to notify the eUICC to establish a new ISD-P by using the SM-SR
  • a third receiving unit configured to receive a notification that the eUICC establishes a new ISD-P
  • a negotiating unit configured to negotiate, by using the SM-SR, a transmission key of the subscription data with the new ISD-P of the eUICC;
  • An encryption unit configured to select one of the generated subscription data, and encrypt the selected subscription data by using the transmission key
  • the first sending unit is configured to send the encrypted subscription data to the new ISD-P of the eUICC.
  • the device further includes:
  • a fourth receiving unit configured to receive a subscription data pre-generation instruction sent by the operator
  • the generating unit is configured to generate subscription data according to the related data carried in the pre-generated instruction.
  • the related data includes at least one of the following data:
  • the device further includes:
  • a fifth receiving unit configured to receive an installation result of the subscription data sent by the new ISD-P
  • the second sending unit is configured to send the installation result to the SM-SR.
  • the device further includes:
  • the negotiating unit is further configured to perform key agreement to determine an encryption key before the first sending unit sends the key personal information in the subscription data to the eUICC;
  • the first sending unit is further configured to transmit the encrypted key personal information through a secure transmission channel established by the web service web service or the secure socket layer SSL.
  • the device further includes:
  • a setting unit configured to set a counter inside the SM-DP and the SM-SR when the SM-DP performs air interface data transmission with the SM-SR, where the SM-DP and the SM-SR are When the data is transmitted, it is sent in the set order, and the same data is not allowed to be repeatedly transmitted.
  • the SM-DP and the SM-SR each maintain their own counters, and the counter participates in the authentication calculation as a parameter.
  • a smart card air distribution device comprising:
  • a first receiving unit configured to receive an SM-DP authentication request
  • the authentication unit is configured to perform authentication authentication with the SM-DP;
  • a second receiving unit configured to receive an ID of the user equipment card sent by the SM-DP after the authentication is passed
  • An extracting unit configured to extract, according to an ID of the user equipment card, eUICC preset information corresponding to the user equipment card;
  • a first sending unit configured to send the eUICC preset information to the SM-DP;
  • a third receiving unit configured to receive a signing and installing a new ISD-P request sent by the SM-DP;
  • An authentication unit configured to perform two-way authentication and authentication with the ISD-R in the eUICC
  • the fourth receiving unit is configured to: after receiving the response message for establishing a new ISD-P sent by the ISD-R, send the response message to the SM-DP.
  • the device further includes:
  • a fifth receiving unit configured to receive an installation result of the subscription data of the new ISD-P sent by the SM-DP;
  • an update unit configured to update the database, store the subscription data in the eUICC subscription data set, and set the subscription data to an inactive state.
  • the device further includes:
  • a sixth receiving unit configured to receive an activation request of the subscription data sent by the operator
  • a determining unit configured to determine whether the rule information in the eUICC subscription data set allows switching; when allowed, triggering the second sending unit;
  • a second sending unit configured to send a registration activation request to the eUICC
  • a seventh receiving unit configured to receive a message that the ISD-R subscription data is successfully switched
  • the update unit is further configured to set the subscription data to an active state, and notify the operator of the handover result.
  • the device further includes:
  • An eighth receiving unit configured to receive a registration request of the eUICC manufacturer
  • a registration unit configured to register the subscription data in the registration request, the subscription data including at least one of the following information:
  • Contract data category Contract data category, application ID, eUICC ID, eUICC card number, contract data status, memory allocation, and management policy.
  • a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement an air tagging method of the smart card.
  • the technical solution of the embodiment of the present invention adopts a more secure manner to ensure that the subscription data in the registration process is not known by other network elements, and provides secure download and management of the issuer security information domain, thereby improving the system. safety.
  • SM-DP side is a flowchart (SM-DP side) of a method for air tagging of a smart card according to an embodiment of the present invention
  • SM-SR side is a flowchart (SM-SR side) of a method for air-allocating a smart card according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of an eUICC remote management architecture according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an air distribution structure according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of an eUICC issuer security information domain according to an embodiment of the present invention.
  • FIG. 6 is a flowchart of a method for air tagging of a smart card according to Embodiment 1 of the present invention.
  • FIG. 7 is a flowchart of a method for air tagging of a smart card according to Embodiment 2 of the present invention.
  • FIG. 8 is a schematic structural diagram of a configuration of an air tag device of a smart card according to Embodiment 1 of the present invention.
  • FIG. 9 is a schematic structural diagram of a configuration of an air distribution device of a smart card according to Embodiment 2 of the present invention.
  • the embodiment of the invention describes a method for air tagging of a smart card. As shown in FIG. 1 , the method includes:
  • Step 101 User subscription data management—data preparation SM-DP receives a download request sent by the operator, and performs bidirectional authentication with the SM-SR based on the ID of the user equipment card in the download request and the pre-registered SM-SR identifier. Right certification
  • Step 102 After the authentication is passed, the SM-DP receives the preset information of the embedded smart card eUICC extracted by the SM-SR sent by the SM-SR according to the ID of the user equipment card.
  • Step 103 The SM-DP determines, according to the eUICC preset information, that the eUICC can download the subscription data, notify the eUICC to establish a new ISD-P by using the SM-SR, and establish the eUICC after receiving the eUICC. After the notification of the new ISD-P, the transmission key of the subscription data is negotiated with the new ISD-P of the eUICC by the SM-SR;
  • Step 104 The SM-DP selects one of the generated subscription data, encrypts the selected subscription data by using the transmission key, and sends the encrypted subscription data to the new ISD-P of the eUICC. .
  • the SM-DP receives a subscription data pre-generation instruction sent by the operator, and generates subscription data according to the related data carried in the pre-generated instruction.
  • the related data includes at least one of the following data:
  • the SM-DP after receiving the installation result of the subscription data sent by the new ISD-P, the SM-DP sends the installation result to the SM-SR.
  • the SM-DP performs key agreement to determine an encryption key before transmitting the key personal information in the subscription data to the eUICC, and encrypts the key personal information by using the encryption key.
  • the encrypted key personal information is transmitted through a secure transmission channel established by the web service web service or the secure socket layer SSL.
  • a counter is set inside the SM-DP and the SM-SR, respectively, where the SM-DP and the SM-SR are When the data is transmitted, it is sent in the set order, and the same data is not allowed to be repeatedly transmitted.
  • the SM-DP and the SM-SR each maintain their own counters, and the counter participates in the authentication calculation as a parameter.
  • the SM-DP automatically rolls back the eUICC to the initial subscription data when the eUICC installation subscription data fails.
  • the eUICC or the Internet of Things terminal where the eUICC is located is set to have no permission to read or modify key personal information data; the key personal information data is stored in a single independent space, the separate independent The space includes a hardware security module.
  • the embodiment of the invention also describes a method for air tagging of a smart card, as shown in FIG. 2, Methods include:
  • Step 201 User subscription data management—The secure route SM-SR performs authentication authentication with the SM-DP after receiving the SM-DP authentication request.
  • Step 202 After the authentication is passed, the SM-SR receives the ID of the user equipment card sent by the SM-DP, and extracts eUICC preset information corresponding to the user equipment card based on the ID of the user equipment card. The eUICC preset information is sent to the SM-DP;
  • Step 203 After the SM-SR receives the signing and installing the new ISD-P request sent by the SM-DP, the SM-SR performs two-way authentication and authentication with the ISD-R in the eUICC.
  • Step 204 After receiving the response message for establishing a new ISD-P sent by the ISD-R, the SM-SR sends the response message to the SM-DP.
  • the SM-SR after receiving the installation result of the subscription data of the new ISD-P sent by the SM-DP, the SM-SR updates the database, stores the subscription data in the eUICC subscription data set, and the The subscription data is set to inactive.
  • the SM-SR determines whether the rule information in the eUICC subscription data set allows handover; when allowed, sends a registration activation request to the eUICC;
  • the SM-SR When receiving the message that the ISD-R subscription data is successfully switched, the SM-SR sets the subscription data to an active state, and notifies the operator of the handover result.
  • the SM-SR after receiving the registration request of the eUICC manufacturer, the SM-SR registers the subscription data in the registration request, and the subscription data includes at least one of the following information:
  • Contract data category Contract data category, application ID, eUICC ID, eUICC card number, contract data status, memory allocation, and management policy.
  • FIG. 3 is a schematic diagram of an eUICC remote management architecture according to an embodiment of the present invention.
  • the eUICC remote management architecture in the embodiment of the present invention describes three roles involved in eUICC remote management: eUICC manufacturer 31, operator (MNO) 32 and the connection relationship of the remote management platform 33.
  • the remote management platform 33 is the core of eUICC34 remote management.
  • the data related to the operator 32 and the eUICC manufacturer 31 in the eUICC 34 is generated via the remote management platform 33.
  • the carrier data file is downloaded to the eUICC card 34 by means of over-the-air writing.
  • processes such as changes in carrier data and eUICC replacement operators are also completed via the remote management platform 33.
  • the implementation of the remote management platform function also determines or affects the implementation of other management functions to a certain extent.
  • the remote management platform 33 is at the core of the network architecture.
  • the functions of the remote management platform mainly include two parts: SM-DP and SM-SR.
  • SM-DP is mainly responsible for the secure generation, storage and download of user subscription data for remote configuration of eUICC card
  • SM-SR is mainly responsible for the secure transmission and management of remote configuration data of eUICC card.
  • the above functions can be implemented by one or more physical entities.
  • FIG. 4 is a schematic diagram of an air distribution structure according to an embodiment of the present invention.
  • the SM-DP 331 is mainly responsible for generating the credential information provided by the certificate issuer 35 according to the requirements of the operator.
  • the subscription information for downloading includes personalization information (including but not limited to key information, authentication credentials) and non-personalized information; after that, the data is transmitted and installed on the embedded UICC card 34 by the SM-SR 332.
  • the SM-SR 332 is responsible for establishing a secure transmission channel to complete the download, activation, disabling, and deletion of the subscription data.
  • Each embedded UICC card 34 needs to be registered at the first SM-SR 332 for the first time, but can later switch its registered SM-SR 332, so the relevant subscription data needs to be transmitted between different SM-SRs 332.
  • the embedded UICC card manufacturer 31 needs to preload some initial subscription data into the eUICC card 31, including but not limited to the following information: the identity authentication credential provided by the credential issuer, provided by the operator IMSI, ICCID (Integrate Circuit Card Identity).
  • the initial information is backed up to the SM-SR332.
  • the manufacturer 31 provides the SM-DP331 with a contract data generation tool, so that the SM-DP331 can generate new subscription data by itself.
  • the embedded UICC card 34 is a smart card with an operating system (COS), which internally contains a credential security domain, a publisher security root domain, and multiple issuer security information fields, as shown in FIG.
  • the credential security domain stores the private key, the associated credential, the root public key of the CI, and the key group used for credential replacement, which has a higher security level;
  • the issuer security root domain is responsible for performing SM-SR transmission. Platform management instructions and perform key establishment protocols during SM-SR handover.
  • the issuer security information domain represents a contract data of the operator, including the file system, network access application, control authorization security domain, supplementary security domain, policy rules, and carrier security domain.
  • the method for air-keying of a smart card includes the following processing flow:
  • Step 401 The operator sends a subscription data pre-generation instruction to the SM-DP, and sends the predetermined subscription data quantity, the subscription data requirement, and the available IMSI range to the SM-DP, and the SM-DP generates the subscription data according to the description information.
  • the personal information part of the key, certificate, etc., and store the contract data in the SM-DP for download.
  • Step 402 After the SM-DP completes the subscription data preparation, the operator sends a download request to the SM-DP, and the SM-DP pairs the ID number (EID, eUICC ID) of the user equipment card in the request and the corresponding pre-registered SM. - The SR identification number (SRID, SR ID) is identified.
  • step 403 the SM-DP performs bidirectional authentication with the registered SM-SR.
  • Step 404 After the authentication is passed, the SM-DP transmits an eUICC card information set (EIS, eUICC Information Set) entry request (parameter eUICC identifier EID) to the SM-SR.
  • EIS eUICC card information set
  • EID parameter eUICC identifier
  • Step 405 The SM-SR extracts the UICC card preset information, that is, the eUICC card information set (EIS, eUICC Information Set) according to the ID number of the user equipment card.
  • EIS eUICC Card Information Set
  • Step 406 The SM-SR sends the EIS entry information to the SM-DP to confirm whether the eUICC is suitable for downloading the subscription data. If yes, go to step 409. If not, go to step 408.
  • step 408 the SM-SR is notified of the error that occurred.
  • step 409 the SM-DP signs a new ISD-P request to the SM-SR.
  • Step 410 The ISD-R in the SM-SR and the eUICC starts the authentication process to perform two-way authentication.
  • step 411 if the authentication is passed, an empty ISD-P is established.
  • step 412 the SM-SR returns the confirmation information to the SM-DP.
  • Step 413 The SM-DP performs a key agreement process with the newly established ISD-P, establishes a share to transmit the key, and selects one of the new subscription data that has been generated to be sent to the eUICC card.
  • step 414 the SM-DP encrypts the personal subscription data therein using the key negotiated with the ISD-P.
  • Step 415 establishing a secure transmission channel.
  • step 416 the encrypted personal subscription data is sent to the ISD-P.
  • Step 417 after receiving the data, the ISD-P decrypts and installs the data using the key described above.
  • step 418 the ISD-P returns the installation result and status to the SM-DP.
  • step 419 the SM-DP sends the installation result and status of the ISD-P to the SM-SR.
  • the SM-SR updates its database, stores the new subscription data in the eUICC subscription data set (EIS), and sets the new subscription data to an inactive state.
  • EIS eUICC subscription data set
  • step 421 the SM-SR sends a registration information download confirmation to the SM-DP.
  • Step 422 After receiving the new subscription data, the operator sends a new subscription data activation request to the SM-SR, and the SM-SR confirms whether the rule information in the new subscription data set is allowed to be switched; if allowed, signs a registration activation.
  • Requesting an ISD-R to the eUICC the eUICC continues to confirm the local execution rule; if there is a conflict, the ISD-R stops the process and informs the SM-SR; if there is no conflict, the ISD-R performs the contract data switch and informs the handover result.
  • the SM-SR then informs the operator of the handover result. Subsequently, the operator disables the original subscription data through the SM-SR, and the process also performs the operation after confirming the two rule information described above.
  • Step 421 The SM-DP sends a message to the operator that the registration message is successfully downloaded.
  • the deletion of the subscription data in the eUICC card may be performed.
  • the card manufacturer first sends the subscription data pre-stored in the eUICC to the SM-SR for registration, where the subscription data includes, but is not limited to, the subscription data category.
  • the subscription data includes, but is not limited to, the subscription data category.
  • the communication between SM-DP to SM-SR and SM-SR to SM-SR first performs two-way authentication of the identity, and then confirms that the identity is correct before communication can be performed.
  • the SM-DP first performs a key negotiation process to determine an encryption key before sending the key personal information (including but not limited to the key and the credential) in the signed data to the eUICC. Then encrypt key personal information and then encrypt the key individuals Information is transmitted via a secure transport channel established by Web Service or SSL.
  • the counters are set in the SM-DP and the SM-SR, and the SM-DP and the SM-SR send the commands in a certain order when transmitting.
  • the same message is allowed to be sent repeatedly, and the SM-DP, SM-SR, and receiver each maintain their own counter, and the counter participates in the authentication calculation as a parameter.
  • the SM-DP and the eUICC perform multiple confirmations according to certain rules before installation according to certain rules. If the installation cannot be completed, the initial subscription data is automatically rolled back.
  • the eUICC or the M2M (Machine to Machine) device is set to have no permission to read or modify key personal information data.
  • the key personal information data is stored in a single independent space; the separate independent space may be a hardware security module or the like.
  • the method for over-allocating a smart card may include the following processing flow:
  • Step 501 The operator sends a registration information download request to the SM-DP of the remote management platform, and the carrying parameters include (the identifier of the SM-SR, the eUICC identifier EID, the ICCID, the activation request);
  • Step 502 The destination remote management platform (SM-DP) identifies whether the received SM-SR identifier is correct.
  • Step 503 the SM-DP and the SM-SR perform two-way authentication
  • Step 504 if the authentication is passed, the SM-DP transmits an eUICC card information set EIS entry request to the SM-SR (parameter eUICC identifier EID);
  • Step 505 The SM-SR searches for and obtains a corresponding EIS entry according to the eUICC identifier EID, and returns EIS entry information to the SM-DP.
  • step 506 the SM-DP determines whether the eUICC is available. If available, proceed to step 7. If not, proceed to step 13 to notify the SM-SR of the error that occurred.
  • Step 507 The SM-DP sends an IS-DP installation request to the SM-SR.
