WO2018165983A1 - Euicc profile deletion method and device - Google Patents

Euicc profile deletion method and device Download PDF

Info

Publication number
WO2018165983A1
WO2018165983A1 PCT/CN2017/077129 CN2017077129W WO2018165983A1 WO 2018165983 A1 WO2018165983 A1 WO 2018165983A1 CN 2017077129 W CN2017077129 W CN 2017077129W WO 2018165983 A1 WO2018165983 A1 WO 2018165983A1
Authority
WO
WIPO (PCT)
Prior art keywords
euicc
configuration file
delete
instruction
terminal
Prior art date
Application number
PCT/CN2017/077129
Other languages
French (fr)
Chinese (zh)
Inventor
龙水平
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2017/077129 priority Critical patent/WO2018165983A1/en
Priority to CN201780061896.6A priority patent/CN109792601B/en
Publication of WO2018165983A1 publication Critical patent/WO2018165983A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Definitions

  • the present invention relates to the field of eUICC telecommunications smart cards, and in particular, to a method and a device for deleting an eUICC configuration file.
  • the eUICC Telecom Smart Card is a removable or non-removable Universal Integrated Circuit Card (UICC) that performs remote profile management in a secure manner or performs local profile management (eg, end-user triggered configuration) File activation, deactivation or deletion, etc.).
  • UICC Universal Integrated Circuit Card
  • the term eUICC is derived from the embedded UICC, which can be embedded in the terminal in a single chip form, or as part of other single chips in the terminal (such as modem chips, application processor chips), but does not mean that it must be embedded in the terminal. It can't be moved, it can also be a removable card form, just like a Subscriber Identification Module (SIM) card, a Micro SIM card or a Nano SIM card.
  • SIM Subscriber Identification Module
  • the eUICC Profile is a combination of data and applications.
  • the eUICC In order to provide mobile network services to the terminal, it is configured or installed on the eUICC.
  • the so-called services include calling, sending and receiving text messages or data services.
  • the Profile can also be regarded as a SIM software module. Like the traditional SIM card, it performs functions such as authentication calculation and key generation when the terminal accesses the mobile network.
  • the traditional SIM card is to harden the data and the application on the SIM card, and the user cannot delete it.
  • the eUICC is different.
  • the eUICC configuration file can be downloaded to the eUICC remotely. The user can also delete the eUICC configuration file through local management.
  • various accounts of the user are basically associated with the data of the smart card of the telecommunication smart card.
  • the terminal is lost and the data of the telecommunication smart card is not cleared, the user of the lost terminal is brought Security risks such as loss of assets or information leakage.
  • the anti-theft function of the terminal is generally implemented by an anti-theft application (or a mobile phone retrieving application) on the operating system, and the user can enable the anti-theft function on the terminal.
  • the terminal is lost, the user logs in to the website of the terminal manufacturer through the anti-theft application.
  • the server sends a remote command to the terminal, thereby implementing remote management of the lost terminal, and causing the terminal to perform positioning and deleting data of the terminal (such as pictures, address books, short messages, etc. in the terminal).
  • positioning and deleting data of the terminal such as pictures, address books, short messages, etc. in the terminal.
  • the anti-theft function of the terminal can cause the terminal to perform functions such as positioning and deleting data according to the remote management command after the loss, the terminal deletes only the data related to the operating system, and cannot delete the data on the telecommunication smart card.
  • a significant percentage of users have not enabled the phone anti-theft feature.
  • An embodiment of the present invention provides a method and a device for deleting an eUICC configuration file, where the eUICC configuration file of the terminal is deleted, the data of the eUICC of the telecommunication smart card is cleared, and the data associated with the eUICC is deleted after the terminal is lost.
  • the risk of asset loss or information disclosure associated with eUICC's data is avoided.
  • a first aspect of the embodiments of the present invention provides a method for deleting an eUICC configuration file, including:
  • the instruction to delete the eUICC configuration file is sent to the eUICC of the terminal, where the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  • the eUICC configuration file may be deleted in two manners.
  • receiving an eUICC profile delete request sent by the eUICC remote management server or receiving an eUICC profile delete request through the application interface.
  • the eUICC configuration file deletion request sent by the subscription manager data preparation (Data Preparation+, (SM-DP+) server) is received, and the eUICC sent by the local anti-theft application of the terminal is received through an application programming interface (API).
  • API application programming interface
  • the eUICC configuration file deletion request sent by the eUICC remote management server is received, the eUICC configuration file deletion request is received before receiving the eUICC configuration file deletion request.
  • An indication sent by the eUICC to connect to the eUICC remote management server where the indication carries an address of the eUICC remote management server.
  • the eUICC configuration file deletion request sent by the eUICC remote management server if the eUICC configuration file deletion request sent by the eUICC remote management server is received, the eUICC configuration file deletion request further carries the location acquisition Instructing, after the sending, by the eUICC of the terminal, the instruction to delete the eUICC configuration file, the method further includes: receiving a deletion success indication returned by the eUICC; and returning the deletion success indication and the location to the eUICC remote management server according to the location obtaining indication The location information of the terminal.
  • the authentication confirmation information includes: an authentication confirmation personal code; or a message digest of the authentication confirmation personal code; or a message digest of the first data, where The first data includes the authentication confirmation personal code and eUICC profile information; or a message digest of the second data, wherein the second data includes the eUICC profile information and part of the authentication confirmation individual code.
  • the instruction to delete the eUICC configuration file is an eUICC storage reset instruction, and the eUICC storage reset instruction is used to instruct the eUICC to delete all the operating eUICC configuration files.
  • the instruction for deleting the eUICC configuration file carries an eUICC lock indication, and the eUICC lock indication is used to indicate that the eUICC enters a locked state.
  • the method further includes: receiving an eUICC unlock request and an authentication confirmation of the user Entering information; in case the verification of the authentication confirmation input information is passed, sending an eUICC unlocking instruction to the eUICC, the eUICC unlocking instruction is used to indicate that the eUICC enters a normal state.
  • the method further includes: confirming that the personal identifier does not exist in the local authentication And if the eUICC lock indication sent by the eUICC is received, the unreceived eUICC profile download request state is entered.
  • the second aspect of the embodiment of the present invention provides another method for deleting an eUICC configuration file, including:
  • the eUICC configuration file is deleted according to the instruction to delete the eUICC configuration file.
  • the local eUICC configuration file of the receiving terminal is assisted
  • the instruction for deleting the eUICC configuration file sent by the module further includes: receiving a push command sent by the eUICC remote management server; sending, according to the push command, an indication of connecting the eUICC remote management server to the local eUICC configuration file auxiliary module, where the indication is Carrying the address of the eUICC remote management server.
  • the push command is included in a security packet, and the security packet further includes application information for processing the push command.
  • the receiving the push command sent by the eUICC remote management server includes: receiving the security packet, wherein the security packet carries the root issuer security domain information and a push command sent by the eUICC remote management server;
  • the sending, by the command, the indication to the local eUICC configuration file auxiliary module to connect to the eUICC remote management server includes: the root issuer security domain sending an indication to the local eUICC configuration file auxiliary module to connect to the eUICC remote management server according to the push command.
  • the method further includes: sending a deletion success indication to the local eUICC configuration file auxiliary module.
  • the instruction to delete the eUICC configuration file is an eUICC storage reset instruction
  • the deleting the eUICC configuration file according to the instruction to delete the eUICC configuration file includes: storing according to the eUICC The reset instruction deletes all operational eUICC configuration files.
  • the instruction for deleting the eUICC configuration file carries an eUICC lock indication; the method further includes: entering a locked state according to the eUICC lock indication.
  • the method further includes: receiving the eUICC sent by the local eUICC configuration file auxiliary module And an unlocking instruction, where the eUICC unlocking instruction is sent by the local eUICC profile auxiliary module after the verification of the user's authentication confirmation input information is passed; and the normal state is entered according to the eUICC unlocking instruction.
  • the method further includes: sending an eUICC lock to the local eUICC profile auxiliary module The indication, the eUICC lock indication is used to indicate that the local eUICC profile auxiliary module enters an unreceivable profile download request state if the local authentication confirmation personal identification code does not exist.
  • a third aspect of the embodiments of the present invention provides a method for deleting an eUICC configuration file, including:
  • the authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and if the verification of the authentication confirmation information is passed, sending an instruction to delete the eUICC configuration file to the eUICC of the terminal,
  • the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  • the method before the sending, by the local eUICC configuration file auxiliary module of the terminal, the eUICC configuration file deletion request, the method further includes: sending a push command to the eUICC, where the push command is used to indicate The eUICC sends an indication to the local eUICC profile auxiliary module to connect to the eUICC remote management server, where the indication carries the address of the eUICC remote management server.
  • the eUICC configuration file deletion request further carries a location Obtaining an indication; the method further includes: receiving a deletion success indication returned by the local eUICC profile auxiliary module and location information of the terminal.
  • the authentication confirmation information includes: an authentication confirmation personal code; or a message digest of the authentication confirmation personal code; or a message digest of the first data, where The first data includes the authentication confirmation personal code and eUICC profile information; or a message digest of the second data, wherein the second data includes the eUICC profile information and part of the authentication confirmation individual code.
  • a fourth aspect of the embodiments of the present invention provides a local eUICC configuration file auxiliary module, including:
  • a deletion request receiving unit configured to receive an eUICC configuration file deletion request, where the eUICC configuration file deletion request carries authentication confirmation information
  • a verification unit configured to verify the authentication confirmation information
  • a deletion instruction sending unit configured to send an instruction to delete an eUICC configuration file to the eUICC of the terminal, where the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC, if the verification of the authentication confirmation information is passed Configuration file.
  • the deleting request receiving unit is specifically configured to: receive an eUICC configuration file deletion request sent by an eUICC remote management server; or receive an eUICC configuration file deletion request by using an application program interface.
  • the local eUICC configuration file auxiliary module further includes: an indication receiving unit, configured to receive the eUICC remote management sent by the eUICC An indication of the server, where the indication carries an address of the eUICC remote management server.
  • the eUICC configuration file deletion request further carries a location acquisition indication;
  • the local eUICC configuration file auxiliary module further includes: deleting successfully received And a location information returning unit, configured to return the deletion success indication and the location information of the terminal to the eUICC remote management server according to the location obtaining indication.
  • the authentication confirmation information includes: an authentication confirmation personal code; or a message digest of the authentication confirmation personal code; or a message digest of the first data, where The first data includes the authentication confirmation personal code and eUICC profile information; or a message digest of the second data, wherein the second data includes the eUICC profile information and part of the authentication confirmation individual code.
  • the instruction for deleting the eUICC configuration file includes an eUICC storage reset instruction, where the eUICC storage reset instruction is used to instruct the eUICC to delete all the operating eUICC configuration files.
  • the instruction for deleting the eUICC configuration file carries an eUICC lock indication, and the eUICC lock indication is used to indicate that the eUICC enters a locked state.
  • the local eUICC profile auxiliary module further includes: an unlock request receiving unit, configured to receive the eUICC unlock request and the authentication of the user Confirming the input information; the unlocking instruction sending unit is configured to send an eUICC unlocking instruction to the eUICC, where the verification of the authentication confirmation input information is passed, the eUICC unlocking instruction is used to indicate the eUICC Enter the normal state.
  • the local eUICC configuration file auxiliary module further includes: a reject status entry unit, configured to confirm the personal identification code in the local authentication If there is an eUICC lock indication sent by the eUICC, the unreachable eUICC profile download request state is entered.
  • a fifth aspect of the embodiments of the present invention provides an eUICC, including:
  • a deletion instruction receiving unit configured to receive an instruction for deleting an eUICC configuration file sent by a local eUICC configuration file auxiliary module of the terminal;
  • a deleting unit configured to delete the eUICC configuration file according to the instruction to delete the eUICC configuration file.
  • the eUICC further includes: a push command receiving unit, configured to receive a push command sent by the eUICC remote management server; and an indication sending unit, configured to send the command according to the push command
  • the local eUICC profile auxiliary module sends an indication of connecting to the eUICC remote management server, where the indication carries the address of the eUICC remote management server.
  • the push command receiving unit is specifically configured to receive a security packet, where the security packet carries a root issuer security domain information And the push command sent by the eUICC remote management server; the indication sending unit includes a root issuer security domain, configured to send an indication of connecting the eUICC remote management server to the local eUICC profile auxiliary module according to the push command.
  • the eUICC further includes: a deletion success sending unit, configured to send a deletion success indication to the local eUICC profile auxiliary module.
  • the deleting the eUICC configuration file includes: eUICC storing a reset instruction; and the deleting unit is specifically configured to delete all the operating eUICC configuration files according to the eUICC storage reset instruction.
  • the instruction for deleting the eUICC configuration file carries an eUICC lock indication; the eUICC further includes a lock status entry unit, configured to enter a lock state according to the eUICC lock indication.
  • the eUICC further includes: an unlocking instruction receiving unit, configured to receive an eUICC unlocking instruction sent by the local eUICC configuration file auxiliary module
  • the eUICC unlocking instruction is sent by the local eUICC configuration file auxiliary module in the case that the verification of the user's authentication confirmation input information is passed;
  • the normal state entering unit is configured to enter a normal state according to the eUICC unlocking instruction.
  • the eUICC further includes: a lock indication sending unit, configured to send an eUICC lock indication to the local eUICC profile auxiliary module, The eUICC lock indication is used to instruct the local eUICC profile auxiliary module to enter a non-receivable profile download request state if the local authentication confirmation personal identification code does not exist.
  • a sixth aspect of the embodiments of the present invention provides an eUICC remote management server, including:
  • a deletion request sending unit configured to send an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal, where the eUICC configuration file deletion request carries the authentication confirmation information
  • the authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and if the verification of the authentication confirmation information is passed, sending an instruction to delete the eUICC configuration file to the eUICC of the terminal,
  • the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  • the eUICC remote management server further includes: a push command sending unit, configured to send a push command to the eUICC, where the push command is used to indicate the eUICC
  • the local eUICC profile auxiliary module sends an indication of connecting to the eUICC remote management server, where the indication carries the address of the eUICC remote management server.
  • the eUICC configuration file deletion request further carries a location acquisition indication;
  • the eUICC remote management server further includes: a location information receiving unit, configured to receive the local eUICC configuration file The deletion success indication returned by the auxiliary module and the location information of the terminal.
  • the authentication confirmation information includes: an authentication confirmation personal code; or a message digest of the authentication confirmation personal code; or a message digest of the first data, where The first data includes the authentication confirmation personal code and eUICC profile information; or a message digest of the second data, wherein the second data includes a portion of the authentication confirmation personal code and the eUICC configuration file information.
  • a seventh aspect of the embodiments of the present invention provides a terminal, including: a processor, a memory, and a transceiver, wherein the processor, the memory, and the transceiver are connected to each other by a bus, wherein the memory is configured to store program code, and the processing The program is used to call the program code, and performs the following operations:
  • the instruction to delete the eUICC configuration file is sent to the eUICC of the terminal, where the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  • An eighth aspect of the embodiments of the present invention provides another eUICC, including: a processor, a memory, and a communication interface, wherein the processor, the memory, and the communication interface are connected to each other, wherein the memory is used to store program code, and the processor is used by the processor.
  • a processor a memory
  • a communication interface wherein the processor, the memory, and the communication interface are connected to each other, wherein the memory is used to store program code, and the processor is used by the processor.
  • the eUICC configuration file is deleted according to the instruction to delete the eUICC configuration file.
  • a ninth aspect of the embodiments of the present invention provides another eUICC remote management server, including: a processor, a memory, and a transceiver, wherein the processor, the memory, and the transceiver are connected to each other by a bus, wherein the memory is used to store the program code.
  • the processor is configured to invoke the program code and perform the following operations:
  • the authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and in the case that the verification of the authentication confirmation information is passed, the instruction to delete the eUICC configuration file is sent to the eUICC of the terminal.
  • the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  • the names of the local eUICC configuration file auxiliary module and the eUICC remote management server are not limited to the device itself. In actual implementation, these devices may appear under other names. As long as the functions of the respective devices are similar to the present application, they are within the scope of the claims and their equivalents.
  • the eUICC configuration file deletion request is received, and the authentication confirmation information in the eUICC configuration file deletion request is verified.
  • the eUICC configuration file is deleted from the eUICC of the terminal.
  • FIG. 1 is a structural diagram of a method for implementing an embodiment of the present invention according to an embodiment of the present invention
  • FIG. 2 is another structural diagram of a method for implementing an embodiment of the present invention according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart of a method for deleting an eUICC configuration file according to an embodiment of the present invention
  • 4a is a user interaction interface diagram of an eUICC in a locked state according to an embodiment of the present invention
  • FIG. 4b is a diagram of another user interaction interface in which the eUICC is in a locked state according to an embodiment of the present invention
  • 4c is a diagram of a user interaction interface in which a eUICC is in a normal state according to an embodiment of the present invention
  • 4d is a diagram of a user interaction interface of another eUICC in a normal state according to an embodiment of the present invention
  • 4e is a user interaction interface diagram of an LPA in an unreceivable profile download request state according to an embodiment of the present invention
  • FIG. 4f is a diagram of a user interaction interface of another LPA in an unreceivable profile download request state according to an embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of another method for deleting an eUICC configuration file according to an embodiment of the present disclosure
  • FIG. 6 is a schematic flowchart of still another method for deleting an eUICC configuration file according to an embodiment of the present disclosure
  • FIG. 7 is a schematic flowchart of still another method for deleting an eUICC configuration file according to an embodiment of the present invention.
  • FIG. 8 is a schematic flowchart of still another method for deleting an eUICC configuration file according to an embodiment of the present disclosure
  • FIG. 9 is a schematic structural diagram of a local eUICC configuration file auxiliary module according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 11 is a schematic structural diagram of an eUICC according to an embodiment of the present disclosure.
  • FIG. 12 is a schematic structural diagram of another eUICC according to an embodiment of the present disclosure.
  • FIG. 13 is a schematic structural diagram of an eUICC remote management server according to an embodiment of the present invention.
  • FIG. 14 is a schematic structural diagram of an eUICC remote management server according to an embodiment of the present invention.
  • the Profile Assistant (LPA) module is used to implement related management operations on the Profile and eUICC modules (such as profile download and installation, remote profile management, and Remote eUICC management, etc., in the case that the terminal is lost, the anti-theft application module or the user of the terminal may perform a management operation on the eUICC module by notifying the LPA module, instructing the eUICC module to delete the profile, wherein the LPA module and the eUICC module may be Two modules that are separated from each other and have a physical or logical connection relationship, such as an LPA module, are present on the baseband chip, on the application processor, or on other hardware modules of the terminal; the LPA module can also exist directly on the eUICC module.
