WO2018107723A1 - 智能卡的远程签约管理平台切换方法及装置、智能卡、sm-sr - Google Patents

智能卡的远程签约管理平台切换方法及装置、智能卡、sm-sr Download PDF

Info

Publication number
WO2018107723A1
WO2018107723A1 PCT/CN2017/090814 CN2017090814W WO2018107723A1 WO 2018107723 A1 WO2018107723 A1 WO 2018107723A1 CN 2017090814 W CN2017090814 W CN 2017090814W WO 2018107723 A1 WO2018107723 A1 WO 2018107723A1
Authority
WO
WIPO (PCT)
Prior art keywords
destination
credential
euicc
file
source
Prior art date
Application number
PCT/CN2017/090814
Other languages
English (en)
French (fr)
Inventor
吴传喜
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018107723A1 publication Critical patent/WO2018107723A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface

Definitions

  • the present disclosure relates to an Internet of Things (IoT) communication technology, and more particularly to a method and device for switching a remote subscription management platform of a smart card, a smart card, and a Subscriber-Secure Routing (SM-SR).
  • IoT Internet of Things
  • SM-SR Subscriber-Secure Routing
  • the Internet of Things is called the third wave of the world information industry after the computer and the Internet. It represents the development direction of the next generation of information technology. With the popularization of the Internet of Things technology, more and more traditional goods such as automobiles, smart watches and monitoring equipment
  • eUICC embedded Universal Integrated Circuit Card
  • eUICC As an authentication tool for IoT terminals to access carrier networks, and as a security carrier for carrying various applications (APPs) and data, eUICC has become a key core technology for the development of the Internet of Things.
  • eUICC applied to the Internet of Things business is not only a new UICC card form or user terminal device form, but also an overall system established to support this new form of device, in which eUICC activation, deactivation management, user relationship Management, remote management, business management, and security management are all likely to be essential features in the system.
  • the telecommunications smart card is distributed according to the place of issue, the place of use, and the use of the card, and a method of using a network management area such as a province, a city, or the like is issued.
  • a network management area such as a province, a city, or the like.
  • the UICC card only needs to be personalized before the release, such as UICC card ID writing, UICC card basic authentication authorization parameter writing, initial contract data or related parameter writing, after the release,
  • the user subscription data management-data preparation regenerates the new subscription data and downloads it to the eUICC to implement the operator's selection and replacement.
  • Security threats to air-allocation technology include counterfeiting, eavesdropping, replay, denial of service, and unauthorized access, such as identity spoofing threats.
  • Different operating entities participate in the process of generating, downloading, installing, and switching contract data, such as multiple Operators and multiple users subscribe to the data management-Secure Routing (SM-SR), so the identity authentication algorithm is inevitably mastered by multiple operating entities, and at the same time, when the operation authorization is obtained through the credential, once Loss of trust can lead to illegal operations.
  • SM-SR data management-Secure Routing
  • the source SM-SR needs to transfer the remote management control of the eUICC to the destination SM-SR.
  • the destination SM-SR and the source SM-SR are managed by different administrators.
  • the eUICC pre-installs a Provisioning Profile for accessing the SM-SR at the card manufacturer to connect to A preset SM-SR, the preset SM-SR is used to implement operations such as downloading an eUICC to access an operator network, such as an operation profile (Operational Profile), and the eUICC is also provided with a preset
  • the file corresponding to the SM-SR is installed with a credential to enable the SM-SR to download files and data from the eUICC.
  • an embodiment of the present disclosure provides a method and device for switching a remote subscription management platform of a smart card, a smart card, and an SM-SR.
  • a method for switching a remote subscription management platform of a smart card comprising:
  • the destination SM-SR After receiving the handover request for the eUICC, the destination SM-SR encrypts the credential data related to establishing secure communication between the eUICC and other network element entities to ensure that the credential data can be transmitted securely.
  • the credential data includes:
  • a configuration file for accessing the SM-SR where the configuration file is used to connect to a preset SM-SR, where the preset SM-SR is used to implement downloading of files required by the eUICC to access the carrier network;
  • the file corresponding to the preset SM-SR is installed with a credential to implement downloading of files and data between the SM-SR and the eUICC.
  • the credential data related to establishing secure communication between the eUICC and other network element entities is encrypted to ensure that the credential data can be transmitted securely, including:
  • the destination SM-SR receiving source SM-SR sends the eUICC credential, the SM-SR credential, and the file installation credential information, and signs the data management to the destination user—the data preparation SM-DP sends the file installation credential and the configuration file generation.
  • Request message the eUICC credential, the SM-SR credential, and the file installation credential information, and signs the data management to the destination user—the data preparation SM-DP sends the file installation credential and the configuration file generation.
  • the destination SM-SR receives the configuration file encrypted by the file installation credential sent by the destination SM-DP, generates a public key, a private key pair, and encrypts the configuration file with the file installation credential, Sending, by the source SM-SR, the public key to the eUICC;
  • the destination SM-SR receives a download request of the file required by the eUICC to access the operator network to which the destination SM-SR belongs, and sends the corresponding file to the eUICC.
  • the credential data related to establishing secure communication between the eUICC and other network element entities is encrypted to ensure that the credential data can be transmitted securely, including:
  • the destination SM-SR receiving source SM-SR sends the information of the eUICC credential, the SM-SR credential, and the file installation credential, encrypts the configuration file stored by the file with the file installation credential, and generates the public key and the private key pair. And sending, by the source SM-SR, the configuration file encrypted by the file installation credential to the eUICC;
  • the destination SM-SR receives a download request of the file required by the eUICC to access the operator network to which the destination SM-SR belongs, and sends the corresponding file to the eUICC.
  • the determining to allow switching to the destination SM-SR includes:
  • the destination SM-SR When the handover initiator is the eUICC, the destination SM-SR further sends a query request to the destination SM-DP for providing service to the eUICC, and the capability of receiving the destination SM-DP is When the eUICC provides a response message of the service, it is determined to allow handover to the destination SM-SR.
  • the method further includes:
  • the destination SM-SR When the handover initiator is the operator of the destination SM-SR, the destination SM-SR sends a request for the eUICC handover host SM-SR to the source SM-SR, and performs bidirectional authentication authentication with the source SM-SR.
  • the method further includes:
  • the communication between the DP, the source SM-SR and the eUICC, the destination SM-SR and the eUICC, and the eUICC and the operator first performs mutual authentication of the identity, and then communicates after the authentication is passed.
  • the method further includes:
  • the destination SM-DP When performing air interface data transmission between the source SM-SR and the destination SM-SR, the source SM-SR and the source SM-DP, and the destination SM-SR and the destination SM-DP, respectively, the destination SM-DP, the destination SM-SR, The source SM-SR and the source SM-DP internally set the counter.
  • the destination SM-DP, the destination SM-SR, and the source SM-SR are sent in the set order when transmitting data. The same data is not allowed to be sent repeatedly.
  • the destination SM-DP The destination SM-SR, the source SM-SR, the source SM-DP, and the eUICC each maintain their own counters, and the counter participates in the authentication calculation as a parameter.
  • the method further includes:
  • the destination SM-SR first performs key agreement to determine an encryption key before transmitting the key personal information in the subscription data to the eUICC, and encrypts the key personal information by using the encryption key, and encrypts the key personal information.
  • the key personal information is transmitted through the secure transmission channel established by the web service security or secure socket layer SSL.
  • the method further includes:
  • the eUICC or the Internet of Things terminal where the eUICC is located is set to read or modify key personal information data without permission; the personal key data information is stored in a single independent space, and the separate independent space includes hardware security Module.
  • a method for switching a remote subscription management platform of a smart card comprising:
  • the source SM-SR After receiving the handover request sent by the eUICC, the source SM-SR sends a request for the eUICC to switch the host SM-SR to the destination SM-SR.
  • the source SM-SR receives the configuration file encrypted by the destination SM-SR and the public key information, and the eUICC switches the request of the host SM-SR, and encrypts the file with the installation credential.
  • the configuration file and the public key information are sent to the eUICC, and a request to switch the host SM-SR is sent to the eUICC.
  • the method further includes:
  • the source SM-SR performs bidirectional authentication authentication with the destination SM-SR, and after the bidirectional authentication authentication is passed, sends a request for the eUICC to switch the host SM-SR to the destination SM-SR.
  • a method for switching a remote subscription management platform of a smart card comprising:
  • the source SM-SR After receiving the bidirectional authentication request sent by the destination SM-SR, the source SM-SR performs bidirectional authentication authentication with the destination SM-SR, and after receiving the bidirectional authentication authentication, receives the eUICC sent by the destination SM-SR. Switching the request of the host SM-SR;
  • the source SM-SR receives the configuration file and the public key information encrypted by the file installation credential sent by the destination SM-SR, and adds the configuration file encrypted by the credential installation file and the public key information to the source SM-SR.
  • the eUICC sends and sends a request to the eUICC to switch the host SM-SR.
  • a file installation credential is stored in the source SM-SR.
  • the method before sending the file installation credential information to the destination SM-SR, the method further includes:
  • the source SM-SR sends a file installation credential request to the source SM-DP, and receives a file installation credential sent by the source SM-DP.
  • a method for switching a remote subscription management platform of a smart card comprising:
  • the eUICC After receiving the configuration file and the public key information encrypted by the file installation credential sent by the source SM-SR, the eUICC deactivates or deletes the configuration file related to the source SM-SR, and deletes the configuration file related to the source SM-SR. a file management credential, activating the currently received configuration file; and sending an access request message to the destination SM-SR according to the currently received configuration file;
  • the eUICC receives a file management credential corresponding to the destination SM-SR and an SM-SR credential, which is sent by the destination SM-SR and is encrypted by the private key of the destination SM-SR, based on the SM-SR credential When it is determined that the destination SM-SR is legal, data interaction with the destination SM-SR is performed.
  • the method further includes:
  • the required file is used to initiate an access request to the carrier network to which the destination SM-SR belongs according to the required file of the carrier network to which the destination SM-SR belongs.
  • the method further includes:
  • the eUICC automatically rolls back to the initial subscription data when it determines that the handover cannot be completed before switching to the new SM-SR.
  • the method further includes: the eUICC or the Internet of Things terminal where the eUICC is located is set to have no permission to read or modify key personal information data.
  • the method further includes: the personal key data information is stored in a single independent space, and the separate independent space includes a hardware security module.
  • a method for switching a remote subscription management platform of a smart card comprising:
  • the destination SM-SR After receiving the handover request for the embedded smart card eUICC, the destination SM-SR sends a request for the eUICC handover host SM-SR to the source SM-SR;
  • the destination SM-SR receiving source SM-SR sends the information of the eUICC credential, the SM-SR credential, and the file installation credential, and sends a file installation credential and a request message generated by the configuration file to the destination SM-DP;
  • the destination SM-SR receives the configuration file encrypted by the file installation credential sent by the destination SM-DP, generates a public key, a private key pair, and encrypts the configuration file with the file installation credential, Sending, by the source SM-SR, the public key to the eUICC;
  • the destination SM-SR receives a download request of the file required by the eUICC to access the operator network to which the destination SM-SR belongs, and sends the corresponding file to the eUICC.
  • a method for switching a remote subscription management platform of a smart card comprising:
  • the destination SM-SR After receiving the handover request for the embedded smart card eUICC, the destination SM-SR sends a request for the eUICC handover host SM-SR to the source SM-SR;
  • the destination SM-SR receiving source SM-SR sends the information of the eUICC credential, the SM-SR credential, and the file installation credential, encrypts the configuration file stored by the file with the file installation credential, and generates the public key and the private key pair. And sending, by the source SM-SR, the configuration file encrypted by the file installation credential to the eUICC;
  • the destination SM-SR receives a download request of the file required by the eUICC to access the operator network to which the destination SM-SR belongs, and sends the corresponding file to the eUICC.
  • a remote signing management platform switching device for a smart card comprising:
  • a receiving unit configured to receive a handover request for the embedded smart card eUICC
  • the encryption unit is configured to encrypt the credential data relating to the establishment of secure communication between the eUICC and other network element entities to ensure that the credential data can be transmitted securely.
  • the credential data includes:
  • the configuration file is configured to access the SM-SR, and the configuration file is used to connect to a preset SM-SR, where the preset SM-SR is used to implement downloading of files required by the eUICC to access the carrier network;
  • the file corresponding to the preset SM-SR is installed with a credential to implement downloading of files and data between the SM-SR and the eUICC.
  • the encryption unit includes:
  • the authentication subunit is configured to perform mutual authentication with the source SM-SR;
  • Determining a subunit setting to determine whether to allow switching to the destination SM-SR
  • a first sending subunit configured to send a request for the eUICC to switch the host SM-SR to the source SM-SR when the authentication authentication is passed and it is determined that the switching to the destination SM-SR is allowed;
  • the first receiving subunit is configured to receive information that the source SM-SR sends an eUICC credential, an SM-SR credential, and a file installation credential;
  • a second sending subunit configured to send a file installation credential and a request message generated by the configuration file to the destination SM-DP;
  • a second receiving subunit configured to receive a configuration file that is sent by the destination SM-DP and encrypted by a file installation credential
  • a third sending subunit configured to send the configuration file encrypted by the file installation credential, and the public key to the eUICC by using the source SM-SR;
  • a third receiving subunit configured to receive an access request sent by the eUICC
  • An encryption subunit configured to encrypt, by using the private key, a file management credential corresponding to the destination SM-SR;
  • the fourth sending subunit is configured to send the encrypted file management credential and the SM-SR credential corresponding to the destination SM-SR to the eUICC;
  • a fourth receiving subunit configured to receive a download request sent by the eUICC to access a file required by an operator network to which the destination SM-SR belongs;
  • the fifth sending subunit is configured to send the corresponding file to the eUICC.
  • the encryption unit includes:
  • the authentication subunit is configured to perform mutual authentication with the source SM-SR;
  • Determining a subunit setting to determine whether to allow switching to the destination SM-SR
  • a first sending subunit configured to send a request for the eUICC to switch the host SM-SR to the source SM-SR when the authentication authentication is passed and it is determined that the switching to the destination SM-SR is allowed;