  • Step 508 The SM-SR and the eUICC perform bidirectional authentication, and perform an ISD-P creation process. After the creation is complete, the SM-SR sends a create confirmation message to the SM-DP.
  • Step 509 The SM-DP and the eUICC perform an ISD-P key establishment process, and encrypt the registered personal information part by using the ISD-P key, and download the encrypted data and install the registration information to the eUICC through the secure transmission channel. ;
  • Step 510 After receiving the data, the eUICC decrypts the data and installs the ISD-P. After successfully, the eUICC sends an installation success confirmation message to the SM-DP. The SM-DP also sends an ISD-P installation result confirmation message to the SM-SR, SM- SR update (add new registration information) registration information, and send registration confirmation download to SM-DP;
  • Step 511 The eUICC activates a corresponding registration message, and sends a message that the activation succeeds to the SM-DP.
  • Step 512 The SM-DP sends a message to the operator that the registration message is successfully downloaded.
  • FIG. 8 is a schematic structural diagram of a configuration of an air card of a smart card according to Embodiment 1 of the present invention.
  • the remote signing management platform switching device of the smart card according to the embodiment of the present invention includes:
  • the first receiving unit 60 is configured to receive a download request sent by the operator
  • the authentication unit 61 is configured to perform mutual authentication authentication with the SM-SR based on the ID of the user equipment card and the pre-registered SM-SR identifier in the download request.
  • the second receiving unit 62 is configured to: after the authentication is passed, receive, by the SM-SR, the embedded smart card eUICC preset information extracted by the SM-SR according to the ID of the user equipment card;
  • the determining unit 63 is configured to determine, according to the eUICC preset information, whether the eUICC can download the subscription data;
  • the notification unit 64 is configured to notify the eUICC to establish a new ISD-P by using the SM-SR;
  • the third receiving unit 65 is configured to receive the notification that the eUICC establishes a new ISD-P;
  • the negotiating unit 66 is configured to negotiate, by using the SM-SR, a transport key of the subscription data with the new ISD-P of the eUICC;
  • the encryption unit 67 is configured to select one of the generated subscription data, using the transmission The key encrypts the selected subscription data;
  • the first transmitting unit 68 is configured to transmit the encrypted subscription data to the new ISD-P of the eUICC.
  • the air tag device of the smart card according to the embodiment of the present invention further includes:
  • a fourth receiving unit (not shown in FIG. 8) configured to receive a subscription data pre-generation instruction sent by the operator;
  • a generating unit (not shown in FIG. 8) is provided to generate subscription data according to relevant data carried in the pre-generated instruction.
  • the related data includes at least one of the following data:
  • the air tag device of the smart card according to the embodiment of the present invention further includes:
  • a fifth receiving unit (not shown in FIG. 8) configured to receive an installation result of the subscription data sent by the new ISD-P;
  • a second transmitting unit (not shown in FIG. 8) is provided to transmit the installation result to the SM-SR.
  • the air tag device of the smart card according to the embodiment of the present invention further includes:
  • the negotiating unit 66 is further configured to perform key negotiation to determine an encryption key before the first sending unit sends the key personal information in the subscription data to the eUICC;
  • the first sending unit 68 is further configured to transmit the encrypted key personal information through a secure transmission channel established by the web service web service or the secure socket layer SSL.
  • the air tag device of the smart card according to the embodiment of the present invention further includes:
  • a setting unit (not shown in FIG. 8) configured to perform an air interface between the SM-DP and the SM-SR During data transmission, counters are respectively set in the SM-DP and the SM-SR, and the SM-DP and the SM-SR are sent in the set order when transmitting data, and the same data is not allowed to be repeatedly transmitted.
  • the SM-DP and the SM-SR each maintain their own counters, and the counter participates in the authentication calculation as a parameter.
  • the determining unit, the authentication unit, the negotiating unit, the encryption unit, and the like shown in FIG. 8 can all be implemented by a microprocessor, an FPGA (Field-Programmable Gate Array), a digital signal processor, etc., a transmitting unit, and a notification.
  • the unit and the receiving unit can be implemented by means of an air interface antenna system or a wired interface.
  • FIG. 9 is a schematic structural diagram of a configuration of an air card of a smart card according to Embodiment 1 of the present invention.
  • the remote signing management platform switching device of the smart card according to the embodiment of the present invention includes:
  • the first receiving unit 70 is configured to receive an SM-DP authentication request
  • the authentication unit 71 is configured to perform authentication authentication with the SM-DP.
  • the second receiving unit 72 is configured to receive an ID of the user equipment card sent by the SM-DP after the authentication is passed;
  • the extracting unit 73 is configured to extract eUICC preset information corresponding to the user equipment card based on an ID of the user equipment card;
  • the first sending unit 74 is configured to send the eUICC preset information to the SM-DP.
  • the third receiving unit 75 is configured to receive the signing and installing a new ISD-P request sent by the SM-DP;
  • the authentication unit 76 is configured to perform bidirectional authentication authentication with the ISD-R in the eUICC;
  • the fourth receiving unit 77 is configured to: after receiving the response message for establishing a new ISD-P sent by the ISD-R, send the response message to the SM-DP.
  • the air tag device of the smart card according to the embodiment of the present invention further includes:
  • a fifth receiving unit (not shown in FIG. 9) configured to receive an installation result of the subscription data of the new ISD-P sent by the SM-DP;
  • An update unit (not shown in FIG. 9) is arranged to update the database, store the subscription data in the eUICC subscription data set, and set the subscription data to an inactive state.
  • the air tag device of the smart card according to the embodiment of the present invention further includes:
  • a sixth receiving unit (not shown in FIG. 9) configured to receive an activation request of the subscription data sent by an operator
  • a determining unit (not shown in FIG. 9) configured to determine whether rule information in the eUICC subscription data set allows switching; when allowed, triggering the second sending unit;
  • a second sending unit (not shown in FIG. 9) configured to send a registration activation request to the eUICC
  • a seventh receiving unit configured to receive a message that the ISD-R subscription data is successfully switched
  • the update unit is further configured to set the subscription data to an active state, and notify the operator of the handover result.
  • the air tag device of the smart card according to the embodiment of the present invention further includes:
  • An eighth receiving unit (not shown in FIG. 9) configured to receive a registration request of the eUICC manufacturer
  • a registration unit (not shown in FIG. 9) is provided to register the subscription data in the registration request, the subscription data including at least one of the following information:
  • Contract data category Contract data category, application ID, eUICC ID, eUICC card number, contract data status, memory allocation, and management policy.
  • each unit in the remote subscription management platform switching device of the smart card shown in FIG. 9 can be understood by referring to the related description of the remote card subscription management platform switching method of the foregoing smart card.
  • the authentication unit, the authentication unit, the extraction unit, and the like shown in FIG. 9 can all be implemented by a microprocessor, an FPGA, a digital signal processor, etc., and the transmitting unit and the receiving unit can be implemented by means of an air interface antenna system or a wired interface.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative
  • the division of the unit is only a logical function division, and the actual implementation may have another division manner, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be Ignore, or not execute.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit;
  • the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing steps include the steps of the foregoing method embodiments; and the foregoing storage medium includes: a removable storage device, a read only memory (ROM), a magnetic disk, or an optical disk, and the like, which can store program codes.
  • ROM read only memory
  • the above-described integrated unit of the embodiment of the present invention may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a stand-alone product.
  • the technical solution of the embodiment of the present invention may be embodied in the form of a software product stored in a storage medium, including a plurality of instructions for causing a computer device (which may be a personal computer, a server, or Either network device or the like) performs all or part of the methods described in various embodiments of the invention.
  • the foregoing storage medium includes: a removable storage device, a read only memory (ROM), a magnetic disk, or an optical disk, and the like, which can store program codes.
  • the technical solution of the embodiment of the present invention adopts a more secure manner to ensure that the subscription data in the registration process is not known by other network elements, and provides secure download and management of the issuer security information domain, thereby improving the system. safety.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本文公布一种智能卡的空中配号方法及装置,所述方法包括:SM-DP接收运营商发送的下载请求,基于所述下载请求中的用户设备卡的ID和预注册的SM-SR标识与SM-SR进行双向鉴权认证;鉴权通过后,SM-DP接收SM-SR发送的SM-SR依据用户设备卡的ID提取的eUICC预设信息;SM-DP基于eUICC预设信息确定eUICC能下载签约数据时,通过SM-SR向eUICC通知建立新ISD-P,并在接收到eUICC建立新ISD-P的通知后,通过SM-SR与eUICC的新ISD-P协商签约数据的传输密钥;SM-DP从已生成的签约数据中选择一个,利用传输密钥对所选择的签约数据进行加密,并将加密后的签约数据向eUICC发送。