  • the deletion of the profile may be implemented based on the eUICC management system.
  • the specific architecture of the eUICC management system is shown in Figure 1.
  • the SM-DP+ server is used to prepare the profile, the prepared profile is securely sent to the eUICC module of the terminal, and the profile is remotely managed.
  • the SM-DP+ can be deployed.
  • the Subscription Manager Discovery Service (SM-DS) server is used to provide (a Or the SM-DP+ address or the SM-DP address is replaced by the terminal, and the terminal can establish a connection with the SM-DP+ through the SM-DP+ address, or the terminal further obtains the SM-DP+ address by replacing the SM-DS;
  • the terminal includes LPA module and eUICC module, eUICC module is used to implement various functions of SIM card and configuration and management functions of profile and eUICC; Operator Business Supporting System (Operator BSS) is used to order profiles to SM-DP+.
  • Operator BSS Operator Business Supporting System
  • End User is the end user / (operator's) mobile user
  • eUICC manufacturing is a manufacturer of eUICC.
  • SM-DP+, SM-DS are all called eUICC remote management servers (or remote SIM configuration servers).
  • the user can contact the operator to report the loss of the profile, and then the operator's management personnel operate on the Operator BSS, and send the remote profile remote management command to the SM-DP+ through the Operator BSS (management operation of the management command)
  • the type is set to delete), and the profile remote management command is sent by the SM-DP+ to the LPA module; after receiving the profile remote management command sent by the SM-DP+, the LPA module instructs the eUICC module to delete the profile.
  • the deletion of the profile may be implemented based on the local anti-theft application of the terminal.
  • the system architecture for deleting the profile based on the local anti-theft application can be as shown in FIG. 2, wherein the OEM (Original Equipment Manufacture Server, OEM Server) is the server of the manufacturer of the production terminal, and can provide the cloud service for the end user (mobile phone positioning) , anti-theft, photo or address book synchronization) and other services; local anti-theft application is an application running on the terminal operating system, can achieve the terminal's anti-theft function, in the case of networking can communicate with the OEM Server, OEM Server can be local anti-theft
  • the application sends a remote command; the LPA module and the eUICC module are used to implement communication functions such as calling, sending and receiving short messages of the terminal; and the local anti-theft application and the LPA module can communicate through the API.
  • the user can log in to the portal corresponding to the terminal server (ie, OEM Portal), and initiate a request to delete the profile on the portal webpage.
  • the OEM Server sends a request to delete the profile to the local anti-theft application, and the local anti-theft application uses the API to
  • the LPA module sends a request to delete the profile. After receiving the request to delete the profile, the LPA module instructs the eUICC module to delete the profile.
  • the LPA module before receiving the profile remote management command or deleting the profile request, the LPA module needs to determine whether the request of the sender is legal, and determines that the request of the sender is legal (for example, the sender obtains the license information of the user and sends the request.
  • the eUICC module pairs the profile when the terminal is in the white list of the LPA module. Delete it.
  • FIG. 3 is a method for deleting an eUICC configuration file according to an embodiment of the present invention.
  • the method of the embodiment of the present invention may be implemented in the system architecture shown in FIG. 1, including but not limited to the following steps:
  • Step S101 The Operator BSS sends a Remote Profile Management Order (RPMOrder) to the SM-DP+, where the RPMorer carries a Remote Profile Management Command (RPM Command) and an eUICC Identification (EID) , the Integrated Circuit Card Identification (ICCID), the eUICC lock indication (euiccLock), and the authentication identifier (Hash (Authenticated Confirmation Personal Identification Number) (ACP)), wherein the operation type of the RPM Command is set to Memory reset (euiccmemoryReset).
  • RPM Command Remote Profile Management Command
  • EID eUICC Identification
  • ICCID Integrated Circuit Card Identification
  • eUICC lock indication euiccLock
  • ACP Authenticated Confirmation Personal Identification Number
  • the ACP is a personal password used for authentication confirmation, and the end user (End User) confirms the terminal operation by inputting personal biometrics such as ACP or a substitute fingerprint.
  • the RPMOrder may also carry an SM-DS address (Location-Flag), where the SM-DS Address is used for the SM-DP+ to generate a remote management event and notify the SM-DS to record the event.
  • the locationFlag is used to instruct the LPA to acquire current or historical location information of the terminal.
  • the operation type of the PRM Command when the operation type of the PRM Command is eucememoryReset, it is used to instruct the eUICC to delete all the operation profiles (Operational Profiles), wherein the Operational Profile supports a subscription between the user and the operator, and allows the terminal to connect to a mobile network, the Operational Profile.
  • the non-telecom service may also be included.
  • the operation type of the PRM Command when the operation type of the PRM Command is eucememoryReset, the eUICC may also be used to instruct the eUICC to delete all the Operational Profiles and Provisioning Profiles, wherein Provisioning The Profile is only used to connect to a mobile network and configure profiles on the eUICC (such as downloading profiles, remote profile enable or delete operations).
  • the Provisioning Profile is a profile that maintains and sets functions.
  • the Hash (ACP) is the authentication confirmation information, and the authentication confirmation information may also be the message digest of the first data, where the first data includes the ACP and the profile information, that is, the Hash (ACP) may be replaced with the Hash ( ACP
  • the profile information may be, for example, an identifier (EID), a profile owner (Profileowner), an ICCID, or an operator name of the eUICC where the profile is located.
  • EID identifier
  • Profileowner profile owner
  • ICCID operator name of the eUICC where the profile is located.
  • the first data and the second data are described below by way of example. Assume that the ACP is 123456 and the profile information is the carrier name (assumed to be CMCC). If the first, third and fifth characters of the ACP are agreed to be part of the ACP, the first data is Hash (123456
  • the ACP (or part of the ACP) is provided by the user to the Operator BSS.
  • the user reports the loss to the operator's customer service personnel and authenticates the identity (for example, by saying the customer service password or presenting the ID card), and the ACP (or part of the ACP) is provided to the operator after the identity authentication is passed.
  • the customer service personnel then the operator's customer service personnel record the ACP (or part of the ACP) to the Operator BSS.
  • Profile information such as EID, Profileowner, ICCID, and carrier name may exist in the Operator BSS or other systems of the operator.
  • the Operator BSS may use a standard hash algorithm to abstract the ACP, the first data, or the second data.
  • the Hash algorithm may be, for example, a first Secure Hash Algorithm (SHA)-1.
  • eucicLock True
  • eucicLock is used to indicate the state that eUICC needs to enter
  • Step S102 The SM-DP+ performs a legality check.
  • SM-DP+ checks the EID or ICCID to see if it belongs to its management scope.
  • Step S103 The SM-DP+ generates a profile remote management pending event (pending RPM order).
  • each RPM Order event has an Event Identification (EventID).
  • EventID Event Identification
  • SM-DP+ can find the pending RPM order through eventID or EID.
  • the SM-DP+ may also perform remote management event registration at the SM-DS for query by the LPA.
  • the SM-DS stores the address, eventID and EID of the SM-DP+.
  • the LPA may initiate a query request to the SM-DS (the EID is carried in the query request). If the SM-DS queries the event record corresponding to the EID (the event record includes the eventID and the SM-DP+ address), then the SM- DS returns the event record to the LPA.
  • the SM-DP+ saves the remote management event of the eUICC of the terminal, waits for the LPA of the terminal to initiate a connection and performs a remote management operation.
  • the LPA obtains the address of the SM-DP+ to initiate a connection to the SM-DP+.
  • the LPA can be from the SM-DS under the conditions of user operation, power-on, timing trigger, or eUICC trigger.
  • the LPA can initiate a connection to the SM-DP+ and send the EventID to the SM-DP+; in another possible implementation, the LPA obtains the address of the SM-DP+ saved in itself, eUICC or Profile. Then initiate a connection to SM-DP+ and send the EID to SM-DP+.
  • the SM-DP+ can also actively inform the LPA of the address of the SM-DP+ in a push manner to trigger the LPA to quickly initiate a connection.
  • the SM-DP+ can transmit the address of the SM-DP+ to the LPA by using a terminal manufacturer's Push Service.
  • SM-DP+ can use a new Request Type, such as "Request for ES interface” or "Request for ES9+interface", to indicate that the LPA establishes a connection to SM-DP+, SM-DP+ through the ES/ES9+ interface.
  • the address of the Request Type and the SM-DP+ itself may be carried as a destination address (Data destination Address) in a push command (Push Command) and pushed to the LPA by the terminal manufacturer's Push Service.
  • the SM-DP+ may also send the address of the SM-DP+ to the eUICC based on an Over The Air (OTA) of the Short Message Service (SMS), and then send it to the LPA by the eUICC.
  • OTA Over The Air
  • SMS Short Message Service
  • the OTA-based implementation flow is described below through steps S104-105.
  • TAR Toolkit Application Reference
  • ISD-R Issuer Security Domain-Root
  • the Secured Packet can be generated by the SM-DP+, and then the SM-DP+ sends the Secured Packet to the OTA server of the operator.
  • the OTA server sends the Secured Packet to the eUICC.
  • the Secured Packet can also be generated by the OTA server.
  • the SM-DP+ sends the Push Command to the operator's OTA server, the operator OTA server generates the Secured Packet, and then sends the Secured Packet to the eUICC.
  • the Open Channel is an active command initiated by the eUICC to the LPA.
  • the eUICC parses the Secured Packet, and then the ISD-R application in the eUICC extracts the request type and the SM-DP+ address from the Push Command, and generates a Bearer Type and a UICC/terminal interface transport level based on the request type, together with the SM- The address of DP+ is placed in the Open Channel command.
  • Step S106 The LPA establishes a Transport Layer Security (TLS) connection with the SM-DP+.
  • TLS Transport Layer Security
  • the LPA performs one-way certificate authentication on the SM-DP+, and establishes a TLS connection after the authentication is passed.
  • Step S107 The SM-DP+ and the eUICC perform two-way authentication based on the HyperText Transfer Protocol Secure (HTTPS).
  • HTTPS HyperText Transfer Protocol Secure
  • HTTPS runs on top of a TLS connection.
  • the LPA obtains the eUICC challenge value and the like from the eUICC, sends an HTTPS request (including the eUICC challenge value) to the SM-DP+, triggers the eUICC and the SM-DP+ to perform bidirectional authentication, and the bidirectional authentication data exchange passes the HTTPS request and response.
  • the eUICC generates its own authentication signature value (euiccSignature1) and sends eucicSignature1 to SM-DP+, SM-DP+ and eUICC both store eucicSignature1; meanwhile, SM-DP+ will authenticate the certificate (CERT. DPauth.ECDSA) is sent to eUICC, eUICC saves CERT.DPauth.ECDSA; after two-way authentication is passed, SM-DP+ generates session identification (TransactionID).
  • Step S108 The SM-DP+ lookup obtains the pending RPM order.
  • the terminal sends an EID to the SM-DP+.
  • the SM-DP+ can find the pending RPM order based on the EID lookup.
  • smdpSigned3 ⁇ TransactionID, RPM Command, eucicLock, Hash (ACP), locationFlag ⁇ .
  • the TransactionID is generated by SM-DP+ during the establishment of the RSP session.
  • Step S110 SM-DP+ performs signature calculation on smdpSigned3 and eucicSignature1 using the private key (SK.DPrpm.ECDSA) to generate a signature value (smdpSignature3).
  • SM-DP+ may generate a digest of smdpSigned3
  • A ⁇ smdpSigned3, eucicsignature1 ⁇
  • the abstract is obtained by summing A
  • the result of encrypting the digest a by SK.DPrpm.ECDSA is the signature value smdpSignature3.
  • Step S111 SM-DP+ sends smdpSigned3, smdpSignature3 and Remote Profile Management (RPM) certificate (CERT.DPrpm.ECDSA) to the LPA.
  • RPM Remote Profile Management
  • the SM-DP+ sends a profile deletion request carrying the RPM Command to the LPA, instructing the terminal to delete the profile, and the profile deletion request carries smdpSigned3, smdpSignature3, and CERT.DPrpm.ECDSA.
  • Step S112 The LPA verifies the Hash (ACP).
  • the LPA obtains the locally stored ACP, extracts the local ACP into a hash (local ACP), and compares the Hash (ACP) with the Hash (local ACP). If the Hash (ACP) is the same as the Hash (local ACP), then The verification of the Hash (ACP) is passed, that is, the verification of the authentication confirmation information is passed.
  • the LPA obtains the locally stored ACP and profile information, and abstracts the local ACP and the profile information to obtain a hash (local ACP
  • ACP and profile information are abstracted to get Hash (local part ACP
  • the LPA may obtain the profile information from the profile deletion request, or obtain the profile information from the RPM Command, or obtain the profile information from the eUICC.
  • the LPA performs step S113; in the case where the verification of the Hash (ACP) does not pass, the LPA terminates the profile deletion process.
  • Step S113 The LPA sends a load RPMCommand command (LoadRPMCommand) to the eUICC, where the LoadRPMCommand carries smdpSigned3, smdpSignature3, and CERT.DPrpm.ECDSA.
  • LoadRPMCommand a load RPMCommand command
  • the LoadRPMCommand is an instruction to delete the profile, and is used to indicate that the eUICC is based on the PRM.
  • Command's action type deletes the profile.
  • the LPA also acquires the location information of the terminal and returns the location information of the terminal to the SM-DP+.
  • the LPA can acquire the current or historical geographical location information of the terminal by using a positioning system such as a Global Positioning System (GPS) or a Beidou system of the terminal, and return the geographical location information to the SM-DP+; the LPA can also acquire the terminal.
  • the cell list in the vicinity of the cell in the current or previous time and the signal strength of each cell, and return the cell list and its corresponding signal strength list to the SM-DP+; the LPA can also be obtained in the search range of the terminal.
  • Step S114 The eUICC verifies that CERT.DPrpm.ECDSA is legal and belongs to the same SM-DP+ as CERT.DPauth.ECDSA, and verifies that the TransactionID matches the current Remote SIM Provisioning (RSP) session.
  • RSP Remote SIM Provisioning
  • the eUICC compares the two SM-DP+OIDs obtained by acquiring the SM-DP+ Object Identifications (OID) from CERT.DPrpm.ECDSA and CERT.DPauth.ECDSA respectively, if two The same SM-DP+OID determines that CERT.DPrpm.ECDSA and CERT.DPauth.ECDSA belong to the same SM-DP+.
  • OID SM-DP+ Object Identifications
  • Step S115 The eUICC verifies the smdpSignature3.
  • the eUICC verifies the smdpSignature3 using the public key (PK.DPrpm.ECDSA), smdpSigned3, and eucicsignature1 corresponding to SK.DPrpm.ECDSA, where eucicSignature1 is the authentication signature value generated and saved by the eUICC during the establishment of the RSP session. .
  • the eUICC generates a first digest of smdpSigned3
  • the first digest is the same as the second digest, the verification of smdpSignature3 is passed.
  • smdpSignature3 is a signature value obtained by encrypting the summary a with SK.DPrpm.ECDSA; when smdpSigned2 and smdpSignature3 are transmitted to In eUICC, the abstract is obtained by summarizing smdpSigned3
  • Step S116 The eUICC deletes all the Operational Profiles according to the eucicemoryReset.
  • the eUICC extracts the RPM Command from the smdpSigned3, and the operation type of the PRM Command is set to euciccmoryReset, and the eUICC deletes all the Operational Profiles according to the operation type of the PRM Command.
  • the eUICC can also clear the Profile Policy Rules (PPR) information of the Operational Profile in the Profile Policy Enabler.
  • PPR Profile Policy Rules
  • Step S117 The eUICC enters the locked state according to eucicLock.
  • eUICC downloads related commands to the profile sent by LPA (such as ES10a.GetEuiccConfiguredAddresses, ES10b.PrepareDownload, ES10b.GetEUICCChallenge, ES10b.AuthenticateServer) returns an error indication to the LPA, the error cause value indicating eUICC lock or service unavailable.
  • the LPA may also obtain the unlock request and the authentication confirmation input information of the user, and send an eUICC unlocking instruction to the eUICC when the verification of the authentication confirmation input information is passed, and the eUICC according to the eUICC The unlock command enters the normal state.
  • the LPA obtains the ACP input by the user or the authentication fingerprint input information of the user fingerprint/voiceprint/iris instead of the ACP through the user interaction interface of the terminal, and inputs the authentication confirmation input information with the locally saved ACP or replaces the ACP. User fingerprint/voiceprint/iris and other information are matched. If the matching is consistent, the authentication confirmation input information is verified.
  • eUICCMemoryReset an eUICC storage reset command
  • the eUICCMemoryReset is a function instruction sent by the LPA defined in the official document (SGP22) of the Global System for Mobile Communication (GSM) Association to the eUICC, and can be used to instruct the eUICC to delete all the Operational Profiles and store them in the eUICC.
  • Profile metadata (Metadata).
  • the following uses the terminal as a mobile phone as an example to describe the locked state and normal state of the eUICC. See Figures 4a-4d.
  • Figure 4a shows the user interaction interface after the user enters the LPA when the eUICC is in the locked state.
  • the user interface has the “eUICC Unlock” option, the “Profile Download” option, and the “Profile Management” option.
  • the user may also prompt the user to input a fingerprint or the like instead of the ACP authentication confirmation input information.
  • a fingerprint or the like instead of the ACP authentication confirmation input information.
  • only the user is prompted to input the ACP as one of the examples.
  • Figure 4c shows the user interaction interface after the user enters the LPA when the eUICC is in a normal state.
  • the user interaction interface has the "Profile download option and the "Profile management” option.
  • the user interaction interface is as shown in Fig. 4d. Show, enter the profile download interface.
  • the user can send the RPMorder to the SM-DP+ through the Operator BSS, and the SM-DP+ generates the pending RPM order, and then carries the RPM Command, the euciclock, and the Hash (ACP) carried in the RPMorder in the eUICC configuration.
  • the file deletion request is sent to the LPA.
  • the LPA verifies the Hash (ACP)
  • the LPA sends the LoadRPMCommand to the eUICC.
  • the LoadRPMCommand carries the RPM Command and the euciclock.
  • the eUICC receives the RPM Command, and deletes all the operation profiles according to the RPM Command operation type and according to the eucicLock.
