WO2018129753A1 - 一种签约信息集的下载方法、装置以及相关设备 - Google Patents

一种签约信息集的下载方法、装置以及相关设备 Download PDF

Info

Publication number
WO2018129753A1
WO2018129753A1 PCT/CN2017/071317 CN2017071317W WO2018129753A1 WO 2018129753 A1 WO2018129753 A1 WO 2018129753A1 CN 2017071317 W CN2017071317 W CN 2017071317W WO 2018129753 A1 WO2018129753 A1 WO 2018129753A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
management server
digital signature
subscription management
lpa
Prior art date
Application number
PCT/CN2017/071317
Other languages
English (en)
French (fr)
Inventor
高林毅
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2017/071317 priority Critical patent/WO2018129753A1/zh
Priority to CN201780081853.4A priority patent/CN110121894B/zh
Publication of WO2018129753A1 publication Critical patent/WO2018129753A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a method, an apparatus, and a related device for downloading a subscription information set.
  • a profile is a collection of file structures, data, or applications that are configured into an embedded Universal Integrated Circuit Card (eUICC).
  • the terminal is configured with eUICC and a Local Profile Assistant (LPA).
  • the eUICC is a universal integrated circuit card that supports remote or local management profiles.
  • the LPA can download profiles from SM-DP+ and manage the profiles locally.
  • the eSight can send the terminal information to the LPA through the client, and the eUICC sends the terminal information to the LPA through the client, such as a browser, to log in to the operator's website.
  • the LPA sends the terminal information to the web server through the client.
  • the web server sends the SM-DP+ address of the storage profile to the LPA through the client, and the LPA downloads the required profile from the SM-DP+ corresponding to the SM-DP+ address.
  • the terminal information includes the eUICC identification information, the terminal identification information, and the like for identifying the sensitive information of the user.
  • the LPA sends the terminal information to the web server through the client. If the security level of the client is low, the terminal information is easily leaked, and the terminal information is reduced. Security; in order to improve the security of the terminal information, the client needs to have a higher authorization level, for example, the authorization of the signature of the terminal manufacturer, the security of the terminal information is limited by the security level or authorization level of the client, and does not have Wide applicability.
  • the embodiment of the invention discloses a method, a device and a related device for downloading a contract information set, which can improve the reliability of the second information without requiring the client to have a higher security level or authorization level.
  • an embodiment of the present invention provides a method for downloading a subscription information set.
  • the LPA may receive a first request sent by a client, where the first request may carry the first information and the first access path; the LPA will first information.
  • the LPA may send the second information and the first digital signature to the application server according to the first access path; the LPA receives the subscription management server address sent by the application server; and the LPA downloads the subscription information set according to the subscription management server address.
  • the LPA and the eUICC can be deployed in the terminal device, and the client device can also be run in the terminal device, and the user can log in to the application server through the client.
  • the LPA After receiving the first request sent by the client, the LPA sends the first information carried by the first request to the eUICC, where the eUICC calculates the first digital signature, and the eUICC sends the second information and the first digital signature to the LPA.
  • the LPA sends the second information and the first digital signature to the application server according to the first access path carried by the first request, and the application server sends the subscription management server address to the LPA when the first digital signature verification succeeds according to the second information, the LPA
  • the downloading of the subscription information set is performed according to the subscription management server address.
  • the LPA forwards the second information to the application server through the client, and the embodiment of the present invention can not require the client to have a higher security level. Or, in the case of an authorization level, the reliability of the second information is improved.
  • the first request may be a terminal information acquisition request, and the first access path may be a URL. Specifically, the address of the LPA connection application server.
  • the first request may carry the identifier information of the application server
  • the LPA may request the user to obtain the second application server corresponding to the identifier information before sending the second information and the first digital signature to the application server according to the first access path.
  • the information when determining that the user agrees to the application server corresponding to the identifier information to obtain the second information, the LPA may establish a communication connection with the application server through the first access path.
  • the first request may carry the identifier information of the application server
  • the LPA may receive the certificate of the application server sent by the application server according to the first access path, and the LPA may be used by the application server.
  • the certificate is verified, and the subject information in the certificate of the application server is the same as the identifier information.
  • the LPA may use the first information. Send to eUICC.
  • the first information may include a first random number generated by the application server and an event identifier of the download subscription information set.
  • the LPA receives the subscription management server address sent by the application server, and specifically: receiving the second request sent by the application server by using the client, and acquiring the subscription management server address from the application server according to the second request.
  • the LPA can receive the second request sent by the application server by using the client, the second request carries the second digital signature and the subscription management server address, and the second digital signature is calculated according to at least the subscription management server address, at least When the second digital signature verification is successful according to the subscription management server address, the LPA can download the subscription information set according to the subscription management server address.
  • the LPA receives the second request sent by the application server by using the client, and the second request may carry the second digital signature and the subscription management server address indication information, where the second digital signature is performed by the application server according to at least the subscription management server address indication information.
  • the calculated contract management server includes a first subscription management server and a second subscription management server.
  • the LPA may send the indication information to the eUICC according to the subscription management server address indication information.
  • the third request, and receiving the second subscription management server address sent by the eUICC sending a fourth request to the second subscription management server according to the second subscription management server address, and receiving the subscription management of the first subscription management server sent by the second subscription management server server address.
  • the LPA may receive the second request sent by the application server by using the client, the second request carries the second digital signature and the second subscription management server address of the second subscription management server, and the second digital signature is the application server at least according to the The second subscription management server address is calculated.
  • the subscription management server includes a first subscription management server and a second subscription management server.
  • the LPA successfully verifies the second digital signature according to at least the second subscription management server address
  • the second subscription may be performed according to the second subscription.
  • the management server address sends a fourth request to the second subscription management server, and receives the subscription management server address of the first subscription management server sent by the second subscription management server.
  • the LPA may generate a second random number and send a second random number to the application server, and the LPA may further receive a second random number and a third digital signature sent by the application server by using the client, where the third digital signature is an application server.
  • the LPA may use the second random number and the subscription management server.
  • the address and the third digital signature are sent to the eUICC, and the verification result sent by the eUICC according to the second random number and the subscription management server for verifying the third digital signature is received, and when the verification result indicates that the eUICC successfully verifies the third digital signature, the LPA
  • the subscription information set can be downloaded according to the subscription management server address.
  • the LPA may send a random number acquisition request to the eUICC, receive a third random number generated by the eUICC, send the third random number to the application server, and receive a fourth digital signature generated by the application server, where the fourth digital signature is an application.
  • the server calculates the at least the third random number, and the LPA may send the fourth digital signature and the first information to the eUICC, and then receive the first digital signature sent by the eUICC.
  • the embodiment of the present invention provides a method for downloading a subscription information set, where the application server may receive the second information and the first digital signature sent by the LPA according to the first access path, where the first digital signature is performed according to the second information. Calculated, the application server verifies the first digital signature according to the second information. When the first digital signature verification succeeds according to the second information, the application server may send the subscription management server address to the LPA, and the subscription management server address is used for the LPA. Download the contract information set.
  • the communication connection with the LPA may be established, and the certificate is sent to the LPA through a communication connection with the LPA.
  • the application server sends the subscription management server address to the LPA, where the client sends a second request to the LPA, and sends the subscription management server address to the LPA.
  • the application server may further calculate a second digital signature according to at least the subscription management server address, and send, by the client, a second request to the LPA, where the second request carries the second digital signature and the subscription management server address.
  • the application server may further generate a second digital signature according to the at least the subscription management server address indication information, and send a second request to the LPA through the client, where the second request may carry the second digital signature and the subscription management server address indication information.
  • the application server may further calculate, according to the second subscription management server address of the second subscription management server, a second digital signature, where the second request is sent by the client, and the second request may carry the second digital signature and The second subscription management server address.
  • the application server may further receive the second random number sent by the LPA, calculate a third digital signature according to the at least the second random number and the subscription management server address, and send the second random number and the third digital signature by using the client. Give the LPA.
  • the application server may further receive the third random number sent by the LPA, calculate the fourth digital signature according to the at least the third random number, and send the fourth digital signature to the LPA.
  • the application server may obtain the eUICC information according to the second information.
  • the included event identifier of the download subscription information set associates the eUICC information to the first request sent by the client.
  • the method for downloading the subscription information set described in the second aspect may be applied to the application server, where the LPA may be deployed in the terminal device, and the terminal device runs the client, and the user may log in to the application server through the client.
  • an embodiment of the present invention provides a computer storage medium, where the computer storage medium stores a program, and the program includes all or part of a download method of the subscription information set provided by the first aspect of the embodiment of the present invention. step.
  • an embodiment of the present invention provides a computer storage medium, where the computer storage medium stores a program.
  • the program execution includes all or part of the steps of the downloading method of the subscription information set provided by the second aspect of the embodiment of the present invention.
  • an embodiment of the present invention provides a downloading device for a contract information set, where the downloading device includes a unit for executing a downloading method of the contract information set disclosed in the first aspect of the embodiment of the present invention.
  • an embodiment of the present invention provides a terminal device, including: a processor, a memory, and a transceiver, wherein the memory stores a set of program codes, and the processor calls the program code stored in the memory, and is configured to execute the following: Operation: receiving a first request sent by the client, where the first request carries the first information and the first access path; sending the first information to the eUICC; receiving the second information sent by the eUICC and the first digital signature, where the first digital signature is Calculating, according to the second information, the second information includes the first information and the eUICC information; sending, according to the first access path, the second information and the first digital signature to the application server; receiving the subscription management server address sent by the application server; The subscription management server address downloads the subscription information set.
  • an embodiment of the present invention provides a downloading device for a contract information set, where the downloading device includes a unit for executing a downloading method of the contract information set disclosed in the second aspect of the embodiment of the present invention.
  • an embodiment of the present invention provides an application server, including: a processor, a memory, and a transceiver, wherein the memory stores a set of program codes, and the processor calls the program code stored in the memory, and is configured to execute the following: Operation: receiving, by the LPA, the second information and the first digital signature sent according to the first access path, where the first digital signature is calculated according to the second information; and the first digital signature is verified according to the second information; When the information is successfully verified by the first digital signature, the subscription management server address is sent to the LPA, and the subscription management server address is used by the LPA to download the subscription information set.
  • FIG. 1 is a schematic structural diagram of a download system of a subscription information set disclosed in an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a method for downloading a subscription information set according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart of a method for downloading a subscription information set according to another embodiment of the present invention.
  • FIG. 4 is a schematic flowchart of a method for downloading a subscription information set according to another embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of a method for downloading a subscription information set according to another embodiment of the present invention.
  • FIG. 6 is a schematic flowchart of a method for downloading a subscription information set according to another embodiment of the present invention.
  • FIG. 7 is a schematic diagram showing the result of a device for downloading a subscription information set according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a terminal device according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of a terminal device according to another embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of an application server according to an embodiment of the present invention.
  • FIG. 1 is a schematic structural diagram of a system for downloading a subscription information set according to an embodiment of the present invention.
  • the download system of the subscription information set may include a terminal device Device, an SM-DP+, an operator, and a user. (End User).
  • the terminal device may be configured with an eUICC and an LPA.
  • eUICC is a Universal Integrated Circuit Card (UICC) that supports remote or local management profiles.
  • the eUICC can support downloading profiles from the SM-DP+ to the eUICC, and can support local management of the profile through the LPA, or remote management of the eUICC through the SM-DP+.
  • the profile is a collection of the file structure, data, and application information in the eUICC. When the profile is in the active state, the eUICC functions the same as the traditional UICC and can be used to access the corresponding mobile network operator (Mobile Network). Operator, MNO) network.
  • Mobile Network Mobile Network
  • MNO mobile network operator
  • the LPA may include a local discovery service (LDS), a local profile download (LPD), and a local user interface (LUI), and the LDS may be responsible for an event query, ie, Query the event to the SM-DS; the LPD can download the profile, that is, the LPD downloads the profile from the SM-DP+ to the LPD through the Hyper Text Transfer Protocol over Secure Socket Layer (HTTPS), and then passes the local application.
  • the protocol data unit (APDU) command sends the downloaded profile to the eUICC.
  • the LPD can also obtain the remote management command from the SM-DP+ and pass the command to the eUICC to implement remote management of the eUICC and the profile.
  • the interaction logic and interface between the user and the user can complete local management of the profile through the LUI, such as downloading a new profile, activating a profile, activating a profile, and deleting a profile.
  • the functions of the SM-DP+ may include generating a profile, encrypting a profile, storing a profile, binding a profile and securely downloading a profile to a terminal device, remotely managing an eUICC or profile, and performing event registration or deletion to the SM-DS.
  • the downloading system of the subscription information set may further include a subscription management-discovery server (SM-DS), and the SM-DS may be responsible for receiving the event registration sent by the SM-DP+, and sending the event to the terminal device.
  • the event may include a profile download event or a profile management event, that is, the presence profile waits for the terminal device to download from the SM-DP+, or the profile management command waits for the terminal device to acquire from the SM-DP+.
  • the downloading system of the contract information set may further include an EUM or a Certificate Issuer (CI), and the EUM may be used to issue an EUM certificate to the terminal device, where the CI may be used to issue an application server to the Operator. (MNO portal) certificate.
  • EUM may be used to issue an EUM certificate to the terminal device, where the CI may be used to issue an application server to the Operator. (MNO portal) certificate.
  • MNO portal Operator.
  • FIG. 2 is a method for downloading a subscription information set according to an embodiment of the present invention, where the method includes but is not limited to the following steps:
  • Step S201 The APP sends a profile download request to the MNO portal.
  • the user can log in to the MNO portal using the App, for example, log in to the MNO portal using the MNO App, or log in to the MNO portal using a browser.
  • the APP can send a profile download request to the MNO portal.
  • Step S202 The MNO portal sends a terminal information acquisition request to the APP, where the terminal information acquisition request carries a URL, an MNO challenge, and a transaction id.
  • the MNO portal may generate an event identifier transaction id corresponding to the profile download event, and a random number MNO challenge, and the MNO portal may send a terminal information acquisition request to the APP.
  • the terminal information obtaining request may carry a Uniform Resource Locator (URL), an MNO challenge, and a transaction id.
  • the URL can be the address of the LPA connection to the MNO portal.
  • the terminal information obtaining request sent by the MNO portal to the APP may further carry the carrier identifier MNO name.
  • the MNO name can be "China Mobile”.
  • Step S203 The APP sends the URL, the MNO challenge, and the transaction id to the LPA.
  • the APP may send the terminal information acquisition request to the LPA through the application programming interface (API) of the APP for acquiring the terminal information, and acquire the terminal information.
  • the request can carry a URL, an MNO challenge, and a transaction id.
  • the APP can transfer information between the two APIs of the get Device Info and the trigger download and the LPA.
  • the APP can send a terminal information acquisition request to the LPA through the get Device Info API.
  • the LPA may prompt the user [MNO name] to obtain the terminal information, request the user to agree, and the LPA may establish a connection with the MNO portal by using the URL after the user agrees.
  • the LPA can obtain the MNOportal certificate through the connection with the MNO portal, and authenticate the MNOportal certificate to the certificate issued by the GSMA, and determine that the subject name (subject field) and the MNO name in the MNOportal certificate are consistent.
  • the certificate of the portal is a certificate issued by the GSMA
  • the certificate of the MNOportal is obtained by digitally signing the certificate issuer and the certificate receiver according to the private key of the GSMA CI.
  • the LPA can obtain the public key of the GSMA CI to authenticate the certificate issued by MNOportal to the GSMA CI.
  • Step S204 The LPA sends the MNO challenge and the transaction id to the eUICC.
  • the LPA can also send device info to the eUICC.
  • Step S205 The eUICC generates an eUICC signature according to the transaction id, the eUICC info, and the MNO challenge.
  • the eUICC may perform a hash operation on the transaction id, the eUICC info, and the MNO challenge to obtain a hash operation result, and encrypt the hash operation result according to the private key of the eUICC to obtain an eUICC signature.
  • the eUICC may hash the transaction id, device info, eUICC info, and MNO challenge to obtain a hash operation result according to the private key of the eUICC.
  • the hash operation result is encrypted to obtain an eUICC signature.
  • Step S206 The eUICC sends the transaction id, the eUICC info, the MNO challenge, the eUICC signature, the eUICC certificate, and the EUM certificate to the LPA.
  • the eUICC certificate and the EUM certificate may be configured by the EUM to the eUICC before the terminal device leaves the factory.
  • the eUICC may send the transaction id, device info, eUICC info, MNO challenge, eUICC signature, eUICC certificate, and EUM.
  • the certificate is sent to the LPA.
  • Step S207 The LPA sends the transaction id, the eUICC info, the MNO challenge, the eUICC signature, the eUICC certificate, and the EUM certificate to the MNO portal.
  • the LPA may send the transaction id, device info, eUICC info, MNO challenge, eUICC signature, eUICC certificate, and EUM certificate to the LPA.
  • the LPA may send the transaction id, device info, eUICC info, MNO challenge, eUICC signature, The eUICC certificate and the EUM certificate are sent to the MNO portal.
  • Step S208 The MNO portal verifies the eUICC certificate, the EUM certificate, and the eUICC signature. If they are all correct, the eUICC info is associated with the profile download request initiated by the APP by using the transaction id.
  • the MNO portal can verify the eUICC certificate, the EUM certificate, and the eUICC signature. If all are correct, the MNO portal can obtain the eUICC info and associate the eUICC info to the APP-initiated profile download request by using the transaction id. If the eUICC certificate, the EUM certificate, or the eUICC signature is incorrect, or the MNO portal cannot identify the transaction id sent by the LPA, the MNO portal may send an error to the LPA to prompt the LPA verification to fail, ending the process.
  • the MNO portal can send the transaction id, the next URL, and the token token to the LPA.
  • the next URL is the address where the APP connects to the MNO portal for the next service, and the token is the random number generated by the MNO portal.
  • the method for verifying the eUICC signature by the MNO portal may be: the MNO portal hashes the transaction id, the eUICC info, and the MNO challenge, obtains a hash operation result, and decrypts the eUICC signature according to the public key of the eUICC, and decrypts the obtained
  • the MNO portal can determine that the eUICC signature verification is successful.
  • the manner in which the MNO portal identifies the transaction id sent by the LPA may be: when the transaction id is stored locally in the MNO portal, the MNO portal can identify the transaction id; when the transaction id is not stored locally in the MNO portal, the MNO portal The transaction id was not recognized.
  • the MNO portal can verify the eUICC certificate, the EUM certificate, and the eUICC signature, if all are correct, then The MNO portal can obtain device info and eUICC info, and associate the device info and eUICC info to the profile download request initiated by the APP by using the transaction id.
  • the method for verifying the eUICC signature by the MNO portal may be: the MNO portal hashes the transaction id, device info, eUICC info, and MNO challenge, obtains a hash operation result, and decrypts the eUICC signature according to the public key of the eUICC. When the decrypted information is consistent with the hashing result described above, the MNO portal may determine that the eUICC signature verification is successful.
  • the LPA may return a response to the terminal information, where the response may carry a transaction id, an next URL, and a token.
  • the App can connect to the MNO portal using the next URL, and MNOportal verifies the token sent by the App. If it is valid, the user is allowed to interact with the package selection.
  • the MNO portal may send a profile subscription request to the SM-DP+.
  • the SM-DP+ address and the Matching ID may be sent to the MNO portal.
  • the Matching ID may be a credential for downloading the profile.
  • the Matching ID may be information indicating a download profile or a null value.
  • Step S209 The MNO portal sends a trigger download request to the APP, and triggers the download request to carry a transaction id.
  • Step S210 The APP sends a trigger download request to the LPA.
  • the APP may send the trigger download request to the LPA through the APP for sending an API that triggers the download request.
  • the APP can send a trigger download request to the LPA through the trigger Download API.
  • Step S211 The LPA establishes a connection with the MNO portal and acquires the SM-DP+ address through a connection with the MNO portal.
  • the LPA may establish a connection with the MNO portal, and obtain an SM-DP+ address through a connection with the MNO portal, where the connection established by the LPA with the MNO portal may be combined with step S203.
  • the connection established by the LPA with the URL is the same as the connection of the MNO portal, that is, the connection manner of the LPA and the MNO portal in step S211 is the same as the connection manner of the LPA and the MNO portal in step S203.