  • the first receiving subunit is configured to receive information that the source SM-SR sends an eUICC credential, an SM-SR credential, and a file installation credential;
  • the first encryption subunit is configured to encrypt the configuration file with a file installation credential
  • a second sending subunit configured to send the configuration file encrypted by the file installation credential, and the public key to the eUICC by using the source SM-SR;
  • a second receiving subunit configured to receive an access request sent by the eUICC
  • a second encryption subunit configured to encrypt, by using the private key, a file management credential corresponding to the destination SM-SR;
  • a third sending subunit configured to send the encrypted file management credential and the SM-SR credential corresponding to the destination SM-SR to the eUICC;
  • a third receiving subunit configured to receive a download request sent by the eUICC to access a file required by an operator network to which the destination SM-SR belongs;
  • the fourth sending subunit is configured to send the corresponding file to the eUICC.
  • the determining subunit is further configured to:
  • the handover initiator is the eUICC
  • receiving the destination SM-DP to send the eUICC After providing the response message of the service, it is determined that the switch to the destination SM-SR is allowed.
  • the encryption unit further includes:
  • a sixth sending subunit configured to: when the handover initiator is an operator of the destination SM-SR, send a request for the eUICC handover host SM-SR to the source SM-SR, and trigger the authentication subunit and the source
  • the SM-SR performs two-way authentication.
  • a remote signing management platform switching device for a smart card comprising:
  • a first receiving unit configured to receive a handover request sent by the eUICC
  • a first sending unit configured to send, to the destination SM-SR, a request for the eUICC to switch the host SM-SR;
  • a second receiving unit configured to receive a response of the consent switch sent by the destination SM-SR
  • a second sending unit configured to send, to the destination SM-SR, information about an eUICC credential, an SM-SR credential, and a file installation credential;
  • the third receiving unit is configured to receive, by the destination SM-SR, a configuration file encrypted with a file installation credential, a public key information, and a request of the eUICC to switch the host SM-SR;
  • the third sending unit is configured to send the configuration file encrypted with the file installation credential and the public key information to the eUICC, and send a request for switching the host SM-SR to the eUICC.
  • the device further includes:
  • An authentication unit configured to perform mutual authentication with the destination SM-SR
  • the fourth sending unit is configured to send, after the bidirectional authentication authentication is passed, a request for the eUICC to switch the host SM-SR to the destination SM-SR.
  • a remote signing management platform switching device for a smart card comprising:
  • a first receiving unit configured to receive a two-way authentication authentication request sent by the destination SM-SR;
  • An authentication unit configured to perform mutual authentication with the destination SM-SR
  • a second receiving unit configured to receive the destination SM-SR after the two-way authentication and authentication is passed
  • the sent eUICC switches the request of the host SM-SR
  • a first sending unit configured to send, to the destination SM-SR, information about an eUICC credential, an SM-SR credential, and a file installation credential;
  • a third receiving unit configured to receive a response sent by the destination SM-SR, and send, to the destination SM-SR, information about an eUICC credential, an SM-SR credential, and a file installation credential;
  • the fourth receiving unit is configured to receive the configuration file and the public key information encrypted by the file installation credential sent by the destination SM-SR;
  • the second sending unit is configured to send the configuration file encrypted with the file installation credential and the public key information to the eUICC, and send a request for switching the host SM-SR to the eUICC.
  • the device further includes:
  • the storage unit is set to store the file installation credentials.
  • the device further includes:
  • a third sending unit configured to send a file installation credential request to the source SM-DP;
  • the fifth receiving unit is configured to receive a file installation credential sent by the source SM-DP.
  • a remote signing management platform switching device for a smart card comprising:
  • the first receiving unit is configured to receive the configuration file and the public key information encrypted by the file installation credential sent by the source SM-SR;
  • Deactivating the deleting unit setting to deactivate or delete the configuration file related to the source SM-SR, and deleting the file management credential related to the source SM-SR;
  • the first sending unit is configured to send an access request message to the destination SM-SR according to the currently received configuration file
  • a second receiving unit configured to receive, by the destination SM-SR, a file management credential corresponding to the destination SM-SR and an SM-SR credential encrypted by a private key of the destination SM-SR;
  • a determining unit configured to determine, according to the SM-SR credential, whether the destination SM-SR is legal, and trigger an interaction unit when legal;
  • An interaction unit configured to perform data interaction with the destination SM-SR.
  • the interaction unit further includes:
  • a first sending subunit configured to send, to the destination SM-SR, a download request for a file required by the carrier network to which the destination SM-SR belongs;
  • a receiving subunit configured to receive a file required by the carrier network to which the destination SM-SR is sent by the destination SM-SR;
  • the second sending sub-unit is configured to initiate an access request to the carrier network to which the destination SM-SR belongs according to the file required by the carrier network to which the destination SM-SR belongs.
  • a smart card the smart card being applied to a machine type communication terminal, the smart card comprising:
  • the antenna system is configured to receive the configuration file and the public key information encrypted by the file installation credential sent by the source SM-SR;
  • a processor configured to deactivate or delete a configuration file related to the source SM-SR, delete a file management credential associated with the source SM-SR, and activate a currently received configuration file;
  • the antenna system is further configured to: send an access request message to the destination SM-SR according to the currently received configuration file; and receive, by the destination SM-SR, the private SM that is encrypted by the destination SM-SR and the destination SM- The file management credential corresponding to the SR and the SM-SR credential;
  • the processor is further configured to determine, according to the SM-SR credential, whether the destination SM-SR is legal, and perform data interaction with the destination SM-SR when legal.
  • the antenna system is further configured to send, to the destination SM-SR, a download request of a file required by the carrier network to which the destination SM-SR belongs, and receive the destination sent by the destination SM-SR.
  • the file required by the carrier network to which the destination SM-SR belongs is specified; and the access request is initiated to the carrier network to which the destination SM-SR belongs according to the required file of the carrier network to which the destination SM-SR belongs.
  • a user subscription data management security route, the user subscription data management security route SM-SR includes:
  • An antenna system configured to receive a handover request for an embedded smart card eUICC
  • the processor is configured to encrypt credential data relating to eUICC establishing secure communication with other network element entities to ensure that the credential data can be transmitted securely.
  • the credential data includes:
  • the configuration file is configured to access the SM-SR, and the configuration file is used to connect to a preset SM-SR, where the preset SM-SR is used to implement downloading of files required by the eUICC to access the carrier network;
  • the file corresponding to the preset SM-SR is installed with a credential to implement downloading of files and data between the SM-SR and the eUICC.
  • the processor is further configured to
  • the receiving source SM-SR sends the information of the eUICC credential, the SM-SR credential, and the file installation credential, and signs the data management to the destination user—the data preparation SM-DP sends the file installation credential and the request message generated by the configuration file.
  • the SM-SR sends to the eUICC
  • the processor is further configured to
  • the receiving source SM-SR sends the eUICC credential, the SM-SR credential, and the file installation credential information, encrypts the configuration file stored by itself with the file installation credential; generates the public key and the private key key pair, and installs the file And the public key that is encrypted by the credential is sent to the eUICC by using the source SM-SR;
  • a storage medium includes a stored program, wherein the remote registration management platform switching method of the smart card is executed when the program runs.
  • the technical solution of the embodiment of the present disclosure adopts a more secure manner to ensure secure handover of the remote management platform, securely perform contract management and secure routing device switching, and ensure the destination SM-SR file in the SM-SR handover process of the eUICC. Manage issues where credentials are not touched or learned by other external devices.
  • FIG. 1 is a schematic diagram of an eUICC remote management architecture according to an embodiment of the present disclosure
  • FIG. 2 is a flowchart of a method for switching a remote subscription management platform of a smart card according to Embodiment 1 of the present disclosure
  • FIG. 3 is a flowchart of a method for switching a remote subscription management platform of a smart card according to Embodiment 2 of the present disclosure
  • FIG. 4 is a flowchart of a method for switching a remote subscription management platform of a smart card according to Embodiment 3 of the present disclosure
  • FIG. 5 is a flowchart of a method for switching a remote subscription management platform of a smart card according to Embodiment 4 of the present disclosure
  • FIG. 6 is a schematic structural diagram of a remote signing management platform switching apparatus of a smart card according to Embodiment 1 of the present disclosure
  • FIG. 7 is a schematic structural diagram of a device for switching a remote subscription management platform of a smart card according to Embodiment 2 of the present disclosure
  • FIG. 8 is a schematic structural diagram of a device for switching a remote subscription management platform of a smart card according to Embodiment 3 of the present disclosure
  • FIG. 9 is a schematic structural diagram of a remote signing management platform switching apparatus of a smart card according to Embodiment 4 of the present disclosure.
  • the embodiment of the present disclosure describes a method for switching a remote subscription management platform of a smart card. This example is performed by performing an action on the destination SM-SR side, and the method includes:
  • the destination user subscription data management-secure route SM-SR encrypts the trust data related to the establishment of secure communication between the eUICC and other network element entities after receiving the handover request for the embedded smart card eUICC, ensuring that the trust data can be transmitted securely. .
  • the credential data includes:
  • the configuration file is configured to access the SM-SR, and the configuration file is used to connect to a preset SM-SR, where the preset SM-SR is used to implement downloading of files required by the eUICC to access the carrier network;
  • the file corresponding to the preset SM-SR is installed with a credential to implement downloading of files and data between the SM-SR and the eUICC.
  • Encrypting the credential data related to establishing secure communication between the eUICC and other network element entities to ensure that the credential data can be transmitted securely including:
  • the destination SM-SR receiving source SM-SR sends the eUICC credential, the SM-SR credential, and the file installation credential information, and signs the data management to the destination user—the data preparation SM-DP sends the file installation credential and the configuration file generation.
  • Request message the eUICC credential, the SM-SR credential, and the file installation credential information, and signs the data management to the destination user—the data preparation SM-DP sends the file installation credential and the configuration file generation.
  • the destination SM-SR receives the configuration file encrypted by the file installation credential sent by the destination SM-DP, generates a public key, a private key pair, and encrypts the configuration file with the file installation credential, Sending, by the source SM-SR, the public key to the eUICC;
  • the destination SM-SR receives a download request of the file required by the eUICC to access the operator network to which the destination SM-SR belongs, and sends the corresponding file to the eUICC.
  • the credential data related to establishing secure communication between the eUICC and other network element entities is encrypted to ensure that the credential data can be transmitted securely, including:
  • the destination SM-SR receiving source SM-SR sends an eUICC credential, an SM-SR credential,
  • the file installs the credential information, encrypts the configuration file stored by the file installation credential; generates a public key, a private key key pair, and passes the configuration file encrypted by the file installation credential, and the public key passes the source
  • the SM-SR sends to the eUICC;
  • the destination SM-SR receives a download request of the file required by the eUICC to access the operator network to which the destination SM-SR belongs, and sends the corresponding file to the eUICC.
  • the determining allows switching to the destination SM-SR, including:
  • the destination SM-SR When the handover initiator is the eUICC, the destination SM-SR further sends a query request to the destination SM-DP for providing service to the eUICC, and the capability of receiving the destination SM-DP is When the eUICC provides a response message of the service, it is determined to allow handover to the destination SM-SR.
  • the destination SM-SR When the handover initiator is the operator of the destination SM-SR, the destination SM-SR sends a request for the eUICC handover host SM-SR to the source SM-SR, and performs bidirectional authentication authentication with the source SM-SR.
  • the source SM-SR After receiving the handover request sent by the eUICC, the source SM-SR sends a request for the eUICC to switch the host SM-SR to the destination SM-SR.
  • the source SM-SR receives the file installation credential sent by the destination SM-SR and encrypts it.
  • the configuration file and the public key information the eUICC to switch the host SM-SR request, send the configuration file encrypted with the file installation credential and the public key information to the eUICC, and send the handover host to the eUICC SM-SR request.
  • the method further includes:
  • the source SM-SR performs bidirectional authentication authentication with the destination SM-SR, and after the bidirectional authentication authentication is passed, sends a request for the eUICC to switch the host SM-SR to the destination SM-SR.
  • the source SM-SR After receiving the bidirectional authentication request sent by the destination SM-SR, the source SM-SR performs bidirectional authentication authentication with the destination SM-SR, and after receiving the bidirectional authentication authentication, receives the eUICC sent by the destination SM-SR. Switching the request of the host SM-SR;
  • the source SM-SR receives the configuration file and the public key information encrypted by the file installation credential sent by the destination SM-SR, and adds the configuration file encrypted by the credential installation file and the public key information to the source SM-SR.
  • the eUICC sends and sends a request to the eUICC to switch the host SM-SR.
  • a file installation credential is stored in the source SM-SR.
  • the method before sending the file installation credential information to the destination SM-SR, the method further includes:
  • the eUICC After receiving the configuration file and the public key information encrypted by the file installation credential sent by the source SM-SR, the eUICC deactivates or deletes the configuration file related to the source SM-SR, and deletes the configuration file related to the source SM-SR. a file management credential, activating the currently received configuration file; and sending an access request message to the destination SM-SR according to the currently received configuration file;
  • the eUICC receives a file management credential corresponding to the destination SM-SR and an SM-SR credential, which is sent by the destination SM-SR and is encrypted by the private key of the destination SM-SR, based on the SM-SR credential When it is determined that the destination SM-SR is legal, data interaction with the destination SM-SR is performed.
  • the required file is used to initiate an access request to the carrier network to which the destination SM-SR belongs according to the required file of the carrier network to which the destination SM-SR belongs.
  • FIG. 1 is a schematic diagram of an eUICC remote management architecture according to an embodiment of the present disclosure.
  • the eUICC remote management architecture of the embodiment of the present disclosure describes three roles involved in eUICC remote management: an eUICC manufacturer, an operator (MNO), and The connection relationship of the remote management platform.
  • the remote management platform is the core of eUICC remote management.