  • Profile which reduces the risk of asset loss associated with eUICC data or information leakage associated with eUICC data after the terminal is lost, and the eUICC enters a locked state so that the terminal user (such as a thief) cannot perform profile downloading, further improving Terminal security.
  • FIG. 5 is a method for deleting another eUICC configuration file according to an embodiment of the present invention.
  • the method of the embodiment of the present invention may be implemented on the system architecture shown in FIG. 2, where the method includes but is not limited to The following steps:
  • Step S201 The OEM portal (Portal) obtains the account and password input by the user.
  • the account and the password are registered by the user in the terminal in advance.
  • the OEM server corresponding to the OEM Portal saves the association relationship between the account and the password and the terminal.
  • the IMEI of the terminal is 123456789012345
  • the account registered by the user on the terminal with IMEI 123456789012345 is 1234
  • the password is 5678.
  • the OEM Server associates IMEI (123456789012345), account number (1234) and password (5678) (if saved in the same In a data table, when the user logs in to the account 1234, the OEM Server can know through 1234 that the user is the user of the terminal with the IMEI of 123456789012345.
  • Step S202 The OEM Portal obtains the terminal recovery operation and the ACP after the user logs in.
  • the OEM Portal obtains the user's terminal retrieval operation.
  • the OEM Portal can also obtain profile information such as the EID and ICCID of the terminal.
  • Step S203 The OEM Portal sends the Hash (ACP), the storage reset indication (euiccmemoryReset), and the eucicLock to the local anti-theft application.
  • the Hash (ACP) is the authentication confirmation information.
  • the description of the authentication confirmation information refer to the description of the authentication confirmation information in step S101 in the embodiment corresponding to FIG. 3, and details are not described herein.
  • the local anti-theft application has confirmed that the terminal is currently in a lost state, and then notifies the LPA to delete the profile.
  • Step S204 The local anti-theft application sends a profile deletion request to the LPA, wherein the profile deletion request carries Hash (ACP), eucememoryReset, and eucicLock.
  • the local anti-theft application sends a profile deletion request to the LPA through the API, that is, sends an API Request (Hash (ACP), euciccmoryReset, eucicLock) to the LPA.
  • API Request Hash (ACP), euciccmoryReset, eucicLock
  • Step S205 The LPA verifies the Hash (ACP).
  • the verification process or the authentication confirmation information of the LSA to the Hash (ACP) is otherwise (the message confirmation that the authentication confirmation information is the first data, the message digest of the authentication data as the second data, or the authentication confirmation information is
  • the message confirmation that the authentication confirmation information is the first data, the message digest of the authentication data as the second data, or the authentication confirmation information is
  • the verification process of the ACP reference may be made to the description of step S112 in the embodiment corresponding to FIG. 3, and details are not described herein again.
  • the LPA performs step S206; in the case where the verification of the Hash (ACP) fails, the LPA terminates the profile deletion process.
  • Step S206 The LPA sends a storage reset instruction (eUICCMemoryReset) to the eUICC, where the eUICCMemoryReset carries the eucicLock.
  • eUICCMemoryReset a storage reset instruction
  • the eUICCMemoryReset is an instruction to delete the profile, and is used to instruct the eUICC to delete all the Operational Profiles.
  • Step S207 The eUICC deletes all the Operational Profiles according to the eUICCMemoryReset.
  • Step S208 The eUICC enters a locked state according to euciclock.
  • step S117 for details, refer to the description of step S117 in the embodiment corresponding to FIG. 3 for details of the eUICC after entering the locked state, and details are not described herein.
  • the eUICC can also enter the normal state according to the eUICC unlocking command sent by the LPA.
  • the eUICC unlocking command sent by the LPA For a specific implementation process, refer to the description of the process in which the eUICC enters the normal state in step S117 in the implementation corresponding to FIG. 3, and details are not described herein.
  • the user logs the previously registered account in the OEM Portal, and sends a profile deletion request to the local anti-theft application of the terminal through the terminal recovery function of the OEM Portal.
  • the profile deletion request carries the eucicLock, the euciccmoryReset and the Hash (ACP)
  • the local anti-theft application forwards the profile deletion request to the LPA through the API.
  • the LCA verifies the Hash (ACP)
  • the LCA sends the eUICCMemoryReset carrying the euciclock to the eUICC.
  • the eUICC deletes all the operational profiles according to the eUICCMemoryReset.
  • the profile can be deleted in time when the terminal is lost, and the risk of asset loss associated with the eUICC data or information leakage associated with the eUICC data after the terminal is lost is reduced, and the eUICC enters the locked state to make Terminal users (such as thieves) cannot perform profile downloads to further improve the security of the terminal.
  • FIG. 6 is a method for deleting an eUICC configuration file according to an embodiment of the present invention.
  • the method of the embodiment of the present invention may be implemented in the system architecture shown in FIG. 2 , where the method includes but is not limited to The following steps:
  • Step S301 The local anti-theft application determines that the terminal is in a lost state by using the context awareness module of the terminal.
  • the context awareness module can serve as a sub-module of the local anti-theft application, receive an instruction issued by the local application, and only provide services for the local anti-theft application; in another specific implementation, the scenario As a separate functional unit, the sensing module sends relevant information to the local anti-theft application to provide services for the local anti-theft application while also serving other applications of the terminal.
  • the local anti-theft application can obtain the sound information around the terminal through the voice recognition module of the terminal; the local anti-theft application can also obtain the operation of the user on the terminal through the behavior analysis module of the terminal, thereby determining the context information of the terminal; The face information in front of the terminal can be obtained through the image recognition module of the terminal.
  • the local anti-theft application detects that the context information is in an abnormal situation, it is determined that the terminal is currently in a lost state. For example, if the voice recognition module of the terminal recognizes an abnormal vocabulary such as “going to the mobile phone”, it is determined that the terminal is currently in a lost state; The image recognition module recognizes that the face in front of the terminal belongs to the strange face information and the behavior analysis module of the terminal senses that the user inputs the wrong lock screen password a plurality of times, and determines that the terminal is currently in a lost state.
  • Step S302 The local anti-theft application sends a profile deletion request to the LPA, wherein the profile deletion request carries a storage reset indication (euiccmemoryReset) and eucicLock.
  • a storage reset indication euiccmemoryReset
  • the local anti-theft application sends a profile deletion request to the LPA through the API, that is, sends an API Request (euiccmemoryReset, euciclock) to the LPA.
  • API Request euiccmemoryReset, euciclock
  • Step S303 The LPA sends the eUICCMemoryReset to the eUICC, where the eUICCMemoryReset carries the eucicLock.
  • the lost state of the terminal is determined by the local anti-theft application, and finally The terminal does not receive the remote command sent by other servers, so there is no authentication confirmation information in the profile deletion request. If the authentication confirmation information is not received and the profile deletion request is determined as the API Request, the LPA can save the reference. The right to verify the verification of this step.
  • Step S304 The eUICC deletes all the Operational Profiles according to the eUICCMemoryReset.
  • Step S305 The eUICC enters a locked state according to eucicLock.
  • steps S206 to S208 in the embodiment corresponding to FIG. 4 for specific implementation of steps S303-S305, and details are not described herein.
  • the local anti-theft application determines that the terminal is in a lost state by using the context awareness module of the terminal, and the local anti-theft application generates a profile deletion request, and the profile deletion request carries eucicLock and euciccmoryReset, and the LPA sends eUICCMemoryReset carrying euciclock to the eUICC according to eucememoryReset.
  • the eUICC deletes all the operating profiles according to eUICCMemoryReset and enters the locked state according to eucicLock.
  • the profile can be deleted in time, and the assets associated with the eUICC data are lost or associated with the eUICC data after the terminal is lost.
  • FIG. 7 is a method for deleting an eUICC configuration file according to an embodiment of the present invention.
  • the method of the embodiment of the present invention may be implemented on the system architecture shown in FIG. 1 or FIG. Methods include, but are not limited to, the following steps:
  • Step S401 The LPA receives the profile deletion request, and the profile deletion request carries the authentication confirmation information.
  • the authentication confirmation information may refer to the description of the authentication confirmation information in step S101 in the embodiment corresponding to FIG. 3, that is, the authentication confirmation information may be ACP; may also be Hash (ACP); or may be Hash (ACP
  • the sender of the profile deletion request may be the SM-DP+ in the system architecture of FIG. 1 or the local anti-theft application of the terminal in the system architecture of FIG. 2.
  • the profile deletion request carries smdpSigned3, smdpSignature3, and CERT.DPrpm.ECDSA.
  • the profile deletion request may be an API Request (Hash (ACP), eucememoryReset, euciclock), that is, the scenario involved in the embodiment corresponding to FIG. 5; the profile deletion request may also be It is an API Request (euiccmemoryReset, eucicLock), that is, the scenario involved in the embodiment corresponding to FIG. 6.
  • API Request Hash (ACP), eucememoryReset, euciclock
  • the profile deletion request may also be It is an API Request (euiccmemoryReset, eucicLock), that is, the scenario involved in the embodiment corresponding to FIG. 6.
  • Step S402 The LPA verifies the authentication confirmation information.
  • step S112 For a specific implementation of the LPA to verify the authentication confirmation information, refer to the description of step S112 in the embodiment corresponding to FIG. 3, and details are not described herein.
  • the LPA performs step S403.
  • Step S403 The LPA sends an instruction to delete the profile to the eUICC, and the instruction to delete the profile carries eucicLock.
  • the instruction to delete the profile may be the LoadRPMCommand in the embodiment corresponding to FIG. 3, or may be the eUICCMemoryReset in the embodiment corresponding to FIG. 5 or FIG. 6.
  • Step S404 The eUICC deletes the profile.
  • the eUICC may extract the RPM Command from the smdpSigned3 carried in the LoadRPMCommand, and the operation type of the PRM Command is set to euciccmoryReset, and all the Operational Profiles are deleted according to the type of the PRM Command.
  • the eUICC can also delete all Operational Profiles according to eUICCMemoryReset.
  • Step S405 The eUICC enters a locked state according to eucicLock.
  • step S405 may refer to the description of step S117 in the embodiment corresponding to FIG. 3, and details are not described herein again.
  • the eUICC can also enter the normal state according to the eUICC unlocking command sent by the LPA.
  • the eUICC unlocking command sent by the LPA For a specific implementation process, refer to the description of the process in which the eUICC enters the normal state in step S117 in the implementation corresponding to FIG. 3, and details are not described herein.
  • Step S406 The eUICC sends an Answer to Reset (ATR) response to the LPA when the terminal is restarted or powered on, where the ATR response carries eucicLock.
  • ATR Answer to Reset
  • step S408 may be replaced by: the LPA sends a Select ISD-R Application (Select ISD-R) instruction to the eUICC, and the eUICC sends a File Control Parameters (FCP) response to the LPA, and the FCP response carries eucicLock.
  • Select ISD-R Select ISD-R
  • FCP File Control Parameters
  • eucicLock False.
  • Step S407 In the case where the local ACP does not exist, the LPA enters a state in which the profile download request cannot be received.
  • the LPA performs grayscale processing on the button, menu item or icon downloaded by the profile to enter the unreceivable profile download request state.
  • FIG. 4 e is a user interaction interface after the user enters the LPA when the LPA enters the unreceivable profile download request state, and the “Profile Download” option and the “Profile Management” option on the user interaction interface are in a shadow state. After the end user clicks on the option, the interface will not change.
  • the LPA does not have the function of “receiving the terminal user's profile download request, eUICC unlock request, and authentication confirmation input information”, and the terminal user cannot unlock the eUICC.
  • the profile download cannot be performed by the LPA, that is, the LPA cannot perform the embodiment of the embodiment corresponding to FIG. 3, in step S117, “the LPA obtains the user-entered ACP or user fingerprint, etc., and the authentication confirmation input information used to prove the identity of the user through the user interaction interface of the terminal”.
  • An operation and its subsequent operations Specifically, as shown in FIG.
  • the user interaction interface displays a "service abnormality" bullet box as shown in FIG. 4f; further, may also exit after displaying the user interaction interface as shown in FIG. 4f.
  • the user interface of the LPA is returned to the main interface of the terminal.
  • the LPA receives the profile deletion request, and verifies the authentication confirmation information in the profile deletion request, and sends a profile deletion instruction to the eUICC in the case of verifying the authentication confirmation information, in the profile deletion instruction.
  • Carrying eucicLock, eUICC deletes all profiles according to eucicLock to enter the locked state, and can delete the profile in time when the terminal is lost, reducing the risk of asset loss associated with eUICC data or information leakage associated with eUICC data after the terminal is lost.
  • LPA also gets the status of eUICC, in the hair If the eUICC enters the locked state and the ACP does not exist, the user cannot enter the unreceived profile download request state, that is, the user cannot unlock the eUICC, even if the terminal user clears the ACP by double clearing (clearing the user data and restoring the factory settings). Profile download is also not possible.
  • the eUICC deletes all the Operational Profiles according to the instruction of deleting the profile sent by the LPA.
  • the sender of the profile deletion request is SM-DP+
  • the operation of the RPM Command of the SM-DP+ The type can also be set to Delete (Delete), and Delete indicates that the eUICC deletes the target profile, that is, the profile corresponding to the RPM Command.
  • Delete indicates that the eUICC deletes the target profile, that is, the profile corresponding to the RPM Command.
  • FIG. 8 is a method for deleting an eUICC configuration file according to an embodiment of the present invention, where the method includes but is not limited to the following steps:
  • Step S501 The Operator BSS sends an RPMorder to the SM-DP+, where the RPMorer carries an RPM Command, an EID, an ICCID, and a Profile Policy Rules Unset (PPR Unset), where the RPM Command operation type is set to delete (Delete ).
  • RPMorer carries an RPM Command, an EID, an ICCID, and a Profile Policy Rules Unset (PPR Unset), where the RPM Command operation type is set to delete (Delete ).
  • PPR Unset Profile Policy Rules Unset
  • the ICCID may also be carried in the RPM Command, that is, the PRMOrder carries the RPM Command, EID, PPR Unset, RPM Command (ICCID Delete).
  • the PPR Unset is used to instruct the eUICC to clear the PPR setting corresponding to the target profile that the user wants to delete.
  • the RPMOrder may also carry an SM-DS Address, a locationFlag, where the SM-DS Address is used to notify the SM-DS to perform event recording while the SM-DP+ generates a remote management event, and the locationFlag is used to indicate that the LPA acquires the current or terminal of the terminal. Historical location information.
  • the PPR Unset can be used instead of the authentication confirmation information
  • the LPA receives the PPR Unset default verification of the authentication confirmation information and sends the PPR Unset to the eUICC, eUICC.
  • the PPR setting can be cleared by receiving the PPR Unset.
  • the description of the verification process of the LPA authentication confirmation information is omitted.
  • Step S502 The SM-DP+ performs a legality check.
  • Step S503 SM-DP+ generates a pending RPM order.
  • the SM-DP+ saves the remote management event of the eUICC of the terminal, waits for the LPA of the terminal to initiate a connection and performs a remote management operation.
  • the LPA obtains the address of the SM-DP+ to initiate the connection to the SM-DP+, and the specific manner in which the LPA obtains the address of the SM-DP+ is introduced in step S103 in the embodiment corresponding to FIG. 3, and details are not described herein again.
  • the following takes the LPA to obtain the address of the locally saved SM-DP+ as an example to describe the subsequent process.
  • Step S504 The LPA establishes a TLS connection with the SM-DP+.
  • Step S505 The SM-DP+ and the eUICC perform mutual authentication based on the HTTPS.
  • Step S506 The SM-DP+ lookup obtains the pending RPM order.
  • steps S504 to S506 have been introduced in steps S106 to S108 in the embodiment corresponding to FIG. 3, and details are not described herein.
  • smdpSigned3 ⁇ TransactionID, RPM Command, PPR Unset, ICCID, locationFlag ⁇ .
  • smdpSigned3 ⁇ TransactionID, RPM Command, PPR Unset ⁇ .
  • Step S508 SM-DP+ performs signature calculation on smdpSigned3 and eucicSignature1 by using SK.DPrpm.ECDSA to generate smdpSignature3.
  • Step S509 SM-DP+ sends smdpSigned3, smdpSignature3 and CERT.DPrpm.ECDSA to the LPA.
  • the SM-DP+ sends a profile deletion request carrying the RPM Command to the LPA, instructing the terminal to delete the profile, that is, the profile deletion request carries smdpSigned3, smdpSignature3, and CERT.DPrpm.ECDSA.
  • Step S510 The LPA sends the LoadRPMCommand to the eUICC, where the LoadRPMCommand carries smdpSigned3, smdpSignature3, and CERT.DPrpm.ECDSA.
  • the LPA also obtains the current or historical location information of the terminal. For details, refer to the description of step S113 in the embodiment corresponding to FIG. 3 .
  • Step S511 The eUICC verifies that CERT.DPrpm.ECDSA is legal and belongs to the same SM-DP+ as CERT.DPauth.ECDSA, and verifies that the TransactionID matches the current RSP session.
  • Step S512 The eUICC verifies the smdpSignature3.
  • Step S513 The eUICC clears the PPR setting according to the PPR Unset.
  • the eUICC extracts the PPR Unset and the ICCID from the smdpSigned3, determines the target profile to be deleted according to the ICCID, and clears the PPR setting in the target profile according to the PPR Unset.
  • the eUICC can also clear the PPR information of the target profile in the Profile Policy Enabler.
  • Step S514 The eUICC deletes the target profile corresponding to the ICCID.
  • the eUICC determines the target profile according to the ICCID, and performs a delete operation on the target profile.
  • the user can send the RPMorder to the SM-DP+ through the Operator BSS, and the SM-DP+ generates the pending RPM order, and then the RPM Command, the ICCID, and the PPR Unset carried in the RPMOrder are deleted in the eUICC configuration file.
  • the request is sent to the LPA, and the LPA sends a LoadRPMCommand to the eUICC.
  • the LoadRPMCommand carries the RPM Command, the ICCID, and the PPR Unset.
  • the eUICC determines the target profile to be deleted according to the ICCID, and deletes the PPR setting of the target profile according to the PPR Unset, thereby deleting the profile.
  • the profile can be deleted in time, and the risk of asset loss associated with the eUICC data or information leakage associated with the eUICC data after the terminal is lost is reduced, and on the other hand, the user retrieves the terminal. You can also re-download the profile.
  • FIG. 9 is a schematic structural diagram of a local eUICC configuration file auxiliary module according to an embodiment of the present invention.