  • the LPA may request the MNO portal to obtain the SM-DP+ address and the Matching ID, and the request may carry the transaction id, and the MNO portal may send the SM-DP+ address and the Matching ID according to the transaction id.
  • the LPA may request the MNO portal to obtain the SM-DP+ address and the Matching ID, and the request may carry the transaction id, and the MNO portal may send the SM-DP+ address and the Matching ID according to the transaction id.
  • the LPA may request the MNO portal to obtain the SM-DP+ address and the Matching ID, and the request may carry the transaction id, and the MNO portal may send the SM-DP+ address and the Matching ID according to the transaction id.
  • Step S212 The LPA downloads the profile from the SM-DP+ according to the SM-DP+ address.
  • the LPA can request the user to agree to download the profile. After the user agrees, the LPA can download the profile from the SM-DP+ by using the SM-DP+ address and the Matching ID.
  • the APP only provides the necessary information for the interaction between the LPA and the MNO portal.
  • the terminal information such as device info, eUICC info and the like is directly sent by the LPA to the MNO portal, and is not transmitted by the APP, and is not dependent.
  • the authorization level of the APP the security of the terminal information is improved, and the versatility of the download profile process is also improved.
  • FIG. 3 illustrates a method for downloading a subscription information set according to another embodiment of the present invention, where the method includes but is not limited to the following steps:
  • Step S301 The APP sends a profile download request to the MNO portal.
  • step S301 reference may be made to step S201, which is not repeatedly described in the embodiment of the present invention.
  • Step S302 The MNO portal sends a terminal information acquisition request to the APP, where the terminal information acquisition request carries a URL, an MNO challenge, and a transaction id.
  • step S302 reference may be made to step S202, which is not repeatedly described in the embodiment of the present invention.
  • Step S303 The APP sends the URL, the MNO challenge, and the transaction id to the LPA.
  • step S303 reference may be made to step S203, which is not described in detail in the embodiment of the present invention.
  • Step S304 The LPA sends the MNO challenge and the transaction id to the eUICC.
  • step S304 reference may be made to step S204, which is not repeatedly described in the embodiment of the present invention.
  • Step S305 The eUICC generates an eUICC signature according to the transaction id, the eUICC info, and the MNO challenge.
  • step S305 reference may be made to step S205, which is not described in detail in the embodiment of the present invention.
  • Step S306 The eUICC sends the transaction id, the eUICC info, the MNO challenge, the eUICC signature, the eUICC certificate, and the EUM certificate to the LPA.
  • step S306 reference may be made to step S206, which is not repeatedly described in the embodiment of the present invention.
  • Step S307 The LPA sends the transaction id, the eUICC info, the MNO challenge, the LPA challenge, the eUICC signature, the eUICC certificate, and the EUM certificate to the MNO portal.
  • the LPA may generate an LPA challenge and send the transaction id, eUICC info, MNO challenge, LPA challenge, eUICC signature, eUICC certificate, and EUM certificate to the MNO portal.
  • Step S308 The MNO portal verifies the eUICC certificate, the EUM certificate, and the eUICC signature. If they are all correct, the eUICC info is associated with the profile download request initiated by the APP by using the transaction id.
  • step S308 reference may be made to step S208, which is not described in detail in the embodiment of the present invention.
  • Step S309 The MNO portal sends a profile subscription request to the SM-DP+.
  • Step S310 The SM-DP+ sends the SM-DP+ address and the Matching ID to the MNO portal.
  • the SM-DP+ address and the Matching ID may be sent to the MNO portal.
  • Step S311 The MNO portal sends a trigger download request to the APP, and triggers the download request to carry the transaction id, the SM-DP+ address, the LPA challenge, and the signature of the MNO portal.
  • the MNO portal may hash the transaction id, the SM-DP+ address, and the LPA challenge to obtain a hash operation result, and encrypt the hash operation result according to the private key of the MNO portal to obtain the MNO portal signature, and the transaction
  • the id, SM-DP+ address, LPA challenge, and MNO portal signature are sent to the APP.
  • the trigger download request may also carry the certificate of the MNO portal.
  • Step S312 The APP sends a trigger download request to the LPA.
  • Step S313 The LPA verifies the MNO portal signature, and if valid, downloads the profile from the SM-DP+ according to the SM-DP+ address.
  • the LPA may hash the transaction id, the SM-DP+ address, and the LPA challenge, obtain a hash operation result, obtain the public key of the MNO portal, and decrypt the MNO portal signature according to the public key of the MNO portal, when decrypting
  • the LPA may request the user to agree to download the profile. After the user agrees, the LPA may download the profile from the SM-DP+ according to the SM-DP+ address.
  • the LPA can verify that the MNO portal signature is valid, the certificate of the authenticated MNOportal is a certificate issued by the GSMA, and determine the subject name (subject field) and the MNO in the MNOportal certificate. The name is the same, and the user is requested to agree to download the profile. After the user agrees, the LPA can download the profile from the SM-DP+ according to the SM-DP+ address.
  • the MNO portal signature and the SM-DP+ address can be directly transmitted to the LPA through the APP, and the LPA verifies that the MNO portal signature is valid and then downloads from the SM-DP+ according to the SM-DP+ address.
  • the profile does not require the LPA to establish a connection with the Portal again to obtain the SM-DP+ address, which improves the SM-DP+ address acquisition efficiency.
  • FIG. 4 is a method for downloading a subscription information set according to another embodiment of the present invention, where the method includes but is not limited to the following steps:
  • Step S401 The APP sends a profile download request to the MNO portal.
  • step S401 reference may be made to step S301, which is not described in detail in the embodiment of the present invention.
  • Step S402 The MNO portal sends a terminal information acquisition request to the APP, where the terminal information acquisition request carries the URL, MNO challenge and transaction id.
  • step S402 reference may be made to step S302, which is not repeatedly described in the embodiment of the present invention.
  • Step S403 The APP sends the URL, the MNO challenge, and the transaction id to the LPA.
  • step S403 reference may be made to step S303, which is not repeatedly described in the embodiment of the present invention.
  • Step S404 The LPA sends the MNO challenge and the transaction id to the eUICC.
  • step S404 reference may be made to step S304, which is not repeatedly described in the embodiment of the present invention.
  • Step S405 The eUICC generates an eUICC signature according to the transaction id, the eUICC info, and the MNO challenge.
  • step S405 reference may be made to step S305, which is not repeatedly described in the embodiment of the present invention.
  • Step S406 The eUICC sends the transaction id, the eUICC info, the MNO challenge, the eUICC signature, the eUICC certificate, and the EUM certificate to the LPA.
  • step S406 reference may be made to step S306, which is not described in detail in the embodiment of the present invention.
  • Step S407 The LPA sends the transaction id, the eUICC info, the MNO challenge, the LPA challenge, the eUICC signature, the eUICC certificate, and the EUM certificate to the MNO portal.
  • step S407 reference may be made to step S307, which is not repeatedly described in the embodiment of the present invention.
  • Step S408 The MNO portal verifies the eUICC certificate, the EUM certificate, and the eUICC signature. If they are all correct, the eUICC info is associated with the profile download request initiated by the APP by using the transaction id.
  • step S408 reference may be made to step S308, which is not repeatedly described in the embodiment of the present invention.
  • Step S409 The MNO portal sends a profile subscription request to the SM-DP+.
  • the MNO portal may send a profile subscription request to the SM-DP+ and instruct the SM-DP+ to register with the SM-DS, and the SM-DS may be a Root SM-DS or an alternative SM-DS.
  • Step S410 The SM-DP+ notifies the MNO portal that a profile has been generated.
  • the SM-DP+ can generate a profile, thereby registering the event in the SM-DS, and notifying the MNO portal that the profile has been generated.
  • the SM-DS can save the event record event record, and the event record can include the address of the SM-DP+.
  • Step S411 The MNO portal sends a trigger download request to the APP, and triggers the download request to carry a transaction id, an SM-DP+ address, an LPA challenge, and an MNO portal signature.
  • the MNO portal may hash the transaction id, the SM-DP+ address, and the LPA challenge to obtain a hash operation result, and encrypt the hash operation result according to the private key of the MNO portal to obtain the MNO portal signature, and the transaction
  • the id, SM-DP+ address, LPA challenge, and MNO portal signature are sent to the APP.
  • the MNO portal may hash the transaction id, the SM-DS address, and the LPA challenge, obtain a hash operation result, and encrypt the hash operation result according to the private key of the MNO portal to obtain the MNO portal signature, and
  • the transaction id, SM-DS address, LPA challenge, and MNO portal signature are sent to the APP.
  • the MNO portal may perform a hash operation on the transaction id, the root SM-DS indication information, and the LPA challenge, obtain a hash operation result, and encrypt the hash operation result according to the private key of the MNO portal to obtain the MNO portal signature.
  • the transaction id, root SM-DS indication, LPA challenge, and MNO portal The signature is sent to the APP.
  • the root SM-DS indication information is used to instruct the LPA to obtain a root SM-DS address from the eUICC.
  • Step S412 The APP sends a trigger download request to the LPA.
  • Step S413 The LPA verifies the MNO portal signature, and if valid, downloads the profile from the SM-DP+ according to the SM-DP+ address.
  • the LPA may hash the transaction id, the SM-DP+ address, and the LPA challenge, obtain a hash operation result, obtain the public key of the MNO portal, decrypt the MNO portal signature according to the public key of the MNO portal, and decrypt the obtained message.
  • the LPA can request the user to agree to download the profile. After the user agrees, the LPA can download the profile from the SM-DP+ according to the SM-DP+ address.
  • the LPA may hash the transaction id, the SM-DS address, and the LPA challenge, obtain a hash result, obtain the public key of the MNO portal, and decrypt the MNO portal signature according to the public key of the MNO portal, when decrypting
  • the LPA can request the user to agree to download the profile.
  • the LPA can obtain the event record in the SM-DS according to the SM-DS address, and obtain the SM-DP+ included in the event record. Address, download the profile from SM-DP+ according to the SM-DP+ address.
  • the LPA may hash the transaction id, the root SM-DS indication information, and the LPA challenge, obtain a hash operation result, obtain the public key of the MNO portal, and decrypt the MNO portal signature according to the public key of the MNO portal.
  • the LPA may request the user to agree to download the profile.
  • the LPA may obtain the root SM-DS address from the eUICC, according to the root SM-DS address in the root SM-DS.
  • the eUICC pre-stores the root SM-DS address.
  • the MNO portal does not need to send the SM-DP+ address to the LPA through the APP, and the LPA can obtain the SM-DS in the SM-DS according to the SM-DS address or root SM-DS indication information forwarded by the MNO portal through the APP.
  • the SM-DP+ address which in turn downloads the profile from the SM-DP+ based on the SM-DP+ address.
  • FIG. 5 is a method for downloading a subscription information set according to another embodiment of the present invention, where the method includes but is not limited to the following steps:
  • Step S501 The APP sends a profile download request to the MNO portal.
  • step S501 reference may be made to step S201, which is not repeatedly described in the embodiment of the present invention.
  • Step S502 The MNO portal sends a terminal information acquisition request to the APP, where the terminal information acquisition request carries the URL and the transaction id.
  • the MNO portal may generate an event identifier transaction id corresponding to the profile download event, and the MNO portal may send a terminal information acquisition request to the APP.
  • the terminal information obtaining request may carry a URL and a transaction id.
  • the URL can be the address of the LPA connection to the MNO portal.
  • the terminal information obtaining request sent by the MNO portal to the APP may further carry the MNO name.
  • the MNO name can be "China Mobile".
  • Step S503 The APP sends the URL and the transaction id to the LPA.
  • the APP may send the terminal information acquisition request to the LPA through the API for acquiring the terminal information, and the terminal information acquisition request may carry the URL. And the transaction id.
  • the APP may send a terminal information acquisition request to the LPA through the get Device Info API.
  • the LPA may prompt the user [MNO name] to acquire the terminal information, request the user to agree, and the LPA may request the eUICC to obtain the eUICC challenge after the user agrees.
  • Step S504 The LPA acquires the eUICC challeng generated by the eUICC.
  • the LPA can obtain the eUICC challeng generated by the eUICC, establish a connection with the MNO portal by using the URL, and authenticate the certificate of the portal to the certificate issued by the GSMA CI, and determine that the subject name (subject field) and the MNO name in the portal certificate are consistent.
  • the certificate of the portal is a certificate issued by the GSMA
  • the certificate of the MNOportal is obtained by digitally signing the certificate issuer and the certificate receiver according to the private key of the GSMA CI.
  • the LPA can obtain the public key of the GSMA CI to authenticate the certificate issued by MNOportal to the GSMA CI.
  • Step S505 The LPA sends the eUICC challenge and the transaction id to the MNO portal.
  • Step S506 The MNO portal sends the transaction id, the eUICC challenge, the MNO challenge, the MNO portal signature, and the MNO certificate to the LPA.
  • the MNO portal may generate an MNO challenge, hash the eUICC challenge and the MNO challenge to obtain a hash operation result, and perform the hash operation according to the private key of the MNO portal.
  • the result is encrypted to get the MNO portal signature, and the transaction id, eUICC challenge, MNO challenge, MNO portal signature, and MNO certificate are sent to the LPA.
  • Step S507 The LPA sends the transaction id, the eUICC challenge, the MNO challenge, the MNO portal signature, and the MNO certificate to the eUICC.
  • the LPA may send the device info, the MNO name, the transaction id, the eUICC challenge, the MNO challenge, the MNO portal signature, and the MNO certificate to the eUICC.
  • Step S508 The eUICC verifies the MNO portal signature and the MNO certificate. If yes, the transaction id, the eUICC info, the MNO challenge, the eUICC signature, the eUICC certificate, and the EUM certificate are sent to the LPA.
  • the eUICC verifies the MNO portal signature and the MNO certificate, and authenticates the MNOportal certificate as a certificate issued by the GSMA CI, and determines that the subject name (subject field) and the MNO name in the MNOportal certificate are consistent. If correct, the eUICC may be based on the private of the eUICC.
  • the key is encrypted by the transaction id, eUICC info, and MNO challenge to obtain the eUICC signature, and then the transaction id, eUICC info, MNO challenge, eUICC signature, eUICC certificate, and EUM certificate are sent to the LPA.
  • the eUICC may be based on the eUICC private
  • the key is encrypted by the transaction id, device info, eUICC info, and MNO challenge to obtain the eUICC signature, and then the transaction id, device info, eUICC info, MNO challenge, eUICC signature, eUICC certificate, and EUM certificate are sent to the LPA.
  • Step S509 The LPA sends the transaction id, the eUICC info, the MNO challenge, the LPA challenge, the eUICC signature, the eUICC certificate, and the EUM certificate to the MNO portal.
  • eUICC will transaction id, eUICC info, MNO challenge, eUICC signature, eUICC
  • the LPA can generate an LPA challenge and send the transaction id, eUICC info, MNO challenge, LPA challenge, eUICC signature, eUICC certificate, and EUM certificate to the MNO portal.
  • the LPA can generate an LPA challenge, and the transaction id, device info, eUICC info, MNO challenge
  • the LPA challenge, the eUICC signature, the eUICC certificate, and the EUM certificate are sent to the MNO portal.
  • Step S510 The MNO portal verifies the eUICC certificate, the EUM certificate, and the eUICC signature. If they are all correct, the eUICC info is associated with the profile download request initiated by the APP by using the transaction id.
  • step S510 reference may be made to step S208, which is not described in detail in the embodiment of the present invention.
  • Step S511 The MNO portal sends a profile subscription request to the SM-DP+.
  • the MNO portal may send a profile subscription request to the SM-DP+, and the SM-DP+ may generate a profile, and the SM-DP+ may register the profile download event with the SM-DS.
  • Step S512 The SM-DP+ sends a response message to the MNO portal.
  • the SM-DP+ may send response information to the MNO portal, and the response information is used to indicate that the SM-DP+ has generated a profile.
  • the SM-DP+ may send a response message to the MNO portal, where the response information includes an SM-DP+ address.
  • Step S513 The MNO portal sends a trigger download request to the APP, and triggers the download request to carry the transaction id, the SM-DP+ address, the LPA challenge, and the signature of the MNO portal.
  • the MNO portal pre-stores the SM-DP+ address, and when the MNO portal receives the response information sent by the SM-DP+ to indicate that the SM-DP+ has generated the profile, the MNO portal may obtain the SM-DP+ address locally.
  • the MNO portal can also hash the transaction id, the SM-DP+ address, and the LPA challenge to obtain a hash result, and encrypt the hash result according to the private key of the MNO portal to obtain the signature of the MNO portal, and the transaction id, SM
  • the signature of the -DP+ address, the LPA challenge, and the MNO portal is sent to the APP.
  • the MNO portal may send the transaction id, the SM-DP+ address, the LPA challenge, the signature of the MNO portal, and the MNO certificate to the APP.
  • the MNO portal may hash the transaction id, the SM-DP+ address, and the LPA challenge to obtain a hash operation result, according to the MNO portal.
  • the private key encrypts the result of the hash operation to obtain the signature of the MNO portal, and sends the transaction id, the SM-DP+ address, the LPA challenge, and the signature of the MNO portal to the APP.
  • the MNO portal may send the transaction id, the SM-DP+ address, the LPA challenge, the signature of the MNO portal, and the MNO certificate to the APP.
  • the MNO portal may hash the transaction id, the SM-DS address, and the LPA challenge to obtain a hash operation result, and encrypt the hash operation result according to the private key of the MNO portal to obtain an MNO signature, and the transaction id
  • the SM-DS address, the LPA challenge, and the signature of the MNO portal are sent to the APP.
  • the MNO portal may perform a hash operation on the transaction id, the root SM-DS indication information, and the LPA challenge to obtain a hash operation result, and encrypt the hash operation result according to the private key of the MNO portal.
  • the MNO is signed and the transaction id, the root SM-DS indication information, the LPA challenge, and the signature of the MNO portal are sent to the APP.
  • the root SM-DS indication information is used to instruct the LPA to obtain the SM-DP+ address from the root SM-DS.
  • Step S514 The APP sends a trigger download request to the LPA.
  • Step S515 The LPA challenge triggered by the LPA verification trigger download request is consistent with the generated LPA challenge, and the transaction id, the SM-DP+ address, the LPA challenge, and the signature of the MNO portal are sent to the eUICC.
  • the user may be requested to agree to download the profile.
  • the LPA may send the transaction id, the SM-DP+ address, the LPA challenge, and the signature of the MNO portal. Give eUICC.
  • Step S516 The eUICC verifies the signature of the MNO portal, and sends the verification result to the LPA.
  • the eUICC may perform a hash operation on the transaction id, the SM-DP+ address, and the LPA challenge to obtain a hash operation result, obtain the public key of the MNO portal, and decrypt the signature of the MNO portal according to the public key of the MNO portal, and decrypt the obtained message.
  • the eUICC may send the verification result to the LPA.
  • the eUICC may perform a hash operation on the transaction id, the SM-DS address, and the LPA challenge to obtain a hash operation result, obtain the public key of the MNO portal, and decrypt the signature of the MNO portal according to the public key of the MNO portal, when decrypting
  • the eUICC may send the verification result to the LPA.
  • the eUICC may perform a hash operation on the transaction id, the root SM-DS indication information, and the LPA challenge to obtain a hash operation result, obtain the public key of the MNO portal, and decrypt the signature of the MNO portal according to the public key of the MNO portal.
  • the eUICC may send the verification result to the LPA.
  • Step S517 The LPA downloads the profile from the SM-DP+ according to the SM-DP+ address.
  • the LPA can download the profile from the SM-DP+ according to the SM-DP+ address.
  • the LPA can obtain the SM-DP+ address in the SM-DS according to the SM-DS address, and download the profile from the SM-DP+ according to the SM-DP+ address.
  • the LPA can obtain the root SM-DS address from the eUICC according to the root SM-DS indication, and obtain the information in the SM-DS according to the root SM-DS address.
  • the SM-DP+ address downloads the profile from the SM-DP+ based on the SM-DP+ address.
  • the eUICC pre-stores the root SM-DS address.
  • the LPA authenticates the portal certificate, and the eUICC verifies the signature of the MNO portal, which improves the security during the profile download process.
  • FIG. 6 is a method for downloading a subscription information set according to another embodiment of the present invention, where the method includes but is not limited to the following steps:
  • Step S601 The APP sends a profile download request to the MNO portal.
  • step S601 reference may be made to step S501, which is not repeatedly described in the embodiment of the present invention.
  • Step S602 The MNO portal sends a terminal information acquisition request to the APP, and the terminal information acquisition request carries the URL. And the transaction id.
  • step S602 reference may be made to step S502, which is not repeatedly described in the embodiment of the present invention.
  • Step S603 The APP sends the URL and the transaction id to the LPA.
  • step S603 reference may be made to step S503, which is not described in detail in the embodiment of the present invention.
  • Step S604 The LPA acquires the eUICC challeng generated by the eUICC.
  • step S604 reference may be made to step S504, which is not repeatedly described in the embodiment of the present invention.
  • Step S605 The LPA sends the eUICC challenge and the transaction id to the MNO portal.
  • Step S606 The MNO portal sends the transaction id, the eUICC challenge, the MNO challenge, the signature of the MNO portal, and the MNO certificate to the LPA.
  • step S606 reference may be made to step S506, which is not repeatedly described in the embodiment of the present invention.
  • Step S607 The LPA sends the transaction id, the eUICC challenge, the MNO challenge, the signature of the MNO portal, and the MNO certificate to the eUICC.
  • step S607 reference may be made to step S507, which is not described in detail in the embodiment of the present invention.
  • Step S608 The eUICC verifies the signature of the MNO portal and the MNO certificate. If correct, the transaction id, device info, eUICC info, MNO challenge, eUICC signature, eUICC certificate, and EUM certificate are sent to the LPA.
  • step S608 reference may be made to step S508, which is not described in detail in the embodiment of the present invention.
  • Step S609 The LPA sends the transaction id, the eUICC info, the MNO challenge, the LPA challenge, the eUICC signature, the eUICC certificate, and the EUM certificate to the MNO portal.
  • step S609 reference may be made to step S509, which is not repeatedly described in the embodiment of the present invention.
  • Step S610 The MNO portal verifies the eUICC certificate, the EUM certificate, and the eUICC signature. If all are correct, the eUICC info is associated with the profile download request initiated by the APP by using the transaction id.
  • Step S611 The MNO portal sends a profile subscription request to the SM-DP+.
  • Step S612 SM-DP+ sends an SM-DP+ address to the MNO portal.
  • Step S613 The MNO portal sends a trigger download request to the APP, and triggers the download request to carry the transaction id.
  • Step S614 The APP sends a trigger download request to the LPA.
  • Step S615 The LPA sends an SM-DP+ address acquisition request to the MNO portal, and the SM-DP+ address acquisition request carries a transaction id and an eUICCchallenge.
  • Step S616 The MNO portal sends the transaction id, the SM-DP+ address, the eUICC challenge, and the signature of the MNO portal to the LPA.
  • the MNO portal may hash the transaction id, the SM-DP+ address, and the eUICC challenge to obtain a hash operation result, and encrypt the hash operation result according to the private key of the MNO portal to obtain the signature of the MNO portal, and the transaction
  • the signatures of the id, SM-DP+ address, eUICC challenge, and MNO portal are sent to the APP.
  • the MNO portal may hash the transaction id, the SM-DS address, and the eUICC challenge to obtain a hash operation result, and encrypt the hash operation result according to the private key of the MNO portal to obtain an MNO signature, and the transaction id
  • the SM-DS address, the eUICC challenge, and the signature of the MNO portal are sent to the APP.
  • the MNO portal can indicate the transaction id, root SM-DS indication, and eUICC challenge.
  • Perform a hash operation to obtain a hash operation result, encrypt the hash operation result according to the private key of the MNO portal to obtain an MNO signature, and send the transaction id, the root SM-DS indication information, the eUICC challenge, and the signature of the MNO portal to the APP.
  • the root SM-DS indication information is used to instruct the LPA to obtain the SM-DP+ address from the root SM-DS.
  • Step S617 The LPA sends the transaction id, the SM-DP+ address, the eUICC challenge, and the signature of the MNO portal to the eUICC.
  • Step S618 The eUICC verifies the signature of the MNO portal, and sends the verification result to the LPA.
  • the eUICC may perform a hash operation on the transaction id, the SM-DP+ address, and the eUICC challenge to obtain a hash operation result, obtain the public key of the MNO portal, and decrypt the signature of the MNO portal according to the public key of the MNO portal, and decrypt the obtained message.
  • the eUICC may send the verification result to the LPA.
  • the eUICC may perform a hash operation on the transaction id, the SM-DS address, and the eUICC challenge to obtain a hash operation result, obtain the public key of the MNO portal, and decrypt the signature of the MNO portal according to the public key of the MNO portal, when decrypting
  • the eUICC may send the verification result to the LPA.
  • the eUICC may perform a hash operation on the transaction id, the root SM-DS indication information, and the eUICC challenge to obtain a hash operation result, obtain the public key of the MNO portal, and decrypt the signature of the MNO portal according to the public key of the MNO portal.