  • the data related to the operator and the card vendor in the eUICC must be generated by the remote management platform to be downloaded to the eUICC card by means of over-the-air numbering.
  • processes such as changes in carrier data and eUICC replacement operators are also completed via a remote management platform.
  • the implementation of the remote management platform function also determines or affects the implementation of other management functions to a certain extent.
  • the remote management platform is The core position of the network architecture, the functions of the remote management platform mainly include two parts: SM-DP and SM-SR.
  • SM-DP is mainly responsible for the secure generation, storage and download of user subscription data for remote configuration of eUICC card
  • SM-SR is mainly responsible for the secure transmission and management of remote configuration data of eUICC card.
  • the above functions can be implemented by one or more physical entities.
  • the remote subscription management platform switching method of the smart card includes the following processing flow:
  • Step 1 The eUICC activates the corresponding configuration file according to the user request, and obtains related information of the target operator.
  • Step 2 The eUICC sends a handover request to the host SM-SR of the original remote management platform (and carries the target carrier identifier);
  • Step 3 The original remote management platform (source SM-SR) and the remote management platform (destination SM-SR) to be switched perform two-way authentication and authentication;
  • Step 4 The source SM-SR sends an eUICC handover host SM-SR request to the destination SM-SR, and the destination SM-SR queries the destination SM-DP to provide service for the eUICC.
  • Step 5 The destination SM-DP queries the operator for service to the eUICC; the operator returns the result, and returns the result to the destination SM-SR through the SM-DP;
  • step 6 the destination SM-SR determines whether it can be switched; when it is determined that the handover cannot be performed, the current processing flow is ended, and when the handover is possible, step 7 is performed.
  • Step 7 The destination SM-SR sends a message agreeing to the handover to the source SR.
  • Step 8 The source SM-SR sends a message including an eUICC credential, an SM-SR credential, and a file installation credential to the destination SM-SR.
  • Step 9 The destination SM-SR sends a file installation credential and a configuration file generation request message to the destination SM-DP, and the destination SM-DP generates a configuration file, and encrypts the configuration file with a file installation credential; and sends the encrypted configuration file.
  • the destination SM-SR sends a file installation credential and a configuration file generation request message to the destination SM-DP, and the destination SM-DP generates a configuration file, and encrypts the configuration file with a file installation credential; and sends the encrypted configuration file.
  • Step 10 The destination SM-SR generates a pair of public key and private key pair by operation, and uses it as a temporary use; and sends the configuration file encrypted by the file installation credential and the public key to the source SM-SR;
  • Step 11 The source SM-SR sends the encrypted configuration file and the public key to the eUICC and sends a request to the eUICC to replace the SM-SR.
  • the eUICC deactivates (or deletes) the configuration file related to the source SM-SR, and The source SM-SR related file management credential is deleted, and the configuration file just received is activated; the access request message is sent to the destination SM-SR according to the aggressive configuration file;
  • Step 12 The destination SM-SR determines whether the eUICC is legally disclosed. If it is legal, the destination SM-SR encrypts the file management credential corresponding to the destination SM-SR by using the private key; and the encrypted and destination SM-SR will be encrypted. Corresponding file management credentials and SM-SR credentials are sent to the eUICC;
  • the eUICC determines the validity of the SM-SR according to the SM-SR credential. If the eUICC interacts with the destination SM-SR, the eUICC interacts with the SM-SR to implement the eUICC accessing the files required by the operator network. The eUICC initiates an access request to the carrier network according to the downloaded network access related file.
  • the remote subscription management platform switching method of the smart card includes the following processing flow:
  • Step 1 The eUICC activates the corresponding configuration file according to the user request, and obtains related information of the target operator.
  • Step 2 The eUICC sends a handover request to the host SM-SR of the original remote management platform (and carries the target carrier identifier);
  • Step 3 The original remote management platform (source SM-SR) and the remote management platform (destination SM-SR) to be switched perform two-way authentication and authentication;
  • Step 4 The source SM-SR sends an eUICC handover host SM-SR request to the destination SM-SR.
  • the destination SM-SR queries the destination SM-DP to provide services for the eUICC.
  • Step 5 The destination SM-DP queries the operator for service to the eUICC; the operator returns the result, and returns the result to the destination SM-SR through the SM-DP;
  • Step 6 the destination SM-SR determines whether the handover is possible, if the handover cannot be completed, the current processing flow is ended, and when the handover is possible, step 7 is performed;
  • Step 7 The destination SM-SR sends a message agreeing to the handover to the source SR.
  • Step 8 The source SM-SR sends a message including an eUICC credential, an SM-SR credential, and a file installation credential to the destination SM-SR.
  • Step 9 The destination SM-SR sends a file installation credential and a configuration file generation request message to the destination SM-DP, and the destination SM-DP generates a configuration file, and encrypts the configuration file with a file installation credential; and sends the encrypted configuration file.
  • the destination SM-SR sends a file installation credential and a configuration file generation request message to the destination SM-DP, and the destination SM-DP generates a configuration file, and encrypts the configuration file with a file installation credential; and sends the encrypted configuration file.
  • Step 10 The destination SM-SR generates a pair of public key and private key pair by operation, and uses it as a temporary use; and sends the configuration file encrypted by the file installation credential and the public key to the source SM-SR;
  • Step 11 The source SM-SR sends the encrypted configuration file and the public key to the eUICC and sends a request to the eUICC to replace the SM-SR.
  • the eUICC deactivates (or deletes) the configuration file related to the source SM-SR, and The source SM-SR related file management credential is deleted, and the configuration file just received is activated; the access request message is sent to the destination SM-SR according to the aggressive configuration file;
  • Step 12 The destination SM-SR determines whether the eUICC is legally disclosed. If it is legal, the destination SM-SR encrypts the file management credential corresponding to the destination SM-SR by using the private key; and the encrypted and destination SM-SR will be encrypted. Corresponding file management credentials and SM-SR credentials are sent to the eUICC;
  • Step 13 The eUICC determines the legality of the SM-SR according to the SM-SR credential. If the eUICC is legal, the data is transmitted with the destination SM-SR, and the eUICC interacts with the SM-SR to implement the eUICC. The eUICC initiates an access request to the carrier network according to the downloaded network access related file.
  • the remote subscription management platform switching method of the smart card includes the following processing flow when the user initiates the operator change:
  • Step 1101 The eUICC activates the corresponding configuration file according to the user request, and obtains related information of the destination operator.
  • Step 1103 The eUICC sends a handover request to the host SM-SR of the original remote management platform (and carries the destination carrier identifier);
  • Step 1105 The original remote management platform (source SM-SR) and the remote management platform (destination SM-SR) to be switched perform two-way authentication and authentication;
  • Step 1107 The source SM-SR sends an eUICC handover host SM-SR request to the destination SM-SR, and the destination SM-SR queries the destination SM-DP to provide service for the eUICC.
  • Step 1109 the SM-DP queries the operator whether the service can be provided for the eUICC; the operator returns the result, and returns the result to the SM-SR through the SM-DP;
  • Step 1111 If the query result is switchable, the destination SM-SR sends a message agreeing to the handover to the source SR.
  • Step 1113 The source SM-SR sends a message including an eUICC credential, an SM-SR credential, and a file installation credential to the destination SM-SR.
  • Step 1115 The destination SM-SR sends a file installation credential and a configuration file generation request message to the destination SM-DP.
  • Step 1117 The destination SM-DP generates a configuration file, and encrypts the configuration file with a file installation credential; and sends the encrypted configuration file to the destination SM-SR;
  • the file installation credential can also be stored in the directory.
  • the SM-SR can also generate configuration files and store them.
  • steps 1115 and 1117 can also be combined as follows: The SM-SR directly uses the file installation credential encryption configuration file.
  • Step 1119 the destination SM-SR generates a pair of public key and private key pair by operation, and uses it as a temporary use; and sends the configuration file encrypted by the file installation credential and the public key to the source SM-SR;
  • Step 1121 The source SM-SR sends the encrypted configuration file and the public key to the eUICC and sends a request to the eUICC to replace the SM-SR.
  • the eUICC deactivates (or deletes) the configuration file related to the source SM-SR.
  • the source SM-SR related file management credential is deleted, and the configuration file just received is activated; the access request message is sent according to the destination SM-SR to the newly activated configuration file;
  • Step 1123 The destination SM-SR determines whether the eUICC is transparent. If it is legal, the destination SM-SR encrypts the file management credential corresponding to the destination SM-SR by using the private key; and the encrypted SM-SR is encrypted. Corresponding file management credentials and SM-SR credentials are sent to the eUICC;
  • the eUICC determines the validity of the SM-SR according to the SM-SR credential. If it is legal, the e-SCC interacts with the SM-SR, and the eUICC interacts with the SM-SR to implement the eUICC access to the network required by the operator network. The eUICC initiates an access request to the carrier network according to the downloaded network access related file.
  • the destination SM-SR and the destination SM-DP between the source SM-SR and the destination SM-SR, between the destination SM-DP and the operator, the destination SM-SR and the destination SM-DP, the source SM-SR and the eUICC, and the destination SM-SR and The communication between the eUICC, the eUICC, and the operator first performs two-way authentication of the identity, and then confirms that the identity is correct before communicating.
  • the source SM-SR Before the source SM-SR sends the key personal information (including but not limited to the key and the credential) in the signed data to the eUICC, it needs to first perform a key negotiation process to determine an add-on. The secret key is then encrypted, and then the encrypted key personal information is transmitted through a secure transmission channel established by Web Service Security or Secure Sockets Layer (SSL).
  • SSL Secure Sockets Layer
  • the destination SM-SR, and the destination SM-DP When performing air interface data transmission between the source SM-SR and the destination SM-SR, the destination SM-SR, and the destination SM-DP, set the counters in the destination SM-DP, destination SM-SR, and source SM-SR respectively.
  • -DP, destination SM-SR, and source SM-SR send commands in a certain order during transmission and do not allow repeated transmission of the same packet.
  • the destination SM-DP, destination SM-SR, source SM-SR, and receiver are each maintained. Its own counter, and the counter participates in the authentication calculation as a parameter.
  • the eUICC Before switching to the new SM-SR, the eUICC performs multiple confirmations on whether it can be installed according to certain rules. If the handover cannot be completed, it will automatically fall back to the initial subscription data.
  • the eUICC or the IoT device in which it is located is set to have no permission to read or modify key personal information data.
  • the personal key data information is stored in a single independent space; the separate independent space may be a hardware security module or the like.
  • the remote subscription management platform switching method of the smart card includes the following processing flow when the operator initiates the remote subscription management platform change:
  • Step 1301 The operator sends an eUICC host SM-SR handover request to the SM-SR of the destination remote management platform.
  • Step 1303 The destination remote management platform (the destination SM-SR) and the source remote management platform (the source SM-SR) perform a two-way authentication and authentication process;
  • Step 1305 After the authentication is passed, the destination SM-SR sends an eUICC handover host SM-SR request to the source SM-SR.
  • Step 1307 If the source SM-SR agrees to switch (whether or not to agree to switch whether the two operators have a cooperation agreement), the source SM-SR sends a file installation credential request to the source SM-DP; The SM-DP sends a file installation credential to the source SM-SR; the source SM-SR sends an eUICC credential, an SM-SR credential, and a file installation credential to the destination SM-SR;
  • the source SM-SR can directly store the file installation credential, and the source SM-SR does not need to obtain the file installation credential from the source SM-DP.
  • Step 1309 After receiving the data sent by the source SM-SR, the destination SM-SR sends a file installation credential to the destination SM-DP, and sends a configuration file generation request message.
  • Step 1311 The destination SM-DP encrypts the configuration file with the received file installation credential; and sends the encrypted configuration file to the destination SM-SR;
  • Step 1313 The destination SM-SR generates a pair of public key and private key pair by using a preset key operation method as a temporary use; and sends the configuration file encrypted by the file installation credential and the public key to the source. SM-SR; simultaneously sending a request to the source SM-SR to replace the SM-SR of the eUICC;
  • Step 1315 The source SM-SR sends the encrypted configuration file and the public key to the eUICC and sends a request to the eUICC to replace the SM-SR.
  • the eUICC deactivates (or deletes) the configuration file related to the source SM-SR.
  • the source SM-SR related file management credential is deleted, and the configuration file just received is activated; the access request message is sent to the destination SM-SR according to the aggressive configuration file;
  • the destination SM-SR determines whether the eUICC is legal. If it is legal, the destination SM-SR encrypts the file management credential corresponding to the destination SM-SR by using the private key; and the encrypted and destination SM-SR will be encrypted. Corresponding file management credentials and SM-SR credentials are sent to the eUICC;
  • the eUICC determines the legality of the SM-SR according to the SM-SR credential. If the eUICC interacts with the destination SM-SR, the eUICC interacts with the SM-SR to implement the eUICC access to the network required by the operator network. Download, eUICC according to the downloaded network access related files An access request is initiated to the carrier network.
  • the destination SM - SR and destination SM-DP first perform two-way authentication of the identity, and then confirm the identity is correct before communicating.
  • the destination SM-SR needs to perform a key negotiation process to determine an encryption key before sending the key personal information (including and not limited to the key and the credential) in the signed data to a new encryption key.
  • the information is encrypted, and then the encrypted key personal information is transmitted through a secure transmission channel established by Web Service Security or SSL.
  • the destination SM-DP When performing air interface data transmission between the source SM-SR and the destination SM-SR, the source SM-SR and the source SM-DP, and the destination SM-SR and the destination SM-DP, respectively, the destination SM-DP, the destination SM-SR, The source SM-SR and the source SM-DP internally set the counter.
  • the destination SM-DP, the destination SM-SR, and the source SM-SR send commands in a certain order during transmission and are not allowed to repeatedly send the same packet.
  • the destination SM-DP The destination SM-SR, the source SM-SR, the source SM-DP, and the receiving end each maintain their own counters, and the counter participates in the authentication calculation as a parameter.
  • the eUICC and the related device will perform multiple confirmations on whether or not the installation can be performed according to certain rules before switching to the new subscription. If the handover cannot be completed, the automatic subscription will be automatically rolled back to the initial subscription data.
  • the eUICC or the M2M device in which it is located is set to have no permission to read or modify key personal information data.
  • the personal key data information is stored in a single independent space; the separate independent space may be a hardware security module or the like.
  • FIG. 6 is a schematic structural diagram of a remote subscription management platform switching apparatus for a smart card according to Embodiment 1 of the present disclosure. As shown in FIG. 6, the remote subscription management platform switching apparatus of the smart card according to the embodiment of the present disclosure includes:
  • the receiving unit 40 is configured to receive a handover request for the embedded smart card eUICC;
  • the encryption unit 41 is arranged to encrypt the credential data relating to the establishment of secure communication between the eUICC and other network element entities to ensure that the credential data can be transmitted securely.
  • the credential data includes:
  • the configuration file is configured to access the SM-SR, and the configuration file is used to connect to a preset SM-SR, where the preset SM-SR is used to implement downloading of files required by the eUICC to access the carrier network;
  • the file corresponding to the preset SM-SR is installed with a credential to implement downloading of files and data between the SM-SR and the eUICC.
  • the encryption unit 41 includes:
  • An authentication subunit (not shown in FIG. 6) is configured to perform bidirectional authentication authentication with the source SM-SR;
  • Determining a subunit (not shown in Figure 6), configured to determine whether to allow switching to the destination SM-SR;
  • the first sending subunit (not shown in FIG. 6) is configured to send a request for the eUICC to switch the host SM-SR to the source SM-SR when the authentication authentication is passed and it is determined that the switching to the destination SM-SR is permitted. ;
  • a first receiving subunit (not shown in FIG. 6) configured to receive information that the source SM-SR sends an eUICC credential, an SM-SR credential, and a file installation credential;
  • a second sending subunit (not shown in FIG. 6) configured to send a file installation credential and a request message generated by the configuration file to the destination SM-DP;
  • a second receiving subunit (not shown in FIG. 6) configured to receive a configuration file encrypted by a file installation credential sent by the destination SM-DP;
  • Generating a subunit (not shown in FIG. 6), configured to generate a public key, a private key pair;
  • the third sending subunit (not shown in FIG. 6) is configured to send, by using the source SM-SR, the configuration file encrypted by the file installation credential to the eUICC;
  • a third receiving subunit (not shown in FIG. 6) configured to receive an access request sent by the eUICC
  • An encryption subunit (not shown in FIG. 6) configured to encrypt a file management credential corresponding to the destination SM-SR by using the private key;
  • the fourth sending subunit (not shown in FIG. 6) is configured to send the encrypted file management credential and the SM-SR credential corresponding to the destination SM-SR to the eUICC;
  • the fourth receiving subunit (not shown in FIG. 6) is configured to receive a download request sent by the eUICC to access a file required by the operator network to which the destination SM-SR belongs;
  • the fifth transmitting subunit (not shown in FIG. 6) is configured to transmit the corresponding file to the eUICC.
  • the encryption unit 41 may further include:
  • An authentication subunit (not shown in FIG. 6) is configured to perform bidirectional authentication authentication with the source SM-SR;
  • Determining a subunit (not shown in Figure 6), configured to determine whether to allow switching to the destination SM-SR;
  • the first sending subunit (not shown in FIG. 6) is configured to send a request for the eUICC to switch the host SM-SR to the source SM-SR when the authentication authentication is passed and it is determined that the switching to the destination SM-SR is permitted. ;
  • a first receiving subunit (not shown in FIG. 6) configured to receive information that the source SM-SR sends an eUICC credential, an SM-SR credential, and a file installation credential;
  • a first encryption subunit (not shown in FIG. 6) configured to encrypt the configuration file with a file installation credential
  • Generating a subunit (not shown in FIG. 6), configured to generate a public key, a private key pair;
  • a second sending subunit (not shown in FIG. 6), configured to send the configuration file encrypted by the file installation credential, and the public key to the eUICC by using the source SM-SR;
  • a second receiving subunit (not shown in FIG. 6) configured to receive an access request sent by the eUICC
  • a second encryption subunit (not shown in FIG. 6) configured to encrypt the file management credential corresponding to the destination SM-SR by using the private key
  • the third sending subunit (not shown in FIG. 6) is configured to send the encrypted file management credential and the SM-SR credential corresponding to the destination SM-SR to the eUICC;
  • the third receiving subunit (not shown in FIG. 6) is configured to receive a download request sent by the eUICC to access a file required by the operator network to which the destination SM-SR belongs;
  • the fourth transmitting subunit (not shown in FIG. 6) is configured to transmit the corresponding file to the eUICC.
  • the determining subunit is further configured to:
  • the encryption unit 41 may further include:
  • a sixth sending subunit configured to: when the handover initiator is an operator of the destination SM-SR, send a request for the eUICC handover host SM-SR to the source SM-SR, and trigger the authentication subunit and the source
  • the SM-SR performs two-way authentication.
  • each unit in the remote subscription management platform switching device of the smart card shown in FIG. 6 can be understood by referring to the related description of the remote card subscription management platform switching method of the foregoing smart card.
  • the determining unit, the authentication unit, the generating unit, the encrypting unit and the like shown in FIG. 6 can all be implemented by a microprocessor, an FPGA, a digital signal processor, etc., and the transmitting unit and the receiving unit can be implemented by means of an air interface antenna system or a wired interface. .
  • FIG. 7 is a composition of a remote signing management platform switching device for a smart card according to Embodiment 2 of the present disclosure Schematic diagram of the structure, as shown in FIG. 7, the remote subscription management platform switching device of the smart card according to the embodiment of the present disclosure includes:
  • the first receiving unit 50 is configured to receive a handover request sent by the eUICC;
  • the first sending unit 51 is configured to send a request for the eUICC handover host SM-SR to the destination SM-SR;
  • the second receiving unit 52 is configured to receive a response of the consent switch sent by the destination SM-SR.
  • the second sending unit 53 is configured to send, to the destination SM-SR, information about an eUICC credential, an SM-SR credential, and a file installation credential;
  • the third receiving unit 54 is configured to receive, by the destination SM-SR, a configuration file encrypted by a file installation credential, a public key information, and a request of the eUICC to switch the host SM-SR;
  • the third transmitting unit 55 is configured to send the configuration file encrypted with the file installation credential and the public key information to the eUICC, and send a request for switching the host SM-SR to the eUICC.
  • the remote subscription management platform switching device of the smart card further includes:
  • An authentication unit (not shown in FIG. 7) configured to perform bidirectional authentication authentication with the destination SM-SR;
  • the fourth sending unit (not shown in FIG. 7) is configured to send a request for the eUICC to switch the host SM-SR to the destination SM-SR after the two-way authentication authentication is passed.
  • each unit in the remote subscription management platform switching device of the smart card shown in FIG. 7 can be understood by referring to the related description of the remote card subscription management platform switching method of the foregoing smart card.
  • the authentication unit and the like shown in FIG. 7 can all be implemented by a microprocessor, an FPGA, a digital signal processor, etc., and the transmitting unit and the receiving unit can pass through the air interface antenna. It is implemented by means of a system or a wired interface.
  • the remote subscription management platform switching apparatus of the smart card according to the embodiment of the present disclosure includes:
  • the first receiving unit 60 is configured to receive a two-way authentication authentication request sent by the destination SM-SR.
  • the authentication unit 61 is configured to perform bidirectional authentication and authentication with the destination SM-SR.
  • the second receiving unit 62 is configured to: after the bidirectional authentication and authentication is passed, receive a request of the eUICC to switch the host SM-SR sent by the destination SM-SR;
  • the first sending unit 63 is configured to send, to the destination SM-SR, information about an eUICC credential, an SM-SR credential, and a file installation credential;
  • the third receiving unit 64 is configured to receive a response sent by the destination SM-SR, and send information about an eUICC credential, an SM-SR credential, and a file installation credential to the destination SM-SR.
  • the fourth receiving unit 65 is configured to receive the configuration file and the public key information encrypted by the file installation credential sent by the destination SM-SR;
  • the second sending unit 66 is configured to send the configuration file encrypted with the file installation credential and the public key information to the eUICC, and send a request for switching the host SM-SR to the eUICC.
  • the remote subscription management platform switching device of the smart card of the embodiment of the present disclosure further includes:
  • a storage unit (not shown in FIG. 8) is provided to store a file installation credential.
  • the remote subscription management platform switching device of the smart card of the embodiment of the present disclosure further includes:
  • a third sending unit (not shown in FIG. 8) configured to send a request for a file installation credential to the source SM-DP;
  • a fifth receiving unit (not shown in FIG. 8) is configured to receive a file installation credential sent by the source SM-DP.
  • the authentication unit and the like shown in FIG. 8 can all be implemented by a microprocessor, an FPGA, a digital signal processor, etc., and the transmitting unit and the receiving unit can be implemented by means of an air interface antenna system or a wired interface.
  • the remote subscription management platform switching apparatus of the smart card according to the embodiment of the present disclosure includes:
  • the first receiving unit 70 is configured to receive the configuration file and the public key information encrypted by the file installation credential sent by the source SM-SR;
  • Deactivate the deleting unit 71 configured to deactivate or delete the configuration file related to the source SM-SR, and delete the file management credential associated with the source SM-SR;
  • the activation unit 72 is configured to activate the currently received configuration file
  • the first sending unit 73 is configured to send an access request message to the destination SM-SR according to the currently received configuration file;
  • the second receiving unit 74 is configured to receive, by the destination SM-SR, a file management credential corresponding to the destination SM-SR and an SM-SR credential encrypted by the private key of the destination SM-SR;
  • the determining unit 75 is configured to determine, according to the SM-SR credential, whether the destination SM-SR is legal, and trigger an interaction unit when it is legal;
  • the interaction unit 76 is configured to perform data interaction with the destination SM-SR.
  • the interaction unit 76 further includes:
  • a first sending subunit (not shown in FIG. 9) configured to send, to the destination SM-SR, a download request for a file required by the carrier network to which the destination SM-SR belongs;
  • the receiving subunit (not shown in FIG. 9) is configured to receive a file required by the carrier network to which the destination SM-SR is sent by the destination SM-SR;
  • the second sending sub-unit (not shown in FIG. 9) is configured to initiate an access request to the carrier network to which the destination SM-SR belongs according to the file required by the carrier network to which the destination SM-SR belongs.
  • each unit in the remote subscription management platform switching device of the smart card shown in FIG. 9 can be understood by referring to the related description of the remote card subscription management platform switching method of the foregoing smart card.
  • the deactivation deleting unit, the activation unit, the determining unit, the interaction unit, and the like shown in FIG. 9 can all be implemented by a microprocessor, an FPGA, a digital signal processor, etc., and the transmitting unit and the receiving unit can pass through an air interface antenna system or a wired interface. Way to achieve.
  • the embodiment of the present disclosure also describes a smart card, which is applied to a machine type communication terminal, and the smart card includes:
  • the antenna system is configured to receive the configuration file and the public key information encrypted by the file installation credential sent by the source SM-SR;
  • a processor configured to deactivate or delete a configuration file related to the source SM-SR, delete a file management credential associated with the source SM-SR, and activate a currently received configuration file;
  • the antenna system is further configured to: send an access request message to the destination SM-SR according to the currently received configuration file; and receive, by the destination SM-SR, the private SM that is encrypted by the destination SM-SR and the destination SM- The file management credential corresponding to the SR and the SM-SR credential;
  • the processor is further configured to determine, according to the SM-SR credential, whether the destination SM-SR is legal, and perform data interaction with the destination SM-SR when legal.
  • the antenna system is further configured to send the destination SM-SR to the destination SM-SR
  • the file is required to initiate an access request to the carrier network to which the destination SM-SR belongs.
  • the embodiment of the present disclosure further describes a user subscription data management security route, and the user subscription data management security route SM-SR includes:
  • An antenna system configured to receive a handover request for an embedded smart card eUICC
  • the processor is configured to encrypt credential data relating to eUICC establishing secure communication with other network element entities to ensure that the credential data can be transmitted securely.
  • the credential data includes:
  • the configuration file is configured to access the SM-SR, and the configuration file is used to connect to a preset SM-SR, where the preset SM-SR is used to implement downloading of files required by the eUICC to access the carrier network;
  • the file corresponding to the preset SM-SR is installed with a credential to implement downloading of files and data between the SM-SR and the eUICC.
  • the processor is further configured to
  • the receiving source SM-SR sends the information of the eUICC credential, the SM-SR credential, and the file installation credential, and signs the data management to the destination user—the data preparation SM-DP sends the file installation credential and the request message generated by the configuration file.
  • the SM-SR sends to the eUICC
  • processor is further configured to
  • the receiving source SM-SR sends the eUICC credential, the SM-SR credential, and the file installation credential information, encrypts the configuration file stored by itself with the file installation credential; generates the public key and the private key key pair, and installs the file And the public key that is encrypted by the credential is sent to the eUICC by using the source SM-SR;
  • the embodiment of the present disclosure further describes a storage medium.
  • the storage medium may be configured to store program code for performing the following steps:
  • the destination user subscription data management-secure route SM-SR receives the handover request for the embedded smart card eUICC, encrypts the credential data related to the eUICC and other network element entities to establish secure communication, and ensures that the credential data can be transmitted securely.
  • the storage medium is further arranged to store program code for performing the following steps:
  • the source user subscription data management-secure route SM-SR receives the handover request sent by the embedded smart card eUICC, and sends a request for the eUICC to switch the host SM-SR to the destination SM-SR;
  • the source SM-SR receives the response of the consent switch sent by the destination SM-SR, and sends the information of the eUICC credential, the SM-SR credential, and the file installation credential to the destination SM-SR.
  • the source SM-SR receives the configuration file and the public key information sent by the destination SM-SR, and the eUICC switches the host SM-SR request, and uses the file to install the credential encrypted configuration file and the public
  • the key information is sent to the eUICC and a request to switch the host SM-SR is sent to the eUICC.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present disclosure may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the above integration
  • the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing steps include the steps of the foregoing method embodiments; and the foregoing storage medium includes: a removable storage device, a read only memory (ROM), a magnetic disk, or an optical disk, and the like, which can store program codes.
  • ROM read only memory
  • the above-described integrated unit of the present disclosure may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a standalone product.
  • the technical solution of the embodiments of the present disclosure may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions for making
  • a computer device which may be a personal computer, server, or network device, etc.
  • the foregoing storage medium includes: a removable storage device, a read only memory (ROM), a magnetic disk, or an optical disk, and the like, which can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