Description

智能卡的空中配号方法及装置 技术领域
本申请涉及但不限于物联网通信技术,尤指一种智能卡的空中配号方法及装置、智能卡。
背景技术
物联网被称为继计算机、互联网之后,世界信息产业的第三次浪潮,代表了下一代信息技术发展方向,美国、欧盟、中国等国纷纷出台物联网发展规划,进行相关技术和产业前瞻布局。随着物联网技术的普及,越来越多传统商品如汽车、智能表具、监控设备等被嵌入一种嵌入式智能卡(eUICC,embedded Universal Integrated Circuit Card),即将智能卡芯片直接焊接在终端的电路板或直接封装如通信模块,成为物联网终端。
eUICC作为物联网终端接入运营商网络的鉴权工具,以及承载各种应用程序(APP)、数据的安全载体,已经成为物联网发展的关键核心技术。应用于物联网业务的eUICC已不仅仅是一种新的UICC卡形态或用户终端设备形态,还包括为支持这种新形态设备而建立的整体系统,其中eUICC的激活、去激活管理、用户关系管理、远程管理、业务管理和安全管理可能都将是该系统中必不可少的功能。
此外,当前移动网络中电信智能卡根据发行地、使用地以及卡片用途不同,发行采用网络管理区域(省、地市)方法。但在物联网应用场景下,由于智能卡通常存在于物联网终端中或者焊接在终端中,其发行地及使用地很难在物联网终端生产时确定。在此种应用场景下,需考虑物联网智能卡的首次使用时激活、激活后更换运营配置等业务。因此,物联网业务对智能卡管理提出的新的需求,特别是智能卡空中配号、激活、去激活以及配置更换管理等是首先要解决的问题。而eUICC的使用流程与传统UICC卡使用流程发生了较大的改变。传统UICC卡在发行前需要经过生产、选择运营商、定制、发行、激活、使用、终止等环节。在eUICC情况下,UICC卡在发行前只需要进行基础性的个性化,例如UICC卡标识(ID, IDentity)写入、UICC卡基本认证授权参数的写入、初始签约数据或相关参数的写入,发行后则可以根据运营商提供的新注册描述信息,由用户签约数据管理—数据准备(SM-DP,SubscriptionManager-Data Preparation)重新生成新的签约数据并下载到eUICC中,实现运营商的选择更换。由此可以看出,签约数据的定制过程从卡商公司内部更改为通过空口的制作和安装,尤其是个人化密钥、证书等数据的生成和写入,因此空中配号的安全问题凸显出来,一直受到运营商、卡商以及用户的高度关注。空中配号技术的安全威胁包括假冒、窃听、重放、拒绝服务和非授权访问,如身份假冒威胁,在产生、下载、安装、切换签约数据的过程,不同的操作实体会参与进来,例如多个运营商、多个用户签约数据管理—安全路由(SM-SR,SubscriptionManager-Secure Routing),因此身份认证算法不可避免地会被多个操作实体掌握,同时通过证书获取操作授权时,一旦证书丢失,则会导致出现非法操作。再如篡改威胁,在SM-DP到SM-SR、运营商到SM-DP、运营商到SM-SR之间传递操作信令时,可能面临信息篡改风险,例如在SM-DP向SM-SR发送所需安装的eUICC卡标识号时,若UICC卡标识号被人篡改,则可能将签约数据安装在错误的UICC卡。又如拒绝服务和窃听威胁,在用户进行空中操作时,可能会遭受到拒绝服务,导致无法完成写号流程;此外,由于空口容易被人窃听,极易导致在进行信息交换时,其交换的密钥信息被人截获。又如设备使用风险,eUICC依然存在着关键信息存储的不安全风险,同时,由于eUICC可以切换签约数据,在使用时还可能会错误安装、或者激活了一个不完整的签约数据,导致无法使用。如何保证配号过程中签约数据不被相关网元获知,目前还没有效的解决方案。
发明概述
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例提供了一种智能卡的空中配号方法及装置。
本发明实施例的技术方案如下:
一种智能卡的空中配号方法,包括:
用户签约数据管理—数据准备SM-DP接收运营商发送的下载请求,基于所述下载请求中的用户设备卡的ID和预注册的SM-SR标识与所述SM-SR进行双向鉴权认证;
鉴权通过后,所述SM-DP接收所述SM-SR发送的所述SM-SR依据所述用户设备卡的ID提取的嵌入式智能卡eUICC预设信息;
所述SM-DP基于所述eUICC预设信息确定所述eUICC能下载签约数据时,通过所述SM-SR向所述eUICC通知建立新ISD-P(Issuer Security Domain Profile,证书发行方安全域配置),并在接收到所述eUICC建立新ISD-P的通知后,通过所述SM-SR与所述eUICC的新ISD-P协商签约数据的传输密钥;
所述SM-DP从已生成的签约数据中选择一个,利用所述传输密钥对所选择的签约数据进行加密,并将加密后的签约数据向所述eUICC的新ISD-P发送。
本发明实施例中,所述方法还包括:
所述SM-DP接收运营商发送的签约数据预生成指令,根据所述预生成指令中携带的相关数据生成签约数据。
本发明实施例中,所述相关数据包括以下数据至少之一:
预定的签约数据数量、签约数据要求、有效的国际移动用户识别码IMSI范围。
本发明实施例中,所述方法还包括:
所述SM-DP接收到所述新ISD-P发送的签约数据的安装结果后,将所述安装结果向SM-SR发送。
本发明实施例中,所述方法还包括:
所述SM-DP在将约签数据中的关键个人信息向eUICC发送前,进行密钥协商以确定加密密钥,利用所述加密密钥将所述关键个人信息进行加密,将加密后的关键个人信息通过网页业务Web Service或安全套接层SSL建立的安全传输通道进行传送。
本发明实施例中,所述方法还包括:
所述SM-DP与所述SM-SR进行空口数据传输时,分别在所述SM-DP和所述SM-SR内部设置计数器,所述SM-DP和所述SM-SR在发送数据时按照设定的顺序发送,不允许重复发送相同的数据,所述SM-DP和所述SM-SR各自维护自身的计数器,且计数器作为参数参与认证计算。
本发明实施例中,所述方法还包括:
所述SM-DP在所述eUICC安装签约数据失败时,使所述eUICC自动回退到初始的签约数据。
本发明实施例中,所述方法还包括:
所述eUICC或所述eUICC所在的物联网终端被设置为无权限读取或修改关键个人信息数据;所述关键个人信息数据被存储于单独立的空间中,所述单独的独立空间包括硬件安全模块。
一种智能卡的空中配号方法,包括:
用户签约数据管理—安全路由SM-SR接收到SM-DP鉴权请求后,与SM-DP进行鉴权认证;
鉴权通过后,SM-SR接收所述SM-DP发送的用户设备卡的ID,并基于所述用户设备卡的ID提取与所述用户设备卡对应的eUICC预设信息,将所述eUICC预设信息向所述SM-DP发送;
所述SM-SR接收所述SM-DP发送的签署安装新ISD-P请求后,所述SM-SR与所述eUICC中的ISD-R进行双向鉴权认证;
所述SM-SR接收所述ISD-R发送的建立新ISD-P的响应消息后,将所述响应消息向所述SM-DP发送。
本发明实施例中,所述方法还包括:
所述SM-SR接收所述SM-DP发送的新ISD-P的签约数据的安装结果后,对数据库进行更新,将所述签约数据存储于eUICC签约数据集中,且将所述签约数据设置为未激活状态。
本发明实施例中,所述方法还包括:
所述SM-SR接收运营商发送的所述签约数据的激活请求后,确定所述 eUICC签约数据集中的规则信息是否允许切换;允许时,向所述eUICC发送注册激活请求;
所述SM-SR接收所述ISD-R签约数据切换成功的消息时,将所述签约数据设置为激活状态,将切换结果通知运营商。
本发明实施例中,所述方法还包括:
所述SM-SR接收eUICC制造商的注册请求后,将所述注册请求中的签约数据进行注册,所述签约数据包括以下信息至少之一:
签约数据类别、应用标识、eUICC ID、eUICC卡号、签约数据状态、需分配内存、管理策略。
一种智能卡的空中配号装置,包括:
第一接收单元,设置为接收运营商发送的下载请求;
认证单元,设置为基于所述下载请求中的用户设备卡的ID和预注册的SM-SR标识与所述SM-SR进行双向鉴权认证;
第二接收单元,设置为在鉴权通过后,接收所述SM-SR发送的所述SM-SR依据所述用户设备卡的ID提取的嵌入式智能卡eUICC预设信息;
确定单元,设置为基于所述eUICC预设信息确定所述eUICC能否下载签约数据;
通知单元,设置为通过所述SM-SR向所述eUICC通知建立新ISD-P;
第三接收单元,设置为接收到所述eUICC建立新ISD-P的通知;
协商单元,设置为通过所述SM-SR与所述eUICC的新ISD-P协商签约数据的传输密钥;
加密单元,设置为从已生成的签约数据中选择一个,利用所述传输密钥对所选择的签约数据进行加密;
第一发送单元,设置为将加密后的签约数据向所述eUICC的新ISD-P发送。
本发明实施例中,所述装置还包括:
第四接收单元,设置为接收运营商发送的签约数据预生成指令;
生成单元,设置为根据所述预生成指令中携带的相关数据生成签约数据。
本发明实施例中,所述相关数据包括以下数据至少之一:
预定的签约数据数量、签约数据要求、有效的国际移动用户识别码IMSI范围。
本发明实施例中,所述装置还包括:
第五接收单元,设置为接收所述新ISD-P发送的签约数据的安装结果;
第二发送单元,设置为将所述安装结果向SM-SR发送。
本发明实施例中,所述装置还包括:
所述协商单元,还设置为在所述第一发送单元将约签数据中的关键个人信息向eUICC发送前,进行密钥协商以确定加密密钥;
所述第一发送单元还设置为将加密后的关键个人信息通过网页业务Web Service或安全套接层SSL建立的安全传输通道进行传送。
本发明实施例中,所述装置还包括:
设置单元,设置为在SM-DP与所述SM-SR进行空口数据传输时,分别在所述SM-DP和所述SM-SR内部设置计数器,所述SM-DP和所述SM-SR在发送数据时按照设定的顺序发送,不允许重复发送相同的数据,所述SM-DP和所述SM-SR各自维护自身的计数器,且计数器作为参数参与认证计算。
一种智能卡的空中配号装置,包括:
第一接收单元,设置为接收SM-DP鉴权请求;
鉴权单元,设置为与SM-DP进行鉴权认证;
第二接收单元,设置为在鉴权通过后,接收所述SM-DP发送的用户设备卡的ID;
提取单元,设置为基于所述用户设备卡的ID提取与所述用户设备卡对应的eUICC预设信息;
第一发送单元,设置为将所述eUICC预设信息向所述SM-DP发送;
第三接收单元,设置为接收所述SM-DP发送的签署安装新ISD-P请求;
认证单元,设置为与所述eUICC中的ISD-R进行双向鉴权认证;
第四接收单元,设置为接收所述ISD-R发送的建立新ISD-P的响应消息后,将所述响应消息向所述SM-DP发送。
本发明实施例中,所述装置还包括:
第五接收单元,设置为接收所述SM-DP发送的新ISD-P的签约数据的安装结果;
更新单元,设置为对数据库进行更新,将所述签约数据存储于eUICC签约数据集中,且将所述签约数据设置为未激活状态。
本发明实施例中,所述装置还包括:
第六接收单元,设置为接收运营商发送的所述签约数据的激活请求;