  • the eUICC may send the verification result to the LPA.
  • Step S619 The LPA downloads the profile from the SM-DP+ according to the SM-DP+ address.
  • the LPA can download the profile from the SM-DP+ according to the SM-DP+ address.
  • the LPA can obtain the SM-DP+ address in the SM-DS according to the SM-DS address, and download the profile from the SM-DP+ according to the SM-DP+ address.
  • the LPA can obtain the root SM-DS address from the eUICC according to the root SM-DS indication, and obtain the information in the SM-DS according to the root SM-DS address.
  • the SM-DP+ address downloads the profile from the SM-DP+ based on the SM-DP+ address.
  • the eUICC pre-stores the root SM-DS address.
  • the LPA challenge is encrypted with respect to the MNO portal to obtain the signature of the MNO portal.
  • the eUICC verifies the signature of the MNO portal, and the present invention
  • the LPA obtains the eUICC challenge from the eUICC
  • the MNO portal encrypts the eUICC challenge to obtain the signature of the MNO portal
  • the eUICC verifies the signature of the MNO portal, which can improve the security in the profile download process.
  • FIG. 7 is a schematic structural diagram of a device for downloading a subscription information set according to an embodiment of the present invention.
  • the downloading device of the subscription information set may include a receiving unit 701, a sending unit 702, and a downloading unit 703, where each A detailed description of the unit is as follows.
  • the receiving unit 701 is configured to receive a first request sent by the client, where the first request carries the first information and the first Access path.
  • the sending unit 702 is configured to send the first information to the eUICC.
  • the receiving unit 701 is further configured to receive the second information and the first digital signature sent by the eUICC, where the second information includes the first information and eUICC information.
  • the sending unit 702 is further configured to send the second information and the first digital signature to an application server according to the first access path.
  • the receiving unit 701 is further configured to receive a subscription management server address that is sent by the application server when the first digital signature is successfully verified according to the second information.
  • the downloading unit 703 is configured to download the subscription information set according to the subscription management server address.
  • the first request carries the identifier information of the application server
  • the downloading device of the subscription information set in the embodiment of the present invention may further include:
  • connection establishing unit 704 configured to send, by the sending unit 702, the second information and the first digital signature to the application server according to the first access path, when determining that the user agrees to the identifier information
  • the application server acquires the second information establish a communication connection with the application server by using the first access path.
  • the first request carries the identifier information of the application server
  • the receiving unit 701 is further configured to: before the sending unit sends the first information to the eUICC, according to the first Accessing a path, receiving a certificate of the application server sent by the application server.
  • the downloading device of the subscription information set in the embodiment of the present invention may further include:
  • the determining unit 705 is configured to verify the certificate of the application server, and determine whether the body information in the certificate of the application server is the same as the identifier information.
  • the sending unit 702 is further configured to: when the certificate verification of the application server is successful, and the subject information in the certificate of the application server is the same as the identifier information, send the first information to the eUICC .
  • the first information may include a first random number generated by the application server and an event identifier for downloading the subscription information set.
  • the receiving unit 701 receives the subscription management server address sent by the application server, specifically, to:
  • the receiving unit 701 is further configured to receive a second request sent by the application server by using the client, where the second request carries a second digital signature and the subscription management server address, where The two digital signatures are calculated based at least on the subscription management server address.
  • the downloading unit 703 is further configured to: when the verification of the second digital signature is successful according to at least the subscription management server address, download the subscription information set according to the subscription management server address.
  • the receiving unit 701 is further configured to receive a second request sent by the application server by using the client, where the second request carries a second digital signature and a subscription management server address indication information, where the The two digital signatures are obtained according to at least the subscription management server address indication information, and the subscription management server package The first subscription management server and the second subscription management server are included.
  • the sending unit 702 is specifically configured to send a third request to the eUICC according to the subscription management server address indication information when the second digital signature verification is successful according to at least the subscription management server address indication information.
  • the receiving unit 701 is further configured to receive the second subscription management server address sent by the eUICC.
  • the sending unit 702 is further configured to send a fourth request to the second subscription management server according to the second subscription management server address.
  • the receiving unit 701 is further configured to receive a subscription management server address of the first subscription management server that is sent by the second subscription management server.
  • the receiving unit 701 is further configured to receive a second request sent by the application server by using the client, where the second request carries a second digital signature and a second subscription management of the second subscription management server.
  • the server address, the second digital signature is calculated according to at least the second subscription management server address, and the subscription management server includes a first subscription management server and the second subscription management server.
  • the sending unit 702 is further configured to send, according to the second subscription management server address, the second subscription management server, according to the second verification of the second digital signature by the second subscription management server address. Four requests.
  • the receiving unit 701 is further configured to receive a subscription management server address of the first subscription management server that is sent by the second subscription management server.
  • the downloading device of the subscription information set in the embodiment of the present invention may further include:
  • the generating unit 706 is configured to generate a second random number.
  • the sending unit 702 is further configured to send the second random number to the application server.
  • the receiving unit 701 is further configured to receive a second random number and a third digital signature sent by the application server by using the client, where the third digital signature is that the application server is based at least according to the second random number. And the subscription management server address is calculated.
  • the sending unit 702 is further configured to: when the second random number sent by the application server by the client is the same as the generated second random number, the second random number, the subscription management server address And the third digital signature is sent to the eUICC.
  • the receiving unit 701 is further configured to receive, by the eUICC, a verification result that is verified by the second random number and the subscription management server to verify the third digital signature.
  • the downloading unit 703 is further configured to: when the verification result indicates that the eUICC successfully verifies the third digital signature, download the subscription information set according to the subscription management server address.
  • the sending unit 702 is further configured to send a random number acquisition request to the eUICC.
  • the receiving unit 701 is further configured to receive a third random number generated by the eUICC.
  • the sending unit 702 is further configured to send the third random number to the application server, and receive a fourth digital signature generated by the application server, where the fourth digital signature is that the application server is at least according to the first Three random numbers are calculated.
  • the sending unit 702 is further configured to send the fourth digital signature and the first information to the eUICC.
  • the receiving unit 701 is further configured to receive, by the eUICC, the fourth number according to the third random number.
  • the downloading device of the subscription information set and the eUICC in the embodiment of the present invention may be deployed in a terminal device, where the terminal device runs the client, and the user may log in to the application by using the client. server.
  • each unit may also correspond to the corresponding description of the method embodiment shown in FIG. 2-6.
  • the receiving unit 701 receives the first request sent by the client, the first request carries the first information and the first access path, and the sending unit 702 sends the first information to the eUICC.
  • the receiving unit 701 receives the second information and the first digital signature sent by the eUICC, where the second information includes the first information and the eUICC information, and the sending unit 702 sends the second information and the first digital signature to the application server according to the first access path, and receives
  • the unit 701 receives the subscription management server address sent by the application server when the first digital signature verification succeeds according to the second information, and the download unit 703 downloads the subscription information set according to the subscription management server address, so that the client is not required to have high security. In the case of a level or an authorization level, the reliability of the second information is improved.
  • FIG. 8 is a terminal device, which includes a processor 801, a memory 802, and a transceiver 803.
  • the processor 801, the memory 802, and the transceiver 803 are connected to each other through a bus. .
  • the memory 802 includes, but is not limited to, a random access memory (RAM), a read-only memory (ROM), an Erasable Programmable Read Only Memory (EPROM), or A Compact Disc Read-Only Memory (CD-ROM) for storing related instructions and data.
  • the transceiver 803 is configured to receive and transmit data.
  • the processor 801 may be one or more central processing units (CPUs). In the case where the processor 801 is a CPU, the CPU may be a single core CPU or a multi-core CPU.
  • CPUs central processing units
  • the processor 801 in the terminal device is configured to read the program code stored in the memory 802, and perform the following operations:
  • the first request sent by the client is received by the transceiver 803, where the first request carries the first information and the first access path.
  • the first information is sent to the eUICC through the transceiver 803.
  • the transceiver 803 Receiving, by the transceiver 803, the second information and the first digital signature sent by the eUICC, where the first digital signature is calculated according to the second information, where the second information includes the first information and eUICC information.
  • the subscription management server address sent by the application server is received by the transceiver 803.
  • the subscription information set is downloaded according to the subscription management server address.
  • the first request carries the identifier information of the application server
  • the processor 801 may further perform before sending the second information and the first digital signature to the application server according to the first access path.
  • the first request carries the identifier information of the application server, and before the processor 801 sends the first information to the eUICC by using the transceiver 803, the following operations may also be performed:
  • the first information is sent by the transceiver 803 to the eUICC.
  • the first information includes a first random number generated by the application server and an event identifier for downloading the subscription information set.
  • the processor 801 receives, by using the transceiver 803, the subscription management server address sent by the application server, which may be:
  • the second request sent by the application server by the client is received by the transceiver 803.
  • the processor 801 may further receive a second request sent by the application server by using the client, where the second request carries a second digital signature and the subscription management server address, where the second digital signature is Calculated based at least on the subscription management server address.
  • the processor 801 downloads the subscription information set according to the subscription management server address.
  • the processor 801 may further receive a second request sent by the application server by using the client, where the second request carries a second digital signature and a subscription management server address indication information, where the second digital signature is
  • the contract management server includes the first subscription management server and the second subscription management server, which are calculated according to the subscription management server address indication information.
  • the processor 801 sends a third request to the eUICC according to the subscription management server address indication information.
  • the processor 801 receives the second subscription management server address sent by the eUICC.
  • the processor 801 sends a fourth request to the second subscription management server according to the second subscription management server address.
  • the processor 801 receives the subscription management server address of the first subscription management server sent by the second subscription management server.
  • the processor 801 receives a second request sent by the application server by using the client, where the second request carries a second digital signature and a second subscription management server address of the second subscription management server, where The two digital signatures are obtained according to at least the second subscription management server address, and the subscription management server includes a first subscription management server and the second subscription management server.
  • the processor 801 sends a fourth request to the second subscription management server according to the second subscription management server address.
  • the processor 801 receives the subscription management server address of the first subscription management server sent by the second subscription management server.
  • the processor 801 may further generate a second random number and send the second random number to the application server.
  • the processor 801 receives a second random number and a third digital signature sent by the application server by using the client, where the third digital signature is calculated according to at least the second random number and the subscription management server address. of.
  • the processor 801 sets the second random number, the subscription management server address, and the third number.
  • the signature is sent to the eUICC.
  • the processor 801 receives a verification result that is sent by the eUICC to verify the third digital signature according to the second random number and the subscription management server.
  • the processor 801 downloads the subscription information set according to the subscription management server address.
  • the processor 801 may further send a random number acquisition request to the eUICC.
  • the processor 801 receives the third random number generated by the eUICC.
  • the processor 801 sends the third random number to the application server, and receives a fourth digital signature generated by the application server, where the fourth digital signature is calculated according to at least the third random number.
  • the processor 801 transmits the fourth digital signature and the first information to the eUICC.
  • the processor 801 receives the first digital signature sent by the eUICC.
  • each operation may also correspond to the corresponding description of the method embodiment shown in FIG. 2-6.
  • the processor 801 receives the first request sent by the client, sends the first information to the eUICC, and receives the second information sent by the eUICC and the first digital signature, according to the first access path.
  • the application server sends the second information and the first digital signature, receives the subscription management server address sent by the application server, and downloads the subscription information set according to the subscription management server address, and may not require the client to have a higher security level or authorization level. Next, improve the reliability of the second information.
  • FIG. 9 is a schematic structural diagram of a device for downloading a subscription information set according to another embodiment of the present invention.
  • the downloading device of the subscription information set may include a receiving unit 901, a digital signature verification unit 902, and a sending unit 903. , wherein the detailed description of each unit is as follows.
  • the receiving unit 901 is configured to receive the second information that is sent by the LPA according to the first access path and the first digital signature, where the first digital signature is calculated according to the second information.
  • the digital signature verification unit 902 is configured to verify the first digital signature according to the second information.
  • the sending unit 903 is configured to send a subscription management server address to the LPA when the first digital signature verification is successful according to the second information, where the subscription management server address is used by the LPA to perform a subscription information set. download.
  • the downloading device of the subscription information set in the embodiment of the present invention may further include:
  • the connection establishing unit 904 is configured to establish, by the receiving unit 901, a communication connection with the LPA before receiving the second information and the first digital signature sent by the LPA according to the first access path.
  • the sending unit 903 is further configured to send a certificate to the LPA by using a communication connection with the LPA.
  • the sending unit 903 sends the subscription management server address to the LPA, specifically for:
  • a second request is sent to the LPA by the client.
  • the downloading device of the subscription information set in the embodiment of the present invention may further include:
  • the digital signature obtaining unit 905 is configured to calculate, according to at least the subscription management server address, a second digital signature.
  • the sending unit 903 is further configured to send, by using a client, a second request to the LPA, where the second request carries the second digital signature and the subscription management server address.
  • the downloading device of the subscription information set in the embodiment of the present invention may further include:
  • the digital signature obtaining unit 905 is configured to calculate, according to at least the subscription management server address indication information, a second digital signature.
  • the sending unit 903 is further configured to send, by using a client, a second request to the LPA, where the second request carries the second digital signature and the subscription management server address indication information.
  • the downloading device of the subscription information set in the embodiment of the present invention may further include:
  • the digital signature obtaining unit 905 is configured to calculate, according to the second subscription management server address of the at least the second subscription management server, the second digital signature.
  • the sending unit 903 is further configured to send, by the client, a second request to the LPA, where the second request carries the second digital signature and the second subscription management server address.
  • the receiving unit 901 is further configured to receive a second random number sent by the LPA.
  • the downloading device of the subscription information set in the embodiment of the present invention may further include:
  • the digital signature obtaining unit 905 is configured to calculate a third digital signature according to at least the second random number and the subscription management server address.
  • the sending unit 903 is further configured to send the second random number and the third digital signature to the LPA through a client.
  • the receiving unit 901 is further configured to receive a third random number sent by the LPA.
  • the downloading device of the subscription information set in the embodiment of the present invention may further include:
  • the digital signature obtaining unit 905 is configured to calculate a fourth digital signature according to at least the third random number.
  • the sending unit 903 is further configured to send the fourth digital signature to the LPA.
  • the downloading device of the subscription information set in the embodiment of the present invention may further include:
  • the information acquiring unit 906 is configured to: after receiving, by the receiving unit 901, the second information that is sent by the LPA according to the first access path and the first digital signature, when the second information is used according to the second information When a digital signature verification is successful, the eUICC information is obtained.
  • the information associating unit 907 is configured to associate the eUICC information to the first request sent by the client according to the event identifier that is used to download the subscription information set included in the second information.
  • the device for downloading the subscription information set in the embodiment of the present invention may be applied to the application server, where the LPA is deployed in the terminal device, where the terminal device runs a client, and the user can log in to the client through the client.
  • the application server may be applied to the application server, where the LPA is deployed in the terminal device, where the terminal device runs a client, and the user can log in to the client through the client.
  • each unit may also correspond to the corresponding description of the method embodiment shown in FIG. 2-6.
  • the receiving unit 901 receives the second information and the first digital signature transmitted by the LPA according to the first access path, and the digital signature verification unit 902 performs the first digital signature according to the second information. Verifying that when the first digital signature verification is successful according to the second information, the sending unit 903 sends the subscription management to the LPA
  • the server address, the subscription management server address is used for the LPA to download the subscription information set, and the application server can receive the second information directly sent by the LPA, without the client forwarding, without requiring the client to have a higher security level or authorization level. Next, improve the reliability of the second information.
  • FIG. 10 is an application server according to an embodiment of the present invention.
  • the application server includes a processor 1001, a memory 1002, and a transceiver 1003.
  • the processor 1001, the memory 1002, and the transceiver 1003 are connected to each other through a bus. .
  • the memory 1002 includes, but is not limited to, a RAM, a ROM, an EPROM, or a CD-ROM for storing related instructions and data.
  • the transceiver 1003 is configured to receive and transmit data.
  • the processor 1001 may be one or more CPUs.
  • the CPU may be a single core CPU or a multi-core CPU.
  • the processor 1001 in the application server is configured to read the program code stored in the memory 1002 and perform the following operations:
  • the first digital signature is verified according to the second information.
  • the subscription management server address is sent to the LPA through the transceiver 1003, and the subscription management server address is used by the LPA to download the subscription information set.
  • the following operations may also be performed:
  • a certificate is sent to the LPA through a communication connection with the LPA.
  • the processor 1001 sends a subscription management server address to the LPA, specifically:
  • a second request is sent to the LPA by the client.
  • the processor 1001 may further calculate, according to at least the subscription management server address, a second digital signature, and send, by the client, a second request to the LPA, where the second request carries the second digital signature and The subscription management server address.
  • the processor 1001 may further calculate, according to the at least the subscription management server address indication information, a second digital signature, where the second request is sent by the client, where the second request carries the second digital signature and The subscription management server address indication information.
  • the processor 1001 may further calculate, according to the second subscription management server address of the second subscription management server, a second digital signature, and send, by the client, a second request to the LPA, where the second request carries the second request Describe a second digital signature and the second subscription management server address.
  • the processor 1001 may further receive a second random number sent by the LPA, calculate a third digital signature according to the at least the second random number and the subscription management server address, and use the second random number. And transmitting the third digital signature to the LPA through a client.
  • the processor 1001 may further receive a third random number sent by the LPA, according to at least the third random The number of machines is calculated to obtain a fourth digital signature, and the fourth digital signature is sent to the LPA.
  • the processor 1001 may further perform the following operations:
  • the processor 1001 acquires the embedded universal integrated circuit card eUICC information.
  • the processor 1001 associates the eUICC information to the first request sent by the client according to the event identifier of the subscription information set included in the second information.
  • each operation may also correspond to the corresponding description of the method embodiment shown in FIG. 2-6.
  • the processor 1001 receives the second information and the first digital signature sent by the LPA according to the first access path, and when the first digital signature verification succeeds according to the second information, the transceiver 1003 transmits
  • the LPA sends the subscription management server address
  • the subscription management server address is used for the LPA to download the subscription information set
  • the application server can receive the second information directly sent by the LPA, without the client forwarding, without requiring the client to have a higher security level or In the case of the authorization level, the reliability of the second information is improved.
  • the program can be stored in a computer readable storage medium, when the program is executed
  • the flow of the method embodiments as described above may be included.
  • the foregoing storage medium includes various media that can store program codes, such as a ROM or a random access memory RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例公开了一种签约信息集的下载方法、装置及相关设备,所述方法包括:接收客户端发送的第一请求,第一请求携带第一信息和第一访问路径;将第一信息发送给eUICC;接收eUICC发送的第二信息和第一数字签名,第一数字签名是根据第二信息进行计算得到的,第二信息包括第一信息和eUICC信息;根据第一访问路径,向应用服务器发送第二信息和第一数字签名;接收应用服务器发送的签约管理服务器地址;根据签约管理服务器地址对签约信息集进行下载。采用本发明实施例,可在不要求客户端具有较高安全等级或者授权等级的情况下,提高第二信息的可靠性。