本公开实施例公开了一种智能卡的远程签约管理平台切换方法及装置,所述方法包括:目的用户签约数据管理—安全路由SM-SR接收到针对嵌入式智能卡eUICC的切换请求后,对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据安全传送。

Description

智能卡的远程签约管理平台切换方法及装置、智能卡、SM-SR 技术领域
本公开涉及物联网通信技术,尤其涉及一种智能卡的远程签约管理平台切换方法及装置、智能卡、用户签约数据管理—安全路由(SM-SR,Subscription Manager-Secure Routing)。
背景技术
物联网被称为继计算机、互联网之后,世界信息产业的第三次浪潮,代表了下一代信息技术发展方向,随着物联网技术的普及,越来越多传统商品如汽车、智能表具、监控设备等被嵌入一种嵌入式智能卡(eUICC,embedded Universal Integrated Circuit Card),即将智能卡芯片直接焊接在终端的电路板或直接封装为通信模块,成为物联网终端。
eUICC作为物联网终端接入运营商网络的鉴权工具,以及承载各种应用程序(APP)、数据的安全载体,已经成为物联网发展的关键核心技术。应用于物联网业务的eUICC已不仅仅是一种新的UICC卡形态或用户终端设备形态,还包括为支持这种新形态设备而建立的整体系统,其中eUICC的激活、去激活管理、用户关系管理、远程管理、业务管理和安全管理可能都将是该系统中必不可少的功能。
此外,当前移动网络中电信智能卡根据发行地、使用地以及卡片用途不同,发行采用网络管理区域如省、地市等的方法。但在物联网应用场景下,由于智能卡通常存在于物联网终端中或者焊接在终端中,其发行地及使用地很难在物联网终端生产时确定。在此种应用场景下,需考虑物联网智能卡的首次使用时激活、激活后更换运营配置等业务。因此,物联网业务对智能卡管理提出的新的需求,特别是智能卡空中配号、激活、去激活以及配置更换管理等是首先必须要解决的问题。而eUICC的使用流程与传统UICC卡使用流程发生了较大的改变。传统UICC卡在发行前需要经 过生产、选择运营商、定制、发行、激活、使用、终止等环节。在e_UICC情况下,UICC卡在发行前只需要进行基础性的个性化,例如UICC卡ID写入、UICC卡基本认证授权参数的写入、初始签约数据或相关参数的写入,发行后则可以根据运营商提供的新注册描述信息,由用户签约数据管理—数据准备(SM-DP,SubscriptionManager-Data Preparation)重新生成新的签约数据并下载到eUICC中,实现运营商的选择更换。由此可以看出,签约数据的定制过程从卡商公司内部更改为通过空口的制作和安装,尤其是个人化密钥、信任状(Profile Installer Credential)数据的生成和写入。因此空中配号的安全问题凸显出来,一直受到运营商、卡商以及用户的高度关注。空中配号技术的安全威胁包括假冒、窃听、重放、拒绝服务和非授权访问,如身份假冒威胁,在产生、下载、安装、切换签约数据的过程,不同的操作实体会参与进来,例如多个运营商、多个用户签约数据管理—安全路由(SM-SR,Subscription Manager-Secure Routing),因此身份认证算法不可避免地会被多个操作实体掌握,同时通过信任状获取操作授权时,一旦信任状丢失,则会导致出现非法操作。相关技术中,当eUICC出厂后,由某个运营商的移动网络为其提供服务,但是如果后续需要变更运营商时,就需要改变原来提供服务的运营商的移动网络使用的目的SM-SR,这时就需要将源SM-SR对eUICC的远程管理控制权转移到目的SM-SR。一般来说,目的SM-SR和源SM-SR由不同的管理者进行管理,eUICC在卡制造商处会预先安装一个用于接入SM-SR的配置文件(Provisioning Profile),用以连接到一个预设的SM-SR,预设的SM-SR用于实现eUICC接入运营商网络所需要的文件如执行文件(Operational Profile)等的下载等操作,而且eUICC中还设置有与预设的SM-SR对应的文件安装信任状,以实现SM-SR可以与eUICC所属内部的文件、数据的下载。然而,在上述的SM-SR的切换过程中,如何保证目的SM-SR中的用于保证eUICC与外部实体建立安全通信的文件管理信任状(Profile Management Credential)不被源SM-SR接触或者获知,目前还没有效的解决方案。
发明内容
为解决上述技术问题,本公开实施例提供了一种智能卡的远程签约管理平台切换方法及装置、智能卡、SM-SR。
本公开实施例的技术方案如下:
一种智能卡的远程签约管理平台切换方法,包括:
目的SM-SR接收到针对eUICC的切换请求后,对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送。
本公开实施例中,所述信任状数据包括:
用于接入SM-SR的配置文件,所述配置文件用于连接预设的SM-SR,所述预设的SM-SR用于实现eUICC接入运营商网络所需要的文件的下载;
与所述预设的SM-SR对应的文件安装信任状,以实现SM-SR与eUICC之间内部的文件、数据的下载。
本公开实施例中,所述对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送,包括:
所述目的SM-SR向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
所述目的SM-SR接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,向目的用户签约数据管理—数据准备SM-DP发送文件安装信任状及配置文件生成的请求消息;
所述目的SM-SR接收所述目的SM-DP发送的以文件安装信任状加密的配置文件,生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
所述目的SM-SR接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发 送;
所述目的SM-SR接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
本公开实施例中,所述对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送,包括:
所述目的SM-SR向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
所述目的SM-SR接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,以文件安装信任状加密自身存储的配置文件;生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
所述目的SM-SR接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
所述目的SM-SR接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
本公开实施例中,所述确定允许切换至所述目的SM-SR,包括:
切换发起方为所述eUICC时,所述目的SM-SR还向所述目的SM-DP发送能否为所述eUICC提供服务的查询请求,并在接收到所述目的SM-DP发送的能为所述eUICC提供服务的响应消息时,确定允许切换至所述目的SM-SR。
本公开实施例中,所述方法还包括:
切换发起方为所述目的SM-SR的运营商时,所述目的SM-SR向所述源SM-SR发送eUICC切换宿主SM-SR的请求,并与源SM-SR进行双向鉴权认证。
本公开实施例中,所述方法还包括:
源SM-SR与源SM-DP、源SM-SR与目的SM-SR之间、目的SM-SR与目的SM-DP、目的SM-DP与运营商之间,目的SM-SR与目的SM-DP、源SM-SR与eUICC、目的SM-SR与eUICC、eUICC与运营商之间的通信先进行身份的双向认证,认证通过后再进行通信。
本公开实施例中,所述方法还包括:
在源SM-SR与目的SM-SR、源SM-SR与源SM-DP、目的SM-SR与目的SM-DP之间进行空口数据传输时,分别在目的SM-DP、目的SM-SR、源SM-SR、源SM-DP内部设置计数器,目的SM-DP、目的SM-SR、源SM-SR在发送数据时按照设定的顺序发送,不允许重复发送相同的数据,目的SM-DP、目的SM-SR、源SM-SR、源SM-DP和eUICC各自维护自身的计数器,且计数器作为参数参与认证计算。
本公开实施例中,所述方法还包括:
所述目的SM-SR在将约签数据中的关键个人信息向eUICC发送前,首先进行密钥协商以确定加密密钥,利用所述加密密钥将所述关键个人信息进行加密,将加密后的关键个人信息通过网页业务Web Service安全或安全套接层SSL建立的安全传输通道进行传送。
本公开实施例中,所述方法还包括:
所述eUICC或所述eUICC所在的物联网终端被设置为无权限读取或修改关键个人信息数据;所述个人关键数据信息被存储于单独立的空间中,所述单独的独立空间包括硬件安全模块。
一种智能卡的远程签约管理平台切换方法,包括:
源SM-SR接收eUICC发送的切换请求后,向目的SM-SR发送eUICC切换宿主SM-SR的请求;
所述源SM-SR接收所述目的SM-SR发送的同意切换的响应,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
所述源SM-SR接收所述目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息、eUICC切换宿主SM-SR的请求,将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
本公开实施例中,所述源SM-SR接收eUICC发送的切换请求后,所述方法还包括:
所述源SM-SR与所述目的SM-SR进行双向鉴权认证,并在双向鉴权认证通过后,向所述目的SM-SR发送eUICC切换宿主SM-SR的请求。
一种智能卡的远程签约管理平台切换方法,包括:
源SM-SR接收目的SM-SR发送的双向鉴权认证请求后,与所述目的SM-SR进行双向鉴权认证,并在双向鉴权认证通过后,接收所述目的SM-SR发送的eUICC切换宿主SM-SR的请求;
所述源SM-SR同意切换时,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
所述源SM-SR接收所述目的SM-SR发送的响应,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
所述源SM-SR接收所述目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息,将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
本公开实施例中,所述源SM-SR中存储有文件安装信任状。
本公开实施例中,向所述目的SM-SR发送文件安装信任状的信息之前,所述方法还包括:
所述源SM-SR向源SM-DP发送文件安装信任状的请求,并接收所述源SM-DP发送的文件安装信任状。
一种智能卡的远程签约管理平台切换方法,包括:
eUICC接收源SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息后,去激活或删除与所述源SM-SR相关的配置文件、删除与所述源SM-SR相关的文件管理信任状,激活当前接收的配置文件;并按照所述当前接收的配置文件向目的SM-SR发送接入请求消息;
所述eUICC接收目的SM-SR发送的以所述目的SM-SR的私钥加密的与所述目的SM-SR对应的文件管理信任状以及SM-SR信任状,基于所述SM-SR信任状确定所述目的SM-SR合法时,与所述目的SM-SR进行数据交互。
本公开实施例中,所述方法还包括:
所述eUICC向所述目的SM-SR发送所述目的SM-SR所属的运营商网络所需文件的下载请求,并接收所述目的SM-SR发送的所述目的SM-SR所属的运营商网络所需文件,根据所述目的SM-SR所属的运营商网络所需文件向所述目的SM-SR所属的运营商网络发起接入请求。
本公开实施例中,所述方法还包括:
eUICC在切换到新SM-SR之前,确定切换无法完成时,自动回退到初始的签约数据。
本公开实施例中,所述方法还包括:所述eUICC或所述eUICC所在的物联网终端被设置为无权限读取或修改关键个人信息数据。
本公开实施例中,所述方法还包括:所述个人关键数据信息被存储于单独立的空间中,所述单独的独立空间包括硬件安全模块。
一种智能卡的远程签约管理平台切换方法,包括:
目的SM-SR接收到针对嵌入式智能卡eUICC的切换请求后,向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
所述目的SM-SR接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,向目的SM-DP发送文件安装信任状及配置文件生成的请求消息;
所述目的SM-SR接收所述目的SM-DP发送的以文件安装信任状加密的配置文件,生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
所述目的SM-SR接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
所述目的SM-SR接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
一种智能卡的远程签约管理平台切换方法,其包括:
目的SM-SR接收到针对嵌入式智能卡eUICC的切换请求后,向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
所述目的SM-SR接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,以文件安装信任状加密自身存储的配置文件;生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
所述目的SM-SR接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
所述目的SM-SR接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
一种智能卡的远程签约管理平台切换装置,包括:
接收单元,设置为接收到针对嵌入式智能卡eUICC的切换请求;
加密单元,设置为对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送。
本公开实施例中,所述信任状数据包括:
设置为接入SM-SR的配置文件,所述配置文件用于连接预设的SM-SR,所述预设的SM-SR用于实现eUICC接入运营商网络所需要的文件的下载;
与所述预设的SM-SR对应的文件安装信任状,以实现SM-SR与eUICC之间内部的文件、数据的下载。
本公开实施例中,所述加密单元,包括:
认证子单元,设置为与源SM-SR进行双向鉴权认证;
确定子单元,设置为确定是否允许切换至所述目的SM-SR;
第一发送子单元,设置为在鉴权认证通过且确定允许切换至所述目的SM-SR时,向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
第一接收子单元,设置为接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
第二发送子单元,设置为向目的SM-DP发送文件安装信任状及配置文件生成的请求消息;
第二接收子单元,设置为接收所述目的SM-DP发送的以文件安装信任状加密的配置文件;
生成子单元,设置为生成公钥、私钥密钥对;
第三发送子单元,设置为将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
第三接收子单元,设置为接收所述eUICC发送的接入请求;
加密子单元,设置为使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密;
第四发送子单元,设置为将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
第四接收子单元,设置为接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求;
第五发送子单元,设置为将对应的文件向所述eUICC发送。
或者,本公开实施例中,所述加密单元,包括:
认证子单元,设置为与源SM-SR进行双向鉴权认证;
确定子单元,设置为确定是否允许切换至所述目的SM-SR;
第一发送子单元,设置为在鉴权认证通过且确定允许切换至所述目的SM-SR时,向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
第一接收子单元,设置为接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
第一加密子单元,设置为以文件安装信任状加密配置文件;
生成子单元,设置为生成公钥、私钥密钥对;
第二发送子单元,设置为将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
第二接收子单元,设置为接收所述eUICC发送的接入请求;
第二加密子单元,设置为使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密;
第三发送子单元,设置为将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
第三接收子单元,设置为接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求;
第四发送子单元,设置为将对应的文件向所述eUICC发送。
本公开实施例中,所述确定子单元,还设置为:
在切换发起方为所述eUICC时,向所述目的SM-DP发送能否为所述eUICC提供服务的查询请求;接收所述目的SM-DP发送的能为所述eUICC 提供服务的响应消息后,确定允许切换至所述目的SM-SR。
本公开实施例中,所述加密单元,还包括:
第六发送子单元,设置为在切换发起方为所述目的SM-SR的运营商时,向所述源SM-SR发送eUICC切换宿主SM-SR的请求,并触发所述认证子单元与源SM-SR进行双向鉴权认证。
一种智能卡的远程签约管理平台切换装置,包括:
第一接收单元,设置为接收eUICC发送的切换请求;
第一发送单元,设置为向目的SM-SR发送eUICC切换宿主SM-SR的请求;
第二接收单元,设置为接收所述目的SM-SR发送的同意切换的响应;
第二发送单元,设置为向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
第三接收单元,设置为接收所述目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息、eUICC切换宿主SM-SR的请求;
第三发送单元,设置为将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
本公开实施例中,所述装置还包括:
认证单元,设置为与所述目的SM-SR进行双向鉴权认证;
第四发送单元,设置为在双向鉴权认证通过后,向所述目的SM-SR发送eUICC切换宿主SM-SR的请求。
一种智能卡的远程签约管理平台切换装置,包括:
第一接收单元,设置为接收目的SM-SR发送的双向鉴权认证请求;
认证单元,设置为与所述目的SM-SR进行双向鉴权认证;
第二接收单元,设置为在双向鉴权认证通过后,接收所述目的SM-SR 发送的eUICC切换宿主SM-SR的请求;
第一发送单元,设置为向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
第三接收单元,设置为接收所述目的SM-SR发送的响应,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
第四接收单元,设置为接收所述目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息;
第二发送单元,设置为将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