确定单元,设置为确定所述eUICC签约数据集中的规则信息是否允许切换;允许时,触发第二发送单元;
第二发送单元,设置为向所述eUICC发送注册激活请求;
第七接收单元,设置为接收所述ISD-R签约数据切换成功的消息;
所述更新单元,还设置为将所述签约数据设置为激活状态,并将切换结果通知运营商。
本发明实施例中,所述装置还包括:
第八接收单元,设置为接收eUICC制造商的注册请求;
注册单元,设置为将所述注册请求中的签约数据进行注册,所述签约数据包括以下信息至少之一:
签约数据类别、应用标识、eUICC ID、eUICC卡号、签约数据状态、需分配内存、管理策略。
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现上述智能卡的空中配号方法。
本发明实施例的技术方案采用了一种更加安全的方式来保证配号过程中的签约数据不被其他网元获知,对发行者安全信息域的提供安全的下载和管理,从而提高了系统的安全性。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1为本发明实施例的智能卡的空中配号方法的流程图(SM-DP侧);
图2为本发明实施例的智能卡的空中配号方法的流程图(SM-SR侧);
图3为本发明实施例的eUICC远程管理架构示意图;
图4为本发明实施例的空中配号架构示意图;
图5为本发明实施例的eUICC发行者安全信息域结构示意图;
图6为本发明实施例一的智能卡的空中配号方法的流程图;
图7为本发明实施例二的智能卡的空中配号方法的流程图;
图8为本发明实施例一的智能卡的空中配号装置的组成结构示意图;
图9为本发明实施例二的智能卡的空中配号装置的组成结构示意图。
详述
为了能够更加详尽地了解本发明实施例的特点与技术内容,下面结合附图对本发明实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本发明实施例。
本发明实施例记载了一种智能卡的空中配号方法,如图1所示,所述方法包括:
步骤101,用户签约数据管理—数据准备SM-DP接收运营商发送的下载请求,基于所述下载请求中的用户设备卡的ID和预注册的SM-SR标识与所述SM-SR进行双向鉴权认证;
步骤102,鉴权通过后,所述SM-DP接收所述SM-SR发送的所述SM-SR依据所述用户设备卡的ID提取的嵌入式智能卡eUICC预设信息;
步骤103,所述SM-DP基于所述eUICC预设信息确定所述eUICC能下载签约数据时,通过所述SM-SR向所述eUICC通知建立新ISD-P,并在接收到所述eUICC建立新ISD-P的通知后,通过所述SM-SR与所述eUICC的新ISD-P协商签约数据的传输密钥;
步骤104,所述SM-DP从已生成的签约数据中选择一个,利用所述传输密钥对所选择的签约数据进行加密,并将加密后的签约数据向所述eUICC的新ISD-P发送。
本示例中,所述SM-DP接收运营商发送的签约数据预生成指令,根据所述预生成指令中携带的相关数据生成签约数据。
本示例中,所述相关数据包括以下数据至少之一:
预定的签约数据数量、签约数据要求、有效的国际移动用户识别码IMSI范围。
本示例中,所述SM-DP接收到所述新ISD-P发送的签约数据的安装结果后,将所述安装结果向SM-SR发送。
本示例中,所述SM-DP在将约签数据中的关键个人信息向eUICC发送前,进行密钥协商以确定加密密钥,利用所述加密密钥将所述关键个人信息进行加密,将加密后的关键个人信息通过网页业务Web Service或安全套接层SSL建立的安全传输通道进行传送。
本示例中,所述SM-DP与所述SM-SR进行空口数据传输时,分别在所述SM-DP和所述SM-SR内部设置计数器,所述SM-DP和所述SM-SR在发送数据时按照设定的顺序发送,不允许重复发送相同的数据,所述SM-DP和所述SM-SR各自维护自身的计数器,且计数器作为参数参与认证计算。
本示例中,所述SM-DP在所述eUICC安装签约数据失败时,使所述eUICC自动回退到初始的签约数据。
本示例中,所述eUICC或所述eUICC所在的物联网终端被设置为无权限读取或修改关键个人信息数据;所述关键个人信息数据被存储于单独立的空间中,所述单独的独立空间包括硬件安全模块。
本发明实施例还记载了一种智能卡的空中配号方法,如图2所示,所述 方法包括:
步骤201,用户签约数据管理—安全路由SM-SR接收到SM-DP鉴权请求后,与SM-DP进行鉴权认证;
步骤202,鉴权通过后,SM-SR接收所述SM-DP发送的用户设备卡的ID,并基于所述用户设备卡的ID提取与所述用户设备卡对应的eUICC预设信息,将所述eUICC预设信息向所述SM-DP发送;
步骤203,所述SM-SR接收所述SM-DP发送的签署安装新ISD-P请求后,所述SM-SR与所述eUICC中的ISD-R进行双向鉴权认证;
步骤204,所述SM-SR接收所述ISD-R发送的建立新ISD-P的响应消息后,将所述响应消息向所述SM-DP发送。
本示例中,所述SM-SR接收所述SM-DP发送的新ISD-P的签约数据的安装结果后,对数据库进行更新,将所述签约数据存储于eUICC签约数据集中,且将所述签约数据设置为未激活状态。
本示例中,所述SM-SR接收运营商发送的所述签约数据的激活请求后,确定所述eUICC签约数据集中的规则信息是否允许切换;允许时,向所述eUICC发送注册激活请求;
所述SM-SR接收所述ISD-R签约数据切换成功的消息时,将所述签约数据设置为激活状态,将切换结果通知运营商。
本示例中,所述SM-SR接收eUICC制造商的注册请求后,将所述注册请求中的签约数据进行注册,所述签约数据包括以下信息至少之一:
签约数据类别、应用标识、eUICC ID、eUICC卡号、签约数据状态、需分配内存、管理策略。
以下通过示例,进一步阐明本发明实施例技术方案。
图3为本发明实施例的eUICC远程管理架构示意图,如图3所示,本发明实施例的eUICC远程管理架构描述了参与eUICC远程管理的三种角色:eUICC制造商31、运营商(MNO)32和远程管理平台33的连接关系。在上述架构中,远程管理平台33是eUICC34远程管理的核心。eUICC34中涉及运营商32及eUICC制造商31的数据经由远程管理平台33生成完整的 运营商数据文件后,通过空中写号等方式下载到eUICC卡34中。此外,运营商数据的变更、eUICC更换运营商等过程也经由远程管理平台33完成。远程管理平台功能的实现一定程度上还决定或影响着其它管理功能的实现。其中,远程管理平台33处于网络架构的核心地位,远程管理平台的功能主要包括两部分:SM-DP和SM-SR。其中,SM-DP主要负责eUICC卡远程配置的用户签约数据的安全生成、存储和下载;SM-SR主要负责eUICC卡远程配置数据的安全传输和管理。上述功能可以由一个或多个物理实体进行系统实现。
图4为本发明实施例的空中配号架构示意图,如图4所示,本发明实施例中,SM-DP331,主要负责根据运营商的需求,以及证书发行者35提供的信任状信息生成可供下载的签约信息,包括个人化信息(包括且不限于密钥信息、认证信任状)以及非个人化信息;之后,通过SM-SR332将这些数据传输并安装在嵌入式UICC卡34上。SM-SR332,在接收到运营商32或SM-DP331的下载指令后,负责建立一个安全的传输通道,来完成签约数据的下载、激活、禁用、删除等操作。每一个嵌入式UICC卡34首次都需要在一个SM-SR332处注册,但以后可以切换其注册的SM-SR332,因此在不同的SM-SR332间需要传递相关的签约数据。嵌入式UICC卡制造商31在制作卡时,需要将一些初始的签约数据预先装载到eUICC卡31中,这些数据包括但不限于下列信息:信任状签发者提供的身份认证信任状、运营商提供的IMSI、ICCID(Integrate Circuit Card Identity,集成电路卡识别码)。eUICC卡制作完毕后则将这些初始信息备份到SM-SR332中,此外制造商31还会向SM-DP331提供签约数据的生成工具,以便SM-DP331可以自行生成新的签约数据。嵌入式UICC卡34是一个带有操作系统(COS)的智能卡,内部包含了信任状安全域、发行者安全根域以及多个发行者安全信息域,参见图5所示。其中信任状安全域中存储着私钥、相关信任状、CI的根公钥以及用于信任状更换的密钥组,具有较高的安全级别;发行者安全根域则负责执行SM-SR发送的平台管理指令,并在SM-SR切换时执行密钥建立协议。发行者安全信息域代表了运营商的一个签约数据,包括文件系统、网络接入应用、控制授权安全域、补充安全域、策略规则以及运营商安全域。
基于图3、图4所示的架构,如图6所示,本发明实施例提供的智能卡的空中配号方法,包括以下处理流程:
步骤401,运营商向SM-DP发送签约数据预生成指令,并将需要预定的签约数据数量、签约数据要求、可用IMSI范围发送给SM-DP,SM-DP根据这些描述信息自行生成签约数据中的密钥、证书等个人信息部分,并将这些签约数据存储在SM-DP中准备下载。
步骤402,SM-DP完成签约数据准备后,运营商将下载请求发送给SM-DP,SM-DP对所述请求中的用户设备卡的ID号(EID,eUICC ID)和对应预注册的SM-SR标识号(SRID,SR ID)进行识别。
步骤403,SM-DP与注册的SM-SR进行双向鉴权。
步骤404,鉴权通过后,SM-DP向SM-SR传送eUICC卡信息集(EIS,eUICC Information Set)条目请求(参数eUICC标识EID)。
步骤405,SM-SR依据用户设备卡的ID号将该UICC卡预设信息即eUICC卡信息集(EIS,eUICC Information Set)提取出来。
步骤406,SM-SR将EIS条目信息发送给SM-DP,用于确认该eUICC是否适合下载该签约数据。若可以,执行步骤409,如果不可以,则执行步骤408。
步骤408,给SM-SR通知发生的错误。
步骤409,SM-DP向SM-SR签署安装新的ISD-P请求。
步骤410,SM-SR和eUICC中的ISD-R启动认证流程,进行双向鉴权。
步骤411,如果通过认证,则建立一个空的ISD-P。
步骤412,SM-SR将确认信息返回给SM-DP。步骤413,SM-DP与新建立的ISD-P进行密钥协商流程,建立一个共享来传输密钥,并且从已经生成的新的签约数据中挑选一个预备发送给eUICC卡。
步骤414,SM-DP使用与ISD-P协商好的密钥对其中的个人签约数据进行加密。
步骤415,建立安全传输通道。
步骤416,将加密后的个人签约数据发送给ISD-P。
步骤417,ISD-P接收该数据后,使用前面所述密钥对该数据进行解密和安装。
步骤418,ISD-P将安装结果和状态返回给SM-DP。步骤419,SM-DP将ISD-P的安装结果和状态发送给SM-SR。
步骤420,SM-SR对其数据库进行更新,将新的签约数据存储于eUICC签约数据集(EIS)中,且置这个新的签约数据为未激活状态。
步骤421,SM-SR向SM-DP发送注册信息下载确认。