Description

一种签约信息集的下载方法、装置以及相关设备 技术领域
本申请涉及通信技术领域,尤其涉及一种签约信息集的下载方法、装置以及相关设备。
背景技术
Profile是配置到嵌入式通用集成电路卡(embeddedUniversal Integrated Circuit Card,eUICC)中的文件结构、数据或者应用程序等集合。终端配置有eUICC和本地文件助手(Local Profile Assistant,LPA),eUICC是一种支持远程或者本地管理Profile的通用集成电路卡,LPA可从SM-DP+下载Profile,以及对Profile进行本地管理。通过浏览器登录运营商网站下载Profile的方式具体可以为:用户通过客户端(如浏览器)登录运营商网站,网页服务器通过客户端向LPA发送终端信息获取请求,eUICC将终端信息发送给LPA,LPA将该终端信息通过客户端发送给网页服务器,网页服务器将存储Profile的SM-DP+地址通过客户端发送给LPA,LPA从SM-DP+地址对应的SM-DP+中下载所需的Profile。由于终端信息包括eUICC标识信息以及终端标识信息等用于识别用户的敏感信息,LPA将终端信息通过客户端发送给网页服务器,若该客户端的安全等级较低,则终端信息容易泄露,降低终端信息的安全性;为了提高终端信息的安全性,客户端需要具有较高的授权等级,例如具有终端厂商的签名的授权,则终端信息的安全性受限于客户端的安全等级或者授权等级,不具有广泛适用性。
发明内容
本发明实施例公开了一种签约信息集的下载方法、装置以及相关设备,可在不要求客户端具有较高安全等级或者授权等级的情况下,提高第二信息的可靠性。
第一方面,本发明实施例提供了一种签约信息集的下载方法,LPA可以接收客户端发送的第一请求,其中第一请求可以携带第一信息和第一访问路径;LPA将第一信息发送给eUICC;LPA接收eUICC发送的第二信息和与第二信息关联的第一数字签名,其中第一数字签名是eUICC根据第二信息进行计算得到的,第二信息可以包括第一信息和eUICC信息;LPA可以根据第一访问路径,向应用服务器发送第二信息和第一数字签名;LPA接收应用服务器发送的签约管理服务器地址;LPA根据签约管理服务器地址对签约信息集进行下载。
在该技术方案中,LPA和eUICC可以部署在终端设备中,该终端设备中还可以运行客户端,用户可以通过客户端登录应用服务器。LPA接收客户端发送的第一请求之后,将第一请求携带的第一信息发送给eUICC,eUICC对第二信息进行计算得到第一数字签名,eUICC将第二信息和第一数字签名发送给LPA,LPA根据第一请求携带的第一访问路径,向应用服务器发送第二信息和第一数字签名,应用服务器在根据第二信息对第一数字签名验证成功时向LPA发送签约管理服务器地址,LPA根据签约管理服务器地址对签约信息集进行下载,相对传统的签约信息集的下载方法中LPA将第二信息通过客户端转发给应用服务器,本发明实施例可在不要求客户端具有较高安全等级或者授权等级的情况下,提高第二信息的可靠性。其中,第一请求可以为终端信息获取请求,第一访问路径可以为URL, 具体为LPA连接应用服务器的地址。
可选的,第一请求可以携带应用服务器的标识信息,则LPA根据第一访问路径,向应用服务器发送第二信息和第一数字签名之前,可以请求用户同意标识信息对应的应用服务器获取第二信息,当确定用户同意标识信息对应的应用服务器获取第二信息时,LPA可以通过第一访问路径建立与应用服务器之间的通信连接。
可选的,第一请求可以携带所述应用服务器的标识信息,LPA将第一信息发送给eUICC之前,可以根据第一访问路径,接收应用服务器发送的应用服务器的证书,LPA可以对应用服务器的证书进行验证,并判断应用服务器的证书中的主体信息与标识信息是否相同,当对应用服务器的证书验证成功,且应用服务器的证书中的主体信息与标识信息相同时,LPA可以将第一信息发送给eUICC。
可选的,第一信息可以包括应用服务器生成的第一随机数和下载签约信息集的事件标识。
可选的,LPA接收应用服务器发送的签约管理服务器地址,具体可以为:接收应用服务器通过客户端发送的第二请求,根据第二请求从应用服务器中获取签约管理服务器地址。
可选的,LPA可以接收应用服务器通过客户端发送的第二请求,第二请求携带第二数字签名和签约管理服务器地址,第二数字签名是至少根据签约管理服务器地址进行计算得到的,在至少根据签约管理服务器地址对第二数字签名验证成功时,LPA可以根据签约管理服务器地址对签约信息集进行下载。
可选的,LPA接收应用服务器通过客户端发送的第二请求,第二请求可以携带第二数字签名和签约管理服务器地址指示信息,第二数字签名是应用服务器至少根据签约管理服务器地址指示信息进行计算得到的,签约管理服务器包括第一签约管理服务器和第二签约管理服务器,LPA在至少根据签约管理服务器地址指示信息对第二数字签名验证成功时,可以根据签约管理服务器地址指示信息向eUICC发送第三请求,并接收eUICC发送的第二签约管理服务器地址,根据第二签约管理服务器地址向第二签约管理服务器发送第四请求,接收第二签约管理服务器发送的第一签约管理服务器的签约管理服务器地址。
可选的,LPA可以接收应用服务器通过客户端发送的第二请求,第二请求携带第二数字签名和第二签约管理服务器的第二签约管理服务器地址,第二数字签名是应用服务器至少根据第二签约管理服务器地址进行计算得到的,签约管理服务器包括第一签约管理服务器和第二签约管理服务器,LPA在至少根据第二签约管理服务器地址对第二数字签名验证成功时,可以根据第二签约管理服务器地址向第二签约管理服务器发送第四请求,并接收第二签约管理服务器发送的第一签约管理服务器的签约管理服务器地址。
可选的,LPA可以生成第二随机数,并向应用服务器发送第二随机数,LPA还可以接收应用服务器通过客户端发送的第二随机数和第三数字签名,第三数字签名是应用服务器至少根据第二随机数以及签约管理服务器地址进行计算得到的,当应用服务器通过客户端发送的第二随机数和生成得到的第二随机数相同时,LPA可以将第二随机数、签约管理服务器地址以及第三数字签名发送给eUICC,接收eUICC发送的至少根据第二随机数和签约管理服务器对第三数字签名进行验证的验证结果,当验证结果指示eUICC对第三数字签名验证成功时,LPA可以根据签约管理服务器地址对签约信息集进行下载。
可选的,LPA可以向eUICC发送随机数获取请求,接收eUICC生成的第三随机数,将第三随机数发送给应用服务器,并接收应用服务器生成的第四数字签名,第四数字签名是应用服务器至少根据第三随机数进行计算得到的,LPA可以将第四数字签名和第一信息发送给eUICC,进而接收eUICC发送的第一数字签名。
第二方面,本发明实施例提供一种签约信息集的下载方法,应用服务器可以接收LPA根据第一访问路径发送的第二信息和第一数字签名,其中第一数字签名是根据第二信息进行计算得到的,应用服务器根据第二信息对第一数字签名进行验证,当根据第二信息对第一数字签名验证成功时,应用服务器可以向LPA发送签约管理服务器地址,签约管理服务器地址用于LPA对签约信息集进行下载。
可选的,应用服务器接收LPA根据第一访问路径发送的第二信息和第一数字签名之前,可以建立与LPA之间的通信连接,通过与LPA之间的通信连接,向LPA发送证书。
可选的,应用服务器向LPA发送签约管理服务器地址,具体可以为:通过客户端向LPA发送第二请求,向LPA发送签约管理服务器地址。
可选的,应用服务器还可以根据至少签约管理服务器地址进行计算得到第二数字签名,通过客户端向LPA发送第二请求,其中第二请求携带第二数字签名和签约管理服务器地址。
可选的,应用服务器还可以根据至少签约管理服务器地址指示信息进行计算得到第二数字签名,通过客户端向LPA发送第二请求,第二请求可以携带第二数字签名和签约管理服务器地址指示信息。
可选的,应用服务器还可以根据至少第二签约管理服务器的第二签约管理服务器地址进行计算得到第二数字签名,通过客户端向LPA发送第二请求,第二请求可以携带第二数字签名和第二签约管理服务器地址。
可选的,应用服务器还可以接收LPA发送的第二随机数,根据至少第二随机数以及签约管理服务器地址进行计算得到第三数字签名,将第二随机数和第三数字签名通过客户端发送给LPA。
可选的,应用服务器还可以接收LPA发送的第三随机数,根据至少第三随机数进行计算得到第四数字签名,将第四数字签名发送给LPA。
可选的,应用服务器接收LPA根据第一访问路径发送的第二信息和第一数字签名之后,当根据第二信息对第一数字签名验证成功时,应用服务器可以获取eUICC信息,根据第二信息所包含的下载签约信息集的事件标识,将eUICC信息关联到客户端发送的第一请求。
可选的,第二方面描述的签约信息集的下载方法可以应用于应用服务器中,LPA可以部署在终端设备中,终端设备运行有客户端,用户可以通过客户端登录到应用服务器。
第三方面,本发明实施例提供一种计算机存储介质,所述计算机存储介质存储有程序,所述程序执行时包括本发明实施例第一方面提供的签约信息集的下载方法中全部或部分的步骤。
第四方面,本发明实施例提供一种计算机存储介质,所述计算机存储介质存储有程序, 所述程序执行时包括本发明实施例第二方面提供的签约信息集的下载方法中全部或部分的步骤。
第五方面,本发明实施例提供一种签约信息集的下载装置,该签约信息集的下载装置包括用于执行本发明实施例第一方面公开的签约信息集的下载方法的单元。
第六方面,本发明实施例提供一种终端设备,其特征在于,包括处理器、存储器以及收发器,存储器中存储一组程序代码,且处理器调用存储器中存储的程序代码,用于执行以下操作:接收客户端发送的第一请求,第一请求携带第一信息和第一访问路径;将第一信息发送给eUICC;接收eUICC发送的第二信息和第一数字签名,第一数字签名是根据第二信息进行计算得到的,第二信息包括第一信息和eUICC信息;根据第一访问路径,向应用服务器发送第二信息和第一数字签名;接收应用服务器发送的签约管理服务器地址;根据签约管理服务器地址对签约信息集进行下载。
第七方面,本发明实施例提供一种签约信息集的下载装置,该签约信息集的下载装置包括用于执行本发明实施例第二方面公开的签约信息集的下载方法的单元。
第八方面,本发明实施例提供一种应用服务器,其特征在于,包括处理器、存储器以及收发器,存储器中存储一组程序代码,且处理器调用存储器中存储的程序代码,用于执行以下操作:接收LPA根据第一访问路径发送的第二信息和第一数字签名,第一数字签名是根据第二信息进行计算得到的;根据第二信息对第一数字签名进行验证;当根据第二信息对第一数字签名验证成功时,向LPA发送签约管理服务器地址,签约管理服务器地址用于LPA对签约信息集进行下载。
附图说明
为了更清楚地说明本发明实施例或背景技术中的技术方案,下面将对本发明实施例或背景技术中所需要使用的附图进行说明。
图1是本发明实施例公开的一种签约信息集的下载系统的架构示意图;
图2是本发明实施例公开的一种签约信息集的下载方法的流程示意图;
图3是本发明另一实施例公开的一种签约信息集的下载方法的流程示意图;
图4是本发明另一实施例公开的一种签约信息集的下载方法的流程示意图;
图5是本发明另一实施例公开的一种签约信息集的下载方法的流程示意图;
图6是本发明另一实施例公开的一种签约信息集的下载方法的流程示意图;
图7是本发明实施例公开的一种签约信息集的下载装置的结果示意图;
图8是本发明实施例公开的一种终端设备的结构示意图;
图9是本发明另一实施例公开的一种终端设备的结构示意图;
图10是本发明实施例公开的一种应用服务器的结构示意图。
具体实施方式
下面结合本发明实施例中的附图对本发明实施例进行描述。
请参见图1,图1是本发明实施例提供的一种签约信息集的下载系统的架构示意图,该签约信息集的下载系统可以包括终端设备Device、SM-DP+、运营商(Operator)以及用户(End User)。
其中,终端设备可以配置有eUICC和LPA。eUICC是一种支持远程或本地管理profile的通用集成电路卡(Universal Integrated Circuit Card,UICC)。eUICC可以支持将profile从SM-DP+下载到eUICC中,并且可以支持通过LPA对profile进行本地管理,也可以支持通过SM-DP+对eUICC进行远程管理。其中,Profile是eUICC中的文件结构,数据,以及应用程序等签约信息的集合,当Profile处于激活状态时,eUICC的功能和传统的UICC相同,可用于接入相应的移动网络运营商(Mobile Network Operator,MNO)的网络。其中,LPA可以包括本地发现服务(local discovery service,LDS)、本地签约信息集下载(local profile download,LPD)以及本地用户界面(local user interface,LUI),LDS可负责事件(event)查询,即向SM-DS查询event;LPD可负责下载profile,即LPD通过以安全为目的的HTTP通道(Hyper Text Transfer Protocol over Secure Socket Layer,HTTPS)从SM-DP+中下载profile到LPD中,然后通过本地应用协议数据单元(ApplicationProtocolDataUnit,APDU)命令将下载下来的profile再发送到eUICC中,LPD也可以从SM-DP+获取远程管理命令,并将命令传递给eUICC,实现对eUICC以及profile的远程管理;LUI提供与用户之间的交互逻辑和界面,用户可以通过LUI来完成对profile的本地管理,如下载新的profile,激活profile,去激活profile,删除profile等。
SM-DP+的功能可以包括生成profile,加密profile,存储profile,绑定profile并且安全下载profile到终端设备中,远程管理eUICC或者profile,以及向SM-DS进行事件注册或删除等功能。
可选的,签约信息集的下载系统还可以包括签约管理-发现服务器(SubscriptionManager-Discovery Server,SM-DS),SM-DS可负责接收SM-DP+发送的event注册,并将event发送给终端设备。event可以包括profile下载事件或profile管理事件,即存在profile等待终端设备从SM-DP+中下载,或者存在profile管理命令等待终端设备从SM-DP+中获取。
可选的,签约信息集的下载系统还可以包括智能卡制造商(EUM)或者证书发布中心(Certificate Issuer,CI),EUM可以用于向终端设备发布EUM证书,CI可以用于向Operator发布应用服务器(MNO portal)的证书。
请参见图2,图2是本发明实施例提供的一种签约信息集的下载方法,该方法包括但不限于如下步骤:
步骤S201:APP向MNO portal发送profile下载请求。
具体地,用户可以使用App登录MNO portal,例如使用MNO App登录MNO portal,或者使用浏览器登录MNO portal等。用户在APP中选择下载profile之后,APP可以向MNO portal发送profile下载请求。
步骤S202:MNO portal向APP发送终端信息获取请求,终端信息获取请求携带URL、MNO challenge以及transaction id。
具体地,用户选择下载profile之后,MNO portal可以生成对应于该profile下载事件的事件标识transaction id,以及随机数MNO challenge,MNO portal可以向APP发送终端信息获取请求。其中,终端信息获取请求可以携带统一资源定位符(Uniform Resource Locator,URL)、MNO challenge以及transaction id。URL可以为LPA连接MNO portal的地址。
可选的,MNO portal向APP发送的终端信息获取请求还可以携带运营商标识MNO name。例如,MNO portal为中国移动网站,则MNO name可以为“中国移动”。
步骤S203:APP将URL、MNO challenge以及transaction id发送给LPA。
具体地,APP接收到MNO portal发送的终端信息获取请求之后,可以通过APP用于获取终端信息的应用程序编程接口(Application Programming Interface,API),将该终端信息获取请求发送给LPA,终端信息获取请求可以携带URL、MNO challenge以及transaction id。例如,APP可以调用get Device Info和trigger Download这两个API和LPA之间传递信息,示例性的,APP可以通过get Device Info API向LPA发送终端信息获取请求。
可选的,APP将携带有MNO name的终端信息获取请求发送给LPA之后,LPA可以提示用户[MNO name]需要获取终端信息,请求用户同意,用户同意之后LPA可以利用URL建立和MNO portal的连接,LPA可以通过和MNO portal的连接获取MNOportal的证书,并认证MNOportal的证书为GSMA CI颁发的证书,判断MNOportal证书中的主体名称(subject字段)和MNO name一致。
具体实现中,若portal的证书为GSMA CI颁发的证书,则MNOportal的证书是根据GSMA CI的私钥对证书颁发者以及证书接收方等信息进行数字签名得到的。基于此,LPA可以获取GSMA CI的公钥,来认证MNOportal的证书为GSMA CI颁发的证书。
步骤S204:LPA将MNO challenge以及transaction id发送给eUICC。
可选的,LPA还可以将device info发送给eUICC。
步骤S205:eUICC根据transaction id、eUICC info以及MNO challenge生成eUICC签名。
具体地,eUICC可以对transaction id、eUICC info以及MNO challenge进行哈希运算,得到哈希运算结果,根据eUICC的私钥,对该哈希运算结果进行加密得到eUICC签名。
可选的,LPA将device info、MNO challenge以及transaction id发送给eUICC之后,eUICC可以对transaction id、device info、eUICC info以及MNO challenge进行哈希运算,得到哈希运算结果,根据eUICC的私钥,对该哈希运算结果进行加密得到eUICC签名。
步骤S206:eUICC将transaction id、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给LPA。
具体地,eUICC证书以及EUM证书可以是终端设备出厂之前EUM配置到eUICC中的。
可选的,如果eUICC签名是eUICC对transaction id、device info、eUICC info以及MNO challenge进行数字签名得到的,则eUICC可以将transaction id、device info、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给LPA。
步骤S207:LPA将transaction id、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给MNO portal。