本公开实施例中,所述装置还包括:
存储单元,设置为存储有文件安装信任状。
本公开实施例中,所述装置还包括:
第三发送单元,设置为向源SM-DP发送文件安装信任状的请求;
第五接收单元,设置为接收所述源SM-DP发送的文件安装信任状。
一种智能卡的远程签约管理平台切换装置,包括:
第一接收单元,设置为接收源SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息;
去激活删除单元,设置为去激活或删除与所述源SM-SR相关的配置文件、删除与所述源SM-SR相关的文件管理信任状;
激活单元,设置为激活当前接收的配置文件;
第一发送单元,设置为按照所述当前接收的配置文件向目的SM-SR发送接入请求消息;
第二接收单元,设置为接收目的SM-SR发送的以所述目的SM-SR的私钥加密的与所述目的SM-SR对应的文件管理信任状以及SM-SR信任状;
确定单元,设置为基于所述SM-SR信任状确定所述目的SM-SR是否合法,合法时触发交互单元;
交互单元,设置为与所述目的SM-SR进行数据交互。
本公开实施例中,所述交互单元还包括:
第一发送子单元,设置为向所述目的SM-SR发送所述目的SM-SR所属的运营商网络所需文件的下载请求;
接收子单元,设置为接收所述目的SM-SR发送的所述目的SM-SR所属的运营商网络所需文件;
第二发送子单元,设置为根据所述目的SM-SR所属的运营商网络所需文件向所述目的SM-SR所属的运营商网络发起接入请求。
一种智能卡,所述智能卡应用于机器类型通信终端中,所述智能卡包括:
天线系统,设置为接收源SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息;
处理器,设置为去激活或删除与所述源SM-SR相关的配置文件、删除与所述源SM-SR相关的文件管理信任状,激活当前接收的配置文件;
天线系统,还设置为按照所述当前接收的配置文件向目的SM-SR发送接入请求消息;接收目的SM-SR发送的以所述目的SM-SR的私钥加密的与所述目的SM-SR对应的文件管理信任状以及SM-SR信任状;
处理器,还设置为基于所述SM-SR信任状确定所述目的SM-SR是否合法,合法时与所述目的SM-SR进行数据交互。
本公开实施例中,所述天线系统,还设置为向所述目的SM-SR发送所述目的SM-SR所属的运营商网络所需文件的下载请求;接收所述目的SM-SR发送的所述目的SM-SR所属的运营商网络所需文件;并根据所述目的SM-SR所属的运营商网络所需文件向所述目的SM-SR所属的运营商网络发起接入请求。
一种用户签约数据管理安全路由,所述用户签约数据管理安全路由SM-SR包括:
天线系统,设置为接收到针对嵌入式智能卡eUICC的切换请求;
处理器,设置为对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送。
本公开实施例中,所述信任状数据包括:
设置为接入SM-SR的配置文件,所述配置文件用于连接预设的SM-SR,所述预设的SM-SR用于实现eUICC接入运营商网络所需要的文件的下载;
与所述预设的SM-SR对应的文件安装信任状,以实现SM-SR与eUICC之间内部的文件、数据的下载。
本公开实施例中,所述处理器,还设置为
向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,向目的用户签约数据管理—数据准备SM-DP发送文件安装信任状及配置文件生成的请求消息;
接收所述目的SM-DP发送的以文件安装信任状加密的配置文件,生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
本公开实施例中,所述处理器,还设置为
向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,以文件安装信任状加密自身存储的配置文件;生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
一种存储介质,所述存储介质包括存储的程序,其中,所述程序运行时执行上述智能卡的远程签约管理平台切换方法。
本公开实施例的技术方案采用了一种更加安全的方式来保证远程管理平台的安全切换,安全地进行签约管理安全路由设备切换,保证了eUICC的SM-SR切换过程中目的SM-SR的文件管理信任状不被其他外部装置接触或获知的问题。
附图说明
此处所说明的附图用来提供对本公开的进一步理解,构成本公开的一部分,本公开的示意性实施例及其说明用于解释本公开,并不构成对本公开的不当限定。在附图中:
图1为本公开实施例的eUICC远程管理架构示意图;
图2为本公开实施例一的智能卡的远程签约管理平台切换方法的流程图;
图3为本公开实施例二的智能卡的远程签约管理平台切换方法的流程图;
图4为本公开实施例三的智能卡的远程签约管理平台切换方法的流程图;
图5为本公开实施例四的智能卡的远程签约管理平台切换方法的流程图;
图6为本公开实施例一的智能卡的远程签约管理平台切换装置的组成结构示意图;
图7为本公开实施例二的智能卡的远程签约管理平台切换装置的组成结构示意图;
图8为本公开实施例三的智能卡的远程签约管理平台切换装置的组成结构示意图;
图9为本公开实施例四的智能卡的远程签约管理平台切换装置的组成结构示意图。
具体实施方式
实施例一
为了能够更加详尽地了解本公开实施例的特点与技术内容,下面结合附图对本公开实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本公开实施例。
本公开实施例记载了一种智能卡的远程签约管理平台切换方法,本示例是以目的SM-SR侧的执行动作进行的说明,所述方法包括:
目的用户签约数据管理—安全路由SM-SR接收到针对嵌入式智能卡eUICC的切换请求后,对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送。
本示例中,所述信任状数据包括:
设置为接入SM-SR的配置文件,所述配置文件用于连接预设的SM-SR,所述预设的SM-SR用于实现eUICC接入运营商网络所需要的文件的下载;
与所述预设的SM-SR对应的文件安装信任状,以实现SM-SR与eUICC之间内部的文件、数据的下载。
所述对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送,包括:
所述目的SM-SR向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
所述目的SM-SR接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,向目的用户签约数据管理—数据准备SM-DP发送文件安装信任状及配置文件生成的请求消息;
所述目的SM-SR接收所述目的SM-DP发送的以文件安装信任状加密的配置文件,生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
所述目的SM-SR接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
所述目的SM-SR接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
或者,作为一种实现方式,所述对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送,包括:
所述目的SM-SR向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
所述目的SM-SR接收源SM-SR发送eUICC信任状、SM-SR信任状、 文件安装信任状的信息,以文件安装信任状加密自身存储的配置文件;生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
所述目的SM-SR接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
所述目的SM-SR接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
所述确定允许切换至所述目的SM-SR,包括:
切换发起方为所述eUICC时,所述目的SM-SR还向所述目的SM-DP发送能否为所述eUICC提供服务的查询请求,并在接收到所述目的SM-DP发送的能为所述eUICC提供服务的响应消息时,确定允许切换至所述目的SM-SR。
切换发起方为所述目的SM-SR的运营商时,所述目的SM-SR向所述源SM-SR发送eUICC切换宿主SM-SR的请求,并与源SM-SR进行双向鉴权认证。
本公开实施例记载的源SM-SR执行主体的智能卡的远程签约管理平台切换方法,包括:
源SM-SR接收eUICC发送的切换请求后,向目的SM-SR发送eUICC切换宿主SM-SR的请求;
所述源SM-SR接收所述目的SM-SR发送的同意切换的响应,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
所述源SM-SR接收所述目的SM-SR发送的用文件安装信任状加密后 的配置文件以及公钥信息、eUICC切换宿主SM-SR的请求,将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
所述源SM-SR接收eUICC发送的切换请求后,所述方法还包括:
所述源SM-SR与所述目的SM-SR进行双向鉴权认证,并在双向鉴权认证通过后,向所述目的SM-SR发送eUICC切换宿主SM-SR的请求。
本公开实施例记载的源SM-SR执行主体的另一智能卡的远程签约管理平台切换方法,包括:
源SM-SR接收目的SM-SR发送的双向鉴权认证请求后,与所述目的SM-SR进行双向鉴权认证,并在双向鉴权认证通过后,接收所述目的SM-SR发送的eUICC切换宿主SM-SR的请求;
所述源SM-SR同意切换时,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
所述源SM-SR接收所述目的SM-SR发送的响应,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
所述源SM-SR接收所述目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息,将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
本示例中,作为一种实现方式,所述源SM-SR中存储有文件安装信任状。
作为一种实现方式,向所述目的SM-SR发送文件安装信任状的信息之前,所述方法还包括:
所述源SM-SR向源SM-DP发送文件安装信任状的请求,并接收所述 源SM-DP发送的文件安装信任状。
本公开实施例记载的eUICC执行主体的智能卡的远程签约管理平台切换方法,包括:
eUICC接收源SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息后,去激活或删除与所述源SM-SR相关的配置文件、删除与所述源SM-SR相关的文件管理信任状,激活当前接收的配置文件;并按照所述当前接收的配置文件向目的SM-SR发送接入请求消息;
所述eUICC接收目的SM-SR发送的以所述目的SM-SR的私钥加密的与所述目的SM-SR对应的文件管理信任状以及SM-SR信任状,基于所述SM-SR信任状确定所述目的SM-SR合法时,与所述目的SM-SR进行数据交互。
所述eUICC向所述目的SM-SR发送所述目的SM-SR所属的运营商网络所需文件的下载请求,并接收所述目的SM-SR发送的所述目的SM-SR所属的运营商网络所需文件,根据所述目的SM-SR所属的运营商网络所需文件向所述目的SM-SR所属的运营商网络发起接入请求。
以下通过示例,进一步阐明本公开实施例技术方案的实质。
图1为本公开实施例的eUICC远程管理架构示意图,如图1所示,本公开实施例的eUICC远程管理架构描述了参与eUICC远程管理的三种角色:eUICC制造商、运营商(MNO)和远程管理平台的连接关系。在上述架构中,远程管理平台是eUICC远程管理的核心。eUICC中涉及运营商及卡商的数据须经由远程管理平台生成完整的运营商数据文件后,才能通过空中写号等方式下载到eUICC卡中。此外,运营商数据的变更、eUICC更换运营商等过程也经由远程管理平台完成。远程管理平台功能的实现一定程度上还决定或影响着其它管理功能的实现。其中,远程管理平台处于 网络架构的核心地位,远程管理平台的功能主要包括两部分:SM-DP和SM-SR。其中,SM-DP主要负责eUICC卡远程配置的用户签约数据的安全生成、存储和下载;SM-SR主要负责eUICC卡远程配置数据的安全传输和管理。上述功能可以由一个或多个物理实体进行系统实现。
基于图1所示的架构,如图2所示,本公开实施例提供的智能卡的远程签约管理平台切换方法包括以下处理流程:
步骤1,eUICC根据用户请求,激活对应的配置文件,取得目标运营商的相关信息;
步骤2,eUICC向原远程管理平台之宿主SM-SR发送切换请求(并携带目标运营商标识);
步骤3,原远程管理平台(源SM-SR)与欲切换的远程管理平台(目的SM-SR)进行双向鉴权认证;
步骤4,源SM-SR向目的SM-SR发送eUICC切换宿主SM-SR请求;目的SM-SR向目的SM-DP查询能否为该eUICC提供服务;
步骤5,目的SM-DP向运营商查询能否为该eUICC提供服务;运营商将结果返回,并将结果通过SM-DP返回给目的SM-SR;
步骤6,目的SM-SR确定是否可以切换;当确定不能切换时,结束当前处理流程,能切换时执行步骤7。
步骤7,目的SM-SR向源SR发送同意切换的消息;
步骤8,源SM-SR向目的SM-SR发送包括eUICC信任状、SM-SR信任状、文件安装信任状的消息;
步骤9,目的SM-SR向目的SM-DP发送文件安装信任状及配置文件生成请求消息,目的SM-DP生成配置文件,并将配置文件用文件安装信任状加密;将加密后的配置文件发送给目的SM-SR;
步骤10,目的SM-SR通过运算产生一对公钥、私钥密钥对,作为临时使用;并将用文件安装信任状加密后的配置文件以及上述公钥发送给源SM-SR;
步骤11,源SM-SR将加密后的配置文件、公钥传给eUICC并向eUICC发送更换其SM-SR的请求,eUICC将与源SM-SR相关的配置文件去激活(或删除)、与源SM-SR相关的文件管理信任状删除,并激活刚接收到的配置文件;按照刚激的配置文件向的目的SM-SR发送接入请求消息;
步骤12,目的SM-SR判断该eUICC公开是否合法,如果合法,目的SM-SR采用私钥对与目的SM-SR对应的文件管理信任状进行加密;并将将加密后的与目的SM-SR对应的文件管理信任状以及SM-SR信任状发送给eUICC;
步骤13,eUICC根据SM-SR信任状判断SM-SR的合法性,如果合法,则和目的SM-SR进行数据传送,eUICC与SM-SR交互,实现eUICC接入该运营商网络所需文件的下载,eUICC根据下载的网络接入相关文件向该运营商网络发起接入请求。
基于图1所示的架构,如图3所示,本公开实施例提供的智能卡的远程签约管理平台切换方法包括以下处理流程:
步骤1,eUICC根据用户请求,激活对应的配置文件,取得目标运营商的相关信息;
步骤2,eUICC向原远程管理平台之宿主SM-SR发送切换请求(并携带目标运营商标识);
步骤3,原远程管理平台(源SM-SR)与欲切换的远程管理平台(目的SM-SR)进行双向鉴权认证;
步骤4,源SM-SR向目的SM-SR发送eUICC切换宿主SM-SR请求; 目的SM-SR向目的SM-DP查询能否为该eUICC提供服务;
步骤5,目的SM-DP向运营商查询能否为该eUICC提供服务;运营商将结果返回,并将结果通过SM-DP返回给目的SM-SR;
步骤6,目的SM-SR判断是否可以进行切换,如果不能切换则结束当前处理流程,可以切换时,执行步骤7;
步骤7,目的SM-SR向源SR发送同意切换的消息;
步骤8,源SM-SR向目的SM-SR发送包括eUICC信任状、SM-SR信任状、文件安装信任状的消息;
步骤9,目的SM-SR向目的SM-DP发送文件安装信任状及配置文件生成请求消息,目的SM-DP生成配置文件,并将配置文件用文件安装信任状加密;将加密后的配置文件发送给目的SM-SR;
步骤10,目的SM-SR通过运算产生一对公钥、私钥密钥对,作为临时使用;并将用文件安装信任状加密后的配置文件以及上述公钥发送给源SM-SR;
步骤11,源SM-SR将加密后的配置文件、公钥传给eUICC并向eUICC发送更换其SM-SR的请求,eUICC将与源SM-SR相关的配置文件去激活(或删除)、与源SM-SR相关的文件管理信任状删除,并激活刚接收到的配置文件;按照刚激的配置文件向的目的SM-SR发送接入请求消息;
步骤12,目的SM-SR判断该eUICC公开是否合法,如果合法,目的SM-SR采用私钥对与目的SM-SR对应的文件管理信任状进行加密;并将将加密后的与目的SM-SR对应的文件管理信任状以及SM-SR信任状发送给eUICC;
步骤13,eUICC根据SM-SR信任状判断SM-SR的合法性,如果合法,则和目的SM-SR进行数据传送,eUICC与SM-SR交互,实现eUICC 接入该运营商网络所需文件的下载,eUICC根据下载的网络接入相关文件向该运营商网络发起接入请求。
基于图1所示的架构,如图4所示,本公开实施例提供的智能卡的远程签约管理平台切换方法,在用户发起运营商变更的情况下,包括以下处理流程:
步骤1101,eUICC根据用户请求,激活对应的配置文件,取得目的运营商的相关信息;
步骤1103,eUICC向原远程管理平台之宿主SM-SR发送切换请求(并携带目的运营商标识);
步骤1105,原远程管理平台(源SM-SR)与欲切换的远程管理平台(目的SM-SR)进行双向鉴权认证;
步骤1107,源SM-SR向目的SM-SR发送eUICC切换宿主SM-SR请求;目的SM-SR向目的SM-DP查询能否为该eUICC提供服务;
步骤1109,SM-DP向运营商查询能否为该eUICC提供服务;运营商将结果返回,并将结果通过SM-DP返回给SM-SR;
步骤1111,如果查询结果是可以切换,则目的SM-SR向源SR发送同意切换的消息;
步骤1113,源SM-SR向目的SM-SR发送包括eUICC信任状、SM-SR信任状、文件安装信任状的消息;
步骤1115,目的SM-SR向目的SM-DP发送文件安装信任状及配置文件生成请求消息;
步骤1117,目的SM-DP生成配置文件,并将配置文件用文件安装信任状加密;并将加密后的配置文件发送给目的SM-SR;
需要说明的是,作为一种实现方式,文件安装信任状也可以存储于目 的SM-SR中,SM-SR也可以自行生成配置文件并存储。此时,步骤1115及1117也可以合并为:由SM-SR直接使用文件安装信任状加密配置文件。
步骤1119,目的SM-SR通过运算产生一对公钥、私钥密钥对,作为临时使用;并将用文件安装信任状加密后的配置文件以及上述公钥发送给源SM-SR;
步骤1121,源SM-SR将加密后的配置文件、公钥传给eUICC并向eUICC发送更换其SM-SR的请求,eUICC将与源SM-SR相关的配置文件去激活(或删除)、与源SM-SR相关的文件管理信任状删除,并激活刚接收到的配置文件;按照刚激活的配置文件向的目的SM-SR发送接入请求消息;
步骤1123,目的SM-SR判断该eUICC公开是否合法,如果合法,目的SM-SR采用私钥对与目的SM-SR对应的文件管理信任状进行加密;并将将加密后的与目的SM-SR对应的文件管理信任状以及SM-SR信任状发送给eUICC;
步骤1125,eUICC根据SM-SR信任状判断SM-SR的合法性,如果合法,则和目的SM-SR进行数据传送,eUICC与SM-SR交互,实现eUICC接入该运营商网络所需文件的下载,eUICC根据下载的网络接入相关文件向该运营商网络发起接入请求。
本公开实施例中,源SM-SR到目的SM-SR之间、目的SM-DP和运营商之间,目的SM-SR和目的SM-DP、源SM-SR和eUICC、目的SM-SR和eUICC、eUICC与运营商之间的通信首先进行身份的双向认证,确认身份正确后再进行通信。
源SM-SR在将约签数据中的关键个人信息(包括且不限于密钥、信任状)下发给eUICC前,需要首先进行一个密钥协商流程以确定一个加 密密钥,之后将各新信息进行加密,然后将加密后的关键个人信息通过Web Service安全或安全套接层(SSL,Secure Sockets Layer)建立的安全传输通道进行传送。