步骤422,接到用户申请开通新签约数据后,运营商向SM-SR发送新签约数据激活请求,SM-SR确认该新签约数据集中的规则信息是否允许切换;若允许,则签署一个注册激活请求给eUICC的ISD-R,eUICC继续进行本地执行规则的确认;如果有冲突,ISD-R停止该过程,并且告知SM-SR;如果没有冲突,ISD-R进行签约数据切换,并告知切换结果给SM-SR,SM-SR再告知运营商切换结果。随后,运营商再通过SM-SR将原签约数据禁用,此过程也要经过上面所述两次规则信息的确认后再执行操作。
步骤421,SM-DP给运营商发送发送注册消息下载成功的消息。
运营商确定对某签约数据不再启用,并将彻底删除时,可以进行eUICC卡内该签约数据的删除的操作。
本发明实施例中,当eUICC在eUICC卡制造商处制作完成后,卡制造商先将eUICC内部预存储的签约数据发送给SM-SR进行注册,所述签约数据包括并不限于签约数据类别、应用标识、ICCID、MSISDN、签约数据状态、需分配内存、管理策略。
SM-DP到SM-SR、SM-SR到SM-SR之间的通信首先进行身份的双向认证,确认身份正确后再可进行通信。
本发明实施例中,SM-DP在将约签数据中的关键个人信息(包括且不限于密钥、信任状)下发给eUICC前,首先进行一个密钥协商流程以确定一个加密密钥,之后将关键个人信息进行加密,然后将加密后的关键个人 信息通过Web Service或SSL建立的安全传输通道进行传送。
本发明实施例中,在SM-DP和SM-SR进行空口数据传输时,在SM-DP、SM-SR内部设置计数器,SM-DP、SM-SR在发送时按照一定的顺序发送指令并不允许重复发送相同的报文,SM-DP、SM-SR和接收端各自维护自己的计数器,且计数器作为参数参与认证计算。
本发明实施例中,SM-DP和eUICC在安装之前按照一定的规则对是否能够安装进行多次确认,若安装无法完成,将会自动回退到初始的签约数据。
本发明实施例中,eUICC或所在的M2M(Machine to Machine,机器与机器)设备被设置为无权限读取或修改关键个人信息数据。
本发明实施例中,关键个人信息数据被存储于单独立的空间中;所述单独的独立空间可以是硬件安全模块等。
基于图3、图4所示的架构,如图7所示,本发明实施例提供的智能卡的空中配号方法,可包括以下处理流程:
步骤501,运营商向远程管理平台之SM-DP发送注册信息下载请求,携带参数包括(SM-SR的标识SRID,eUICC标识EID,ICCID,激活请求);
步骤502,目的远程管理平台(SM-DP)识别接收的SM-SR标识是否正确;
步骤503,SM-DP和SM-SR进行双向鉴权;
步骤504,鉴权通过的话,SM-DP向SM-SR传送eUICC卡信息集EIS条目请求(参数eUICC标识EID);
步骤505,SM-SR根据eUICC标识EID查找、获取对应的EIS条目,并向SM-DP返回EIS条目信息;
步骤506,SM-DP判断该eUICC是否可用。如果可用,继续执行步骤7,如果不可用,则执行步骤13,给SM-SR通知发生的错误。
步骤507,SM-DP向SM-SR发送IS-DP安装请求;
步骤508,SM-SR和eUICC进行双向鉴权,并进行ISD-P创建过程,创建完成后SM-SR向SM-DP发送创建确认消息;
步骤509,SM-DP和eUICC进行ISD-P密钥建立流程,并利用ISD-P密钥对注册的个人信息部分进行加密,将加密后的数据下载并安装注册信息通过安全传输通道传送给eUICC;
步骤510,eUICC接收到数据后,解密数据并安装ISD-P,成功后给SM-DP发送安装成功确认消息,SM-DP给SM-SR也发一个ISD-P安装结果的确认消息,SM-SR更新(加入新的注册信息)注册信息,并给SM-DP发送注册信息下载确认;
步骤511,eUICC激活相应的注册消息,给SM-DP发送激活成功的消息;
步骤512,SM-DP给运营商发送发送注册消息下载成功的消息。
图8为本发明实施例一的智能卡的空中配号装置的组成结构示意图,如图8所示,本发明实施例的智能卡的远程签约管理平台切换装置包括:
第一接收单元60,设置为接收运营商发送的下载请求;
认证单元61,设置为基于所述下载请求中的用户设备卡的ID和预注册的SM-SR标识与所述SM-SR进行双向鉴权认证;
第二接收单元62,设置为在鉴权通过后,接收所述SM-SR发送的所述SM-SR依据所述用户设备卡的ID提取的嵌入式智能卡eUICC预设信息;
确定单元63,设置为基于所述eUICC预设信息确定所述eUICC能否下载签约数据;
通知单元64,设置为通过所述SM-SR向所述eUICC通知建立新ISD-P;
第三接收单元65,设置为接收到所述eUICC建立新ISD-P的通知;
协商单元66,设置为通过所述SM-SR与所述eUICC的新ISD-P协商签约数据的传输密钥;
加密单元67,设置为从已生成的签约数据中选择一个,利用所述传输 密钥对所选择的签约数据进行加密;
第一发送单元68,设置为将加密后的签约数据向所述eUICC的新ISD-P发送。
在图8所示的智能卡的空中配号装置的基础上,本发明实施例的智能卡的空中配号装置还包括:
第四接收单元(图8中未示出),设置为接收运营商发送的签约数据预生成指令;
生成单元(图8中未示出),设置为根据所述预生成指令中携带的相关数据生成签约数据。
所述相关数据包括以下数据至少之一:
预定的签约数据数量、签约数据要求、有效的国际移动用户识别码IMSI范围。
在图8所示的智能卡的空中配号装置的基础上,本发明实施例的智能卡的空中配号装置还包括:
第五接收单元(图8中未示出),设置为接收所述新ISD-P发送的签约数据的安装结果;
第二发送单元(图8中未示出),设置为将所述安装结果向SM-SR发送。
在图8所示的智能卡的空中配号装置的基础上,本发明实施例的智能卡的空中配号装置还包括:
所述协商单元66,还设置为在所述第一发送单元将约签数据中的关键个人信息向eUICC发送前,进行密钥协商以确定加密密钥;
所述第一发送单元68还设置为将加密后的关键个人信息通过网页业务Web Service或安全套接层SSL建立的安全传输通道进行传送。
在图8所示的智能卡的空中配号装置的基础上,本发明实施例的智能卡的空中配号装置还包括:
设置单元(图8中未示出),设置为在SM-DP与所述SM-SR进行空口 数据传输时,分别在所述SM-DP和所述SM-SR内部设置计数器,所述SM-DP和所述SM-SR在发送数据时按照设定的顺序发送,不允许重复发送相同的数据,所述SM-DP和所述SM-SR各自维护自身的计数器,且计数器作为参数参与认证计算。
本领域技术人员应当理解,图8所示的智能卡的空中配号装置中的各单元的实现功能可参照前述智能卡的远程签约管理平台切换方法的相关描述而理解。图8所示的确定单元、认证单元、协商单元、加密单元等均可以通过微处理器、FPGA(Field-Programmable Gate Array,现场可编程门阵列)、数字信号处理器等实现,发送单元、通知单元和接收单元可以通过空口天线系统或有线接口等的方式实现。
图9为本发明实施例一的智能卡的空中配号装置的组成结构示意图,如图9所示,本发明实施例的智能卡的远程签约管理平台切换装置包括:
第一接收单元70,设置为接收SM-DP鉴权请求;
鉴权单元71,设置为与SM-DP进行鉴权认证;
第二接收单元72,设置为在鉴权通过后,接收所述SM-DP发送的用户设备卡的ID;
提取单元73,设置为基于所述用户设备卡的ID提取与所述用户设备卡对应的eUICC预设信息;
第一发送单元74,设置为将所述eUICC预设信息向所述SM-DP发送;
第三接收单元75,设置为接收所述SM-DP发送的签署安装新ISD-P请求;
认证单元76,设置为与所述eUICC中的ISD-R进行双向鉴权认证;
第四接收单元77,设置为接收所述ISD-R发送的建立新ISD-P的响应消息后,将所述响应消息向所述SM-DP发送。
在图9所示的智能卡的空中配号装置的基础上,本发明实施例的智能卡的空中配号装置还包括:
第五接收单元(图9中未示出),设置为接收所述SM-DP发送的新ISD-P的签约数据的安装结果;
更新单元(图9中未示出),设置为对数据库进行更新,将所述签约数据存储于eUICC签约数据集中,且将所述签约数据设置为未激活状态。
在图9所示的智能卡的空中配号装置的基础上,本发明实施例的智能卡的空中配号装置还包括:
第六接收单元(图9中未示出),设置为接收运营商发送的所述签约数据的激活请求;
确定单元(图9中未示出),设置为确定所述eUICC签约数据集中的规则信息是否允许切换;允许时,触发第二发送单元;
第二发送单元(图9中未示出),设置为向所述eUICC发送注册激活请求;
第七接收单元,设置为接收所述ISD-R签约数据切换成功的消息;
所述更新单元,还设置为将所述签约数据设置为激活状态,并将切换结果通知运营商。
在图9所示的智能卡的空中配号装置的基础上,本发明实施例的智能卡的空中配号装置还包括:
第八接收单元(图9中未示出),设置为接收所述eUICC制造商的注册请求;
注册单元(图9中未示出),设置为将所述注册请求中的签约数据进行注册,所述签约数据包括以下信息至少之一:
签约数据类别、应用标识、eUICC ID、eUICC卡号、签约数据状态、需分配内存、管理策略。
本领域技术人员应当理解,图9所示的智能卡的远程签约管理平台切换装置中的各单元的实现功能可参照前述智能卡的远程签约管理平台切换方法的相关描述而理解。图9所示的鉴权单元、认证单元、提取单元等均可以通过微处理器、FPGA、数字信号处理器等实现,发送单元和接收单元可以通过空口天线系统或有线接口等的方式实现。
在本申请所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其他的方式实现。以上所描述的设备实施例仅仅是示意性 的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其他形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。
另外,在本发明各实施例中的各功能单元可以全部集成在一个处理单元中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、只读存储器(ROM,Read Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
或者,本发明实施例上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本发明各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、只读存储器(ROM,Read Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保 护范围应以所述权利要求的保护范围为准。
工业实用性
本发明实施例的技术方案采用了一种更加安全的方式来保证配号过程中的签约数据不被其他网元获知,对发行者安全信息域的提供安全的下载和管理,从而提高了系统的安全性。