可选的,如果eUICC将transaction id、device info、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给LPA,则LPA可以将transaction id、device info、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给MNO portal。
步骤S208:MNO portal验证eUICC证书、EUM证书以及eUICC签名,如果都正确,则利用transaction id将eUICC info关联到APP发起的profile下载请求。
具体地,MNO portal可以验证eUICC证书、EUM证书以及eUICC签名,如果都正确,则MNO portal可以获取eUICC info,并利用transaction id将eUICC info关联到APP发起的profile下载请求。如果eUICC证书、EUM证书或者eUICC签名不正确,或者MNO portal无法识别LPA发送的transaction id,则MNO portal可以向LPA发送error,以提示LPA验证失败,结束该流程。如果eUICC证书、EUM证书以及eUICC签名正确,且MNO portal可识别LPA发送的transaction id,则MNO portal可以将transaction id、next URL以及令牌token发送给LPA。其中next URL为APP连接MNO portal进行下一步业务的地址,token是MNO portal生成的随机数。
其中,MNO portal验证eUICC签名的方式具体可以为:MNO portal对transaction id、eUICC info以及MNO challenge进行哈希运算,得到哈希运算结果,根据eUICC的公钥对eUICC签名进行解密,当解密得到的信息与上述哈希运算结果一致时,MNO portal可以确定eUICC签名验证成功。
其中,MNO portal识别LPA发送的transaction id的方式具体可以为:当MNO portal的本地存储有该transaction id时,MNO portal可以识别该transaction id;当MNO portal的本地未存储该transaction id时,MNO portal无法识别该transaction id。
可选的,LPA将transaction id、device info、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给MNO portal之后,MNO portal可以验证eUICC证书、EUM证书以及eUICC签名,如果都正确,则MNO portal可以获取device info以及eUICC info,并利用transaction id将device info以及eUICC info关联到APP发起的profile下载请求。
其中,MNO portal验证eUICC签名的方式具体可以为:MNO portal对transaction id、device info、eUICC info以及MNO challenge进行哈希运算,得到哈希运算结果,根据eUICC的公钥对eUICC签名进行解密,当解密得到的信息与上述哈希运算结果一致时,MNO portal可以确定eUICC签名验证成功。
可选的,LPA接收到MNO portal发送的transaction id、next URL以及token之后,可以向App返回获取终端信息的响应,该响应可以携带transaction id、next URL以及token。App可以利用next URL连接到MNO portal,MNOportal验证App发送的token,如果有效,则允许用户进行套餐选择等交互。
其中,MNO portal可以向SM-DP+发送profile订购请求,SM-DP+生成profile之后,可以向MNO portal发送SM-DP+地址以及Matching ID。其中,Matching ID可以为下载profile的凭证,示例性的,Matching ID可以为指示下载profile的信息或者空值等。
步骤S209:MNO portal向APP发送触发下载请求,触发下载请求携带transaction id。
步骤S210:APP将触发下载请求发送给LPA。
具体地,APP可以通过APP用于发送触发下载请求的API,将该触发下载请求发送给LPA。示例性的,APP可以通过trigger Download API向LPA发送触发下载请求。
步骤S211:LPA和MNO portal建立连接,并通过和MNO portal之间的连接获取SM-DP+地址。
具体地,LPA接收到APP发送的触发下载请求之后,可以和MNO portal建立连接,并通过和MNO portal之间的连接获取SM-DP+地址,其中LPA建立的和MNO portal的连接可以和步骤S203中LPA利用URL建立的和MNO portal的连接相同,即步骤S211中LPA和MNO portal的连接方式和步骤S203中LPA和MNO portal的连接方式相同。
可选的,LPA和MNO portal建立连接之后,LPA可以向MNO portal请求获取SM-DP+地址以及Matching ID,该请求可以携带transaction id,则MNO portal可以根据transaction id将SM-DP+地址以及Matching ID发送给LPA。
步骤S212:LPA根据SM-DP+地址从SM-DP+中下载profile。
可选的,LPA可以请求用户同意下载profile,用户同意后,LPA可以利用SM-DP+地址以及Matching ID从SM-DP+中下载profile。
在图2所描述的方法中,APP仅提供LPA和MNO portal进行交互的必要信息,终端信息例如device info,eUICC info等敏感信息是LPA直接发送给MNO portal的,并没有经过APP传递,不依赖于APP的授权等级,提高终端信息的安全性,同时也提高了下载profile过程的通用性。
请参见图3,图3是本发明另一实施例提供的一种签约信息集的下载方法,该方法包括但不限于如下步骤:
步骤S301:APP向MNO portal发送profile下载请求。
需要说明的是,步骤S301具体可以参见步骤S201,本发明实施例不再赘述。
步骤S302:MNO portal向APP发送终端信息获取请求,终端信息获取请求携带URL、MNO challenge以及transaction id。
需要说明的是,步骤S302具体可以参见步骤S202,本发明实施例不再赘述。
步骤S303:APP将URL、MNO challenge以及transaction id发送给LPA。
需要说明的是,步骤S303具体可以参见步骤S203,本发明实施例不再赘述。
步骤S304:LPA将MNO challenge以及transaction id发送给eUICC。
需要说明的是,步骤S304具体可以参见步骤S204,本发明实施例不再赘述。
步骤S305:eUICC根据transaction id、eUICC info以及MNO challenge生成eUICC签名。
需要说明的是,步骤S305具体可以参见步骤S205,本发明实施例不再赘述。
步骤S306:eUICC将transaction id、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给LPA。
需要说明的是,步骤S306具体可以参见步骤S206,本发明实施例不再赘述。
步骤S307:LPA将transaction id、eUICC info、MNO challenge、LPA challenge、eUICC签名、eUICC证书以及EUM证书发送给MNO portal。
具体地,LPA可以生成LPA challenge,并将transaction id、eUICC info、MNO challenge、LPA challenge、eUICC签名、eUICC证书以及EUM证书发送给MNO portal。
步骤S308:MNO portal验证eUICC证书、EUM证书以及eUICC签名,如果都正确,则利用transaction id将eUICC info关联到APP发起的profile下载请求。
需要说明的是,步骤S308具体可以参见步骤S208,本发明实施例不再赘述。
步骤S309:MNO portal向SM-DP+发送profile订购请求。
步骤S310:SM-DP+向MNO portal发送SM-DP+地址以及Matching ID。
具体地,SM-DP+生成profile之后,可以向MNO portal发送SM-DP+地址以及Matching ID。
步骤S311:MNO portal向APP发送触发下载请求,触发下载请求携带transaction id、SM-DP+地址、LPA challenge以及MNO portal的签名。
具体地,MNO portal可以对transaction id、SM-DP+地址以及LPA challenge进行哈希运算,得到哈希运算结果,根据MNO portal的私钥对该哈希运算结果进行加密得到MNO portal签名,并将transaction id、SM-DP+地址、LPA challenge以及MNO portal签名发送给APP。可选的,触发下载请求还可以携带MNO portal的证书。
步骤S312:APP将触发下载请求发送给LPA。
步骤S313:LPA验证MNO portal签名,如果有效,则根据SM-DP+地址从SM-DP+中下载profile。
具体地,LPA可以对transaction id、SM-DP+地址以及LPA challenge进行哈希运算,得到哈希运算结果,获取MNO portal的公钥,并根据MNO portal的公钥对MNO portal签名进行解密,当解密得到的信息与上述哈希运算结果一致时,LPA可以请求用户同意下载profile,用户同意后,LPA可以根据SM-DP+地址从SM-DP+中下载profile。
可选的,如果LPA接收到APP发送的MNO portal的证书,则LPA可以验证MNO portal签名有效,认证MNOportal的证书为GSMA CI颁发的证书,并判断MNOportal证书中的主体名称(subject字段)和MNO name一致,进而请求用户同意下载profile,用户同意后,LPA可以根据SM-DP+地址从SM-DP+中下载profile。
在图3所描述的方法中,在触发下载profile时,可直接将MNO portal签名以及SM-DP+地址经过APP传递给LPA,LPA验证MNO portal签名有效之后根据SM-DP+地址从SM-DP+中下载profile,不需要LPA再次和Portal建立连接以获取SM-DP+地址,可提高SM-DP+地址获取效率。
请参见图4,图4是本发明另一实施例提供的一种签约信息集的下载方法,该方法包括但不限于如下步骤:
步骤S401:APP向MNO portal发送profile下载请求。
需要说明的是,步骤S401具体可以参见步骤S301,本发明实施例不再赘述。
步骤S402:MNO portal向APP发送终端信息获取请求,终端信息获取请求携带URL、 MNO challenge以及transaction id。
需要说明的是,步骤S402具体可以参见步骤S302,本发明实施例不再赘述。
步骤S403:APP将URL、MNO challenge以及transaction id发送给LPA。
需要说明的是,步骤S403具体可以参见步骤S303,本发明实施例不再赘述。
步骤S404:LPA将MNO challenge以及transaction id发送给eUICC。
需要说明的是,步骤S404具体可以参见步骤S304,本发明实施例不再赘述。
步骤S405:eUICC根据transaction id、eUICC info以及MNO challenge生成eUICC签名。
需要说明的是,步骤S405具体可以参见步骤S305,本发明实施例不再赘述。
步骤S406:eUICC将transaction id、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给LPA。
需要说明的是,步骤S406具体可以参见步骤S306,本发明实施例不再赘述。
步骤S407:LPA将transaction id、eUICC info、MNO challenge、LPA challenge、eUICC签名、eUICC证书以及EUM证书发送给MNO portal。
需要说明的是,步骤S407具体可以参见步骤S307,本发明实施例不再赘述。
步骤S408:MNO portal验证eUICC证书、EUM证书以及eUICC签名,如果都正确,则利用transaction id将eUICC info关联到APP发起的profile下载请求。
需要说明的是,步骤S408具体可以参见步骤S308,本发明实施例不再赘述。
步骤S409:MNO portal向SM-DP+发送profile订购请求。
具体地,MNO portal可以向SM-DP+发送profile订购请求,并指示SM-DP+在SM-DS注册,SM-DS可以为Root SM-DS或者alternative SM-DS。
步骤S410:SM-DP+通知MNO portal已经生成profile。
具体地,MNO portal向SM-DP+发送profile订购请求之后,SM-DP+可以生成profile,进而在SM-DS进行事件注册,并通知MNO portal已经生成profile。SM-DP+在SM-DS进行事件注册之后,SM-DS可以保存事件记录event record,事件记录可以包括SM-DP+的地址。
步骤S411:MNO portal向APP发送触发下载请求,触发下载请求携带transaction id、SM-DP+地址、LPA challenge以及MNO portal签名。
具体地,MNO portal可以对transaction id、SM-DP+地址以及LPA challenge进行哈希运算,得到哈希运算结果,根据MNO portal的私钥对该哈希运算结果进行加密得到MNO portal签名,并将transaction id、SM-DP+地址、LPA challenge以及MNO portal签名发送给APP。
可选的,MNO portal可以对transaction id、SM-DS地址以及LPA challenge进行哈希运算,得到哈希运算结果,根据MNO portal的私钥对该哈希运算结果进行加密得到MNO portal签名,并将transaction id、SM-DS地址、LPA challenge以及MNO portal签名发送给APP。
可选的,MNO portal可以对transaction id、root SM-DS指示信息以及LPA challenge进行哈希运算,得到哈希运算结果,根据MNO portal的私钥对该哈希运算结果进行加密得到MNO portal签名,并将transaction id、root SM-DS指示信息、LPA challenge以及MNO portal 签名发送给APP。其中,root SM-DS指示信息用于指示LPA从eUICC中获取root SM-DS地址。
步骤S412:APP将触发下载请求发送给LPA。
步骤S413:LPA验证MNO portal签名,如果有效,则根据SM-DP+地址从SM-DP+中下载profile。
具体地,LPA可以对transaction id、SM-DP+地址以及LPA challenge进行哈希运算,得到哈希运算结果,获取MNO portal的公钥,根据MNO portal的公钥对MNO portal签名进行解密,当解密得到的信息与上述哈希运算结果一致时,LPA可以请求用户同意下载profile,用户同意后,LPA可以根据SM-DP+地址从SM-DP+中下载profile。
可选的,LPA可以对transaction id、SM-DS地址以及LPA challenge进行哈希运算,得到哈希运算结果,获取MNO portal的公钥,根据MNO portal的公钥对MNO portal签名进行解密,当解密得到的信息与上述哈希运算结果一致时,LPA可以请求用户同意下载profile,用户同意后,LPA可以根据SM-DS地址在SM-DS中获取事件记录,进而获取事件记录所包含的SM-DP+地址,根据SM-DP+地址从SM-DP+中下载profile。
可选的,LPA可以对transaction id、root SM-DS指示信息以及LPA challenge进行哈希运算,得到哈希运算结果,获取MNO portal的公钥,根据MNO portal的公钥对MNO portal签名进行解密,当解密得到的信息与上述哈希运算结果一致时,LPA可以请求用户同意下载profile,用户同意后,LPA可以从eUICC中获取root SM-DS地址,根据root SM-DS地址在root SM-DS中获取SM-DP+地址,根据SM-DP+地址从SM-DP+中下载profile。其中,eUICC预先存储有root SM-DS地址。
在图4所描述的方法中,MNO portal无需将SM-DP+地址经过APP发送给LPA,LPA可以根据MNO portal经过APP转发的SM-DS地址或者root SM-DS指示信息,在SM-DS中获取SM-DP+地址,进而根据SM-DP+地址从SM-DP+中下载profile。
请参见图5,图5是本发明另一实施例提供的一种签约信息集的下载方法,该方法包括但不限于如下步骤:
步骤S501:APP向MNO portal发送profile下载请求。
需要说明的是,步骤S501具体可以参见步骤S201,本发明实施例不再赘述。
步骤S502:MNO portal向APP发送终端信息获取请求,终端信息获取请求携带URL以及transaction id。
具体地,用户选择下载profile之后,MNO portal可以生成对应于该profile下载事件的事件标识transaction id,MNO portal可以向APP发送终端信息获取请求。其中,终端信息获取请求可以携带URL以及transaction id。URL可以为LPA连接MNO portal的地址。
可选的,MNO portal向APP发送的终端信息获取请求还可以携带MNO name。例如,MNO portal为中国移动网站,则MNO name可以为“中国移动”。
步骤S503:APP将URL以及transaction id发送给LPA。
具体地,APP接收到MNO portal发送的终端信息获取请求之后,可以通过APP用于获取终端信息的API,将该终端信息获取请求发送给LPA,终端信息获取请求可以携带URL 以及transaction id。例如,APP可以通过get Device Info API向LPA发送终端信息获取请求。
可选的,APP将携带有MNO name的终端信息获取请求发送给LPA之后,LPA可以提示用户[MNO name]需要获取终端信息,请求用户同意,用户同意之后LPA可以向eUICC请求获取eUICC challenge。
步骤S504:LPA获取eUICC生成的eUICC challeng。
具体地,LPA可以获取eUICC生成的eUICC challeng,并利用URL建立和MNO portal的连接,并认证portal的证书为GSMA CI颁发的证书,判断portal证书中的主体名称(subject字段)和MNO name一致。