在源SM-SR与目的SM-SR、目的SM-SR与目的SM-DP之间进行空口数据传输时,分别在目的SM-DP、目的SM-SR、源SM-SR内部设置计数器,目的SM-DP、目的SM-SR、源SM-SR在发送时按照一定的顺序发送指令并不允许重复发送相同的报文,目的SM-DP、目的SM-SR、源SM-SR和接收端各自维护自身的计数器,且计数器作为参数参与认证计算。
eUICC在切换到新的SM-SR之前,按照一定的规则对是否能够安装进行多次确认,若切换无法完成,将会自动回退到初始的签约数据。
eUICC或所在的物联网设备被设置为无权限读取或修改关键个人信息数据。个人关键数据信息被存储于单独立的空间中;所述单独的独立空间可以是硬件安全模块等。
基于图1所示的架构,如图5所示,本公开实施例提供的智能卡的远程签约管理平台切换方法,在运营商发起远程签约管理平台变更的情况下,包括以下处理流程:
步骤1301,运营商向目的远程管理平台之SM-SR发送eUICC宿主SM-SR切换请求;
步骤1303,目的远程管理平台(目的SM-SR)和源远程管理平台(源SM-SR)进行双向鉴权认证过程;
步骤1305,认证通过后,目的SM-SR向源SM-SR发送eUICC切换宿主SM-SR请求;
步骤1307,源SM-SR同意切换的话(是否同意切换看是否两家运营商有合作协议),源SM-SR向源SM-DP发送文件安装信任状请求;源 SM-DP向源SM-SR发送文件安装信任状;源SM-SR向目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状;
作为一种实现方式,源SM-SR中可以直接存储文件安装信任状,此时源SM-SR将不必向源SM-DP获取文件安装信任状。
步骤1309,目的SM-SR收到源SM-SR发送的数据后,向目的SM-DP发送文件安装信任状,并发送配置文件生成请求消息;
步骤1311,目的SM-DP将配置文件用收到的文件安装信任状加密;并将加密后的配置文件发送给目的SM-SR;
步骤1313,目的SM-SR通过预设的密钥运算方法产生一对公钥、私钥密钥对,作为临时使用;并将用文件安装信任状加密后的配置文件以及上述公钥发送给源SM-SR;同时向源SM-SR发送更换eUICC的SM-SR的请求;
步骤1315,源SM-SR将加密后的配置文件、公钥传给eUICC并向eUICC发送更换其SM-SR的请求,eUICC将与源SM-SR相关的配置文件去激活(或删除)、与源SM-SR相关的文件管理信任状删除,并激活刚接收到的配置文件;按照刚激的配置文件向的目的SM-SR发送接入请求消息;
步骤1317,目的SM-SR判断该eUICC公开是否合法,如果合法,目的SM-SR采用私钥对与目的SM-SR对应的文件管理信任状进行加密;并将将加密后的与目的SM-SR对应的文件管理信任状以及SM-SR信任状发送给eUICC;
步骤1319,eUICC根据SM-SR信任状判断SM-SR的合法性,如果合法,则和目的SM-SR进行数据传送,eUICC与SM-SR交互,实现eUICC接入该运营商网络所需文件的下载,eUICC根据下载的网络接入相关文件 向该运营商网络发起接入请求。
本公开实施例中,源SM-SR与源SM-DP、源SM-SR与目的SM-SR之间、目的SM-SR与目的SM-DP、目的SM-DP与运营商之间,目的SM-SR和目的SM-DP、源SM-SR和eUICC、目的SM-SR和eUICC、eUICC与运营商之间的通信首先进行身份的双向认证,确认身份正确后再进行通信。
目的SM-SR在将约签数据中的关键个人信息(包括且不限于密钥、信任状)下发给eUICC前,需要首先进行一个密钥协商流程以确定一个加密密钥,之后将个新信息进行加密,然后将加密后的关键个人信息通过Web Service安全或SSL建立的安全传输通道进行传送。
在源SM-SR与目的SM-SR、源SM-SR与源SM-DP、目的SM-SR与目的SM-DP之间进行空口数据传输时,分别在目的SM-DP、目的SM-SR、源SM-SR、源SM-DP内部设置计数器,目的SM-DP、目的SM-SR、源SM-SR在发送时按照一定的顺序发送指令并不允许重复发送相同的报文,目的SM-DP、目的SM-SR、源SM-SR、源SM-DP和接收端各自维护自身的计数器,且计数器作为参数参与认证计算。
eUICC与相关装置在切换到新的签约之前按照一定的规则对是否能够安装进行多次确认,若切换无法完成,将会自动回退到初始的签约数据。eUICC或所在的M2M设备被设置为无权限读取或修改关键个人信息数据。个人关键数据信息被存储于单独立的空间中;所述单独的独立空间可以是硬件安全模块等。
图6为本公开实施例一的智能卡的远程签约管理平台切换装置的组成结构示意图,如图6所示,本公开实施例的智能卡的远程签约管理平台切换装置包括:
接收单元40,设置为接收到针对嵌入式智能卡eUICC的切换请求;
加密单元41,设置为对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送。
所述信任状数据包括:
设置为接入SM-SR的配置文件,所述配置文件用于连接预设的SM-SR,所述预设的SM-SR用于实现eUICC接入运营商网络所需要的文件的下载;
与所述预设的SM-SR对应的文件安装信任状,以实现SM-SR与eUICC之间内部的文件、数据的下载。
本公开实施例中,所述加密单元41,包括:
认证子单元(图6中未示出),设置为与源SM-SR进行双向鉴权认证;
确定子单元(图6中未示出),设置为确定是否允许切换至所述目的SM-SR;
第一发送子单元(图6中未示出),设置为在鉴权认证通过且确定允许切换至所述目的SM-SR时,向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
第一接收子单元(图6中未示出),设置为接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
第二发送子单元(图6中未示出),设置为向目的SM-DP发送文件安装信任状及配置文件生成的请求消息;
第二接收子单元(图6中未示出),设置为接收所述目的SM-DP发送的以文件安装信任状加密的配置文件;
生成子单元(图6中未示出),设置为生成公钥、私钥密钥对;
第三发送子单元(图6中未示出),设置为将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
第三接收子单元(图6中未示出),设置为接收所述eUICC发送的接入请求;
加密子单元(图6中未示出),设置为使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密;
第四发送子单元(图6中未示出),设置为将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
第四接收子单元(图6中未示出),设置为接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求;
第五发送子单元(图6中未示出),设置为将对应的文件向所述eUICC发送。
作为一种实现方式,所述加密单元41,还可以包括:
认证子单元(图6中未示出),设置为与源SM-SR进行双向鉴权认证;
确定子单元(图6中未示出),设置为确定是否允许切换至所述目的SM-SR;
第一发送子单元(图6中未示出),设置为在鉴权认证通过且确定允许切换至所述目的SM-SR时,向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
第一接收子单元(图6中未示出),设置为接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
第一加密子单元(图6中未示出),设置为以文件安装信任状加密配置文件;
生成子单元(图6中未示出),设置为生成公钥、私钥密钥对;
第二发送子单元(图6中未示出),设置为将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
第二接收子单元(图6中未示出),设置为接收所述eUICC发送的接入请求;
第二加密子单元(图6中未示出),设置为使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密;
第三发送子单元(图6中未示出),设置为将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
第三接收子单元(图6中未示出),设置为接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求;
第四发送子单元(图6中未示出),设置为将对应的文件向所述eUICC发送。
所述确定子单元,还设置为:
在切换发起方为所述eUICC时,向所述目的SM-DP发送能否为所述eUICC提供服务的查询请求;接收所述目的SM-DP发送的能为所述eUICC提供服务的响应消息后,确定允许切换至所述目的SM-SR。
所述加密单元41,还可以包括:
第六发送子单元,设置为在切换发起方为所述目的SM-SR的运营商时,向所述源SM-SR发送eUICC切换宿主SM-SR的请求,并触发所述认证子单元与源SM-SR进行双向鉴权认证。
本领域技术人员应当理解,图6所示的智能卡的远程签约管理平台切换装置中的各单元的实现功能可参照前述智能卡的远程签约管理平台切换方法的相关描述而理解。图6所示的确定单元、认证单元、生成单元、加密单元等均可以通过微处理器、FPGA、数字信号处理器等实现,发送单元和接收单元可以通过空口天线系统或有线接口等的方式实现。
图7为本公开实施例二的智能卡的远程签约管理平台切换装置的组成 结构示意图,如图7所示,本公开实施例的智能卡的远程签约管理平台切换装置包括:
第一接收单元50,设置为接收eUICC发送的切换请求;
第一发送单元51,设置为向目的SM-SR发送eUICC切换宿主SM-SR的请求;
第二接收单元52,设置为接收所述目的SM-SR发送的同意切换的响应;
第二发送单元53,设置为向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
第三接收单元54,设置为接收所述目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息、eUICC切换宿主SM-SR的请求;
第三发送单元55,设置为将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
在图6所示的智能卡的远程签约管理平台切换装置的基础上,本公开实施例的智能卡的远程签约管理平台切换装置还包括:
认证单元(图7中未示出),设置为与所述目的SM-SR进行双向鉴权认证;
第四发送单元(图7中未示出),设置为在双向鉴权认证通过后,向所述目的SM-SR发送eUICC切换宿主SM-SR的请求。
本领域技术人员应当理解,图7所示的智能卡的远程签约管理平台切换装置中的各单元的实现功能可参照前述智能卡的远程签约管理平台切换方法的相关描述而理解。图7所示的认证单元等均可以通过微处理器、FPGA、数字信号处理器等实现,发送单元和接收单元可以通过空口天线 系统或有线接口等的方式实现。
图8为本公开实施例三的智能卡的远程签约管理平台切换装置的组成结构示意图,如图8所示,本公开实施例的智能卡的远程签约管理平台切换装置包括:
第一接收单元60,设置为接收目的SM-SR发送的双向鉴权认证请求;
认证单元61,设置为与所述目的SM-SR进行双向鉴权认证;
第二接收单元62,设置为在双向鉴权认证通过后,接收所述目的SM-SR发送的eUICC切换宿主SM-SR的请求;
第一发送单元63,设置为向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
第三接收单元64,设置为接收所述目的SM-SR发送的响应,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
第四接收单元65,设置为接收所述目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息;
第二发送单元66,设置为将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
在图8所示的智能卡的远程签约管理平台切换装置的基础上,本公开实施例的智能卡的远程签约管理平台切换装置还包括:
存储单元(图8中未示出),设置为存储有文件安装信任状。
在图8所示的智能卡的远程签约管理平台切换装置的基础上,本公开实施例的智能卡的远程签约管理平台切换装置还包括:
第三发送单元(图8中未示出),设置为向源SM-DP发送文件安装信任状的请求;
第五接收单元(图8中未示出),设置为接收所述源SM-DP发送的文件安装信任状。
本领域技术人员应当理解,图8所示的智能卡的远程签约管理平台切换装置中的各单元的实现功能可参照前述智能卡的远程签约管理平台切换方法的相关描述而理解。图8所示的认证单元等均可以通过微处理器、FPGA、数字信号处理器等实现,发送单元和接收单元可以通过空口天线系统或有线接口等的方式实现。
图9为本公开实施例四的智能卡的远程签约管理平台切换装置的组成结构示意图,如图9所示,本公开实施例的智能卡的远程签约管理平台切换装置包括:
第一接收单元70,设置为接收源SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息;
去激活删除单元71,设置为去激活或删除与所述源SM-SR相关的配置文件、删除与所述源SM-SR相关的文件管理信任状;
激活单元72,设置为激活当前接收的配置文件;
第一发送单元73,设置为按照所述当前接收的配置文件向目的SM-SR发送接入请求消息;
第二接收单元74,设置为接收目的SM-SR发送的以所述目的SM-SR的私钥加密的与所述目的SM-SR对应的文件管理信任状以及SM-SR信任状;
确定单元75,设置为基于所述SM-SR信任状确定所述目的SM-SR是否合法,合法时触发交互单元;
交互单元76,设置为与所述目的SM-SR进行数据交互。
所述交互单元76还包括:
第一发送子单元(图9中未示出),设置为向所述目的SM-SR发送所述目的SM-SR所属的运营商网络所需文件的下载请求;
接收子单元(图9中未示出),设置为接收所述目的SM-SR发送的所述目的SM-SR所属的运营商网络所需文件;
第二发送子单元(图9中未示出),设置为根据所述目的SM-SR所属的运营商网络所需文件向所述目的SM-SR所属的运营商网络发起接入请求。
本领域技术人员应当理解,图9所示的智能卡的远程签约管理平台切换装置中的各单元的实现功能可参照前述智能卡的远程签约管理平台切换方法的相关描述而理解。图9所示的去激活删除单元、激活单元、确定单元、交互单元等均可以通过微处理器、FPGA、数字信号处理器等实现,发送单元和接收单元可以通过空口天线系统或有线接口等的方式实现。
本公开实施例还记载了一种智能卡,所述智能卡应用于机器类型通信终端中,所述智能卡包括:
天线系统,设置为接收源SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息;
处理器,设置为去激活或删除与所述源SM-SR相关的配置文件、删除与所述源SM-SR相关的文件管理信任状,激活当前接收的配置文件;
天线系统,还设置为按照所述当前接收的配置文件向目的SM-SR发送接入请求消息;接收目的SM-SR发送的以所述目的SM-SR的私钥加密的与所述目的SM-SR对应的文件管理信任状以及SM-SR信任状;
处理器,还设置为基于所述SM-SR信任状确定所述目的SM-SR是否合法,合法时与所述目的SM-SR进行数据交互。
所述天线系统,还设置为向所述目的SM-SR发送所述目的SM-SR所 属的运营商网络所需文件的下载请求;接收所述目的SM-SR发送的所述目的SM-SR所属的运营商网络所需文件;并根据所述目的SM-SR所属的运营商网络所需文件向所述目的SM-SR所属的运营商网络发起接入请求。
本公开实施例还记载了一种用户签约数据管理安全路由,所述用户签约数据管理安全路由SM-SR包括:
天线系统,设置为接收到针对嵌入式智能卡eUICC的切换请求;
处理器,设置为对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送。
其中,所述信任状数据包括:
设置为接入SM-SR的配置文件,所述配置文件用于连接预设的SM-SR,所述预设的SM-SR用于实现eUICC接入运营商网络所需要的文件的下载;
与所述预设的SM-SR对应的文件安装信任状,以实现SM-SR与eUICC之间内部的文件、数据的下载。
所述处理器,还设置为
向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,向目的用户签约数据管理—数据准备SM-DP发送文件安装信任状及配置文件生成的请求消息;
接收所述目的SM-DP发送的以文件安装信任状加密的配置文件,生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对 应的文件管理信任状、SM-SR信任状向所述eUICC发送;
接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
或者,所述处理器,还设置为
向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,以文件安装信任状加密自身存储的配置文件;生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
本公开实施例还记载了一种存储介质,可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:
S1,目的用户签约数据管理—安全路由SM-SR接收到针对嵌入式智能卡eUICC的切换请求后,对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保信任状数据能够安全传送。
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:
S1,源用户签约数据管理—安全路由SM-SR接收嵌入式智能卡eUICC发送的切换请求后,向目的SM-SR发送eUICC切换宿主SM-SR的请求;
S2,源SM-SR接收目的SM-SR发送的同意切换的响应,向目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
S3,源SM-SR接收目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息、eUICC切换宿主SM-SR的请求,将用文件安装信任状加密后的配置文件以及公钥信息向eUICC发送,并向eUICC发送切换宿主SM-SR的请求。
在本公开所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其他的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其他形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。
另外,在本公开各实施例中的各功能单元可以全部集成在一个处理单元中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、只读存储器(ROM,Read Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
或者,本公开上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本公开实施例的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本公开各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、只读存储器(ROM,Read Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本公开的实施方式,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以所述权利要求的保护范围为准。
工业实用性
通过本公开的技术方案,采用了一种更加安全的方式来保证远程管理平台的安全切换,安全地进行签约管理安全路由设备切换,保证了嵌入式智能卡eUICC的用户签约数据管理—安全路由SM-SR切换过程中目的SM-SR的文件管理信任状不被其他外部装置接触或获知的问题。