Claims (22)

  1. 一种智能卡的空中配号方法,所述方法包括:
    用户签约数据管理—数据准备SM-DP接收运营商发送的下载请求,基于所述下载请求中的用户设备卡的标识ID和预注册的用户签约数据管理—安全路由SM-SR标识与所述SM-SR进行双向鉴权认证;
    鉴权通过后,所述SM-DP接收所述SM-SR发送的所述SM-SR依据所述用户设备卡的ID提取的嵌入式智能卡eUICC预设信息;
    所述SM-DP基于所述eUICC预设信息确定所述eUICC能下载签约数据时,通过所述SM-SR向所述eUICC通知建立新证书发行方安全域配置ISD-P,并在接收到所述eUICC建立新ISD-P的通知后,通过所述SM-SR与所述eUICC的新ISD-P协商签约数据的传输密钥;
    所述SM-DP从已生成的签约数据中选择一个,利用所述传输密钥对所选择的签约数据进行加密,并将加密后的签约数据向所述eUICC的新ISD-P发送。
  2. 根据权利要求1所述的方法,所述方法还包括:
    所述SM-DP接收运营商发送的签约数据预生成指令,根据所述预生成指令中携带的相关数据生成签约数据。
  3. 根据权利要求2所述的方法,其中,所述相关数据包括以下数据至少之一:
    预定的签约数据数量、签约数据要求、有效的国际移动用户识别码IMSI范围。
  4. 根据权利要求1所述的方法,所述方法还包括:
    所述SM-DP接收到所述新ISD-P发送的签约数据的安装结果后,将所述安装结果向SM-SR发送。
  5. 根据权利要求1至4任一项所述的方法,所述方法还包括:
    所述SM-DP在将约签数据中的关键个人信息向eUICC发送前,进行密钥协商以确定加密密钥,利用所述加密密钥将所述关键个人信息进行加密, 将加密后的关键个人信息通过网页业务Web Service或安全套接层SSL建立的安全传输通道进行传送。
  6. 根据权利要求1至5任一项所述的方法,所述方法还包括:
    所述SM-DP与所述SM-SR进行空口数据传输时,分别在所述SM-DP和所述SM-SR内部设置计数器,所述SM-DP和所述SM-SR在发送数据时按照设定的顺序发送,不允许重复发送相同的数据,所述SM-DP和所述SM-SR各自维护自身的计数器,且计数器作为参数参与认证计算。
  7. 根据权利要求1至6任一项所述的方法,所述方法还包括:
    所述SM-DP在所述eUICC安装签约数据失败时,使所述eUICC自动回退到初始的签约数据。
  8. 根据权利要求1至7任一项所述的方法,所述方法还包括:
    所述eUICC或所述eUICC所在的物联网终端被设置为无权限读取或修改关键个人信息数据;所述关键个人信息数据被存储于单独立的空间中,所述单独的独立空间包括硬件安全模块。
  9. 一种智能卡的空中配号方法,所述方法包括:
    用户签约数据管理—安全路由SM-SR接收到用户签约数据管理—数据准备SM-DP鉴权请求后,与SM-DP进行鉴权认证;
    鉴权通过后,SM-SR接收所述SM-DP发送的用户设备卡的标识ID,并基于所述用户设备卡的ID提取与所述用户设备卡对应的嵌入式智能卡eUICC预设信息,将所述eUICC预设信息向所述SM-DP发送;
    所述SM-SR接收所述SM-DP发送的签署安装新证书发行方安全域配置ISD-P请求后,所述SM-SR与所述eUICC中的ISD-R进行双向鉴权认证;
    所述SM-SR接收所述ISD-R发送的建立新ISD-P的响应消息后,将所述响应消息向所述SM-DP发送。
  10. 根据权利要求9所述的方法,所述方法还包括:
    所述SM-SR接收所述SM-DP发送的新ISD-P的签约数据的安装结果 后,对数据库进行更新,将所述签约数据存储于eUICC签约数据集中,且将所述签约数据设置为未激活状态。
  11. 根据权利要求10所述的方法,所述方法还包括:
    所述SM-SR接收运营商发送的所述签约数据的激活请求后,确定所述eUICC签约数据集中的规则信息是否允许切换;允许时,向所述eUICC发送注册激活请求;
    所述SM-SR接收所述ISD-R签约数据切换成功的消息时,将所述签约数据设置为激活状态,将切换结果通知所述运营商。
  12. 根据权利要求10所述的方法,所述方法还包括:
    所述SM-SR接收eUICC制造商的注册请求后,将所述注册请求中的签约数据进行注册,所述签约数据包括以下信息至少之一:
    签约数据类别、应用标识、eUICC ID、eUICC卡号、签约数据状态、需分配内存、管理策略。
  13. 一种智能卡的空中配号装置,所述装置包括:
    第一接收单元,设置为接收运营商发送的下载请求;
    认证单元,设置为基于所述下载请求中的用户设备卡的标识ID和预注册的用户签约数据管理—安全路由SM-SR标识与所述SM-SR进行双向鉴权认证;
    第二接收单元,设置为在鉴权通过后,接收所述SM-SR发送的所述SM-SR依据所述用户设备卡的ID提取的嵌入式智能卡eUICC预设信息;
    确定单元,设置为基于所述eUICC预设信息确定所述eUICC能否下载签约数据;
    通知单元,设置为通过所述SM-SR向所述eUICC通知建立新证书发行方安全域配置ISD-P;
    第三接收单元,设置为接收到所述eUICC建立新ISD-P的通知;
    协商单元,设置为通过所述SM-SR与所述eUICC的新ISD-P协商签约数据的传输密钥;
    加密单元,设置为从已生成的签约数据中选择一个,利用所述传输密钥对所选择的签约数据进行加密;
    第一发送单元,设置为将加密后的签约数据向所述eUICC的新ISD-P发送。
  14. 根据权利要求13所述的装置,所述装置还包括:
    第四接收单元,设置为接收运营商发送的签约数据预生成指令;
    生成单元,设置为根据所述预生成指令中携带的相关数据生成签约数据。
  15. 根据权利要求14所述的装置,其中,所述相关数据包括以下数据至少之一:
    预定的签约数据数量、签约数据要求、有效的国际移动用户识别码IMSI范围。
  16. 根据权利要求13所述的装置,所述装置还包括:
    第五接收单元,设置为接收所述新ISD-P发送的签约数据的安装结果;
    第二发送单元,设置为将所述安装结果向SM-SR发送。
  17. 根据权利要求13至16任一项所述的装置,所述装置还包括:
    所述协商单元,还设置为在所述第一发送单元将约签数据中的关键个人信息向eUICC发送前,进行密钥协商以确定加密密钥;
    所述第一发送单元还设置为将加密后的关键个人信息通过网页业务Web Service或安全套接层SSL建立的安全传输通道进行传送。
  18. 根据权利要求13至17任一项所述的装置,所述装置还包括:
    设置单元,设置为在SM-DP与所述SM-SR进行空口数据传输时,分别在所述SM-DP和所述SM-SR内部设置计数器,所述SM-DP和所述SM-SR在发送数据时按照设定的顺序发送,不允许重复发送相同的数据,所述SM-DP和所述SM-SR各自维护自身的计数器,且计数器作为参数参与认证计算。
  19. 一种智能卡的空中配号装置,所述装置包括:
    第一接收单元,设置为接收用户签约数据管理—数据准备SM-DP鉴权请求;
    鉴权单元,设置为与SM-DP进行鉴权认证;
    第二接收单元,设置为在鉴权通过后,接收所述SM-DP发送的用户设备卡的标识ID;
    提取单元,设置为基于所述用户设备卡的ID提取与所述用户设备卡对应的嵌入式智能卡eUICC预设信息;
    第一发送单元,设置为将所述eUICC预设信息向所述SM-DP发送;
    第三接收单元,设置为接收所述SM-DP发送的签署安装新证书发行方安全域配置ISD-P请求;
    认证单元,设置为与所述eUICC中的ISD-R进行双向鉴权认证;
    第四接收单元,设置为接收所述ISD-R发送的建立新ISD-P的响应消息后,将所述响应消息向所述SM-DP发送。
  20. 根据权利要求19所述的装置,所述装置还包括:
    第五接收单元,设置为接收所述SM-DP发送的新ISD-P的签约数据的安装结果;
    更新单元,设置为对数据库进行更新,将所述签约数据存储于eUICC签约数据集中,且将所述签约数据设置为未激活状态。
  21. 根据权利要求20所述的装置,所述装置还包括:
    第六接收单元,设置为接收运营商发送的所述签约数据的激活请求;
    确定单元,设置为确定所述eUICC签约数据集中的规则信息是否允许切换;允许时,触发第二发送单元;
    第二发送单元,设置为向所述eUICC发送注册激活请求;
    第七接收单元,设置为接收所述ISD-R签约数据切换成功的消息;
    所述更新单元,还设置为将所述签约数据设置为激活状态,并将切换结果通知所述运营商。
  22. 根据权利要求20所述的装置,所述装置还包括:
    第八接收单元,设置为接收eUICC制造商的注册请求;
    注册单元,设置为将所述注册请求中的签约数据进行注册,所述签约数据包括以下信息至少之一:
    签约数据类别、应用标识、eUICC ID、eUICC卡号、签约数据状态、需分配内存、管理策略。
PCT/CN2017/090367 2016-12-14 2017-06-27 智能卡的空中配号方法及装置 WO2018107718A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611155037.7 2016-12-14
CN201611155037.7A CN108235306A (zh) 2016-12-14 2016-12-14 智能卡的空中配号方法及装置