  • the local eUICC configuration file auxiliary module may include a deletion request receiving unit 610, a verification unit 620, and a deletion instruction sending unit 630. , wherein the detailed description of each unit is as follows:
  • a deletion request receiving unit 610 configured to receive an eUICC configuration file deletion request, where the eUICC configuration file deletion request carries authentication confirmation information;
  • the verification unit 620 is configured to verify the authentication confirmation information.
  • the deletion instruction sending unit 630 is configured to send, to the eUICC of the terminal, an instruction to delete the eUICC configuration file, where the instruction to delete the eUICC configuration file is used to indicate the eUICC deletion, if the verification of the authentication confirmation information is passed. eUICC configuration file.
  • the deletion request receiving unit 610 is specifically configured to receive an eUICC configuration file deletion request sent by the eUICC remote management server; or receive an eUICC configuration file deletion request through an application program interface.
  • the local eUICC profile auxiliary module further includes:
  • the indication receiving unit 640 is configured to receive an indication sent by the eUICC to connect to the eUICC remote management server, where the indication carries an address of the eUICC remote management server.
  • the eUICC configuration file deletion request further carries a location acquisition indication;
  • the local eUICC configuration file auxiliary module further includes:
  • Deleting a successful receiving unit 650 configured to receive a deletion success indication returned by the eUICC
  • the location information returning unit 660 is configured to return the deletion success indication and the location information of the terminal to the eUICC remote management server according to the location acquisition indication.
  • the authentication confirmation information includes: a message digest of the authentication confirmation personal code; or a message digest of the first data, where the first data includes the authentication confirmation personal code and eUICC configuration file information; or a message digest of the second data, wherein the second data includes the eUICC profile information and a portion of the authentication confirmation personal code.
  • the instruction to delete the eUICC configuration file includes an eUICC storage reset instruction, and the eUICC storage reset instruction is used to instruct the eUICC to delete all the operating eUICC configuration files.
  • the instruction to delete the eUICC configuration file carries an eUICC lock indication; the eUICC lock indication is used to indicate that the eUICC enters a locked state.
  • the local eUICC configuration file auxiliary module further includes:
  • the unlock request receiving unit 670 is configured to receive an eUICC unlock request and an authentication confirmation input information of the user;
  • the unlocking instruction sending unit 680 is configured to send an eUICC unlocking instruction to the eUICC, where the verification of the authentication confirmation input information is passed, where the eUICC unlocking instruction is used to indicate that the eUICC enters a normal state.
  • the local eUICC configuration file auxiliary module further includes:
  • the reject status entry unit 690 is configured to enter the unreceivable eUICC profile download request status if the local authentication confirms that the personal identification code does not exist and receives the eUICC lock indication sent by the eUICC.
  • each unit may also be referred to FIG. 3, FIG. 5, FIG. 6, FIG. 7, or FIG. Corresponding description of the method embodiment.
  • the local eUICC configuration file auxiliary module receives the eUICC configuration file deletion request and verifies the authentication confirmation information carried in the eUICC configuration file deletion request, and if the verification is passed, The eUICC sends an instruction to delete the eUICC configuration file, instructing the eUICC to delete the eUICC configuration file, and the local eUICC configuration file auxiliary module may perform the foregoing operations after the terminal is lost, and reduce the asset loss associated with the eUICC data after the terminal is lost or related to the eUICC data.
  • the risk of information disclosure is described in FIG. 9, the local eUICC configuration file auxiliary module receives the eUICC configuration file deletion request and verifies the authentication confirmation information carried in the eUICC configuration file deletion request, and if the verification is passed.
  • the eUICC sends an instruction to delete the eUICC configuration file, instructing the eUICC to delete the eUICC configuration file, and the local eUICC configuration file auxiliary module may perform the for
  • FIG. 10 is a terminal 70.
  • the terminal 70 includes a processor 701, a memory 702, and a transceiver 703.
  • the processor 701, the memory 702, and the transceiver 703 are connected to each other through a bus. .
  • the memory 702 includes, but is not limited to, a random access memory (English: Random Access Memory, RAM for short), a read-only memory (English: Read-Only Memory, abbreviated as: ROM), and an erasable programmable read-only memory (English: Erasable Programmable Read Only Memory (EPROM), or Portable Read-Only Memory (CD-ROM), which is used for related commands and data.
  • the transceiver 703 is configured to receive and transmit data.
  • the processor 701 may be one or more central processing units (English: Central Processing Unit, CPU for short). In the case that the processor 701 is a CPU, the CPU may be a single core CPU or a multi-core CPU.
  • CPU Central Processing Unit
  • the processor 701 in the terminal 70 is configured to read the program code stored in the memory 702, and perform the following operations:
  • the instruction to delete the eUICC configuration file is sent to the eUICC of the terminal, where the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  • each operation may also correspond to the corresponding description of the method embodiment shown in FIG. 3, FIG. 5, FIG. 6, FIG. 7, or FIG.
  • the terminal may perform the above operations after the loss, reducing the risk of asset loss associated with the eUICC data or information leakage associated with the eUICC data after the terminal is lost.
  • FIG. 11 is a schematic structural diagram of an eUICC according to an embodiment of the present invention.
  • the eUICC may include a deletion instruction receiving unit 810 and a deleting unit 820.
  • the detailed description of each unit is as follows:
  • the deletion instruction receiving unit 810 is configured to receive an instruction for deleting the eUICC configuration file sent by the local eUICC configuration file auxiliary module of the terminal;
  • the deleting unit 820 is configured to delete the eUICC configuration file according to the instruction to delete the eUICC configuration file.
  • the eUICC further includes:
  • the push command receiving unit 830 is configured to receive a push command sent by the eUICC remote management server;
  • the indication sending unit 840 is configured to send an indication of connecting the eUICC remote management server to the local eUICC profile auxiliary module according to the push command, where the indication carries an address of the eUICC remote management server.
  • the push command receiving unit 830 is specifically configured to receive a security packet, where the security packet is Carrying a push command sent by the eUICC remote management server and root issuer security domain information; the indication sending unit includes a root issuer security domain, configured to send a connection to the local eUICC profile auxiliary module according to the push command The eUICC remote management server instructions.
  • the eUICC further includes:
  • the deletion success sending unit 850 is configured to send a deletion success indication to the local eUICC profile auxiliary module.
  • the instruction to delete the eUICC configuration file includes an eUICC storage reset instruction
  • the deleting unit 820 is specifically configured to delete all the operating eUICC configuration files according to the eUICC storage reset instruction.
  • the eUICC further includes:
  • the unlocking instruction receiving unit 860 is configured to receive an eUICC unlocking instruction sent by the local eUICC configuration file auxiliary module, where the eUICC unlocking instruction is verified by the local eUICC configuration file auxiliary module in verifying the authentication input information of the user. Send in case;
  • the normal state entering unit 870 is configured to enter a normal state according to the eUICC unlocking instruction.
  • the eUICC further includes:
  • the lock indication sending unit 880 is configured to send an eUICC lock indication to the local eUICC profile auxiliary module, where the eUICC lock indication is used to indicate that the local eUICC profile auxiliary module confirms that the personal identifier does not exist in the local authentication Next, enter the unreceivable profile download request status.
  • each unit may also correspond to the corresponding description of the method embodiment shown in FIG. 3, FIG. 5, FIG. 6, FIG. 7, or FIG.
  • the eUICC may delete the eUICC configuration file after the terminal is lost, and reduce the risk of asset loss associated with the eUICC data or information leakage associated with the eUICC data after the terminal is lost.
  • FIG. 12 is an eUICC 90 according to an embodiment of the present invention.
  • the eUICC 90 includes a processor 901, a memory 902, and a communication interface 903.
  • the processor 901, the memory 902, and the communication interface 903 are connected to each other.
  • the memory 902 includes, but is not limited to, a random access memory (English: Random Access Memory, RAM for short), a read-only memory (English: Read-Only Memory, ROM for short), and an erasable programmable read-only memory (English: Erasable Programmable Read Only Memory (EPROM) or Portable Read-Only Memory (CD-ROM) is used to store related commands and data.
  • Communication interface 903 is used to receive and transmit data.
  • the processor 901 may be one or more central processing units (English: Central Processing Unit, CPU for short). In the case that the processor 901 is a CPU, the CPU may be a single core CPU or a multi-core CPU.
  • CPU Central Processing Unit
  • the processor 901 in the eUICC 90 is configured to read the program code stored in the memory 902, and perform the following operations:
  • the eUICC configuration file is deleted according to the instruction to delete the eUICC configuration file.
  • each operation may also correspond to the corresponding description of the method embodiment shown in FIG. 3, FIG. 5, FIG. 6, FIG. 7, or FIG.
  • the eUICC may perform the above operations after the terminal is lost, reducing the risk of asset loss associated with the eUICC data or information leakage associated with the eUICC data after the terminal is lost.
  • FIG. 13 is a schematic structural diagram of an eUICC remote management server according to an embodiment of the present invention.
  • the eUICC remote management server may include a deletion request sending unit 1010, where a detailed description of the deletion request sending unit is as follows:
  • the deletion request sending unit 1010 is configured to send an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal, where the eUICC configuration file deletion request carries the authentication confirmation information;
  • the authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and if the verification of the authentication confirmation information is passed, sending an instruction to delete the eUICC configuration file to the eUICC of the terminal,
  • the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  • the authentication confirmation information includes: an authentication confirmation personal code; or a message digest of the authentication confirmation personal code; or a message digest of the first data, where the first data includes the authentication confirmation a personal code and eUICC profile information; or a message digest of the second data, wherein the second data includes a portion of the authentication confirmation personal code and the eUICC profile information.
  • the eUICC configuration file deletion request further carries a location acquisition indication;
  • the eUICC remote management server further includes:
  • the location information receiving unit 1020 is configured to receive a deletion success indication returned by the local eUICC profile auxiliary module and location information of the terminal.
  • the eUICC remote management server further includes: a location information receiving unit, configured to receive location information of the terminal returned by the local eUICC profile auxiliary module.
  • each unit may also correspond to the corresponding description of the method embodiment shown in FIG. 3 or FIG. 8.
  • the eUICC remote management server sends an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal in case the terminal is lost, so that the terminal can delete the eUICC configuration file in time, thereby reducing the terminal loss.
  • FIG. 14 is an eUICC remote management server 110 according to an embodiment of the present invention.
  • the eUICC remote management server 110 includes a processor 1101, a memory 1102, and a transceiver 1103.
  • the processor 1101, the memory 1102, and the transceiver 1102 The units 1103 are connected to each other through a bus.
  • the memory 1102 includes, but is not limited to, a random access memory (English: Random Access Memory, RAM for short), a read-only memory (English: Read-Only Memory, ROM for short), and an erasable programmable read-only memory (English: Erasable Programmable Read Only Memory (EPROM), or portable read-only memory
  • the memory (English: Compact Disc Read-Only Memory, CD-ROM for short) is used for the related instructions and data.
  • the transceiver 1103 is for receiving and transmitting data.
  • the processor 1101 may be one or more central processing units (English: Central Processing Unit, CPU for short). In the case where the processor 1101 is a CPU, the CPU may be a single core CPU or a multi-core CPU.
  • CPU Central Processing Unit
  • the processor 1101 of the eUICC remote management server 110 is configured to read the program code stored in the memory 1102, and perform the following operations:
  • the authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and if the verification of the authentication confirmation information is passed, sending an instruction to delete the eUICC configuration file to the eUICC of the terminal,
  • the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  • each operation may also correspond to the corresponding description of the method embodiment shown in FIG. 3 or FIG. 8.
  • the eUICC remote management server 110 sends an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal in case the terminal is lost, so that the terminal can delete the eUICC configuration file in time, and lower the terminal.
  • the risk of asset loss associated with the data of the eUICC or information leakage associated with the data of the eUICC after the terminal is lost can be reduced.
  • the program can be stored in a computer readable storage medium, when the program is executed
  • the flow of the method embodiments as described above may be included.
  • the foregoing storage medium includes various media that can store program codes, such as a ROM or a random access memory RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed in the embodiments of the present invention are an eUICC profile deletion method and device. An eUICC profile deletion method, comprising: receiving an eUICC profile deletion request, the eUICC profile deletion request carrying authentication confirmation information; verifying the authentication confirmation information; in the case where the authentication confirmation information has passed the verification, sending, to the eUICC of a terminal, an instruction to delete the eUICC profile, the instruction to delete the eUICC profile being used for instructing the eUICC to delete the eUICC profile. The embodiments of the present invention can reduce the risk of financial losses associated with eUICC data or information leakage associated with eUICC data, after a terminal has been lost.

Description

一种eUICC配置文件的删除方法和设备Method and device for deleting eUICC configuration file 技术领域Technical field
本发明涉及eUICC电信智能卡领域,尤其涉及一种eUICC配置文件的删除方法和设备。The present invention relates to the field of eUICC telecommunications smart cards, and in particular, to a method and a device for deleting an eUICC configuration file.
背景技术Background technique
eUICC电信智能卡是一个可移动的或不可移动的通用集成电路卡(Universal Integrated Circuit Card,UICC),能够以安全的方式执行远程配置文件管理,或者执行本地配置文件管理(比如,终端用户触发的配置文件激活、去激活或删除等)。eUICC一词源自嵌入式(embedded)UICC,可以是单个芯片形态嵌入在终端中,或者作为终端中其它单个芯片(比如modem芯片,应用处理器芯片)的一部分,但不意味着必须嵌入在终端中不可移动,也可以是可移动的卡片形态,就像用户身份识别(Subscriber Identification Module,SIM)卡、Micro SIM卡或Nano SIM卡一样。eUICC配置文件(Profile)是数据和应用的组合,为了给终端提供移动网络服务被配置或安装到eUICC上,所谓服务包括通话、收发短信或数据业务等。Profile也可以看成SIM软件模块,它与传统SIM卡一样,在终端接入移动网络时执行鉴权计算和密钥生成等功能。传统的SIM卡是将数据和应用固化在SIM卡上,用户无法删除,而eUICC则不同,可以在线远程将eUICC配置文件下载到eUICC上,用户还可以通过本地管理的方式将eUICC配置文件删除。The eUICC Telecom Smart Card is a removable or non-removable Universal Integrated Circuit Card (UICC) that performs remote profile management in a secure manner or performs local profile management (eg, end-user triggered configuration) File activation, deactivation or deletion, etc.). The term eUICC is derived from the embedded UICC, which can be embedded in the terminal in a single chip form, or as part of other single chips in the terminal (such as modem chips, application processor chips), but does not mean that it must be embedded in the terminal. It can't be moved, it can also be a removable card form, just like a Subscriber Identification Module (SIM) card, a Micro SIM card or a Nano SIM card. The eUICC Profile is a combination of data and applications. In order to provide mobile network services to the terminal, it is configured or installed on the eUICC. The so-called services include calling, sending and receiving text messages or data services. The Profile can also be regarded as a SIM software module. Like the traditional SIM card, it performs functions such as authentication calculation and key generation when the terminal accesses the mobile network. The traditional SIM card is to harden the data and the application on the SIM card, and the user cannot delete it. The eUICC is different. The eUICC configuration file can be downloaded to the eUICC remotely. The user can also delete the eUICC configuration file through local management.
目前用户的各种账户(如银行卡账户、电子钱包账户等)基本都与电信智能卡SIM卡的数据相关联,在终端丢失且电信智能卡的数据未清除的情况下,会给丢失终端的用户带来资产丢失或信息泄露等安全隐患。现有技术中,终端的防盗功能一般通过操作系统上的防盗应用(或称手机找回应用)实现,用户可以在终端上开启防盗功能,在终端丢失时用户登录终端厂商的网站通过防盗应用对应的服务器向终端下发远程指令,从而实现对丢失的终端的远程管理,使终端执行定位、删除终端的数据(如终端中的图片、通讯录、短信等)。虽然终端的防盗功能可以使终端在丢失后根据远程管理指令执行定位、删除数据等功能,但是终端删除的都只是与操作系统有关的数据,无法删除电信智能卡上的数据。另外,也有相当比例的用户尚未启用手机防盗功能。At present, various accounts of the user (such as bank card accounts, e-wallet accounts, etc.) are basically associated with the data of the smart card of the telecommunication smart card. When the terminal is lost and the data of the telecommunication smart card is not cleared, the user of the lost terminal is brought Security risks such as loss of assets or information leakage. In the prior art, the anti-theft function of the terminal is generally implemented by an anti-theft application (or a mobile phone retrieving application) on the operating system, and the user can enable the anti-theft function on the terminal. When the terminal is lost, the user logs in to the website of the terminal manufacturer through the anti-theft application. The server sends a remote command to the terminal, thereby implementing remote management of the lost terminal, and causing the terminal to perform positioning and deleting data of the terminal (such as pictures, address books, short messages, etc. in the terminal). Although the anti-theft function of the terminal can cause the terminal to perform functions such as positioning and deleting data according to the remote management command after the loss, the terminal deletes only the data related to the operating system, and cannot delete the data on the telecommunication smart card. In addition, a significant percentage of users have not enabled the phone anti-theft feature.
发明内容Summary of the invention
本发明实施例提供一种eUICC配置文件的删除方法和设备,可以在终端丢失的情况下对终端的eUICC配置文件进行删除,清除电信智能卡eUICC的数据,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险。An embodiment of the present invention provides a method and a device for deleting an eUICC configuration file, where the eUICC configuration file of the terminal is deleted, the data of the eUICC of the telecommunication smart card is cleared, and the data associated with the eUICC is deleted after the terminal is lost. The risk of asset loss or information disclosure associated with eUICC's data.
本发明实施例第一方面提供一种eUICC配置文件的删除方法,包括:A first aspect of the embodiments of the present invention provides a method for deleting an eUICC configuration file, including:
接收eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;Receiving an eUICC configuration file deletion request, where the eUICC configuration file deletion request carries authentication confirmation information;
对所述鉴权确认信息进行验证;Verifying the authentication confirmation information;
在对所述鉴权确认信息的验证通过的情况下,向终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。When the verification of the authentication confirmation information is passed, the instruction to delete the eUICC configuration file is sent to the eUICC of the terminal, where the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
在第一方面的第一种可能的实现方式中,可以通过两种方式接收eUICC配置文件删 除请求:接收eUICC远程管理服务器发送的eUICC配置文件删除请求;或通过应用程序接口接收eUICC配置文件删除请求。例如接收签约管理者-数据准备+(Subscription Manager Data Preparation+,SM-DP+)服务器发送的eUICC配置文件删除请求,又如通过应用程序接口(Application Programming Interface,API)接收终端的本地防盗应用发送的eUICC配置文件删除请求。In the first possible implementation manner of the first aspect, the eUICC configuration file may be deleted in two manners. In addition to the request: receiving an eUICC profile delete request sent by the eUICC remote management server; or receiving an eUICC profile delete request through the application interface. For example, the eUICC configuration file deletion request sent by the subscription manager data preparation (Data Preparation+, (SM-DP+) server) is received, and the eUICC sent by the local anti-theft application of the terminal is received through an application programming interface (API). Profile delete request.