Claims (42)

  1. 一种智能卡的远程签约管理平台切换方法,所述方法包括:
    目的用户签约数据管理—安全路由SM-SR接收到针对嵌入式智能卡eUICC的切换请求后,对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送。
  2. 根据权利要求1所述的方法,其中,所述信任状数据包括:
    用于接入SM-SR的配置文件,所述配置文件用于连接预设的SM-SR,所述预设的SM-SR用于实现eUICC接入运营商网络所需要的文件的下载;
    与所述预设的SM-SR对应的文件安装信任状,以实现SM-SR与eUICC之间内部的文件、数据的下载。
  3. 根据权利要求1或2所述的方法,其中,所述对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送,包括:
    所述目的SM-SR向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
    所述目的SM-SR接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,向目的用户签约数据管理—数据准备SM-DP发送文件安装信任状及配置文件生成的请求消息;
    所述目的SM-SR接收所述目的SM-DP发送的以文件安装信任状加密的配置文件,生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
    所述目的SM-SR接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后 的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
    所述目的SM-SR接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
  4. 根据权利要求1或2所述的方法,其中,所述对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送,包括:
    所述目的SM-SR向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
    所述目的SM-SR接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,以文件安装信任状加密自身存储的配置文件;生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
    所述目的SM-SR接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
    所述目的SM-SR接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
  5. 根据权利要求3所述的方法,其中,所述确定允许切换至所述目的SM-SR,包括:
    切换发起方为所述eUICC时,所述目的SM-SR还向所述目的SM-DP发送能否为所述eUICC提供服务的查询请求,并在接收到所述目的SM-DP发送的能为所述eUICC提供服务的响应消息时,确定允许切换 至所述目的SM-SR。
  6. 根据权利要求3所述的方法,其中,所述方法还包括:
    切换发起方为所述目的SM-SR的运营商时,所述目的SM-SR向所述源SM-SR发送eUICC切换宿主SM-SR的请求,并与源SM-SR进行双向鉴权认证。
  7. 根据权利要求1至6任一项所述的方法,其中,所述方法还包括:
    源SM-SR与源SM-DP、源SM-SR与目的SM-SR之间、目的SM-SR与目的SM-DP、目的SM-DP与运营商之间,目的SM-SR与目的SM-DP、源SM-SR与eUICC、目的SM-SR与eUICC、eUICC与运营商之间的通信先进行身份的双向认证,认证通过后再进行通信。
  8. 根据权利要求1至7任一项所述的方法,其中,所述方法还包括:
    在源SM-SR与目的SM-SR、源SM-SR与源SM-DP、目的SM-SR与目的SM-DP之间进行空口数据传输时,分别在目的SM-DP、目的SM-SR、源SM-SR、源SM-DP内部设置计数器,目的SM-DP、目的SM-SR、源SM-SR在发送数据时按照设定的顺序发送,不允许重复发送相同的数据,目的SM-DP、目的SM-SR、源SM-SR、源SM-DP和eUICC各自维护自身的计数器,且计数器作为参数参与认证计算。
  9. 根据权利要求1至8任一项所述的方法,其中,所述方法还包括:
    所述目的SM-SR在将约签数据中的关键个人信息向eUICC发送前,首先进行密钥协商以确定加密密钥,利用所述加密密钥将所述关键个人信息进行加密,将加密后的关键个人信息通过网页业务Web  Service安全或安全套接层SSL建立的安全传输通道进行传送。
  10. 根据权利要求1至9任一项所述的方法,其中,所述方法还包括:
    所述eUICC或所述eUICC所在的物联网终端被设置为无权限读取或修改关键个人信息数据;所述个人关键数据信息被存储于单独立的空间中,所述单独的独立空间包括硬件安全模块。
  11. 一种智能卡的远程签约管理平台切换方法,所述方法包括:
    源用户签约数据管理—安全路由SM-SR接收嵌入式智能卡eUICC发送的切换请求后,向目的SM-SR发送eUICC切换宿主SM-SR的请求;
    所述源SM-SR接收所述目的SM-SR发送的同意切换的响应,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
    所述源SM-SR接收所述目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息、eUICC切换宿主SM-SR的请求,将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
  12. 根据权利要求11所述的方法,其中,所述源SM-SR接收eUICC发送的切换请求后,所述方法还包括:
    所述源SM-SR与所述目的SM-SR进行双向鉴权认证,并在双向鉴权认证通过后,向所述目的SM-SR发送eUICC切换宿主SM-SR的请求。
  13. 一种智能卡的远程签约管理平台切换方法,所述方法包括:
    源用户签约数据管理—安全路由SM-SR接收目的SM-SR发送的双向鉴权认证请求后,与所述目的SM-SR进行双向鉴权认证,并在双向 鉴权认证通过后,接收所述目的SM-SR发送的嵌入式智能卡eUICC切换宿主SM-SR的请求;
    所述源SM-SR同意切换时,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
    所述源SM-SR接收所述目的SM-SR发送的响应,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
    所述源SM-SR接收所述目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息,将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
  14. 根据权利要求13所述的方法,其中,所述源SM-SR中存储有文件安装信任状。
  15. 根据权利要求13所述的方法,其中,向所述目的SM-SR发送文件安装信任状的信息之前,所述方法还包括:
    所述源SM-SR向源用户签约数据管理—数据准备SM-DP发送文件安装信任状的请求,并接收所述源SM-DP发送的文件安装信任状。
  16. 一种智能卡的远程签约管理平台切换方法,所述方法包括:
    嵌入式智能卡eUICC接收源用户签约数据管理—安全路由SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息后,去激活或删除与所述源SM-SR相关的配置文件、删除与所述源SM-SR相关的文件管理信任状,激活当前接收的配置文件;并按照所述当前接收的配置文件向目的SM-SR发送接入请求消息;
    所述eUICC接收目的SM-SR发送的以所述目的SM-SR的私钥加密 的与所述目的SM-SR对应的文件管理信任状以及SM-SR信任状,基于所述SM-SR信任状确定所述目的SM-SR合法时,与所述目的SM-SR进行数据交互。
  17. 根据权利要求16所述的方法,其中,所述方法还包括:
    所述eUICC向所述目的SM-SR发送所述目的SM-SR所属的运营商网络所需文件的下载请求,并接收所述目的SM-SR发送的所述目的SM-SR所属的运营商网络所需文件,根据所述目的SM-SR所属的运营商网络所需文件向所述目的SM-SR所属的运营商网络发起接入请求。
  18. 根据权利要求16所述的方法,其中,所述方法还包括:
    eUICC在切换到新SM-SR之前,确定切换无法完成时,自动回退到初始的签约数据。
  19. 根据权利要求16所述的方法,其中,所述方法还包括:所述eUICC或所述eUICC所在的物联网终端被设置为无权限读取或修改关键个人信息数据。
  20. 根据权利要求19所述的方法,其中,所述方法还包括:所述个人关键数据信息被存储于单独立的空间中,所述单独的独立空间包括硬件安全模块。
  21. 一种智能卡的远程签约管理平台切换方法,所述方法包括:
    目的用户签约数据管理—安全路由SM-SR接收到针对嵌入式智能卡eUICC的切换请求后,向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
    所述目的SM-SR接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,向目的用户签约数据管理—数据准备SM-DP 发送文件安装信任状及配置文件生成的请求消息;
    所述目的SM-SR接收所述目的SM-DP发送的以文件安装信任状加密的配置文件,生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
    所述目的SM-SR接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
    所述目的SM-SR接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
  22. 一种智能卡的远程签约管理平台切换方法,所述方法包括:
    目的用户签约数据管理—安全路由SM-SR接收到针对嵌入式智能卡eUICC的切换请求后,向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
    所述目的SM-SR接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,以文件安装信任状加密自身存储的配置文件;生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
    所述目的SM-SR接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
    所述目的SM-SR接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
  23. 一种智能卡的远程签约管理平台切换装置,所述装置包括:
    接收单元,设置为接收到针对嵌入式智能卡eUICC的切换请求;
    加密单元,设置为对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送。
  24. 根据权利要求23所述的装置,其中,所述信任状数据包括:
    设置为接入用户签约数据管理—安全路由SM-SR的配置文件,所述配置文件用于连接预设的SM-SR,所述预设的SM-SR用于实现eUICC接入运营商网络所需要的文件的下载;
    与所述预设的SM-SR对应的文件安装信任状,以实现SM-SR与eUICC之间内部的文件、数据的下载。
  25. 根据权利要求23或24所述的装置,其中,所述加密单元,包括:
    认证子单元,设置为与源SM-SR进行双向鉴权认证;
    确定子单元,设置为确定是否允许切换至所述目的SM-SR;
    第一发送子单元,设置为在鉴权认证通过且确定允许切换至所述目的SM-SR时,向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
    第一接收子单元,设置为接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
    第二发送子单元,设置为向目的用户签约数据管理—数据准备SM-DP发送文件安装信任状及配置文件生成的请求消息;
    第二接收子单元,设置为接收所述目的SM-DP发送的以文件安装信任状加密的配置文件;
    生成子单元,设置为生成公钥、私钥密钥对;
    第三发送子单元,设置为将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
    第三接收子单元,设置为接收所述eUICC发送的接入请求;
    加密子单元,设置为使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密;
    第四发送子单元,设置为将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
    第四接收子单元,设置为接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求;
    第五发送子单元,设置为将对应的文件向所述eUICC发送。
  26. 根据权利要求23或24所述的装置,其中,所述加密单元,包括:
    认证子单元,设置为与源SM-SR进行双向鉴权认证;
    确定子单元,设置为确定是否允许切换至所述目的SM-SR;
    第一发送子单元,设置为在鉴权认证通过且确定允许切换至所述目的SM-SR时,向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
    第一接收子单元,设置为接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
    第一加密子单元,设置为以文件安装信任状加密配置文件;
    生成子单元,设置为生成公钥、私钥密钥对;
    第二发送子单元,设置为将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
    第二接收子单元,设置为接收所述eUICC发送的接入请求;
    第二加密子单元,设置为使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密;
    第三发送子单元,设置为将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
    第三接收子单元,设置为接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求;
    第四发送子单元,设置为将对应的文件向所述eUICC发送。
  27. 根据权利要求25所述的装置,其中,所述确定子单元,还设置为:
    在切换发起方为所述eUICC时,向所述目的SM-DP发送能否为所述eUICC提供服务的查询请求;接收所述目的SM-DP发送的能为所述eUICC提供服务的响应消息后,确定允许切换至所述目的SM-SR。
  28. 根据权利要求25所述的装置,其中,所述加密单元,还包括:
    第六发送子单元,设置为在切换发起方为所述目的SM-SR的运营商时,向所述源SM-SR发送eUICC切换宿主SM-SR的请求,并触发所述认证子单元与源SM-SR进行双向鉴权认证。
  29. 一种智能卡的远程签约管理平台切换装置,所述装置包括:
    第一接收单元,设置为接收嵌入式智能卡eUICC发送的切换请求;
    第一发送单元,设置为向目的用户签约数据管理—安全路由SM-SR发送eUICC切换宿主SM-SR的请求;
    第二接收单元,设置为接收所述目的SM-SR发送的同意切换的响应;
    第二发送单元,设置为向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
    第三接收单元,设置为接收所述目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息、eUICC切换宿主SM-SR的请求;
    第三发送单元,设置为将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
  30. 根据权利要求29所述的装置,其中,所述装置还包括:
    认证单元,设置为与所述目的SM-SR进行双向鉴权认证;
    第四发送单元,设置为在双向鉴权认证通过后,向所述目的SM-SR发送eUICC切换宿主SM-SR的请求。
  31. 一种智能卡的远程签约管理平台切换装置,所述装置包括:
    第一接收单元,设置为接收目的用户签约数据管理—安全路由SM-SR发送的双向鉴权认证请求;
    认证单元,设置为与所述目的SM-SR进行双向鉴权认证;
    第二接收单元,设置为在双向鉴权认证通过后,接收所述目的SM-SR发送的嵌入式智能卡eUICC切换宿主SM-SR的请求;
    第一发送单元,设置为向所述目的SM-SR发送eUICC信任状、 SM-SR信任状、文件安装信任状的信息;
    第三接收单元,设置为接收所述目的SM-SR发送的响应,向所述目的SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息;
    第四接收单元,设置为接收所述目的SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息;
    第二发送单元,设置为将所述用文件安装信任状加密后的配置文件以及所述公钥信息向所述eUICC发送,并向所述eUICC发送切换宿主SM-SR的请求。
  32. 根据权利要求31所述的装置,其中,所述装置还包括:
    存储单元,设置为存储有文件安装信任状。
  33. 根据权利要求31所述的装置,其中,所述装置还包括:
    第三发送单元,设置为向源用户签约数据管理—数据准备SM-DP发送文件安装信任状的请求;
    第五接收单元,设置为接收所述源SM-DP发送的文件安装信任状。
  34. 一种智能卡的远程签约管理平台切换装置,所述装置包括:
    第一接收单元,设置为接收源用户签约数据管理—安全路由SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息;
    去激活删除单元,设置为去激活或删除与所述源SM-SR相关的配置文件、删除与所述源SM-SR相关的文件管理信任状;
    激活单元,设置为激活当前接收的配置文件;
    第一发送单元,设置为按照所述当前接收的配置文件向目的SM-SR发送接入请求消息;
    第二接收单元,设置为接收目的SM-SR发送的以所述目的SM-SR的私钥加密的与所述目的SM-SR对应的文件管理信任状以及SM-SR信任状;
    确定单元,设置为基于所述SM-SR信任状确定所述目的SM-SR是否合法,合法时触发交互单元;
    交互单元,设置为与所述目的SM-SR进行数据交互。
  35. 根据权利要求34所述的装置,其中,所述交互单元还包括:
    第一发送子单元,设置为向所述目的SM-SR发送所述目的SM-SR所属的运营商网络所需文件的下载请求;
    接收子单元,设置为接收所述目的SM-SR发送的所述目的SM-SR所属的运营商网络所需文件;
    第二发送子单元,设置为根据所述目的SM-SR所属的运营商网络所需文件向所述目的SM-SR所属的运营商网络发起接入请求。
  36. 一种智能卡,所述智能卡应用于机器类型通信终端中,所述智能卡包括:
    天线系统,设置为接收源用户签约数据管理—安全路由SM-SR发送的用文件安装信任状加密后的配置文件以及公钥信息;
    处理器,设置为去激活或删除与所述源SM-SR相关的配置文件、删除与所述源SM-SR相关的文件管理信任状,激活当前接收的配置文件;
    天线系统,还设置为按照所述当前接收的配置文件向目的SM-SR发送接入请求消息;接收目的SM-SR发送的以所述目的SM-SR的私钥加密的与所述目的SM-SR对应的文件管理信任状以及SM-SR信任状;
    处理器,还设置为基于所述SM-SR信任状确定所述目的SM-SR是否合法,合法时与所述目的SM-SR进行数据交互。
  37. 根据权利要求36所述的智能卡,其中,所述天线系统,还设置为向所述目的SM-SR发送所述目的SM-SR所属的运营商网络所需文件的下载请求;接收所述目的SM-SR发送的所述目的SM-SR所属的运营商网络所需文件;并根据所述目的SM-SR所属的运营商网络所需文件向所述目的SM-SR所属的运营商网络发起接入请求。
  38. 一种用户签约数据管理安全路由,所述用户签约数据管理安全路由SM-SR包括:
    天线系统,设置为接收到针对嵌入式智能卡eUICC的切换请求;
    处理器,设置为对涉及eUICC与其他网元实体建立安全通信的信任状数据进行加密,确保所述信任状数据能够安全传送。
  39. 根据权利要求38所述的SM-SR,其中,所述信任状数据包括:
    设置为接入SM-SR的配置文件,所述配置文件用于连接预设的SM-SR,所述预设的SM-SR用于实现eUICC接入运营商网络所需要的文件的下载;
    与所述预设的SM-SR对应的文件安装信任状,以实现SM-SR与eUICC之间内部的文件、数据的下载。
  40. 根据权利要求38或39所述的SM-SR,其中,所述处理器,还设置为
    向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
    接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,向目的用户签约数据管理—数据准备SM-DP发送文件安装信任状及配置文件生成的请求消息;
    接收所述目的SM-DP发送的以文件安装信任状加密的配置文件,生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
    接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
    接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需文件的下载请求,将对应的文件向所述eUICC发送。
  41. 根据权利要求38或39所述的SM-SR,其中,所述处理器,还设置为
    向所述源SM-SR发送eUICC切换宿主SM-SR的请求;
    接收源SM-SR发送eUICC信任状、SM-SR信任状、文件安装信任状的信息,以文件安装信任状加密自身存储的配置文件;生成公钥、私钥密钥对,并将以文件安装信任状加密后的配置文件、所述公钥通过所述源SM-SR向所述eUICC发送;
    接收所述eUICC发送的接入请求,使用所述私钥对与所述目的SM-SR对应的文件管理信任状进行加密,并将将加密后的与所述目的SM-SR对应的文件管理信任状、SM-SR信任状向所述eUICC发送;
    接收所述eUICC发送的接入所述目的SM-SR所属运营商网络所需 文件的下载请求,将对应的文件向所述eUICC发送。
  42. 一种存储介质,所述存储介质包括存储的程序,其中,所述程序运行时执行上述权利要求1至20任一项中所述的方法。
PCT/CN2017/090814 2016-12-14 2017-06-29 智能卡的远程签约管理平台切换方法及装置、智能卡、sm-sr WO2018107723A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611154623.XA CN108235302A (zh) 2016-12-14 2016-12-14 智能卡的远程签约管理平台切换方法及装置、智能卡、sm-sr
CN201611154623.X 2016-12-14

Publications (1)

Publication Number Publication Date
WO2018107723A1 true WO2018107723A1 (zh) 2018-06-21

Family

ID=62557865

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/090814 WO2018107723A1 (zh) 2016-12-14 2017-06-29 智能卡的远程签约管理平台切换方法及装置、智能卡、sm-sr

Country Status (2)

Country Link
CN (1) CN108235302A (zh)
WO (1) WO2018107723A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112399526A (zh) * 2019-08-01 2021-02-23 华为技术有限公司 一种切换运营商网络的方法及电子设备

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109151806A (zh) * 2018-10-29 2019-01-04 江苏恒宝智能系统技术有限公司 一种更新入网参数的方法
CN110536284B (zh) * 2019-07-03 2020-09-01 深圳杰睿联科技有限公司 基于物联网的eSIM管理方法和系统
CN110248358B (zh) * 2019-07-03 2020-10-30 深圳杰睿联科技有限公司 基于物联网的eSIM管理方法和系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026149A (zh) * 2009-09-14 2011-04-20 中兴通讯股份有限公司 一种m2m设备归属网络运营商变更的方法和系统
CN103731823A (zh) * 2012-10-15 2014-04-16 华为终端有限公司 签约管理安全路由设备切换的方法及设备
CN103782568A (zh) * 2013-08-30 2014-05-07 华为终端有限公司 远程变更签约方法及其装置
WO2015080640A1 (en) * 2013-11-29 2015-06-04 Telefonaktiebolaget L M Ericsson (Publ) Method and corresponding apparatus, computer program product to validate an euicc subscription change

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105101158B (zh) * 2014-05-23 2019-01-11 华为技术有限公司 Profile切换方法、信号强度检测方法及设备
KR101975510B1 (ko) * 2014-05-23 2019-05-07 후아웨이 테크놀러지 컴퍼니 리미티드 Euicc 관리 방법, euicc, sm 플랫폼 및 시스템

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026149A (zh) * 2009-09-14 2011-04-20 中兴通讯股份有限公司 一种m2m设备归属网络运营商变更的方法和系统
CN103731823A (zh) * 2012-10-15 2014-04-16 华为终端有限公司 签约管理安全路由设备切换的方法及设备
CN103782568A (zh) * 2013-08-30 2014-05-07 华为终端有限公司 远程变更签约方法及其装置
WO2015080640A1 (en) * 2013-11-29 2015-06-04 Telefonaktiebolaget L M Ericsson (Publ) Method and corresponding apparatus, computer program product to validate an euicc subscription change

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112399526A (zh) * 2019-08-01 2021-02-23 华为技术有限公司 一种切换运营商网络的方法及电子设备

Also Published As

Publication number Publication date
CN108235302A (zh) 2018-06-29

Similar Documents

Publication Publication Date Title
EP3800909B1 (en) Remote management method, and device
EP3281436B1 (en) Method and apparatus for downloading a profile in a wireless communication system
US8578153B2 (en) Method and arrangement for provisioning and managing a device
KR102250685B1 (ko) eUICC(embedded Universal Integrated Circuit Card)를 위한 프로파일 설치 방법 및 장치
US9831903B1 (en) Update of a trusted name list
JP6033291B2 (ja) サービスアクセス認証方法およびシステム
WO2018107718A1 (zh) 智能卡的空中配号方法及装置
CN106961334B (zh) 控制器和附件之间的安全无线通信
KR20160101626A (ko) 이동통신 시스템의 단말에서 프로파일 수신을 위한 방법 및 장치
US10009760B2 (en) Providing network credentials
CN103731823A (zh) 签约管理安全路由设备切换的方法及设备
CN113286290A (zh) 用于群组设备的配置文件下载的方法和装置
WO2018107723A1 (zh) 智能卡的远程签约管理平台切换方法及装置、智能卡、sm-sr
JP2017500798A (ja) Euiccのためのセキュリティ制御方法およびeuicc
US20220398080A1 (en) METHOD FOR INTEROPERATING BETWEEN BUNDLE DOWNLOAD PROCESS AND eSIM PROFILE DOWNLOAD PROCESS BY SSP TERMINAL
KR20180093333A (ko) eSIM 접근 제어 방법 및 장치
KR20200048298A (ko) Ssp의 번들을 관리하는 방법 및 장치
WO2018209986A1 (zh) eUICC签约数据的下载方法及装置
KR102546972B1 (ko) 프로파일 원격관리 예외 처리 방법 및 장치
CN114631339A (zh) 无线通信系统中用于重新安装sim配置文件的方法和装置
CN109963275B (zh) 签约数据的发送方法、接收方法及签约数据的处理系统
US20230379685A1 (en) Apparatus and method for managing events in communication system
KR20190117302A (ko) eUICC 버전을 협상하는 방법 및 장치
CN116097636A (zh) 用于设备之间的链接或配置文件传输的装置和方法
JP7383693B2 (ja) プロファイル遠隔管理権限設定方法、その装置及びそのシステム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17880569

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17880569

Country of ref document: EP

Kind code of ref document: A1