Publications (1)

Publication Number Publication Date
WO2018107718A1 true WO2018107718A1 (zh) 2018-06-21

Family

ID=62557914

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/090367 WO2018107718A1 (zh) 2016-12-14 2017-06-27 智能卡的空中配号方法及装置

Country Status (2)

Country Link
CN (1) CN108235306A (zh)
WO (1) WO2018107718A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079503A (zh) * 2021-03-23 2021-07-06 中国联合网络通信集团有限公司 一种远程下载认证应用证书的方法及系统

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743409B (zh) * 2019-03-13 2021-07-13 中国联合网络通信集团有限公司 异步通信方法及装置
EP3719706A1 (en) * 2019-04-01 2020-10-07 Thales Dis France SA Method for patching an operating system on a secure element transparently through an sm-sr platform
CN112804676B (zh) * 2020-12-29 2024-03-29 北京握奇数据股份有限公司 一种基于eSIM M2M的自主下号的方法和系统
CN113490210B (zh) * 2021-06-17 2023-03-24 中国联合网络通信集团有限公司 一种辅助安全域的创建方法及系统
CN113490211B (zh) * 2021-06-17 2023-03-24 中国联合网络通信集团有限公司 一种辅助安全域的创建方法、sm-sr及系统
CN115499820A (zh) * 2022-07-25 2022-12-20 北京中电飞华通信有限公司 一种eSIM空中写号系统及方法
CN115499821A (zh) * 2022-07-25 2022-12-20 北京中电飞华通信有限公司 一种eSIM签约方法及装置
CN115767503B (zh) * 2022-11-14 2024-06-07 杭州可当科技有限公司 一种应用于物联网的eSIM芯片

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015081882A1 (zh) * 2013-12-05 2015-06-11 华为终端有限公司 下载运营商的文件的方法及设备
CN105101158A (zh) * 2014-05-23 2015-11-25 华为技术有限公司 Profile切换方法、信号强度检测方法及设备

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765101B (zh) * 2009-12-15 2013-08-21 大唐微电子技术有限公司 一种空中个人化写卡的方法和系统
CN102196413B (zh) * 2010-03-03 2013-10-23 中国移动通信集团公司 实现空中配号的方法、系统、服务器和用户身份识别卡

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015081882A1 (zh) * 2013-12-05 2015-06-11 华为终端有限公司 下载运营商的文件的方法及设备
CN105101158A (zh) * 2014-05-23 2015-11-25 华为技术有限公司 Profile切换方法、信号强度检测方法及设备

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
GSMA: "Embedded SIM Remote Provisioning Architecture Version 1.1. GSM Association", OFFICIAL DOCUMENT 12FAST.13, 17 December 2013 (2013-12-17), XP055218410 *
GSMA: "Remote Provisioning Architecture for Embedded UICC Technical Specification Version 3.0. GSM Association", OFFICIAL DOCUMENT SGP.02, 30 June 2015 (2015-06-30) *
LU , DAN ET AL.: "Ananlysis of Embedded SIM Remote Provisioning Technologies and Security Problems", TELECOMMUNICATIONS NETWORK TECHNOLOGY, 15 February 2016 (2016-02-15) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079503A (zh) * 2021-03-23 2021-07-06 中国联合网络通信集团有限公司 一种远程下载认证应用证书的方法及系统
CN113079503B (zh) * 2021-03-23 2022-11-15 中国联合网络通信集团有限公司 一种远程下载认证应用证书的方法及系统

Also Published As

Publication number Publication date
CN108235306A (zh) 2018-06-29

Similar Documents

Publication Publication Date Title
WO2018107718A1 (zh) 智能卡的空中配号方法及装置
US10951630B2 (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
EP3629610B1 (en) Method and apparatus for managing embedded universal integrated circuit card configuration file
EP3800909B1 (en) Remote management method, and device
US10027646B2 (en) Associating an agent device associated with a first application providing apparatus with a second application providing apparatus
JP5508428B2 (ja) 鍵の配布方法及びシステム
KR102169947B1 (ko) 에이전트 디바이스에 대한 신뢰된 신원을 확립하는 방법
JP6033291B2 (ja) サービスアクセス認証方法およびシステム
KR101315670B1 (ko) 보안인증 디바이스에 접근하는 스마트폰 등록 방법 및 등록된 스마트폰의 접근 권한 인증방법
EP3073770A1 (en) Security control method for euicc, and euicc
KR20160124648A (ko) 프로파일 다운로드 및 설치 장치
KR20160003992A (ko) eUICC(embedded Universal Integrated Circuit Card)를 위한 프로파일 설치 방법 및 장치
US20200272446A1 (en) METHOD FOR INTEROPERATING BETWEEN BUNDLE DOWNLOAD PROCESS AND eSIM PROFILE DOWNLOAD PROCESS BY SSP TERMINAL
KR20180093333A (ko) eSIM 접근 제어 방법 및 장치
WO2018209986A1 (zh) eUICC签约数据的下载方法及装置
KR20200048298A (ko) Ssp의 번들을 관리하는 방법 및 장치
KR20200028786A (ko) Ssp 단말과 서버가 디지털 인증서를 협의하는 방법 및 장치
WO2018107723A1 (zh) 智能卡的远程签约管理平台切换方法及装置、智能卡、sm-sr
CN112913263A (zh) 用于处理远程简档管理异常的方法和装置
KR20150016802A (ko) 보안장치 및 이를 이용하는 데이터 이동 방법
KR101757692B1 (ko) 토큰 서버 인증을 이용한 홈네트워크 기기의 원격 제어 시스템 및 방법
CN113709849A (zh) 待入网设备的入网方法和装置、存储介质及电子装置
US20220278985A1 (en) Method and device for transferring bundle between devices
WO2019223524A1 (zh) 一种管理发行者安全信息域的方法、装置和系统
KR20200099836A (ko) eUICC 프로파일 설치 권한을 관리하는 방법 및 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17882252

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17882252

Country of ref document: EP

Kind code of ref document: A1