具体实现中,若portal的证书为GSMA CI颁发的证书,则MNOportal的证书是根据GSMA CI的私钥对证书颁发者以及证书接收方等信息进行数字签名得到的。基于此,LPA可以获取GSMA CI的公钥,来认证MNOportal的证书为GSMA CI颁发的证书。
步骤S505:LPA将eUICC challenge以及transaction id发送给MNO portal。
步骤S506:MNO portal将transaction id、eUICC challenge、MNO challenge、MNO portal签名以及MNO证书发送给LPA。
具体地,LPA将eUICC challenge以及transaction id发送给MNO portal之后,MNO portal可以生成MNO challenge,对eUICC challenge以及MNO challenge进行哈希运算得到哈希运算结果,根据MNO portal的私钥对该哈希运算结果进行加密得到MNO portal签名,将transaction id、eUICC challenge、MNO challenge、MNO portal签名以及MNO证书发送给LPA。
步骤S507:LPA将transaction id、eUICC challenge、MNO challenge、MNO portal签名以及MNO证书发送给eUICC。
可选的,LPA可以将device info、MNO name、transaction id、eUICC challenge、MNO challenge、MNO portal签名以及MNO证书发送给eUICC。
步骤S508:eUICC验证MNO portal签名以及MNO证书,如果正确,则将transaction id、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给LPA。
具体地,eUICC验证MNO portal签名以及MNO证书,并认证MNOportal的证书为GSMA CI颁发的证书,判断MNOportal证书中的主体名称(subject字段)和MNO name一致,如果正确,则eUICC可以根据eUICC的私钥对transaction id、eUICC info、MNO challenge进行加密得到eUICC签名,进而将transaction id、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给LPA。
可选的,如果eUICC验证MNO portal签名以及MNO证书正确,并认证MNOportal的证书为GSMA CI颁发的证书,判断MNOportal证书中的主体名称(subject字段)和MNO name一致,则eUICC可以根据eUICC的私钥对transaction id、device info、eUICC info、MNO challenge进行加密得到eUICC签名,进而将transaction id、device info、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给LPA。
步骤S509:LPA将transaction id、eUICC info、MNO challenge、LPA challenge、eUICC签名、eUICC证书以及EUM证书发送给MNO portal。
具体地,eUICC将transaction id、eUICC info、MNO challenge、eUICC签名、eUICC 证书以及EUM证书发送给LPA之后,LPA可以生成LPA challenge,并将transaction id、eUICC info、MNO challenge、LPA challenge、eUICC签名、eUICC证书以及EUM证书发送给MNO portal。
可选的,eUICC将transaction id、device info、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给LPA之后,LPA可以生成LPA challenge,并将transaction id、device info、eUICC info、MNO challenge、LPA challenge、eUICC签名、eUICC证书以及EUM证书发送给MNO portal。
步骤S510:MNO portal验证eUICC证书、EUM证书以及eUICC签名,如果都正确,则利用transaction id将eUICC info关联到APP发起的profile下载请求。
需要说明的是,步骤S510具体可以参见步骤S208,本发明实施例不再赘述。
步骤S511:MNO portal向SM-DP+发送profile订购请求。
具体地,MNO portal可以向SM-DP+发送profile订购请求,SM-DP+可以生成profile,进而SM-DP+可以向SM-DS注册profile下载事件。
步骤S512:SM-DP+向MNO portal发送响应信息。
具体地,SM-DP+可以向MNO portal发送响应信息,响应信息用于指示SM-DP+已生成profile。
可选的,SM-DP+向SM-DS注册profile下载事件之后,SM-DP+可以向MNO portal发送响应信息,该响应信息包括SM-DP+地址。
步骤S513:MNO portal向APP发送触发下载请求,触发下载请求携带transaction id、SM-DP+地址、LPA challenge以及MNO portal的签名。
具体地,MNO portal预先存储有SM-DP+地址,当MNO portal接收到SM-DP+发送的响应信息用于指示SM-DP+已生成profile时,MNO portal可以在本地获取SM-DP+地址。MNO portal还可以对transaction id、SM-DP+地址以及LPA challenge进行哈希运算得到哈希运算结果,根据MNO portal的私钥对哈希运算结果进行加密得到MNO portal的签名,并将transaction id、SM-DP+地址、LPA challenge以及MNO portal的签名发送给APP。可选的,MNO portal可以将transaction id、SM-DP+地址、LPA challenge、MNO portal的签名以及MNO证书发送给APP。
可选的,当MNO portal接收到SM-DP+发送的响应信息包括SM-DP+地址时,MNO portal可以对transaction id、SM-DP+地址以及LPA challenge进行哈希运算得到哈希运算结果,根据MNO portal的私钥对哈希运算结果进行加密得到MNO portal的签名,并将transaction id、SM-DP+地址、LPA challenge以及MNO portal的签名发送给APP。可选的,MNO portal可以将transaction id、SM-DP+地址、LPA challenge、MNO portal的签名以及MNO证书发送给APP。
可选的,MNO portal可以对transaction id、SM-DS地址以及LPA challenge进行哈希运算得到哈希运算结果,根据MNO portal的私钥对该哈希运算结果进行加密得到MNO签名,并将transaction id、SM-DS地址、LPA challenge以及MNO portal的签名发送给APP。
可选的,MNO portal可以对transaction id、root SM-DS指示信息以及LPA challenge进行哈希运算得到哈希运算结果,根据MNO portal的私钥对该哈希运算结果进行加密得到 MNO签名,并将transaction id、root SM-DS指示信息、LPA challenge以及MNO portal的签名发送给APP。其中,root SM-DS指示信息用于指示LPA从root SM-DS中获取SM-DP+地址。
步骤S514:APP将触发下载请求发送给LPA。
步骤S515:LPA验证触发下载请求携带的LPA challenge和生成的LPA challenge一致,则将transaction id、SM-DP+地址、LPA challenge以及MNO portal的签名发送给eUICC。
具体地,LPA验证触发下载请求携带的LPA challenge和生成的LPA challenge一致之后,可以请求用户同意下载profile,用户同意后,LPA可以将transaction id、SM-DP+地址、LPA challenge以及MNO portal的签名发送给eUICC。
步骤S516:eUICC验证MNO portal的签名,向LPA发送验证结果。
具体地,eUICC可以对transaction id、SM-DP+地址以及LPA challenge进行哈希运算得到哈希运算结果,获取MNO portal的公钥,根据MNO portal的公钥对MNO portal的签名进行解密,当解密得到的信息与上述哈希运算结果一致时,eUICC可以向LPA发送验证结果。
可选的,eUICC可以对transaction id、SM-DS地址以及LPA challenge进行哈希运算得到哈希运算结果,获取MNO portal的公钥,根据MNO portal的公钥对MNO portal的签名进行解密,当解密得到的信息与上述哈希运算结果一致时,eUICC可以向LPA发送验证结果。
可选的,eUICC可以对transaction id、root SM-DS指示信息以及LPA challenge进行哈希运算得到哈希运算结果,获取MNO portal的公钥,根据MNO portal的公钥对MNO portal的签名进行解密,当解密得到的信息与上述哈希运算结果一致时,eUICC可以向LPA发送验证结果。
步骤S517:LPA根据SM-DP+地址从SM-DP+中下载profile。
具体地,eUICC发送的验证结果指示对MNO portal的签名验证成功时,LPA可以根据SM-DP+地址从SM-DP+中下载profile。可选的,eUICC发送的验证结果指示对MNO portal的签名验证成功时,LPA可以根据SM-DS地址在SM-DS中获取SM-DP+地址,根据SM-DP+地址从SM-DP+中下载profile。可选的,eUICC发送的验证结果指示对MNO portal的签名验证成功时,LPA可以根据root SM-DS指示信息从eUICC中获取root SM-DS地址,根据root SM-DS地址在SM-DS中获取SM-DP+地址,根据SM-DP+地址从SM-DP+中下载profile。其中,eUICC预先存储有root SM-DS地址。
在图5所描述的方法中,LPA对portal证书进行认证,eUICC对MNO portal的签名进行验证,可提高profile下载过程中的安全性。
请参见图6,图6是本发明另一实施例提供的一种签约信息集的下载方法,该方法包括但不限于如下步骤:
步骤S601:APP向MNO portal发送profile下载请求。
需要说明的是,步骤S601具体可以参见步骤S501,本发明实施例不再赘述。
步骤S602:MNO portal向APP发送终端信息获取请求,终端信息获取请求携带URL 以及transaction id。
需要说明的是,步骤S602具体可以参见步骤S502,本发明实施例不再赘述。
步骤S603:APP将URL以及transaction id发送给LPA。
需要说明的是,步骤S603具体可以参见步骤S503,本发明实施例不再赘述。
步骤S604:LPA获取eUICC生成的eUICC challeng。
需要说明的是,步骤S604具体可以参见步骤S504,本发明实施例不再赘述。
步骤S605:LPA将eUICC challenge以及transaction id发送给MNO portal。
步骤S606:MNO portal将transaction id、eUICC challenge、MNO challenge、MNO portal的签名以及MNO证书发送给LPA。
需要说明的是,步骤S606具体可以参见步骤S506,本发明实施例不再赘述。
步骤S607:LPA将transaction id、eUICC challenge、MNO challenge、MNO portal的签名以及MNO证书发送给eUICC。
需要说明的是,步骤S607具体可以参见步骤S507,本发明实施例不再赘述。
步骤S608:eUICC验证MNO portal的签名以及MNO证书,如果正确,则将transaction id、device info、eUICC info、MNO challenge、eUICC签名、eUICC证书以及EUM证书发送给LPA。
需要说明的是,步骤S608具体可以参见步骤S508,本发明实施例不再赘述。
步骤S609:LPA将transaction id、eUICC info、MNO challenge、LPA challenge、eUICC签名、eUICC证书以及EUM证书发送给MNO portal。
需要说明的是,步骤S609具体可以参见步骤S509,本发明实施例不再赘述。
步骤S610:MNO portal验证eUICC证书、EUM证书以及eUICC签名,如果都正确,则利用transaction id将eUICC info关联到APP发起的profile下载请求。
步骤S611:MNO portal向SM-DP+发送profile订购请求。
步骤S612:SM-DP+向MNO portal发送SM-DP+地址。
步骤S613:MNO portal向APP发送触发下载请求,触发下载请求携带transaction id。
步骤S614:APP将触发下载请求发送给LPA。
步骤S615:LPA向MNO portal发送SM-DP+地址获取请求,SM-DP+地址获取请求携带transaction id和eUICCchallenge。
步骤S616:MNO portal将transaction id、SM-DP+地址、eUICC challenge以及MNO portal的签名发送给LPA。
具体地,MNO portal可以对transaction id、SM-DP+地址以及eUICC challenge进行哈希运算得到哈希运算结果,根据MNO portal的私钥对该哈希运算结果进行加密得到MNO portal的签名,并将transaction id、SM-DP+地址、eUICC challenge以及MNO portal的签名发送给APP。
可选的,MNO portal可以对transaction id、SM-DS地址以及eUICC challenge进行哈希运算得到哈希运算结果,根据MNO portal的私钥对该哈希运算结果进行加密得到MNO签名,并将transaction id、SM-DS地址、eUICC challenge以及MNO portal的签名发送给APP。
可选的,MNO portal可以对transaction id、root SM-DS指示信息以及eUICC challenge 进行哈希运算得到哈希运算结果,根据MNO portal的私钥对该哈希运算结果进行加密得到MNO签名,并将transaction id、root SM-DS指示信息、eUICC challenge以及MNO portal的签名发送给APP。其中,root SM-DS指示信息用于指示LPA从root SM-DS中获取SM-DP+地址。
步骤S617:LPA将transaction id、SM-DP+地址、eUICC challenge以及MNO portal的签名发送给eUICC。
步骤S618:eUICC验证MNO portal的签名,向LPA发送验证结果。
具体地,eUICC可以对transaction id、SM-DP+地址以及eUICC challenge进行哈希运算得到哈希运算结果,获取MNO portal的公钥,根据MNO portal的公钥对MNO portal的签名进行解密,当解密得到的信息与上述哈希运算结果一致时,eUICC可以向LPA发送验证结果。
可选的,eUICC可以对transaction id、SM-DS地址以及eUICC challenge进行哈希运算得到哈希运算结果,获取MNO portal的公钥,根据MNO portal的公钥对MNO portal的签名进行解密,当解密得到的信息与上述哈希运算结果一致时,eUICC可以向LPA发送验证结果。
可选的,eUICC可以对transaction id、root SM-DS指示信息以及eUICC challenge进行哈希运算得到哈希运算结果,获取MNO portal的公钥,根据MNO portal的公钥对MNO portal的签名进行解密,当解密得到的信息与上述哈希运算结果一致时,eUICC可以向LPA发送验证结果。
步骤S619:LPA根据SM-DP+地址从SM-DP+中下载profile。
具体地,eUICC发送的验证结果指示对MNO portal的签名验证成功时,LPA可以根据SM-DP+地址从SM-DP+中下载profile。可选的,eUICC发送的验证结果指示对MNO portal的签名验证成功时,LPA可以根据SM-DS地址在SM-DS中获取SM-DP+地址,根据SM-DP+地址从SM-DP+中下载profile。可选的,eUICC发送的验证结果指示对MNO portal的签名验证成功时,LPA可以根据root SM-DS指示信息从eUICC中获取root SM-DS地址,根据root SM-DS地址在SM-DS中获取SM-DP+地址,根据SM-DP+地址从SM-DP+中下载profile。其中,eUICC预先存储有root SM-DS地址。
在图6所描述的方法中,相对MNO portal对LPA challenge进行加密得到MNO portal的签名,LPA验证MNO portal发送的LPA challenge与生成的LPA challenge一致之后,eUICC对MNO portal的签名进行验证,本发明实施例中LPA向eUICC获取eUICC challenge,MNO portal对eUICC challenge进行加密得到MNO portal的签名,eUICC对MNO portal的签名进行验证,可提高profile下载过程中的安全性。
上述详细阐述了本发明实施例的方法,下面提供了本发明实施例的装置。
请参见图7,图7是本发明实施例提供的一种签约信息集的下载装置的结构示意图,该签约信息集的下载装置可以包括接收单元701、发送单元702以及下载单元703,其中,各个单元的详细描述如下。
接收单元701,用于接收客户端发送的第一请求,所述第一请求携带第一信息和第一 访问路径。
发送单元702,用于将所述第一信息发送给eUICC。
所述接收单元701,还用于接收所述eUICC发送的第二信息和第一数字签名,所述第二信息包括所述第一信息和eUICC信息。
所述发送单元702,还用于根据所述第一访问路径,向应用服务器发送所述第二信息和所述第一数字签名。
所述接收单元701,还用于接收所述应用服务器在根据所述第二信息对所述第一数字签名验证成功时发送的签约管理服务器地址。
下载单元703,用于根据所述签约管理服务器地址对签约信息集进行下载。
可选的,所述第一请求携带所述应用服务器的标识信息,则本发明实施例中的签约信息集的下载装置还可以包括:
连接建立单元704,用于所述发送单元702根据所述第一访问路径,向所述应用服务器发送所述第二信息和所述第一数字签名之前,当确定用户同意所述标识信息对应的应用服务器获取所述第二信息时,通过所述第一访问路径建立与所述应用服务器之间的通信连接。
可选的,所述第一请求携带所述应用服务器的标识信息,则所述接收单元701,还用于所述发送单元将所述第一信息发送给所述eUICC之前,根据所述第一访问路径,接收所述应用服务器发送的所述应用服务器的证书。