结合第一方面的第一种可能的实现方式,在第二种可能的实现方式中,若接收eUICC远程管理服务器发送的eUICC配置文件删除请求,则在接收eUICC配置文件删除请求前,还接收所述eUICC发送的连接eUICC远程管理服务器的指示,所述指示中携带所述eUICC远程管理服务器的地址。通过所述eUICC远程管理服务器的地址可与所述eUICC远程管理服务器建立通信连接,从而接收eUICC远程管理服务器发送的eUICC配置文件删除请求。In conjunction with the first possible implementation manner of the first aspect, in a second possible implementation, if the eUICC configuration file deletion request sent by the eUICC remote management server is received, the eUICC configuration file deletion request is received before receiving the eUICC configuration file deletion request. An indication sent by the eUICC to connect to the eUICC remote management server, where the indication carries an address of the eUICC remote management server. And establishing, by the eUICC remote management server, a communication connection with the eUICC remote management server, thereby receiving an eUICC configuration file deletion request sent by the eUICC remote management server.
结合第一方面的第一种可能的实现方式,在第三种可能的实现方式中,若接收eUICC远程管理服务器发送的eUICC配置文件删除请求,则所述eUICC配置文件删除请求中还携带位置获取指示,所述向终端的eUICC发送删除eUICC配置文件的指令之后还包括:接收所述eUICC返回的删除成功指示;根据所述位置获取指示向所述eUICC远程管理服务器返回所述删除成功指示和所述终端的位置信息。In conjunction with the first possible implementation of the first aspect, in a third possible implementation, if the eUICC configuration file deletion request sent by the eUICC remote management server is received, the eUICC configuration file deletion request further carries the location acquisition Instructing, after the sending, by the eUICC of the terminal, the instruction to delete the eUICC configuration file, the method further includes: receiving a deletion success indication returned by the eUICC; and returning the deletion success indication and the location to the eUICC remote management server according to the location obtaining indication The location information of the terminal.
在第一方面的第四种可能的实现方式中,所述鉴权确认信息包括:鉴权确认个人码;或所述鉴权确认个人码的消息摘要;或第一数据的消息摘要,其中,所述第一数据包括所述鉴权确认个人码和eUICC配置文件信息;或第二数据的消息摘要,其中,所述第二数据包括所述eUICC配置文件信息和部分的所述鉴权确认个人码。In a fourth possible implementation manner of the first aspect, the authentication confirmation information includes: an authentication confirmation personal code; or a message digest of the authentication confirmation personal code; or a message digest of the first data, where The first data includes the authentication confirmation personal code and eUICC profile information; or a message digest of the second data, wherein the second data includes the eUICC profile information and part of the authentication confirmation individual code.
在第一方面的第五种可能的实现方式中,所述删除eUICC配置文件的指令为eUICC存储复位指令;所述eUICC存储复位指令用于指示所述eUICC删除全部运营eUICC配置文件。In a fifth possible implementation manner of the first aspect, the instruction to delete the eUICC configuration file is an eUICC storage reset instruction, and the eUICC storage reset instruction is used to instruct the eUICC to delete all the operating eUICC configuration files.
在第一方面的第六种可能的实现方式中,所述删除eUICC配置文件的指令携带eUICC锁定指示;所述eUICC锁定指示用于指示所述eUICC进入锁定状态。In a sixth possible implementation manner of the first aspect, the instruction for deleting the eUICC configuration file carries an eUICC lock indication, and the eUICC lock indication is used to indicate that the eUICC enters a locked state.
结合第一方面的第六种可能的实现方式,在第七种可能的实现方式中,所述向终端的eUICC发送删除eUICC配置文件的指令之后还包括:接收用户的eUICC解锁请求和鉴权确认输入信息;在对所述鉴权确认输入信息的验证通过的情况下,向所述eUICC发送eUICC解锁指令,所述eUICC解锁指令用于指示所述eUICC进入正常状态。With reference to the sixth possible implementation manner of the first aspect, in a seventh possible implementation manner, after the sending, by the eUICC of the terminal, the instruction for deleting the eUICC configuration file, the method further includes: receiving an eUICC unlock request and an authentication confirmation of the user Entering information; in case the verification of the authentication confirmation input information is passed, sending an eUICC unlocking instruction to the eUICC, the eUICC unlocking instruction is used to indicate that the eUICC enters a normal state.
结合第一方面的第六种可能的实现方式,在第八种可能的实现方式中,所述向终端的eUICC发送删除eUICC配置文件的指令之后还包括:在本地鉴权确认个人识别码不存在且接收到所述eUICC发送的eUICC锁定指示的情况下,进入不可接收eUICC配置文件下载请求状态。With the sixth possible implementation of the first aspect, in an eighth possible implementation manner, after the sending, by the eUICC of the terminal, the instruction to delete the eUICC configuration file, the method further includes: confirming that the personal identifier does not exist in the local authentication And if the eUICC lock indication sent by the eUICC is received, the unreceived eUICC profile download request state is entered.
本发明实施例第二方面提供另一种eUICC配置文件的删除方法,包括:The second aspect of the embodiment of the present invention provides another method for deleting an eUICC configuration file, including:
接收终端的本地eUICC配置文件辅助模块发送的删除eUICC配置文件的指令;Receiving, by the local eUICC configuration file auxiliary module of the terminal, an instruction to delete the eUICC configuration file;
根据所述删除eUICC配置文件的指令删除eUICC配置文件。The eUICC configuration file is deleted according to the instruction to delete the eUICC configuration file.
在第二方面的第一种可能的实现方式中,所述接收终端的本地eUICC配置文件辅助 模块发送的删除eUICC配置文件的指令之前还包括:接收eUICC远程管理服务器发送的推送命令;根据所述推送命令向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示,所述指示中携带所述eUICC远程管理服务器的地址。In a first possible implementation manner of the second aspect, the local eUICC configuration file of the receiving terminal is assisted The instruction for deleting the eUICC configuration file sent by the module further includes: receiving a push command sent by the eUICC remote management server; sending, according to the push command, an indication of connecting the eUICC remote management server to the local eUICC configuration file auxiliary module, where the indication is Carrying the address of the eUICC remote management server.
结合第二方面的第一种可能的实现方式,在第二种可能的实现方式中,所述推送命令被包含在安全分组中进行发送,安全分组中还包含处理所述推送命令的应用信息,即所述接收eUICC远程管理服务器发送的推送命令包括:接收安全分组,其中,所述安全分组中携带所述根发行者安全域信息以及eUICC远程管理服务器发送的推送命令;所述根据所述推送命令向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示包括:根发行者安全域根据所述推送命令向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示。With reference to the first possible implementation manner of the second aspect, in a second possible implementation manner, the push command is included in a security packet, and the security packet further includes application information for processing the push command. That is, the receiving the push command sent by the eUICC remote management server includes: receiving the security packet, wherein the security packet carries the root issuer security domain information and a push command sent by the eUICC remote management server; The sending, by the command, the indication to the local eUICC configuration file auxiliary module to connect to the eUICC remote management server includes: the root issuer security domain sending an indication to the local eUICC configuration file auxiliary module to connect to the eUICC remote management server according to the push command.
在第二方面的第三种可能的实现方式中,所述根据所述删除eUICC配置文件的指令删除eUICC配置文件之后还包括:向所述本地eUICC配置文件辅助模块发送删除成功指示。In a third possible implementation manner of the second aspect, after the deleting the eUICC configuration file according to the instruction for deleting the eUICC configuration file, the method further includes: sending a deletion success indication to the local eUICC configuration file auxiliary module.
在第二方面的第四种可能的实现方式中,所述删除eUICC配置文件的指令为eUICC存储复位指令;所述根据所述删除eUICC配置文件的指令删除eUICC配置文件包括:根据所述eUICC存储复位指令删除全部运营eUICC配置文件。In a fourth possible implementation manner of the second aspect, the instruction to delete the eUICC configuration file is an eUICC storage reset instruction, and the deleting the eUICC configuration file according to the instruction to delete the eUICC configuration file includes: storing according to the eUICC The reset instruction deletes all operational eUICC configuration files.
在第二方面的第五种可能的实现方式中,所述删除eUICC配置文件的指令携带eUICC锁定指示;所述方法还包括:根据所述eUICC锁定指示进入锁定状态。In a fifth possible implementation manner of the second aspect, the instruction for deleting the eUICC configuration file carries an eUICC lock indication; the method further includes: entering a locked state according to the eUICC lock indication.
结合第二方面的第五种可能的实现方式,在第六种可能的实现方式中,所述根据所述eUICC锁定指示进入锁定状态之后还包括:接收所述本地eUICC配置文件辅助模块发送的eUICC解锁指令,所述eUICC解锁指令由所述本地eUICC配置文件辅助模块在对用户的鉴权确认输入信息的验证通过的情况下发送;根据所述eUICC解锁指令进入正常状态。With the fifth possible implementation of the second aspect, in a sixth possible implementation, after the entering the locked state according to the eUICC locking indication, the method further includes: receiving the eUICC sent by the local eUICC configuration file auxiliary module And an unlocking instruction, where the eUICC unlocking instruction is sent by the local eUICC profile auxiliary module after the verification of the user's authentication confirmation input information is passed; and the normal state is entered according to the eUICC unlocking instruction.
结合第二方面的第五种可能的实现方式,在第七种可能的实现方式中,所述根据所述eUICC锁定指示进入锁定状态之后还包括:向所述本地eUICC配置文件辅助模块发送eUICC锁定指示,所述eUICC锁定指示用于指示所述本地eUICC配置文件辅助模块在本地鉴权确认个人识别码不存在的情况下,进入不可接收Profile下载请求状态。With the fifth possible implementation of the second aspect, in a seventh possible implementation, after the entering the locked state according to the eUICC locking indication, the method further includes: sending an eUICC lock to the local eUICC profile auxiliary module The indication, the eUICC lock indication is used to indicate that the local eUICC profile auxiliary module enters an unreceivable profile download request state if the local authentication confirmation personal identification code does not exist.
本发明实施例第三方面提供又一种eUICC配置文件的删除方法,包括:A third aspect of the embodiments of the present invention provides a method for deleting an eUICC configuration file, including:
向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;Sending an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal, where the eUICC configuration file deletion request carries the authentication confirmation information;
所述鉴权确认信息被所述本地eUICC配置文件辅助模块用于进行验证,并在对所述鉴权确认信息的验证通过的情况下,向所述终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。The authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and if the verification of the authentication confirmation information is passed, sending an instruction to delete the eUICC configuration file to the eUICC of the terminal, The instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
在第三方面的第一种可能的实现方式中,所述向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求之前还包括:向所述eUICC发送推送命令,所述推送命令用于指示所述eUICC向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示,所述指示中携带所述eUICC远程管理服务器的地址。In a first possible implementation manner of the third aspect, before the sending, by the local eUICC configuration file auxiliary module of the terminal, the eUICC configuration file deletion request, the method further includes: sending a push command to the eUICC, where the push command is used to indicate The eUICC sends an indication to the local eUICC profile auxiliary module to connect to the eUICC remote management server, where the indication carries the address of the eUICC remote management server.
在第三方面的第二种可能的实现方式中,所述eUICC配置文件删除请求还携带位置 获取指示;所述方法还包括:接收所述本地eUICC配置文件辅助模块返回的删除成功指示和所述终端的位置信息。In a second possible implementation manner of the third aspect, the eUICC configuration file deletion request further carries a location Obtaining an indication; the method further includes: receiving a deletion success indication returned by the local eUICC profile auxiliary module and location information of the terminal.
在第三方面的第三种可能的实现方式中,所述鉴权确认信息包括:鉴权确认个人码;或所述鉴权确认个人码的消息摘要;或第一数据的消息摘要,其中,所述第一数据包括所述鉴权确认个人码和eUICC配置文件信息;或第二数据的消息摘要,其中,所述第二数据包括所述eUICC配置文件信息和部分的所述鉴权确认个人码。In a third possible implementation manner of the third aspect, the authentication confirmation information includes: an authentication confirmation personal code; or a message digest of the authentication confirmation personal code; or a message digest of the first data, where The first data includes the authentication confirmation personal code and eUICC profile information; or a message digest of the second data, wherein the second data includes the eUICC profile information and part of the authentication confirmation individual code.
本发明实施例第四方面提供一种本地eUICC配置文件辅助模块,包括:A fourth aspect of the embodiments of the present invention provides a local eUICC configuration file auxiliary module, including:
删除请求接收单元,用于接收eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;a deletion request receiving unit, configured to receive an eUICC configuration file deletion request, where the eUICC configuration file deletion request carries authentication confirmation information;
验证单元,用于对所述鉴权确认信息进行验证;a verification unit, configured to verify the authentication confirmation information;
删除指令发送单元,用于在对所述鉴权确认信息的验证通过的情况下,向终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。a deletion instruction sending unit, configured to send an instruction to delete an eUICC configuration file to the eUICC of the terminal, where the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC, if the verification of the authentication confirmation information is passed Configuration file.
在第四方面的第一种可能的实现方式中,所述删除请求接收单元具体用于:接收eUICC远程管理服务器发送的eUICC配置文件删除请求;或通过应用程序接口接收eUICC配置文件删除请求。In a first possible implementation manner of the fourth aspect, the deleting request receiving unit is specifically configured to: receive an eUICC configuration file deletion request sent by an eUICC remote management server; or receive an eUICC configuration file deletion request by using an application program interface.
结合第四方面的第一种可能的实现方式,在第二种可能的实现方式中,所述本地eUICC配置文件辅助模块还包括:指示接收单元,用于接收所述eUICC发送的连接eUICC远程管理服务器的指示,所述指示中携带所述eUICC远程管理服务器的地址。With reference to the first possible implementation manner of the foregoing aspect, in a second possible implementation manner, the local eUICC configuration file auxiliary module further includes: an indication receiving unit, configured to receive the eUICC remote management sent by the eUICC An indication of the server, where the indication carries an address of the eUICC remote management server.
结合第四方面的第一种可能的实现方式,在第三种可能的实现方式中,所述eUICC配置文件删除请求还携带位置获取指示;所述本地eUICC配置文件辅助模块还包括:删除成功接收单元,用于接收所述eUICC返回的删除成功指示;位置信息返回单元,用于根据所述位置获取指示向所述eUICC远程管理服务器返回所述删除成功指示和所述终端的位置信息。With reference to the first possible implementation manner of the fourth aspect, in a third possible implementation manner, the eUICC configuration file deletion request further carries a location acquisition indication; the local eUICC configuration file auxiliary module further includes: deleting successfully received And a location information returning unit, configured to return the deletion success indication and the location information of the terminal to the eUICC remote management server according to the location obtaining indication.
在第四方面的第四种可能的实现方式中,所述鉴权确认信息包括:鉴权确认个人码;或所述鉴权确认个人码的消息摘要;或第一数据的消息摘要,其中,所述第一数据包括所述鉴权确认个人码和eUICC配置文件信息;或第二数据的消息摘要,其中,所述第二数据包括所述eUICC配置文件信息和部分的所述鉴权确认个人码。In a fourth possible implementation manner of the fourth aspect, the authentication confirmation information includes: an authentication confirmation personal code; or a message digest of the authentication confirmation personal code; or a message digest of the first data, where The first data includes the authentication confirmation personal code and eUICC profile information; or a message digest of the second data, wherein the second data includes the eUICC profile information and part of the authentication confirmation individual code.
在第四方面的第五种可能的实现方式中,所述删除eUICC配置文件的指令包括eUICC存储复位指令;所述eUICC存储复位指令用于指示所述eUICC删除全部运营eUICC配置文件。In a fifth possible implementation manner of the fourth aspect, the instruction for deleting the eUICC configuration file includes an eUICC storage reset instruction, where the eUICC storage reset instruction is used to instruct the eUICC to delete all the operating eUICC configuration files.
在第四方面的第六种可能的实现方式中,所述删除eUICC配置文件的指令携带eUICC锁定指示;所述eUICC锁定指示用于指示所述eUICC进入锁定状态。In a sixth possible implementation manner of the fourth aspect, the instruction for deleting the eUICC configuration file carries an eUICC lock indication, and the eUICC lock indication is used to indicate that the eUICC enters a locked state.
结合第四方面的第六种可能的实现方式,在第七种可能的实现方式中,所述本地eUICC配置文件辅助模块还包括:解锁请求接收单元,用于接收用户的eUICC解锁请求和鉴权确认输入信息;解锁指令发送单元,用于在对所述鉴权确认输入信息的验证通过的情况下,向所述eUICC发送eUICC解锁指令,所述eUICC解锁指令用于指示所述eUICC 进入正常状态。With reference to the sixth possible implementation of the fourth aspect, in a seventh possible implementation, the local eUICC profile auxiliary module further includes: an unlock request receiving unit, configured to receive the eUICC unlock request and the authentication of the user Confirming the input information; the unlocking instruction sending unit is configured to send an eUICC unlocking instruction to the eUICC, where the verification of the authentication confirmation input information is passed, the eUICC unlocking instruction is used to indicate the eUICC Enter the normal state.
结合第四方面的第六种可能的实现方式,在第八种可能的实现方式中,所述本地eUICC配置文件辅助模块还包括:拒绝状态进入单元,用于在本地鉴权确认个人识别码不存在且接收到所述eUICC发送的eUICC锁定指示的情况下,进入不可接收eUICC配置文件下载请求状态。With reference to the sixth possible implementation manner of the foregoing aspect, in the eighth possible implementation, the local eUICC configuration file auxiliary module further includes: a reject status entry unit, configured to confirm the personal identification code in the local authentication If there is an eUICC lock indication sent by the eUICC, the unreachable eUICC profile download request state is entered.
本发明实施例第五方面提供一种eUICC,包括:A fifth aspect of the embodiments of the present invention provides an eUICC, including:
删除指令接收单元,用于接收终端的本地eUICC配置文件辅助模块发送的删除eUICC配置文件的指令;a deletion instruction receiving unit, configured to receive an instruction for deleting an eUICC configuration file sent by a local eUICC configuration file auxiliary module of the terminal;
删除单元,用于根据所述删除eUICC配置文件的指令删除eUICC配置文件。And a deleting unit, configured to delete the eUICC configuration file according to the instruction to delete the eUICC configuration file.
在第五方面的第一种可能的实现方式中,所述eUICC还包括:推送命令接收单元,用于接收eUICC远程管理服务器发送的推送命令;指示发送单元,用于根据所述推送命令向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示,所述指示中携带所述eUICC远程管理服务器的地址。In a first possible implementation manner of the fifth aspect, the eUICC further includes: a push command receiving unit, configured to receive a push command sent by the eUICC remote management server; and an indication sending unit, configured to send the command according to the push command The local eUICC profile auxiliary module sends an indication of connecting to the eUICC remote management server, where the indication carries the address of the eUICC remote management server.
结合第五方面的第一种可能的实现方式,在第二种可能的实现方式中,所述推送命令接收单元具体用于接收安全分组,其中,所述安全分组中携带根发行者安全域信息以及所述eUICC远程管理服务器发送的推送命令;所述指示发送单元包括根发行者安全域,用于根据所述推送命令向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示。With reference to the first possible implementation manner of the fifth aspect, in a second possible implementation manner, the push command receiving unit is specifically configured to receive a security packet, where the security packet carries a root issuer security domain information And the push command sent by the eUICC remote management server; the indication sending unit includes a root issuer security domain, configured to send an indication of connecting the eUICC remote management server to the local eUICC profile auxiliary module according to the push command.
在第五方面的第三种可能的实现方式中,所述eUICC还包括:删除成功发送单元,用于向所述本地eUICC配置文件辅助模块发送删除成功指示。In a third possible implementation manner of the fifth aspect, the eUICC further includes: a deletion success sending unit, configured to send a deletion success indication to the local eUICC profile auxiliary module.
在第五方面的第四种可能的实现方式中,所述删除eUICC配置文件的指令包括eUICC存储复位指令;所述删除单元具体用于根据所述eUICC存储复位指令删除全部运营eUICC配置文件。In a fourth possible implementation manner of the fifth aspect, the deleting the eUICC configuration file includes: eUICC storing a reset instruction; and the deleting unit is specifically configured to delete all the operating eUICC configuration files according to the eUICC storage reset instruction.
在第五方面的第五种可能的实现方式中,所述删除eUICC配置文件的指令携带eUICC锁定指示;所述eUICC还包括锁定状态进入单元,用于根据所述eUICC锁定指示进入锁定状态。In a fifth possible implementation manner of the fifth aspect, the instruction for deleting the eUICC configuration file carries an eUICC lock indication; the eUICC further includes a lock status entry unit, configured to enter a lock state according to the eUICC lock indication.
结合第五方面的第五种可能的实现方式,在第六种可能的实现方式中,所述eUICC还包括:解锁指令接收单元,用于接收所述本地eUICC配置文件辅助模块发送的eUICC解锁指令,所述eUICC解锁指令由所述本地eUICC配置文件辅助模块在对用户的鉴权确认输入信息的验证通过的情况下发送;正常状态进入单元,用于根据所述eUICC解锁指令进入正常状态。With reference to the fifth possible implementation manner of the fifth aspect, in a sixth possible implementation, the eUICC further includes: an unlocking instruction receiving unit, configured to receive an eUICC unlocking instruction sent by the local eUICC configuration file auxiliary module The eUICC unlocking instruction is sent by the local eUICC configuration file auxiliary module in the case that the verification of the user's authentication confirmation input information is passed; the normal state entering unit is configured to enter a normal state according to the eUICC unlocking instruction.
结合第五方面的第五种可能的实现方式,在第七种可能的实现方式中,所述eUICC还包括:锁定指示发送单元,用于向所述本地eUICC配置文件辅助模块发送eUICC锁定指示,所述eUICC锁定指示用于指示所述本地eUICC配置文件辅助模块在本地鉴权确认个人识别码不存在的情况下,进入不可接收Profile下载请求状态。With reference to the fifth possible implementation manner of the fifth aspect, in a seventh possible implementation, the eUICC further includes: a lock indication sending unit, configured to send an eUICC lock indication to the local eUICC profile auxiliary module, The eUICC lock indication is used to instruct the local eUICC profile auxiliary module to enter a non-receivable profile download request state if the local authentication confirmation personal identification code does not exist.
本发明实施例第六方面提供一种eUICC远程管理服务器,包括: A sixth aspect of the embodiments of the present invention provides an eUICC remote management server, including:
删除请求发送单元,用于向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;a deletion request sending unit, configured to send an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal, where the eUICC configuration file deletion request carries the authentication confirmation information;
所述鉴权确认信息被所述本地eUICC配置文件辅助模块用于进行验证,并在对所述鉴权确认信息的验证通过的情况下,向所述终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。The authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and if the verification of the authentication confirmation information is passed, sending an instruction to delete the eUICC configuration file to the eUICC of the terminal, The instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
在第六方面的第一种可能的实现方式中,所述eUICC远程管理服务器还包括:推送命令发送单元,用于向所述eUICC发送推送命令,所述推送命令用于指示所述eUICC向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示,所述指示中携带所述eUICC远程管理服务器的地址。In a first possible implementation manner of the sixth aspect, the eUICC remote management server further includes: a push command sending unit, configured to send a push command to the eUICC, where the push command is used to indicate the eUICC The local eUICC profile auxiliary module sends an indication of connecting to the eUICC remote management server, where the indication carries the address of the eUICC remote management server.
在第六方面的第二种可能的实现方式中,所述eUICC配置文件删除请求还携带位置获取指示;所述eUICC远程管理服务器还包括:位置信息接收单元,用于接收所述本地eUICC配置文件辅助模块返回的删除成功指示和所述终端的位置信息。In a second possible implementation manner of the sixth aspect, the eUICC configuration file deletion request further carries a location acquisition indication; the eUICC remote management server further includes: a location information receiving unit, configured to receive the local eUICC configuration file The deletion success indication returned by the auxiliary module and the location information of the terminal.
在第六方面的第三种可能的实现方式中,所述鉴权确认信息包括:鉴权确认个人码;或所述鉴权确认个人码的消息摘要;或第一数据的消息摘要,其中,所述第一数据包括所述鉴权确认个人码和eUICC配置文件信息;或第二数据的消息摘要,其中,所述第二数据包括部分的所述鉴权确认个人码和所述eUICC配置文件信息。In a third possible implementation manner of the sixth aspect, the authentication confirmation information includes: an authentication confirmation personal code; or a message digest of the authentication confirmation personal code; or a message digest of the first data, where The first data includes the authentication confirmation personal code and eUICC profile information; or a message digest of the second data, wherein the second data includes a portion of the authentication confirmation personal code and the eUICC configuration file information.
本发明实施例第七方面提供一种终端,包括:处理器、存储器和收发器,所述处理器、存储器和收发器通过总线相互连接,其中,所述存储器用于存储程序代码,所述处理器用于调用所述程序代码,执行以下操作:A seventh aspect of the embodiments of the present invention provides a terminal, including: a processor, a memory, and a transceiver, wherein the processor, the memory, and the transceiver are connected to each other by a bus, wherein the memory is configured to store program code, and the processing The program is used to call the program code, and performs the following operations:
接收eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;Receiving an eUICC configuration file deletion request, where the eUICC configuration file deletion request carries authentication confirmation information;
对所述鉴权确认信息进行验证;Verifying the authentication confirmation information;
在对所述鉴权确认信息的验证通过的情况下,向终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。When the verification of the authentication confirmation information is passed, the instruction to delete the eUICC configuration file is sent to the eUICC of the terminal, where the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
本发明实施例第八方面提供另一种eUICC,包括:处理器、存储器和通信接口,所述处理器、存储器和通信接口相互连接,其中,所述存储器用于存储程序代码,所述处理器用于调用所述程序代码,执行以下操作:An eighth aspect of the embodiments of the present invention provides another eUICC, including: a processor, a memory, and a communication interface, wherein the processor, the memory, and the communication interface are connected to each other, wherein the memory is used to store program code, and the processor is used by the processor. To invoke the program code, do the following:
接收终端的本地eUICC配置文件辅助模块发送的删除eUICC配置文件的指令;Receiving, by the local eUICC configuration file auxiliary module of the terminal, an instruction to delete the eUICC configuration file;
根据所述删除eUICC配置文件的指令删除eUICC配置文件。The eUICC configuration file is deleted according to the instruction to delete the eUICC configuration file.
本发明实施例第九方面提供另一种eUICC远程管理服务器,包括:处理器、存储器和收发器,所述处理器、存储器和收发器通过总线相互连接,其中,所述存储器用于存储程序代码,所述处理器用于调用所述程序代码,执行以下操作:A ninth aspect of the embodiments of the present invention provides another eUICC remote management server, including: a processor, a memory, and a transceiver, wherein the processor, the memory, and the transceiver are connected to each other by a bus, wherein the memory is used to store the program code. The processor is configured to invoke the program code and perform the following operations:
向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;Sending an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal, where the eUICC configuration file deletion request carries the authentication confirmation information;
所述鉴权确认信息被所述本地eUICC配置文件辅助模块用于进行验证,并在对所述鉴权确认信息的验证通过的情况下,向所述终端的eUICC发送删除eUICC配置文件的指 令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。The authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and in the case that the verification of the authentication confirmation information is passed, the instruction to delete the eUICC configuration file is sent to the eUICC of the terminal. The instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
本发明实施例中,本地eUICC配置文件辅助模块、eUICC远程管理服务器的名字对设备本身不构成限定,在实际实现中,这些设备可以以其他名称出现。只要各个设备的功能和本申请类似,属于本申请权利要求及其等同技术的范围之内。In the embodiment of the present invention, the names of the local eUICC configuration file auxiliary module and the eUICC remote management server are not limited to the device itself. In actual implementation, these devices may appear under other names. As long as the functions of the respective devices are similar to the present application, they are within the scope of the claims and their equivalents.
本发明实施例接收eUICC配置文件删除请求,对eUICC配置文件删除请求中的鉴权确认信息进行验证,在对所述鉴权确认信息验证通过的情况下,向终端的eUICC发送删除eUICC配置文件的指令,以指示所述eUICC删除eUICC配置文件,上述流程可以在终端丢失后执行,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险。In the embodiment of the present invention, the eUICC configuration file deletion request is received, and the authentication confirmation information in the eUICC configuration file deletion request is verified. When the authentication confirmation information is verified, the eUICC configuration file is deleted from the eUICC of the terminal. An instruction to instruct the eUICC to delete the eUICC configuration file, where the foregoing process may be performed after the terminal is lost, reducing the risk of asset loss associated with the eUICC data or information leakage associated with the eUICC data after the terminal is lost.
附图说明DRAWINGS
为了更清楚地说明本发明实施例或背景技术中的技术方案,下面将对本发明实施例或背景技术中所需要使用的附图进行说明。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the background art, the drawings to be used in the embodiments of the present invention or the background art will be described below.
图1是本发明实施例提供的实现本发明实施例的方法的的一种架构图;FIG. 1 is a structural diagram of a method for implementing an embodiment of the present invention according to an embodiment of the present invention;
图2是本发明实施例提供的实现本发明实施例的方法的另一种架构图;2 is another structural diagram of a method for implementing an embodiment of the present invention according to an embodiment of the present invention;
图3是本发明实施例提供的一种eUICC配置文件的删除方法的流程示意图;3 is a schematic flowchart of a method for deleting an eUICC configuration file according to an embodiment of the present invention;
图4a是本发明实施例提供的一种eUICC处于锁定状态的用户交互界面图;4a is a user interaction interface diagram of an eUICC in a locked state according to an embodiment of the present invention;
图4b是本发明实施例提供的另一种eUICC处于锁定状态的用户交互界面图;FIG. 4b is a diagram of another user interaction interface in which the eUICC is in a locked state according to an embodiment of the present invention; FIG.
图4c是本发明实施例提供的一种eUICC处于正常状态的用户交互界面图;4c is a diagram of a user interaction interface in which a eUICC is in a normal state according to an embodiment of the present invention;
图4d是本发明实施例提供的另一种eUICC处于正常状态的用户交互界面图;4d is a diagram of a user interaction interface of another eUICC in a normal state according to an embodiment of the present invention;
图4e是本发明实施例提供的一种LPA处于不可接收Profile下载请求状态的用户交互界面图;4e is a user interaction interface diagram of an LPA in an unreceivable profile download request state according to an embodiment of the present invention;
图4f是本发明实施例提供的另一种LPA处于不可接收Profile下载请求状态的用户交互界面图;FIG. 4f is a diagram of a user interaction interface of another LPA in an unreceivable profile download request state according to an embodiment of the present invention; FIG.
图5是本发明实施例提供的另一种eUICC配置文件的删除方法的流程示意图;FIG. 5 is a schematic flowchart of another method for deleting an eUICC configuration file according to an embodiment of the present disclosure;
图6是本发明实施例提供的又一种eUICC配置文件的删除方法的流程示意图;FIG. 6 is a schematic flowchart of still another method for deleting an eUICC configuration file according to an embodiment of the present disclosure;
图7是本发明本发明实施例提供的又一种eUICC配置文件的删除方法的流程示意图;FIG. 7 is a schematic flowchart of still another method for deleting an eUICC configuration file according to an embodiment of the present invention;
图8是本发明实施例提供的又一种eUICC配置文件的删除方法的流程示意图;FIG. 8 is a schematic flowchart of still another method for deleting an eUICC configuration file according to an embodiment of the present disclosure;
图9是本发明实施例提供的一种本地eUICC配置文件辅助模块的结构示意图;FIG. 9 is a schematic structural diagram of a local eUICC configuration file auxiliary module according to an embodiment of the present disclosure;
图10是本发明实施例提供的一种终端的结构示意图;FIG. 10 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure;
图11是本发明实施例提供的一种eUICC的结构示意图;FIG. 11 is a schematic structural diagram of an eUICC according to an embodiment of the present disclosure;
图12是本发明实施例提供的另一种eUICC的结构示意图;FIG. 12 is a schematic structural diagram of another eUICC according to an embodiment of the present disclosure;
图13是本发明实施例提供的一种eUICC远程管理服务器的结构示意图;FIG. 13 is a schematic structural diagram of an eUICC remote management server according to an embodiment of the present invention;
图14是本发明实施例提供的一种eUICC远程管理服务器的结构示意图。FIG. 14 is a schematic structural diagram of an eUICC remote management server according to an embodiment of the present invention.
具体实施方式detailed description
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行描述。 The technical solutions in the embodiments of the present invention will be described below with reference to the accompanying drawings in the embodiments of the present invention.
在终端(Device、Mobile Station、Terminal或User Equipment)的结构中,Profile辅助(Local Profile Assitant,LPA)模块用于实现对Profile和eUICC模块的相关管理操作(如Profile下载和安装、远程Profile管理和远程eUICC管理等),在终端丢失的情况下,终端的防盗应用模块或用户可通过通知LPA模块执行对eUICC模块的管理操作,指示eUICC模块对Profile进行删除,其中,LPA模块和eUICC模块可以是两个相互分离且存在物理或逻辑连接关系的模块,例如LPA模块存在于基带芯片上、应用处理器上或终端的其他硬件模块上;LPA模块也可以直接存在于eUICC模块上。In the structure of the terminal (Device, Mobile Station, Terminal or User Equipment), the Profile Assistant (LPA) module is used to implement related management operations on the Profile and eUICC modules (such as profile download and installation, remote profile management, and Remote eUICC management, etc., in the case that the terminal is lost, the anti-theft application module or the user of the terminal may perform a management operation on the eUICC module by notifying the LPA module, instructing the eUICC module to delete the profile, wherein the LPA module and the eUICC module may be Two modules that are separated from each other and have a physical or logical connection relationship, such as an LPA module, are present on the baseband chip, on the application processor, or on other hardware modules of the terminal; the LPA module can also exist directly on the eUICC module.
在一种可能的实现方式中,可基于eUICC管理系统实现对Profile(即eUICC配置文件)的删除。eUICC管理系统的具体架构如图1所示,其中,SM-DP+服务器,用于准备Profile,将准备好的Profile安全地发送给终端的eUICC模块,以及对Profile进行远程管理,SM-DP+可以部署在运营商(Operator)、eUICC制造商、原始设备制造商(Original Equipment Manufacture,OEM)或其它方的服务器上;签约管理者-发现(Subscription Manager Discovery Service,SM-DS)服务器用于提供(一个或多个)SM-DP+地址或代替SM-DS地址给终端,终端通过此SM-DP+地址可以与SM-DP+建立连接,或者,终端通过此代替SM-DS进一步获得SM-DP+地址;终端包含LPA模块和eUICC模块,eUICC模块用于实现SIM卡的各项功能以及Profile和eUICC的配置与管理功能;运营商业务支撑系统(Operator Business Supporting System,Operator BSS)用于向SM-DP+订购Profile,以及请求对eUICC上的Profile进行管理;最终用户(End User)为终端使用者/(运营商的)移动用户;eUICC制造商(eUICC Manufacturer,EUM)为生产eUICC的厂商。SM-DP+,SM-DS都被称为eUICC远程管理服务器(或远程SIM配置服务器)。在终端丢失的情况下,用户可联系运营商对Profile进行挂失,然后由运营商的管理人员在Operator BSS上进行操作,通过Operator BSS向SM-DP+发送远程Profile远程管理指令(管理指令的管理操作类型设置为删除),再由SM-DP+向LPA模块下发Profile远程管理指令;LPA模块接收到SM-DP+发送的Profile远程管理指令后,指示eUICC模块对Profile进行删除。In a possible implementation manner, the deletion of the profile (ie, the eUICC configuration file) may be implemented based on the eUICC management system. The specific architecture of the eUICC management system is shown in Figure 1. The SM-DP+ server is used to prepare the profile, the prepared profile is securely sent to the eUICC module of the terminal, and the profile is remotely managed. The SM-DP+ can be deployed. On the server of the operator, eUICC manufacturer, original equipment manufacturer (OEM) or other party; the Subscription Manager Discovery Service (SM-DS) server is used to provide (a Or the SM-DP+ address or the SM-DP address is replaced by the terminal, and the terminal can establish a connection with the SM-DP+ through the SM-DP+ address, or the terminal further obtains the SM-DP+ address by replacing the SM-DS; the terminal includes LPA module and eUICC module, eUICC module is used to implement various functions of SIM card and configuration and management functions of profile and eUICC; Operator Business Supporting System (Operator BSS) is used to order profiles to SM-DP+. And request to manage the profile on the eUICC; the end user (End User) is the end user / (operator's) mobile user; eUICC manufacturing (EUICC Manufacturer, EUM) is a manufacturer of eUICC. SM-DP+, SM-DS are all called eUICC remote management servers (or remote SIM configuration servers). In the case that the terminal is lost, the user can contact the operator to report the loss of the profile, and then the operator's management personnel operate on the Operator BSS, and send the remote profile remote management command to the SM-DP+ through the Operator BSS (management operation of the management command) The type is set to delete), and the profile remote management command is sent by the SM-DP+ to the LPA module; after receiving the profile remote management command sent by the SM-DP+, the LPA module instructs the eUICC module to delete the profile.