进一步的,本发明实施例中的签约信息集的下载装置还可以包括:
判断单元705,用于对所述应用服务器的证书进行验证,并判断所述应用服务器的证书中的主体信息与所述标识信息是否相同。
所述发送单元702,还用于当对所述应用服务器的证书验证成功,且所述应用服务器的证书中的主体信息与所述标识信息相同时,将所述第一信息发送给所述eUICC。
可选的,所述第一信息可以包括所述应用服务器生成的第一随机数和下载所述签约信息集的事件标识。
可选的,所述接收单元701接收所述应用服务器发送的签约管理服务器地址,具体用于:
接收所述应用服务器在根据所述第二信息对所述第一数字签名验证成功时通过所述客户端发送的第二请求。
根据所述第二请求从所述应用服务器中获取所述签约管理服务器地址。
可选的,所述接收单元701,还用于接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和所述签约管理服务器地址,所述第二数字签名是至少根据所述签约管理服务器地址进行计算得到的。
所述下载单元703,还用于在至少根据所述签约管理服务器地址对所述第二数字签名验证成功时,根据所述签约管理服务器地址对所述签约信息集进行下载。
可选的,所述接收单元701,还用于接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和签约管理服务器地址指示信息,所述第二数字签名是至少根据所述签约管理服务器地址指示信息进行计算得到的,所述签约管理服务器包 括第一签约管理服务器和第二签约管理服务器。
所述发送单元702,具体用于在至少根据所述签约管理服务器地址指示信息对所述第二数字签名验证成功时,根据所述签约管理服务器地址指示信息向所述eUICC发送第三请求。
所述接收单元701,还用于接收所述eUICC发送的所述第二签约管理服务器地址。
所述发送单元702,还用于根据所述第二签约管理服务器地址向所述第二签约管理服务器发送第四请求。
所述接收单元701,还用于接收所述第二签约管理服务器发送的所述第一签约管理服务器的签约管理服务器地址。
可选的,所述接收单元701,还用于接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和第二签约管理服务器的第二签约管理服务器地址,所述第二数字签名是至少根据所述第二签约管理服务器地址进行计算得到的,所述签约管理服务器包括第一签约管理服务器和所述第二签约管理服务器。
所述发送单元702,还用于在至少根据所述第二签约管理服务器地址对所述第二数字签名验证成功时,根据所述第二签约管理服务器地址向所述第二签约管理服务器发送第四请求。
所述接收单元701,还用于接收所述第二签约管理服务器发送的所述第一签约管理服务器的签约管理服务器地址。
可选的,本发明实施例中的签约信息集的下载装置还可以包括:
生成单元706,用于生成第二随机数。
所述发送单元702,还用于向所述应用服务器发送所述第二随机数。
所述接收单元701,还用于接收所述应用服务器通过所述客户端发送的第二随机数和第三数字签名,所述第三数字签名是所述应用服务器至少根据所述第二随机数以及所述签约管理服务器地址进行计算得到的。
所述发送单元702,还用于当所述应用服务器通过所述客户端发送的第二随机数和生成得到的第二随机数相同时,将所述第二随机数、所述签约管理服务器地址以及所述第三数字签名发送给所述eUICC。
所述接收单元701,还用于接收所述eUICC发送的至少根据所述第二随机数和所述签约管理服务器对所述第三数字签名进行验证的验证结果。
所述下载单元703,还用于当所述验证结果指示所述eUICC对所述第三数字签名验证成功时,根据所述签约管理服务器地址对所述签约信息集进行下载。
可选的,所述发送单元702,还用于向所述eUICC发送随机数获取请求。
所述接收单元701,还用于接收所述eUICC生成的第三随机数。
所述发送单元702,还用于将所述第三随机数发送给应用服务器,并接收所述应用服务器生成的第四数字签名,所述第四数字签名是所述应用服务器至少根据所述第三随机数进行计算得到的。
所述发送单元702,还用于将所述第四数字签名和所述第一信息发送给所述eUICC。
所述接收单元701,还用于接收所述eUICC在至少根据所述第三随机数对所述第四数 字签名验证成功时发送的所述第一数字签名。
可选的,本发明实施例中的签约信息集的下载装置和所述eUICC可以部署在终端设备中,所述终端设备运行有所述客户端,用户可以通过所述客户端登录到所述应用服务器。
需要说明的是,各个单元的实现还可以对应参照图2-图6所示的方法实施例的相应描述。
在图7所描述的签约信息集的下载装置中,接收单元701接收客户端发送的第一请求,第一请求携带第一信息和第一访问路径,发送单元702将第一信息发送给eUICC,接收单元701接收eUICC发送的第二信息和第一数字签名,第二信息包括第一信息和eUICC信息,发送单元702根据第一访问路径,向应用服务器发送第二信息和第一数字签名,接收单元701接收应用服务器在根据第二信息对第一数字签名验证成功时发送的签约管理服务器地址,下载单元703根据签约管理服务器地址对签约信息集进行下载,可在不要求客户端具有较高安全等级或者授权等级的情况下,提高第二信息的可靠性。
请参见图8,图8是本发明实施例提供的一种终端设备,该终端设备包括处理器801、存储器802和收发器803,所述处理器801、存储器802和收发器803通过总线相互连接。
存储器802包括但不限于是随机存储记忆体(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、可擦除可编程只读存储器(Erasable Programmable Read Only Memory,EPROM)、或便携式只读存储器(Compact Disc Read-Only Memory,CD-ROM),该存储器802用于存储相关指令及数据。收发器803用于接收和发送数据。
处理器801可以是一个或多个中央处理器(Central Processing Unit,CPU),在处理器801是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
该终端设备中的处理器801用于读取所述存储器802中存储的程序代码,执行以下操作:
通过收发器803接收客户端发送的第一请求,所述第一请求携带第一信息和第一访问路径。
通过收发器803将所述第一信息发送给eUICC。
通过收发器803接收所述eUICC发送的第二信息和第一数字签名,所述第一数字签名是根据所述第二信息进行计算得到的,所述第二信息包括所述第一信息和eUICC信息。
根据所述第一访问路径,向应用服务器发送所述第二信息和所述第一数字签名。
通过收发器803接收所述应用服务器发送的签约管理服务器地址。
根据所述签约管理服务器地址对签约信息集进行下载。
可选的,所述第一请求携带所述应用服务器的标识信息,处理器801根据所述第一访问路径,向应用服务器发送所述第二信息和所述第一数字签名之前,还可以执行以下操作:
当确定用户同意所述标识信息对应的应用服务器获取所述第二信息时,通过所述第一访问路径建立与所述应用服务器之间的通信连接。
可选的,所述第一请求携带所述应用服务器的标识信息,则处理器801通过收发器803将所述第一信息发送给eUICC之前,还可以执行以下操作:
根据所述第一访问路径,接收所述应用服务器发送的所述应用服务器的证书。
对所述应用服务器的证书进行验证,并判断所述应用服务器的证书中的主体信息与所述标识信息是否相同。
当对所述应用服务器的证书验证成功,且所述应用服务器的证书中的主体信息与所述标识信息相同时,通过收发器803将所述第一信息发送给所述eUICC。
可选的,所述第一信息包括所述应用服务器生成的第一随机数和下载所述签约信息集的事件标识。
可选的,处理器801通过收发器803接收所述应用服务器发送的签约管理服务器地址,具体可以为:
通过收发器803接收所述应用服务器通过所述客户端发送的第二请求。
根据所述第二请求从所述应用服务器中获取所述签约管理服务器地址。
可选的,处理器801还可以接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和所述签约管理服务器地址,所述第二数字签名是至少根据所述签约管理服务器地址进行计算得到的。
在至少根据所述签约管理服务器地址对所述第二数字签名验证成功时,处理器801根据所述签约管理服务器地址对所述签约信息集进行下载。
可选的,处理器801还可以接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和签约管理服务器地址指示信息,所述第二数字签名是至少根据所述签约管理服务器地址指示信息进行计算得到的,所述签约管理服务器包括第一签约管理服务器和第二签约管理服务器。
在至少根据所述签约管理服务器地址指示信息对所述第二数字签名验证成功时,处理器801根据所述签约管理服务器地址指示信息向所述eUICC发送第三请求。
处理器801接收所述eUICC发送的所述第二签约管理服务器地址。
处理器801根据所述第二签约管理服务器地址向所述第二签约管理服务器发送第四请求。
处理器801接收所述第二签约管理服务器发送的所述第一签约管理服务器的签约管理服务器地址。
可选的,处理器801接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和第二签约管理服务器的第二签约管理服务器地址,所述第二数字签名是至少根据所述第二签约管理服务器地址进行计算得到的,所述签约管理服务器包括第一签约管理服务器和所述第二签约管理服务器。
在至少根据所述第二签约管理服务器地址对所述第二数字签名验证成功时,处理器801根据所述第二签约管理服务器地址向所述第二签约管理服务器发送第四请求。
处理器801接收所述第二签约管理服务器发送的所述第一签约管理服务器的签约管理服务器地址。
可选的,处理器801还可以生成第二随机数,并向所述应用服务器发送所述第二随机数。
处理器801接收所述应用服务器通过所述客户端发送的第二随机数和第三数字签名,所述第三数字签名是至少根据所述第二随机数以及所述签约管理服务器地址进行计算得到 的。
当所述应用服务器通过所述客户端发送的第二随机数和生成得到的第二随机数相同时,处理器801将所述第二随机数、所述签约管理服务器地址以及所述第三数字签名发送给所述eUICC。
处理器801接收所述eUICC发送的至少根据所述第二随机数和所述签约管理服务器对所述第三数字签名进行验证的验证结果。
当所述验证结果指示所述eUICC对所述第三数字签名验证成功时,处理器801根据所述签约管理服务器地址对所述签约信息集进行下载。
可选的,处理器801还可以向所述eUICC发送随机数获取请求。
处理器801接收所述eUICC生成的第三随机数。
处理器801将所述第三随机数发送给应用服务器,并接收所述应用服务器生成的第四数字签名,所述第四数字签名是至少根据所述第三随机数进行计算得到的。
处理器801将所述第四数字签名和所述第一信息发送给所述eUICC。
处理器801接收所述eUICC发送的所述第一数字签名。
需要说明的是,各个操作的实现还可以对应参照图2-图6所示的方法实施例的相应描述。
在图8所描述的终端设备中,处理器801接收客户端发送的第一请求,将第一信息发送给eUICC,接收eUICC发送的第二信息和第一数字签名,根据第一访问路径,向应用服务器发送第二信息和第一数字签名,接收应用服务器发送的签约管理服务器地址,根据签约管理服务器地址对签约信息集进行下载,可在不要求客户端具有较高安全等级或者授权等级的情况下,提高第二信息的可靠性。
请参见图9,图9是本发明另一实施例提供的一种签约信息集的下载装置的结构示意图,该签约信息集的下载装置可以包括接收单元901、数字签名验证单元902以及发送单元903,其中,各个单元的详细描述如下。
接收单元901,用于接收LPA根据第一访问路径发送的第二信息和第一数字签名,第一数字签名是根据第二信息进行计算得到的。
数字签名验证单元902,用于根据所述第二信息对所述第一数字签名进行验证。
发送单元903,用于当根据所述第二信息对所述第一数字签名验证成功时,向所述LPA发送签约管理服务器地址,所述签约管理服务器地址用于所述LPA对签约信息集进行下载。
可选的,本发明实施例中的签约信息集的下载装置还可以包括:
连接建立单元904,用于所述接收单元901接收所述LPA根据所述第一访问路径发送的所述第二信息和所述第一数字签名之前,建立与所述LPA之间的通信连接。
所述发送单元903,还用于通过与所述LPA之间的通信连接,向所述LPA发送证书。
可选的,所述发送单元903向所述LPA发送签约管理服务器地址,具体用于:
通过客户端向所述LPA发送第二请求。
向所述LPA发送所述签约管理服务器地址。
可选的,本发明实施例中的签约信息集的下载装置还可以包括:
数字签名获取单元905,用于根据至少所述签约管理服务器地址进行计算得到第二数字签名。
所述发送单元903,还用于通过客户端向所述LPA发送第二请求,所述第二请求携带所述第二数字签名和所述签约管理服务器地址。
可选的,本发明实施例中的签约信息集的下载装置还可以包括:
数字签名获取单元905,用于根据至少签约管理服务器地址指示信息进行计算得到第二数字签名。
所述发送单元903,还用于通过客户端向所述LPA发送第二请求,所述第二请求携带所述第二数字签名和所述签约管理服务器地址指示信息。
可选的,本发明实施例中的签约信息集的下载装置还可以包括:
数字签名获取单元905,用于根据至少第二签约管理服务器的第二签约管理服务器地址进行计算得到第二数字签名。
所述发送单元903,还用于通过客户端向所述LPA发送第二请求,所述第二请求携带所述第二数字签名和所述第二签约管理服务器地址。
可选的,所述接收单元901,还用于接收所述LPA发送的第二随机数。
进一步的,本发明实施例中的签约信息集的下载装置还可以包括:
数字签名获取单元905,用于根据至少所述第二随机数以及所述签约管理服务器地址进行计算得到第三数字签名。
所述发送单元903,还用于将所述第二随机数和所述第三数字签名通过客户端发送给所述LPA。
可选的,所述接收单元901,还用于接收所述LPA发送的第三随机数。
进一步的,本发明实施例中的签约信息集的下载装置还可以包括:
数字签名获取单元905,用于根据至少所述第三随机数进行计算得到第四数字签名。
所述发送单元903,还用于将所述第四数字签名发送给所述LPA。
可选的,本发明实施例中的签约信息集的下载装置还可以包括:
信息获取单元906,用于所述接收单元901接收所述LPA根据所述第一访问路径发送的所述第二信息和所述第一数字签名之后,当根据所述第二信息对所述第一数字签名验证成功时,获取eUICC信息。
信息关联单元907,用于根据所述第二信息所包含的下载所述签约信息集的事件标识,将所述eUICC信息关联到所述客户端发送的第一请求。
可选的,本发明实施例中的签约信息集的下载装置可以应用于应用服务器中,所述LPA部署在终端设备中,所述终端设备运行有客户端,用户可以通过所述客户端登录到所述应用服务器。
需要说明的是,各个单元的实现还可以对应参照图2-图6所示的方法实施例的相应描述。
在图9所描述的签约信息集的下载装置中,接收单元901接收LPA根据第一访问路径发送的第二信息和第一数字签名,数字签名验证单元902根据第二信息对第一数字签名进行验证,当根据第二信息对第一数字签名验证成功时,发送单元903向LPA发送签约管理 服务器地址,签约管理服务器地址用于LPA对签约信息集进行下载,应用服务器可接收LPA直接发送的第二信息,无需客户端转发,可在不要求客户端具有较高安全等级或者授权等级的情况下,提高第二信息的可靠性。
请参见图10,图10是本发明实施例提供的一种应用服务器,该应用服务器包括处理器1001、存储器1002和收发器1003,所述处理器1001、存储器1002和收发器1003通过总线相互连接。
存储器1002包括但不限于是RAM、ROM、EPROM或者CD-ROM,该存储器1002用于存储相关指令及数据。收发器1003用于接收和发送数据。
处理器1001可以是一个或多个CPU,在处理器1001是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
该应用服务器中的处理器1001用于读取所述存储器1002中存储的程序代码,执行以下操作:
通过收发器1003接收LPA根据第一访问路径发送的第二信息和第一数字签名,第一数字签名是根据所述第二信息进行计算得到的。
根据所述第二信息对所述第一数字签名进行验证。
当根据所述第二信息对所述第一数字签名验证成功时,通过收发器1003向所述LPA发送签约管理服务器地址,所述签约管理服务器地址用于所述LPA对签约信息集进行下载。
可选的,所述处理器1001接收LPA根据第一访问路径发送的第二信息和第一数字签名之前,还可以执行以下操作:
建立与所述LPA之间的通信连接。
通过与所述LPA之间的通信连接,向所述LPA发送证书。
可选的,处理器1001向所述LPA发送签约管理服务器地址,具体用于:
通过客户端向所述LPA发送第二请求。
向所述LPA发送所述签约管理服务器地址。
可选的,处理器1001还可以根据至少所述签约管理服务器地址进行计算得到第二数字签名,通过客户端向所述LPA发送第二请求,所述第二请求携带所述第二数字签名和所述签约管理服务器地址。
可选的,处理器1001还可以根据至少签约管理服务器地址指示信息进行计算得到第二数字签名,通过客户端向所述LPA发送第二请求,所述第二请求携带所述第二数字签名和所述签约管理服务器地址指示信息。
可选的,处理器1001还可以根据至少第二签约管理服务器的第二签约管理服务器地址进行计算得到第二数字签名,通过客户端向所述LPA发送第二请求,所述第二请求携带所述第二数字签名和所述第二签约管理服务器地址。
可选的,处理器1001还可以接收所述LPA发送的第二随机数,根据至少所述第二随机数以及所述签约管理服务器地址进行计算得到第三数字签名,将所述第二随机数和所述第三数字签名通过客户端发送给所述LPA。
可选的,处理器1001还可以接收所述LPA发送的第三随机数,根据至少所述第三随 机数进行计算得到第四数字签名,将所述第四数字签名发送给所述LPA。
可选的,处理器1001接收LPA根据第一访问路径发送的第二信息和第一数字签名之后,还可以执行以下操作:
当根据所述第二信息对所述第一数字签名验证成功时,处理器1001获取嵌入式通用集成电路卡eUICC信息。
处理器1001根据所述第二信息所包含的下载所述签约信息集的事件标识,将所述eUICC信息关联到所述客户端发送的第一请求。
需要说明的是,各个操作的实现还可以对应参照图2-图6所示的方法实施例的相应描述。
在图10所描述的应用服务器中,处理器1001接收LPA根据第一访问路径发送的第二信息和第一数字签名,当根据第二信息对第一数字签名验证成功时,通过收发器1003向LPA发送签约管理服务器地址,签约管理服务器地址用于LPA对签约信息集进行下载,应用服务器可接收LPA直接发送的第二信息,无需客户端转发,可在不要求客户端具有较高安全等级或者授权等级的情况下,提高第二信息的可靠性。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,该流程可以由计算机程序来指令相关的硬件完成,该程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。而前述的存储介质包括:ROM或随机存储记忆体RAM、磁碟或者光盘等各种可存储程序代码的介质。

Claims (44)

  1. 一种签约信息集的下载方法,其特征在于,所述方法包括:
    接收客户端发送的第一请求,所述第一请求携带第一信息和第一访问路径;
    将所述第一信息发送给嵌入式通用集成电路卡eUICC;
    接收所述eUICC发送的第二信息和第一数字签名,所述第一数字签名是根据所述第二信息进行计算得到的,所述第二信息包括所述第一信息和eUICC信息;
    根据所述第一访问路径,向应用服务器发送所述第二信息和所述第一数字签名;
    接收所述应用服务器发送的签约管理服务器地址;
    根据所述签约管理服务器地址对签约信息集进行下载。
  2. 如权利要求1所述的方法,其特征在于,所述第一请求携带所述应用服务器的标识信息;
    所述根据所述第一访问路径,向应用服务器发送所述第二信息和所述第一数字签名之前,还包括:
    当确定用户同意所述标识信息对应的应用服务器获取所述第二信息时,通过所述第一访问路径建立与所述应用服务器之间的通信连接。
  3. 如权利要求1或2所述的方法,其特征在于,所述第一请求携带所述应用服务器的标识信息;
    所述将所述第一信息发送给eUICC之前,还包括:
    根据所述第一访问路径,接收所述应用服务器发送的所述应用服务器的证书;
    对所述应用服务器的证书进行验证,并判断所述应用服务器的证书中的主体信息与所述标识信息是否相同;
    当对所述应用服务器的证书验证成功,且所述应用服务器的证书中的主体信息与所述标识信息相同时,将所述第一信息发送给所述eUICC。
  4. 如权利要求1所述的方法,其特征在于,所述第一信息包括所述应用服务器生成的第一随机数和下载所述签约信息集的事件标识。
  5. 如权利要求1所述的方法,其特征在于,所述接收所述应用服务器发送的签约管理服务器地址,包括:
    接收所述应用服务器通过所述客户端发送的第二请求;
    根据所述第二请求从所述应用服务器中获取所述签约管理服务器地址。
  6. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和所述签约管理服务器地址,所述第二数字签名是至少根据所述签约管理服务器地址进行计算得到的;
    在至少根据所述签约管理服务器地址对所述第二数字签名验证成功时,根据所述签约管理服务器地址对所述签约信息集进行下载。
  7. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和签约管理服务器地址指示信息,所述第二数字签名是至少根据所述签约管理服务器地址指示信息进行计算得到的,所述签约管理服务器包括第一签约管理服务器和第二签约管理服务器;
    在至少根据所述签约管理服务器地址指示信息对所述第二数字签名验证成功时,根据所述签约管理服务器地址指示信息向所述eUICC发送第三请求;
    接收所述eUICC发送的所述第二签约管理服务器地址;
    根据所述第二签约管理服务器地址向所述第二签约管理服务器发送第四请求;
    接收所述第二签约管理服务器发送的所述第一签约管理服务器的签约管理服务器地址。
  8. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和第二签约管理服务器的第二签约管理服务器地址,所述第二数字签名是至少根据所述第二签约管理服务器地址进行计算得到的,所述签约管理服务器包括第一签约管理服务器和所述第二签约管理服务器;
    在至少根据所述第二签约管理服务器地址对所述第二数字签名验证成功时,根据所述第二签约管理服务器地址向所述第二签约管理服务器发送第四请求;
    接收所述第二签约管理服务器发送的所述第一签约管理服务器的签约管理服务器地址。
  9. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    生成第二随机数,并向所述应用服务器发送所述第二随机数;
    接收所述应用服务器通过所述客户端发送的第二随机数和第三数字签名,所述第三数字签名是至少根据所述第二随机数以及所述签约管理服务器地址进行计算得到的;
    当所述应用服务器通过所述客户端发送的第二随机数和生成得到的第二随机数相同时,将所述第二随机数、所述签约管理服务器地址以及所述第三数字签名发送给所述eUICC;
    接收所述eUICC发送的至少根据所述第二随机数和所述签约管理服务器对所述第三数字签名进行验证的验证结果;
    当所述验证结果指示所述eUICC对所述第三数字签名验证成功时,根据所述签约管理服务器地址对所述签约信息集进行下载。
  10. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    向所述eUICC发送随机数获取请求;
    接收所述eUICC生成的第三随机数;
    将所述第三随机数发送给应用服务器,并接收所述应用服务器生成的第四数字签名,所述第四数字签名是至少根据所述第三随机数进行计算得到的;
    将所述第四数字签名和所述第一信息发送给所述eUICC;
    接收所述eUICC发送的所述第一数字签名。
  11. 如权利要求1所述的方法,其特征在于,所述方法应用于本地文件助手LPA中,所述LPA和所述eUICC部署在终端设备中,所述终端设备运行有所述客户端,用户通过所述客户端登录到所述应用服务器。
  12. 一种签约信息集的下载方法,其特征在于,所述方法包括:
    接收本地文件助手LPA根据第一访问路径发送的第二信息和第一数字签名,所述第一数字签名是根据所述第二信息进行计算得到的;
    根据所述第二信息对所述第一数字签名进行验证;
    当根据所述第二信息对所述第一数字签名验证成功时,向所述LPA发送签约管理服务器地址,所述签约管理服务器地址用于所述LPA对签约信息集进行下载。
  13. 如权利要求12所述的方法,其特征在于,所述接收LPA根据第一访问路径发送的第二信息和第一数字签名之前,还包括:
    建立与所述LPA之间的通信连接;
    通过与所述LPA之间的通信连接,向所述LPA发送证书。
  14. 如权利要求12所述的方法,其特征在于,所述向所述LPA发送签约管理服务器地址,包括:
    通过客户端向所述LPA发送第二请求;
    向所述LPA发送所述签约管理服务器地址。
  15. 如权利要求12所述的方法,其特征在于,所述方法还包括:
    根据至少所述签约管理服务器地址进行计算得到第二数字签名;
    通过客户端向所述LPA发送第二请求,所述第二请求携带所述第二数字签名和所述签约管理服务器地址。
  16. 如权利要求12所述的方法,其特征在于,所述方法还包括:
    根据至少签约管理服务器地址指示信息进行计算得到第二数字签名;
    通过客户端向所述LPA发送第二请求,所述第二请求携带所述第二数字签名和所述签约管理服务器地址指示信息。
  17. 如权利要求12所述的方法,其特征在于,所述方法还包括:
    根据至少第二签约管理服务器的第二签约管理服务器地址进行计算得到第二数字签名;
    通过客户端向所述LPA发送第二请求,所述第二请求携带所述第二数字签名和所述第二签约管理服务器地址。
  18. 如权利要求12所述的方法,其特征在于,所述方法还包括:
    接收所述LPA发送的第二随机数;
    根据至少所述第二随机数以及所述签约管理服务器地址进行计算得到第三数字签名;
    将所述第二随机数和所述第三数字签名通过客户端发送给所述LPA。
  19. 如权利要求12所述的方法,其特征在于,所述方法还包括:
    接收所述LPA发送的第三随机数;
    根据至少所述第三随机数进行计算得到第四数字签名;
    将所述第四数字签名发送给所述LPA。
  20. 如权利要求12所述的方法,其特征在于,所述接收LPA根据第一访问路径发送的第二信息和第一数字签名之后,还包括:
    当根据所述第二信息对所述第一数字签名验证成功时,获取嵌入式通用集成电路卡eUICC信息;
    根据所述第二信息所包含的下载所述签约信息集的事件标识,将所述eUICC信息关联到所述客户端发送的第一请求。
  21. 如权利要求12所述的方法,其特征在于,所述方法应用于应用服务器中,所述LPA部署在终端设备中,所述终端设备运行有客户端,用户通过所述客户端登录到所述应用服务器。
  22. 一种签约信息集的下载装置,其特征在于,所述装置包括:
    接收单元,用于接收客户端发送的第一请求,所述第一请求携带第一信息和第一访问路径;
    发送单元,用于将所述第一信息发送给嵌入式通用集成电路卡eUICC;
    所述接收单元,还用于接收所述eUICC发送的第二信息和第一数字签名,所述第二信息包括所述第一信息和eUICC信息;
    所述发送单元,还用于根据所述第一访问路径,向应用服务器发送所述第二信息和所述第一数字签名;
    所述接收单元,还用于接收所述应用服务器在根据所述第二信息对所述第一数字签名验证成功时发送的签约管理服务器地址;
    下载单元,用于根据所述签约管理服务器地址对签约信息集进行下载。
  23. 如权利要求22所述的装置,其特征在于,所述第一请求携带所述应用服务器的 标识信息;
    所述装置还包括:
    连接建立单元,用于所述发送单元根据所述第一访问路径,向所述应用服务器发送所述第二信息和所述第一数字签名之前,当确定用户同意所述标识信息对应的应用服务器获取所述第二信息时,通过所述第一访问路径建立与所述应用服务器之间的通信连接。
  24. 如权利要求22或23所述的装置,其特征在于,所述第一请求携带所述应用服务器的标识信息;
    所述接收单元,还用于所述发送单元将所述第一信息发送给所述eUICC之前,根据所述第一访问路径,接收所述应用服务器发送的所述应用服务器的证书;
    所述装置还包括:
    判断单元,用于对所述应用服务器的证书进行验证,并判断所述应用服务器的证书中的主体信息与所述标识信息是否相同;
    所述发送单元,还用于当对所述应用服务器的证书验证成功,且所述应用服务器的证书中的主体信息与所述标识信息相同时,将所述第一信息发送给所述eUICC。
  25. 如权利要求22所述的装置,其特征在于,所述第一信息包括所述应用服务器生成的第一随机数和下载所述签约信息集的事件标识。
  26. 如权利要求22所述的装置,其特征在于,所述接收单元接收所述应用服务器发送的签约管理服务器地址,具体用于:
    接收所述应用服务器在根据所述第二信息对所述第一数字签名验证成功时通过所述客户端发送的第二请求;
    根据所述第二请求从所述应用服务器中获取所述签约管理服务器地址。
  27. 如权利要求22所述的装置,其特征在于,
    所述接收单元,还用于接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和所述签约管理服务器地址,所述第二数字签名是至少根据所述签约管理服务器地址进行计算得到的;
    所述下载单元,还用于在至少根据所述签约管理服务器地址对所述第二数字签名验证成功时,根据所述签约管理服务器地址对所述签约信息集进行下载。
  28. 如权利要求22所述的装置,其特征在于,
    所述接收单元,还用于接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和签约管理服务器地址指示信息,所述第二数字签名是至少根据所述签约管理服务器地址指示信息进行计算得到的,所述签约管理服务器包括第一签约管理服务器和第二签约管理服务器;
    所述发送单元,具体用于在至少根据所述签约管理服务器地址指示信息对所述第二数 字签名验证成功时,根据所述签约管理服务器地址指示信息向所述eUICC发送第三请求;
    所述接收单元,还用于接收所述eUICC发送的所述第二签约管理服务器地址;
    所述发送单元,还用于根据所述第二签约管理服务器地址向所述第二签约管理服务器发送第四请求;
    所述接收单元,还用于接收所述第二签约管理服务器发送的所述第一签约管理服务器的签约管理服务器地址。
  29. 如权利要求22所述的装置,其特征在于,
    所述接收单元,还用于接收所述应用服务器通过所述客户端发送的第二请求,所述第二请求携带第二数字签名和第二签约管理服务器的第二签约管理服务器地址,所述第二数字签名是至少根据所述第二签约管理服务器地址进行计算得到的,所述签约管理服务器包括第一签约管理服务器和所述第二签约管理服务器;
    所述发送单元,还用于在至少根据所述第二签约管理服务器地址对所述第二数字签名验证成功时,根据所述第二签约管理服务器地址向所述第二签约管理服务器发送第四请求;
    所述接收单元,还用于接收所述第二签约管理服务器发送的所述第一签约管理服务器的签约管理服务器地址。
  30. 如权利要求22所述的装置,其特征在于,所述装置还包括:
    生成单元,用于生成第二随机数;
    所述发送单元,还用于向所述应用服务器发送所述第二随机数;
    所述接收单元,还用于接收所述应用服务器通过所述客户端发送的第二随机数和第三数字签名,所述第三数字签名是所述应用服务器至少根据所述第二随机数以及所述签约管理服务器地址进行计算得到的;
    所述发送单元,还用于当所述应用服务器通过所述客户端发送的第二随机数和生成得到的第二随机数相同时,将所述第二随机数、所述签约管理服务器地址以及所述第三数字签名发送给所述eUICC;
    所述接收单元,还用于接收所述eUICC发送的至少根据所述第二随机数和所述签约管理服务器对所述第三数字签名进行验证的验证结果;
    所述下载单元,还用于当所述验证结果指示所述eUICC对所述第三数字签名验证成功时,根据所述签约管理服务器地址对所述签约信息集进行下载。
  31. 如权利要求22所述的装置,其特征在于,
    所述发送单元,还用于向所述eUICC发送随机数获取请求;
    所述接收单元,还用于接收所述eUICC生成的第三随机数;
    所述发送单元,还用于将所述第三随机数发送给应用服务器,并接收所述应用服务器生成的第四数字签名,所述第四数字签名是所述应用服务器至少根据所述第三随机数进行计算得到的;
    所述发送单元,还用于将所述第四数字签名和所述第一信息发送给所述eUICC;
    所述接收单元,还用于接收所述eUICC在至少根据所述第三随机数对所述第四数字签名验证成功时发送的所述第一数字签名。
  32. 如权利要求22所述的装置,其特征在于,所述装置和所述eUICC部署在终端设备中,所述终端设备运行有所述客户端,用户通过所述客户端登录到所述应用服务器。
  33. 一种终端设备,其特征在于,所述终端设备包括处理器、存储器以及收发器,其中,所述存储器中存储一组程序代码,且所述处理器用于调用存储器中存储的程序代码,用于执行以下操作:
    接收客户端发送的第一请求,所述第一请求携带第一信息和第一访问路径;
    将所述第一信息发送给嵌入式通用集成电路卡eUICC;
    接收所述eUICC发送的第二信息和第一数字签名,所述第一数字签名是根据所述第二信息进行计算得到的,所述第二信息包括所述第一信息和eUICC信息;
    根据所述第一访问路径,向应用服务器发送所述第二信息和所述第一数字签名;
    接收所述应用服务器发送的签约管理服务器地址;
    根据所述签约管理服务器地址对签约信息集进行下载。
  34. 一种签约信息集的下载装置,其特征在于,所述装置包括:
    接收单元,用于接收本地文件助手LPA根据第一访问路径发送的第二信息和第一数字签名,所述第一数字签名是根据所述第二信息进行计算得到的;
    数字签名验证单元,用于根据所述第二信息对所述第一数字签名进行验证;
    发送单元,用于当根据所述第二信息对所述第一数字签名验证成功时,向所述LPA发送签约管理服务器地址,所述签约管理服务器地址用于所述LPA对签约信息集进行下载。
  35. 如权利要求34所述的装置,其特征在于,所述装置还包括:
    连接建立单元,用于所述接收单元接收所述LPA根据所述第一访问路径发送的所述第二信息和所述第一数字签名之前,建立与所述LPA之间的通信连接;
    所述发送单元,还用于通过与所述LPA之间的通信连接,向所述LPA发送证书。
  36. 如权利要求34所述的装置,其特征在于,所述发送单元向所述LPA发送签约管理服务器地址,具体用于:
    通过客户端向所述LPA发送第二请求;
    向所述LPA发送所述签约管理服务器地址。
  37. 如权利要求34所述的装置,其特征在于,所述装置还包括:
    数字签名获取单元,用于根据至少所述签约管理服务器地址进行计算得到第二数字签名;
    所述发送单元,还用于通过客户端向所述LPA发送第二请求,所述第二请求携带所述 第二数字签名和所述签约管理服务器地址。
  38. 如权利要求34所述的装置,其特征在于,所述装置还包括:
    数字签名获取单元,用于根据至少签约管理服务器地址指示信息进行计算得到第二数字签名;
    所述发送单元,还用于通过客户端向所述LPA发送第二请求,所述第二请求携带所述第二数字签名和所述签约管理服务器地址指示信息。
  39. 如权利要求34所述的装置,其特征在于,所述装置还包括:
    数字签名获取单元,用于根据至少第二签约管理服务器的第二签约管理服务器地址进行计算得到第二数字签名;
    所述发送单元,还用于通过客户端向所述LPA发送第二请求,所述第二请求携带所述第二数字签名和所述第二签约管理服务器地址。
  40. 如权利要求34所述的装置,其特征在于,
    所述接收单元,还用于接收所述LPA发送的第二随机数;
    所述装置还包括:
    数字签名获取单元,用于根据至少所述第二随机数以及所述签约管理服务器地址进行计算得到第三数字签名;
    所述发送单元,还用于将所述第二随机数和所述第三数字签名通过客户端发送给所述LPA。
  41. 如权利要求34所述的装置,其特征在于,
    所述接收单元,还用于接收所述LPA发送的第三随机数;
    所述装置还包括:
    数字签名获取单元,用于根据至少所述第三随机数进行计算得到第四数字签名;
    所述发送单元,还用于将所述第四数字签名发送给所述LPA。
  42. 如权利要求34所述的装置,其特征在于,所述装置还包括:
    信息获取单元,用于所述接收单元接收所述LPA根据所述第一访问路径发送的所述第二信息和所述第一数字签名之后,当根据所述第二信息对所述第一数字签名验证成功时,获取嵌入式通用集成电路卡eUICC信息;
    信息关联单元,用于根据所述第二信息所包含的下载所述签约信息集的事件标识,将所述eUICC信息关联到所述客户端发送的第一请求。
  43. 如权利要求34所述的装置,其特征在于,所述装置应用于应用服务器中,所述LPA部署在终端设备中,所述终端设备运行有客户端,用户通过所述客户端登录到所述应用服务器。
  44. 一种应用服务器,其特征在于,所述应用服务器包括处理器、存储器以及收发器,其中,所述存储器中存储一组程序代码,且所述处理器用于调用存储器中存储的程序代码,用于执行以下操作:
    接收本地文件助手LPA根据第一访问路径发送的第二信息和第一数字签名,所述第一数字签名是根据所述第二信息进行计算得到的;
    根据所述第二信息对所述第一数字签名进行验证;
    当根据所述第二信息对所述第一数字签名验证成功时,向所述LPA发送签约管理服务器地址,所述签约管理服务器地址用于所述LPA对签约信息集进行下载。
PCT/CN2017/071317 2017-01-16 2017-01-16 一种签约信息集的下载方法、装置以及相关设备 WO2018129753A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/071317 WO2018129753A1 (zh) 2017-01-16 2017-01-16 一种签约信息集的下载方法、装置以及相关设备
CN201780081853.4A CN110121894B (zh) 2017-01-16 2017-01-16 一种签约信息集的下载方法、装置以及相关设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/071317 WO2018129753A1 (zh) 2017-01-16 2017-01-16 一种签约信息集的下载方法、装置以及相关设备

Publications (1)

Publication Number Publication Date
WO2018129753A1 true WO2018129753A1 (zh) 2018-07-19

Family

ID=62839189

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/071317 WO2018129753A1 (zh) 2017-01-16 2017-01-16 一种签约信息集的下载方法、装置以及相关设备

Country Status (2)

Country Link
CN (1) CN110121894B (zh)
WO (1) WO2018129753A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113132990A (zh) * 2021-04-19 2021-07-16 东信和平科技股份有限公司 一种基于eSIM的Profile远程订阅方法及服务器和终端设备
CN113784336A (zh) * 2021-09-17 2021-12-10 捷开通讯(深圳)有限公司 码号下载方法、系统、终端设备及计算机可读存储介质
CN114826772A (zh) * 2022-05-30 2022-07-29 中国联合网络通信集团有限公司 数据完整性验证系统

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645239B (zh) * 2021-08-10 2022-10-28 平安普惠企业管理有限公司 一种应用登录方法、装置、用户终端及存储介质
CN115665747B (zh) * 2022-12-26 2023-03-03 深圳市亲邻科技有限公司 终端设备运营商网络切换方法、装置、介质及终端设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103974250A (zh) * 2013-01-30 2014-08-06 华为终端有限公司 配置方法和设备
CN105050073A (zh) * 2014-04-22 2015-11-11 三星电子株式会社 配置文件的方法和装置
WO2016167551A1 (ko) * 2015-04-13 2016-10-20 삼성전자 주식회사 통신 시스템에서 프로파일을 관리하는 기법
WO2016178548A1 (ko) * 2015-05-07 2016-11-10 삼성전자 주식회사 프로파일 제공 방법 및 장치

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043744B (zh) * 2006-03-21 2012-06-06 华为技术有限公司 一种ims网络中用户终端接入鉴权的方法
CN100596076C (zh) * 2006-10-20 2010-03-24 华为技术有限公司 个人网管理中用户设备登记、激活系统、方法及装置
CN102076124B (zh) * 2009-11-19 2014-04-09 中兴通讯股份有限公司 一种变更签约数据的系统、方法及设备
KR102250685B1 (ko) * 2014-07-01 2021-05-12 삼성전자 주식회사 eUICC(embedded Universal Integrated Circuit Card)를 위한 프로파일 설치 방법 및 장치

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103974250A (zh) * 2013-01-30 2014-08-06 华为终端有限公司 配置方法和设备
CN105050073A (zh) * 2014-04-22 2015-11-11 三星电子株式会社 配置文件的方法和装置
WO2016167551A1 (ko) * 2015-04-13 2016-10-20 삼성전자 주식회사 통신 시스템에서 프로파일을 관리하는 기법
WO2016178548A1 (ko) * 2015-05-07 2016-11-10 삼성전자 주식회사 프로파일 제공 방법 및 장치

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113132990A (zh) * 2021-04-19 2021-07-16 东信和平科技股份有限公司 一种基于eSIM的Profile远程订阅方法及服务器和终端设备
CN113784336A (zh) * 2021-09-17 2021-12-10 捷开通讯(深圳)有限公司 码号下载方法、系统、终端设备及计算机可读存储介质
CN113784336B (zh) * 2021-09-17 2024-04-09 捷开通讯(深圳)有限公司 码号下载方法、系统、终端设备及计算机可读存储介质
CN114826772A (zh) * 2022-05-30 2022-07-29 中国联合网络通信集团有限公司 数据完整性验证系统
CN114826772B (zh) * 2022-05-30 2024-03-08 中国联合网络通信集团有限公司 数据完整性验证系统

Also Published As

Publication number Publication date
CN110121894A (zh) 2019-08-13
CN110121894B (zh) 2021-02-05

Similar Documents

Publication Publication Date Title
US10387134B2 (en) Method and device for downloading profile of operator
KR102229744B1 (ko) 오프라인 결제 방법 및 디바이스
CN108768970B (zh) 一种智能设备的绑定方法、身份认证平台及存储介质
WO2015165325A1 (zh) 终端安全认证方法、装置及系统
US11539690B2 (en) Authentication system, authentication method, and application providing method
WO2018129753A1 (zh) 一种签约信息集的下载方法、装置以及相关设备
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
CN112187709B (zh) 鉴权方法、设备及服务器
WO2018129724A1 (zh) 一种签约数据集的下载方法、设备及服务器
CN112559993B (zh) 身份认证方法、装置、系统及电子设备
CN112632521B (zh) 一种请求响应方法、装置、电子设备和存储介质
KR20150111162A (ko) 사용자 단말을 통한 로그인 지원 방법 및 그 장치
KR101690989B1 (ko) Fido 인증모듈을 이용한 전자서명 방법
CN109196891B (zh) 一种签约数据集的管理方法、终端及服务器
JP5431040B2 (ja) 認証要求変換装置、認証要求変換方法および認証要求変換プログラム
US8081758B2 (en) Communication support server, communication support method, and communication support system
KR20170066607A (ko) 보안 체크 방법, 장치, 단말기 및 서버
US20170244692A1 (en) Authentication of a user using a security device
WO2019095948A1 (zh) 一种事件的处理方法和终端
JP2018036940A (ja) クラウドストレージシステム
WO2018099407A1 (zh) 账户认证登录方法及装置
KR20220100886A (ko) 네트워크 슬라이스 상에서 사용자를 인증하기 위한 방법
WO2018018419A1 (zh) 一种配置文件批量获取、下载方法、服务器及终端
JP6307610B2 (ja) データ改竄検知装置、データ改竄検知方法、及びプログラム
KR101412698B1 (ko) 중계 서버를 이용한 인증서 배포 시스템, 인증서 배포 방법, 및 이를 위한 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17891157

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17891157

Country of ref document: EP

Kind code of ref document: A1