在另一种可能的实现方式中,可基于终端的本地防盗应用实现对Profile的删除。基于本地防盗应用实现对Profile的删除的系统架构可如图2所示,其中,OEM服务器(Original Equipment Manufacture Server,OEM Server)为生产终端的厂商的服务器,可为终端用户提供云服务(手机定位、防盗、照片或通讯录同步)等服务;本地防盗应用是运行在终端操作系统上的一个应用,可实现终端的防盗功能,在联网的情况下可以和OEM Server通信,OEM Server可向本地防盗应用发送远程指令;LPA模块和eUICC模块用于实现终端的通话、收发短信等通信功能;本地防盗应用和LPA模块之间可以通过API进行通信。在终端丢失的情况下,用户可登录终端服务器对应的门户(即OEM Portal),在门户网页上发起删除Profile的请求,OEM Server将删除Profile的请求发送给本地防盗应用,本地防盗应用通过API向LPA模块发送删除Profile的请求,LPA模块接收删除Profile的请求后,指示eUICC模块对Profile进行删除。In another possible implementation manner, the deletion of the profile may be implemented based on the local anti-theft application of the terminal. The system architecture for deleting the profile based on the local anti-theft application can be as shown in FIG. 2, wherein the OEM (Original Equipment Manufacture Server, OEM Server) is the server of the manufacturer of the production terminal, and can provide the cloud service for the end user (mobile phone positioning) , anti-theft, photo or address book synchronization) and other services; local anti-theft application is an application running on the terminal operating system, can achieve the terminal's anti-theft function, in the case of networking can communicate with the OEM Server, OEM Server can be local anti-theft The application sends a remote command; the LPA module and the eUICC module are used to implement communication functions such as calling, sending and receiving short messages of the terminal; and the local anti-theft application and the LPA module can communicate through the API. In the case that the terminal is lost, the user can log in to the portal corresponding to the terminal server (ie, OEM Portal), and initiate a request to delete the profile on the portal webpage. The OEM Server sends a request to delete the profile to the local anti-theft application, and the local anti-theft application uses the API to The LPA module sends a request to delete the profile. After receiving the request to delete the profile, the LPA module instructs the eUICC module to delete the profile.
在上述两种可能实现的方式中,LPA模块在接收Profile远程管理命令或删除Profile的请求之前,需判断发送端的请求是否合法,在确定发送端的请求合法(如发送端得到用户的许可信息、发送端在LPA模块的白名单内等)的情况下,才会指示eUICC模块对Profile 进行删除。In the above two possible implementation manners, before receiving the profile remote management command or deleting the profile request, the LPA module needs to determine whether the request of the sender is legal, and determines that the request of the sender is legal (for example, the sender obtains the license information of the user and sends the request. The eUICC module pairs the profile when the terminal is in the white list of the LPA module. Delete it.
以下通过具体实施例来介绍本发明实施提供的一种eUICC配置文件的删除方法在图1或图2的架构下的具体实现流程。需要说明的是,在接下来的具体实施中,在不另做说明的情况下,LPA代表终端的LPA模块、eUICC代表终端的eUICC模块、SM-DP+代表eUICC远程管理服务器(eUICC远程管理服务器包括但不限于SM-DP+)、Profile代表eUICC配置文件(eUICC配置文件包括但不限于Profile)。The specific implementation flow of the method for deleting an eUICC configuration file provided by the implementation of the present invention in the architecture of FIG. 1 or FIG. 2 is described in the following. It should be noted that, in the following specific implementation, the LPA module of the LPA on behalf of the terminal, the eUICC module of the eUICC on behalf of the terminal, and the SM-DP+ on behalf of the eUICC remote management server (the eUICC remote management server are included, unless otherwise specified) But not limited to SM-DP+), Profile represents the eUICC configuration file (eUICC configuration files include but are not limited to Profile).
请参见图3,图3是本发明实施例提供的一种eUICC配置文件的删除方法本发明实施例的方法可以实现在如图1所示的系统架构上,该方法包括但不限于如下步骤:Referring to FIG. 3, FIG. 3 is a method for deleting an eUICC configuration file according to an embodiment of the present invention. The method of the embodiment of the present invention may be implemented in the system architecture shown in FIG. 1, including but not limited to the following steps:
步骤S101:Operator BSS向SM-DP+发送远程Profile管理命令(Remote Profile Management Order,RPMOrder),其中,RPMOrder中携带远程Profile管理指令(Remote Profile Management Command,RPM Command),eUICC标识(eUICC Identification,EID),Profile标识(Integrated Circuit Card Identification,ICCID),eUICC锁定指示(euiccLock),鉴权确认个人识别码的消息摘要(Hash(Authenticated Confirmation Personal identification number,ACP)),其中,RPM Command的操作类型设置为存储复位(euiccmemoryReset)。Step S101: The Operator BSS sends a Remote Profile Management Order (RPMOrder) to the SM-DP+, where the RPMorer carries a Remote Profile Management Command (RPM Command) and an eUICC Identification (EID) , the Integrated Circuit Card Identification (ICCID), the eUICC lock indication (euiccLock), and the authentication identifier (Hash (Authenticated Confirmation Personal Identification Number) (ACP)), wherein the operation type of the RPM Command is set to Memory reset (euiccmemoryReset).
其中,ACP是用于鉴权确认的个人密码,终端用户(End User)通过输入ACP或代替的指纹等个人生物特征对其终端操作进行确认。The ACP is a personal password used for authentication confirmation, and the end user (End User) confirms the terminal operation by inputting personal biometrics such as ACP or a substitute fingerprint.
可选地,RPMOrder还可以携带SM-DS地址(SM-DS Address),位置获取指示(locationFlag),其中,SM-DS Address用于SM-DP+生成远程管理事件的同时通知SM-DS进行事件记录,locationFlag用于指示LPA获取终端的当前或历史位置信息。Optionally, the RPMOrder may also carry an SM-DS address (Location-Flag), where the SM-DS Address is used for the SM-DP+ to generate a remote management event and notify the SM-DS to record the event. The locationFlag is used to instruct the LPA to acquire current or historical location information of the terminal.
具体地,PRM Command的操作类型为euiccmemoryReset时,用于指示eUICC删除所有的运营Profile(Operational Profile),其中,Operational Profile支持用户与运营商的一个签约,允许终端连接到一个移动网络,Operational Profile中还可能包含非电信业务;可选地,在另一种实现方式中,PRM Command的操作类型为euiccmemoryReset时,也可以用于指示eUICC删除所有的Operational Profile和配置Profile(Provisioning Profile),其中,Provisioning Profile仅/主要用于连接到一个移动网络,实现配置eUICC上的Profile(比如下载Profile、远程Profile使能或删除等操作),即Provisioning Profile为一种起维护和设置功能的Profile。Specifically, when the operation type of the PRM Command is eucememoryReset, it is used to instruct the eUICC to delete all the operation profiles (Operational Profiles), wherein the Operational Profile supports a subscription between the user and the operator, and allows the terminal to connect to a mobile network, the Operational Profile. The non-telecom service may also be included. Alternatively, in another implementation manner, when the operation type of the PRM Command is eucememoryReset, the eUICC may also be used to instruct the eUICC to delete all the Operational Profiles and Provisioning Profiles, wherein Provisioning The Profile is only used to connect to a mobile network and configure profiles on the eUICC (such as downloading profiles, remote profile enable or delete operations). The Provisioning Profile is a profile that maintains and sets functions.
其中,Hash(ACP)为鉴权确认信息,鉴权确认信息也可以为第一数据的消息摘要,其中,所述第一数据包括ACP和Profile信息,即Hash(ACP)可以被替换为Hash(ACP|Profile信息),符号“|”用于串联前后两个数据;还可以为第二数据的消息摘要,其中,第二数据包括部分的ACP和Profile信息,即Hash(ACP)可以被替换为Hash(部分ACP|Profile信息),鉴权确认信息还可以为ACP,即Hash(ACP)可以被替换为ACP。The Hash (ACP) is the authentication confirmation information, and the authentication confirmation information may also be the message digest of the first data, where the first data includes the ACP and the profile information, that is, the Hash (ACP) may be replaced with the Hash ( ACP|Profile information), the symbol "|" is used to concatenate the two data before and after; it can also be a message digest of the second data, wherein the second data includes part of the ACP and profile information, ie Hash (ACP) can be replaced with Hash (partial ACP|Profile information), the authentication confirmation information can also be ACP, that is, Hash (ACP) can be replaced with ACP.
具体地,Profile信息例如可以为Profile所在的eUICC的标识(EID),Profile拥有者(Profileowner),ICCID,或运营商名称(Operator name)等信息。Specifically, the profile information may be, for example, an identifier (EID), a profile owner (Profileowner), an ICCID, or an operator name of the eUICC where the profile is located.
下面举例对第一数据和第二数据进行说明。假设ACP为123456,Profile信息为运营商名称(假设为CMCC),假设约定取ACP的第1、3和5位字符作为部分的ACP,则第一数据为Hash(123456|CMCC),即第一数据为123456|CMCC的消息摘要;第二数据为 Hash(135|CMCC),即第二数据为135|CMCC的消息摘要。The first data and the second data are described below by way of example. Assume that the ACP is 123456 and the profile information is the carrier name (assumed to be CMCC). If the first, third and fifth characters of the ACP are agreed to be part of the ACP, the first data is Hash (123456|CMCC), which is the first. The data is 123456|CMCC message digest; the second data is Hash (135|CMCC), that is, the second data is a message digest of 135|CMCC.
具体地,ACP(或部分的ACP)由用户提供给Operator BSS。例如,用户在发现终端丢失后向运营商的客服人员挂失并进行身份认证(比如,通过说出客服密码,或者出示身份证),身份认证通过后将ACP(或部分的ACP)提供给运营商的客服人员,然后运营商的客服人员将ACP(或部分的ACP)记录到Operator BSS,EID、Profileowner、ICCID和运营商名称等Profile信息可存在于Operator BSS或运营商的其它系统中。Specifically, the ACP (or part of the ACP) is provided by the user to the Operator BSS. For example, after discovering that the terminal is lost, the user reports the loss to the operator's customer service personnel and authenticates the identity (for example, by saying the customer service password or presenting the ID card), and the ACP (or part of the ACP) is provided to the operator after the identity authentication is passed. The customer service personnel, then the operator's customer service personnel record the ACP (or part of the ACP) to the Operator BSS. Profile information such as EID, Profileowner, ICCID, and carrier name may exist in the Operator BSS or other systems of the operator.
具体地,Operator BSS可以采用标准的哈希算法对ACP、所述第一数据或所述第二数据取摘要,Hash算法例如可以为第一安全散列算法(Secure Hash Algorithm,SHA)-1、第二安全散列算法SHA-2、SHA-256等。Specifically, the Operator BSS may use a standard hash algorithm to abstract the ACP, the first data, or the second data. The Hash algorithm may be, for example, a first Secure Hash Algorithm (SHA)-1. The second secure hash algorithm SHA-2, SHA-256, and the like.
具体地,euiccLock=True,euiccLock用于指示eUICC需进入的状态,当euiccLock=True或euiccLock设置为有效时,指示eUICC进入锁定状态。Specifically, eucicLock=True, eucicLock is used to indicate the state that eUICC needs to enter, and when eucicLock=True or eucicLock is set to be valid, it indicates that eUICC enters the locked state.
步骤S102:SM-DP+进行合法性检查。Step S102: The SM-DP+ performs a legality check.
具体地,SM-DP+对EID或ICCID进行检查,确认是否属于其管理范围。Specifically, SM-DP+ checks the EID or ICCID to see if it belongs to its management scope.
步骤S103:SM-DP+生成Profile远程管理待处理事件(pending RPM order)。Step S103: The SM-DP+ generates a profile remote management pending event (pending RPM order).
具体地,每一个RPM Order事件都有一个事件标识(Event Identification,EventID)。Specifically, each RPM Order event has an Event Identification (EventID).
具体地,SM-DP+可以通过eventID或EID查找到pending RPM order。Specifically, SM-DP+ can find the pending RPM order through eventID or EID.
可选地,SM-DP+还可以在SM-DS处进行远程管理事件注册以供LPA进行查询,SM-DS中保存有SM-DP+的地址、eventID和EID。Optionally, the SM-DP+ may also perform remote management event registration at the SM-DS for query by the LPA. The SM-DS stores the address, eventID and EID of the SM-DP+.
具体地,LPA可以通过向SM-DS发起查询请求(查询请求中携带EID),若SM-DS查询到有与EID对应的事件记录(事件记录中包含eventID和SM-DP+地址),则SM-DS向LPA返回该事件记录。Specifically, the LPA may initiate a query request to the SM-DS (the EID is carried in the query request). If the SM-DS queries the event record corresponding to the EID (the event record includes the eventID and the SM-DP+ address), then the SM- DS returns the event record to the LPA.
至此,SM-DP+保存有终端的eUICC的远程管理事件,等待终端的LPA发起连接并执行远程管理操作。At this point, the SM-DP+ saves the remote management event of the eUICC of the terminal, waits for the LPA of the terminal to initiate a connection and performs a remote management operation.
具体地,LPA获取到SM-DP+的地址即可向SM-DP+发起连接,在一种可能的实现方式中,在用户操作、开机、定时触发或者eUICC触发等条件下,LPA可以从SM-DS获取SM-DP+地址和EventID,LPA可以向SM-DP+发起连接并将EventID发送给SM-DP+;在另一种可能的实现方式中,LPA获取自身、eUICC或者Profile中保存的SM-DP+的地址,然后向SM-DP+发起连接并将EID发送给SM-DP+。Specifically, the LPA obtains the address of the SM-DP+ to initiate a connection to the SM-DP+. In a possible implementation manner, the LPA can be from the SM-DS under the conditions of user operation, power-on, timing trigger, or eUICC trigger. Obtaining the SM-DP+ address and the EventID, the LPA can initiate a connection to the SM-DP+ and send the EventID to the SM-DP+; in another possible implementation, the LPA obtains the address of the SM-DP+ saved in itself, eUICC or Profile. Then initiate a connection to SM-DP+ and send the EID to SM-DP+.
可选地,SM-DP+还可以将SM-DP+的地址以推送的方式主动告知给LPA,以触发LPA能快速发起连接。Optionally, the SM-DP+ can also actively inform the LPA of the address of the SM-DP+ in a push manner to trigger the LPA to quickly initiate a connection.
具体地,SM-DP+可以利用终端厂商的消息推送服务(Push Service)将SM-DP+的地址发送给LPA。SM-DP+可以采用一个新的请求类型(Request Type),比如“Request for ES interface”或“Request for ES9+interface”,用于指示LPA通过ES/ES9+接口建立连接到SM-DP+,SM-DP+可以将Request Type和SM-DP+自身的地址作为目的地址(Data destination Address)携带在推送命令(Push Command)中通过终端厂商的Push Service推送给LPA。Specifically, the SM-DP+ can transmit the address of the SM-DP+ to the LPA by using a terminal manufacturer's Push Service. SM-DP+ can use a new Request Type, such as "Request for ES interface" or "Request for ES9+interface", to indicate that the LPA establishes a connection to SM-DP+, SM-DP+ through the ES/ES9+ interface. The address of the Request Type and the SM-DP+ itself may be carried as a destination address (Data destination Address) in a push command (Push Command) and pushed to the LPA by the terminal manufacturer's Push Service.
具体地,SM-DP+还可以基于短信业务服务(Short Message Service,SMS)的空中接口机制(Over The Air,OTA)将SM-DP+的地址发送给eUICC,再由eUICC发送给LPA。 以下通过步骤S104~105介绍基于OTA的实现流程。Specifically, the SM-DP+ may also send the address of the SM-DP+ to the eUICC based on an Over The Air (OTA) of the Short Message Service (SMS), and then send it to the LPA by the eUICC. The OTA-based implementation flow is described below through steps S104-105.
步骤S104:SM-DP+将Push Command(Request for ES/ES9+interface,Data destination Address=RSP Server IP address)携带在安全分组(Secured Packet)中,基于空中接口机制发送给eUICC,其中,Secured Packet中还携带工具应用标记(Toolkit Application Reference,TAR),TAR=根发行者安全域(Issuer Security Domain-Root,ISD-R)。Step S104: The SM-DP+ carries the Push Command (Request for ES/ES9+interface, Data destination Address=RSP Server IP address) in the Secured Packet, and sends it to the eUICC based on the air interface mechanism, where the Secured Packet is used. It also carries the Toolkit Application Reference (TAR), TAR=Issuer Security Domain-Root (ISD-R).
具体地,TAR=ISD-R用于指示由eUICC的ISD-R应用对Push Command进行处理。Specifically, TAR=ISD-R is used to indicate that the Push Command is processed by the ISD-R application of the eUICC.
可选地,Secured Packet可以由SM-DP+生成,然后SM-DP+将Secured Packet发送给运营商OTA服务器,运营商OTA服务器将Secured Packet发送给eUICC;Secured Packet也可以由运营商OTA服务器生成,首先SM-DP+将Push Command发送给运营商OTA服务器,运营商OTA服务器生成Secured Packet,然后将Secured Packet发送给eUICC。Optionally, the Secured Packet can be generated by the SM-DP+, and then the SM-DP+ sends the Secured Packet to the OTA server of the operator. The OTA server sends the Secured Packet to the eUICC. The Secured Packet can also be generated by the OTA server. First, The SM-DP+ sends the Push Command to the operator's OTA server, the operator OTA server generates the Secured Packet, and then sends the Secured Packet to the eUICC.
步骤S105:eUICC向LPA发送创建信道命令(Open Channel),Open Channel中携带目的服务器SM-DP+的地址(RSP Server IP address),承载类型(Bearer Type)和终端与eUICC之间的接口传输类型(UICC/terminal interface transport level),其中,Bearer Type=ES/ES9+interface,UICC/terminal interface transport level=ES10interface。Step S105: The eUICC sends an Open Channel command to the LPA, where the Open Channel carries the address of the destination server SM-DP+ (RSP Server IP address), the bearer type (Bearer Type), and the interface transmission type between the terminal and the eUICC ( UICC/terminal interface transport level), where Bearer Type=ES/ES9+interface, UICC/terminal interface transport level=ES10interface.
具体地,Open Channel为一个主动命令,由eUICC向LPA发起。Specifically, the Open Channel is an active command initiated by the eUICC to the LPA.
具体地,eUICC对Secured Packet进行解析,然后由eUICC中的ISD-R应用从Push Command中提取请求类型和SM-DP+的地址,基于请求类型生成Bearer Type和UICC/terminal interface transport level,连同SM-DP+的地址放入Open Channel命令中。Specifically, the eUICC parses the Secured Packet, and then the ISD-R application in the eUICC extracts the request type and the SM-DP+ address from the Push Command, and generates a Bearer Type and a UICC/terminal interface transport level based on the request type, together with the SM- The address of DP+ is placed in the Open Channel command.
具体地,BearerType=ES/ES9+interface为一个新的Bearer Type,用于指示LPA与SM-DP+之间通过ES/ES9+接口建立连接。Specifically, BearerType=ES/ES9+interface is a new Bearer Type, which is used to indicate that the connection between the LPA and the SM-DP+ is established through the ES/ES9+ interface.
具体地,UICC/terminal interface transport level=ES10interface为一个新的UICC/terminal interface transport level,用于指示eUICC和终端(LPA)之间采用ES10接口。Specifically, the UICC/terminal interface transport level=ES10interface is a new UICC/terminal interface transport level, which is used to indicate that the ES10 interface is adopted between the eUICC and the terminal (LPA).
步骤S106:LPA与SM-DP+建立传输层安全协议(Transport Layer Security,TLS)连接。Step S106: The LPA establishes a Transport Layer Security (TLS) connection with the SM-DP+.
具体地,例如,LPA对SM-DP+做单向证书认证,认证通过后建立TLS连接。Specifically, for example, the LPA performs one-way certificate authentication on the SM-DP+, and establishes a TLS connection after the authentication is passed.
步骤S107:SM-DP+与eUICC基于安全超文本传输协议(HyperText Transfer Protocol Secure,HTTPS)进行双向鉴权。Step S107: The SM-DP+ and the eUICC perform two-way authentication based on the HyperText Transfer Protocol Secure (HTTPS).
具体地,HTTPS运行在TLS连接之上。Specifically, HTTPS runs on top of a TLS connection.
具体地,LPA从eUICC获取eUICC挑战值等信息,向SM-DP+发送HTTPS请求(含eUICC挑战值),触发eUICC与SM-DP+进行双向鉴权,双向鉴权的数据交换就通过HTTPS请求与响应消息以及LPA与eUICC的接口实现。在所述双向鉴权过程中,eUICC产生自身的鉴权签名值(euiccSignature1)并将euiccSignature1发送给SM-DP+,SM-DP+和eUICC均保存euiccSignature1;同时,SM-DP+将鉴权证书(CERT.DPauth.ECDSA)发送给eUICC,eUICC保存CERT.DPauth.ECDSA;双向鉴权通过后,SM-DP+生成会话标识(Tranction Identification,TransactionID)。Specifically, the LPA obtains the eUICC challenge value and the like from the eUICC, sends an HTTPS request (including the eUICC challenge value) to the SM-DP+, triggers the eUICC and the SM-DP+ to perform bidirectional authentication, and the bidirectional authentication data exchange passes the HTTPS request and response. Message and interface implementation of LPA and eUICC. In the two-way authentication process, the eUICC generates its own authentication signature value (euiccSignature1) and sends eucicSignature1 to SM-DP+, SM-DP+ and eUICC both store eucicSignature1; meanwhile, SM-DP+ will authenticate the certificate (CERT. DPauth.ECDSA) is sent to eUICC, eUICC saves CERT.DPauth.ECDSA; after two-way authentication is passed, SM-DP+ generates session identification (TransactionID).
步骤S108:SM-DP+查找得到pending RPM order。Step S108: The SM-DP+ lookup obtains the pending RPM order.
具体地,在双向鉴权过程中,终端发送EID给SM-DP+。 Specifically, in the two-way authentication process, the terminal sends an EID to the SM-DP+.
具体地,SM-DP+可以根据EID查找得到pending RPM order。Specifically, the SM-DP+ can find the pending RPM order based on the EID lookup.
步骤S109:SM-DP+生成待签名数据(smdpSigned3),smdpSigned3={TransactionID,RPM Command,euiccLock,Hash(ACP)}。Step S109: SM-DP+ generates data to be signed (smdpSigned3), smdpSigned3={TransactionID, RPM Command, eucicLock, Hash (ACP)}.
在另一种实现方式中,smdpSigned3={TransactionID,RPM Command,euiccLock,Hash(ACP),locationFlag}。In another implementation, smdpSigned3={TransactionID, RPM Command, eucicLock, Hash (ACP), locationFlag}.
具体地,TransactionID在建立RSP会话过程中由SM-DP+生成。Specifically, the TransactionID is generated by SM-DP+ during the establishment of the RSP session.
步骤S110:SM-DP+利用私钥(SK.DPrpm.ECDSA)对smdpSigned3和euiccSignature1进行签名计算生成签名值(smdpSignature3)。Step S110: SM-DP+ performs signature calculation on smdpSigned3 and eucicSignature1 using the private key (SK.DPrpm.ECDSA) to generate a signature value (smdpSignature3).
具体地,SM-DP+可以生成smdpSigned3|euiccSignature1的摘要,然后利用SK.DPrpm.ECDSA对所述摘要进行加密生成smdpSignature3。例如A={smdpSigned3,euiccSignature1},对A取摘要得到摘要a,利用SK.DPrpm.ECDSA对摘要a进行加密得到的结果即签名值smdpSignature3。Specifically, SM-DP+ may generate a digest of smdpSigned3|euiccSignature1, and then encrypt the digest with SK.DPrpm.ECDSA to generate smdpSignature3. For example, A={smdpSigned3, eucicsignature1}, the abstract is obtained by summing A, and the result of encrypting the digest a by SK.DPrpm.ECDSA is the signature value smdpSignature3.
步骤S111:SM-DP+将smdpSigned3、smdpSignature3及远程Profile管理(Remote Profile Management,RPM)证书(CERT.DPrpm.ECDSA)发送给LPA。Step S111: SM-DP+ sends smdpSigned3, smdpSignature3 and Remote Profile Management (RPM) certificate (CERT.DPrpm.ECDSA) to the LPA.
至此,SM-DP+将携RPM Command的Profile删除请求发送给LPA,指示终端对Profile进行删除,Profile删除请求中携带smdpSigned3、smdpSignature3及CERT.DPrpm.ECDSA。At this point, the SM-DP+ sends a profile deletion request carrying the RPM Command to the LPA, instructing the terminal to delete the profile, and the profile deletion request carries smdpSigned3, smdpSignature3, and CERT.DPrpm.ECDSA.
步骤S112:LPA对Hash(ACP)进行验证。Step S112: The LPA verifies the Hash (ACP).
具体地,LPA获取本地存储的ACP,对本地ACP取摘要得到Hash(本地ACP),将Hash(ACP)与Hash(本地ACP)进行比较,若Hash(ACP)与Hash(本地ACP)相同,则对Hash(ACP)的验证通过,即对鉴权确认信息的验证通过。Specifically, the LPA obtains the locally stored ACP, extracts the local ACP into a hash (local ACP), and compares the Hash (ACP) with the Hash (local ACP). If the Hash (ACP) is the same as the Hash (local ACP), then The verification of the Hash (ACP) is passed, that is, the verification of the authentication confirmation information is passed.
可选地,若LPA接收到的鉴权确认信息为第一数据的消息摘要,则LPA获取本地存储的ACP和Profile信息,对本地ACP和Profile信息取摘要得到Hash(本地ACP|Profile信息),将第一数据的消息摘要与Hash(本地ACP|Profile信息)进行比较,若第一数据的消息摘要与Hash(本地ACP|Profile信息)相同,则对第一数据的消息摘要的验证通过,即对鉴权确认信息的验证通过;若LPA接收到的鉴权确认信息为第二数据的消息摘要,则获取本地存储的本地ACP和Profile信息,并从本地ACP中取得本地部分ACP,对本地部分ACP和Profile信息取摘要得到Hash(本地部分ACP|Profile信息),将第二数据的消息摘要与Hash(本地部分ACP|Profile信息)进行比较,若第二数据的消息摘要与Hash(本地部分ACP|Profile信息)相同,则对第二数据的消息摘要的验证通过,即对鉴权确认信息的验证通过;若LPA接收到的鉴权确认信息为ACP,则LPA将ACP与本地ACP进行比较,若ACP与本地ACP相同,则对鉴权确认信息的验证通过。其中,LPA可以从Profile删除请求中获取Profile信息,或者从RPM Command中获取Profile信息,或者从eUICC中获取Profile信息。Optionally, if the authentication confirmation information received by the LPA is the message digest of the first data, the LPA obtains the locally stored ACP and profile information, and abstracts the local ACP and the profile information to obtain a hash (local ACP|Profile information). Comparing the message digest of the first data with the Hash (local ACP|Profile information), if the message digest of the first data is the same as the Hash (local ACP|Profile information), the verification of the message digest of the first data is passed, ie The authentication of the authentication confirmation information is passed; if the authentication confirmation information received by the LPA is the message digest of the second data, the locally stored local ACP and profile information is obtained, and the local part ACP is obtained from the local ACP, and the local part is obtained. ACP and profile information are abstracted to get Hash (local part ACP|Profile information), and the message digest of the second data is compared with Hash (local part ACP|Profile information), if the message digest of the second data and Hash (local part ACP) If the profile information is the same, the verification of the message digest of the second data is passed, that is, the verification of the authentication confirmation information is passed; if the authentication confirmation information received by the LPA is the ACP, the LPA The ACP is compared with the local ACP. If the ACP is the same as the local ACP, the authentication confirmation information is verified. The LPA may obtain the profile information from the profile deletion request, or obtain the profile information from the RPM Command, or obtain the profile information from the eUICC.
具体地,在对Hash(ACP)的验证通过的情况下,LPA执行步骤S113;在对Hash(ACP)的验证不通过的情况下,LPA终止本次Profile删除流程。Specifically, in the case where the verification of the Hash (ACP) is passed, the LPA performs step S113; in the case where the verification of the Hash (ACP) does not pass, the LPA terminates the profile deletion process.
步骤S113:LPA将装载RPMCommand指令(LoadRPMCommand)发送给eUICC,其中,LoadRPMCommand中携带smdpSigned3、smdpSignature3及CERT.DPrpm.ECDSA。Step S113: The LPA sends a load RPMCommand command (LoadRPMCommand) to the eUICC, where the LoadRPMCommand carries smdpSigned3, smdpSignature3, and CERT.DPrpm.ECDSA.
具体地,LoadRPMCommand为删除Profile的指令,用于指示eUICC根据PRM  Command的操作类型删除Profile。Specifically, the LoadRPMCommand is an instruction to delete the profile, and is used to indicate that the eUICC is based on the PRM. Command's action type deletes the profile.
可选地,若smdpSigned3={TransactionID,RPM Command,euiccLock,Hash(ACP),locationFlag},则LPA还获取终端的位置信息并向SM-DP+返回终端的位置信息。Optionally, if smdpSigned3={TransactionID, RPM Command, eucicLock, Hash (ACP), locationFlag}, the LPA also acquires the location information of the terminal and returns the location information of the terminal to the SM-DP+.
具体地,LPA可以利用终端的全球定位系统(Global Positioning System,GPS)、北斗系统等定位系统获取终端当前或历史的地理位置信息并向SM-DP+返回所述地理位置信息;LPA也可以获取终端当前或之前一定时间内所在的小区附近的小区列表以及各个小区的信号强度,并将所述小区列表及其对应的信号强度列表返回给SM-DP+;LPA还可以获取在终端的搜索范围内的无线网络列表以及各个无线网络的信号强度,并将所述无线网络列表及其对应的信号强度列表返回给SM-DP+。Specifically, the LPA can acquire the current or historical geographical location information of the terminal by using a positioning system such as a Global Positioning System (GPS) or a Beidou system of the terminal, and return the geographical location information to the SM-DP+; the LPA can also acquire the terminal. The cell list in the vicinity of the cell in the current or previous time and the signal strength of each cell, and return the cell list and its corresponding signal strength list to the SM-DP+; the LPA can also be obtained in the search range of the terminal. The list of wireless networks and the signal strength of each wireless network, and returning the list of wireless networks and their corresponding signal strengths to the SM-DP+.
步骤S114:eUICC验证CERT.DPrpm.ECDSA合法且与CERT.DPauth.ECDSA属于同一SM-DP+,验证TransactionID匹配当前的远程SIM配置(Remote SIM Provisioning,RSP)会话。Step S114: The eUICC verifies that CERT.DPrpm.ECDSA is legal and belongs to the same SM-DP+ as CERT.DPauth.ECDSA, and verifies that the TransactionID matches the current Remote SIM Provisioning (RSP) session.
具体地,eUICC通过分别从CERT.DPrpm.ECDSA和CERT.DPauth.ECDSA中获取SM-DP+对象标识(Object Identifications,OID),对分别获取出来的两个SM-DP+OID进行比较,若两个SM-DP+OID相同则确定CERT.DPrpm.ECDSA与CERT.DPauth.ECDSA属于同一SM-DP+。Specifically, the eUICC compares the two SM-DP+OIDs obtained by acquiring the SM-DP+ Object Identifications (OID) from CERT.DPrpm.ECDSA and CERT.DPauth.ECDSA respectively, if two The same SM-DP+OID determines that CERT.DPrpm.ECDSA and CERT.DPauth.ECDSA belong to the same SM-DP+.
步骤S115:eUICC对smdpSignature3进行验证。Step S115: The eUICC verifies the smdpSignature3.
具体地,eUICC采用与SK.DPrpm.ECDSA对应的公钥(PK.DPrpm.ECDSA)、smdpSigned3和euiccSignature1对smdpSignature3进行验证,其中,euiccSignature1为eUICC在建立RSP会话过程中产生并保存的鉴权签名值。Specifically, the eUICC verifies the smdpSignature3 using the public key (PK.DPrpm.ECDSA), smdpSigned3, and eucicsignature1 corresponding to SK.DPrpm.ECDSA, where eucicSignature1 is the authentication signature value generated and saved by the eUICC during the establishment of the RSP session. .
具体地,eUICC生成smdpSigned3|euiccSignature1的第一摘要,再用PK.DPrpm.ECDSA对smdpSignature2解密生成第二摘要,在第一摘要与第二摘要相同时,对smdpSignature3的验证通过。举例来说,在SM-DP+中,A={smdpSigned3,euiccSignature1},对A取摘要得到摘要a,smdpSignature3为对摘要a利用SK.DPrpm.ECDSA进行加密得到的签名值;当smdpSigned2和smdpSignature3传输至eUICC时,对smdpSigned3|euiccSignature1取摘要得到摘要a1,利用PK.DPrpm.ECDSA对smdpSignature3解密生成新的摘要b,在摘要a1和摘要b相同时,对smdpSignature2的验证通过。Specifically, the eUICC generates a first digest of smdpSigned3|euiccSignature1, and then decrypts smdpSignature2 with PK.DPrpm.ECDSA to generate a second digest. When the first digest is the same as the second digest, the verification of smdpSignature3 is passed. For example, in SM-DP+, A={smdpSigned3, eucicSignature1}, a summary is obtained for A, and smdpSignature3 is a signature value obtained by encrypting the summary a with SK.DPrpm.ECDSA; when smdpSigned2 and smdpSignature3 are transmitted to In eUICC, the abstract is obtained by summarizing smdpSigned3|euiccSignature1 to obtain the abstract a1, and smdpSignature3 is decrypted by PK.DPrpm.ECDSA to generate a new digest b. When the digest a1 and the digest b are the same, the verification of smdpSignature2 is passed.
步骤S116:eUICC根据euiccmemoryReset删除所有的Operational Profile。Step S116: The eUICC deletes all the Operational Profiles according to the eucicemoryReset.
具体地,eUICC从smdpSigned3中提取得到RPM Command,PRM Command的操作类型被设置为euiccmemoryReset,则eUICC根据PRM Command的操作类型删除所有的Operational Profile。Specifically, the eUICC extracts the RPM Command from the smdpSigned3, and the operation type of the PRM Command is set to euciccmoryReset, and the eUICC deletes all the Operational Profiles according to the operation type of the PRM Command.
进一步地,eUICC在删除所有的Operational Profile后,eUICC还可以清除Profile策略使能器(Profile Policy Enabler)中Operational Profile的Profile策略规则(Profile Policy Rules,PPR)信息。Further, after the eUICC deletes all the Operational Profiles, the eUICC can also clear the Profile Policy Rules (PPR) information of the Operational Profile in the Profile Policy Enabler.
步骤S117:eUICC根据euiccLock进入锁定状态。Step S117: The eUICC enters the locked state according to eucicLock.
具体地,eUICC从smdpSigned3中提取得到euiccLock,euiccLock=True,则进入锁定状态,进入锁定状态后,eUICC对LPA发送的Profile下载相关的命令(比如ES10a.GetEuiccConfiguredAddresses,ES10b.PrepareDownload,ES10b.GetEUICCChallenge, ES10b.AuthenticateServer)向LPA返回错误指示,错误原因值指示eUICC lock或服务不可用等。Specifically, eUICC extracts eucicLock from smdpSigned3, and euciclock=True enters a locked state. After entering the locked state, eUICC downloads related commands to the profile sent by LPA (such as ES10a.GetEuiccConfiguredAddresses, ES10b.PrepareDownload, ES10b.GetEUICCChallenge, ES10b.AuthenticateServer) returns an error indication to the LPA, the error cause value indicating eUICC lock or service unavailable.
可选地,在eUICC进入锁定状态后,LPA还可以获取用户的解锁请求和鉴权确认输入信息,在对鉴权确认输入信息的验证通过的情况下,向eUICC发送eUICC解锁指令,eUICC根据eUICC解锁指令进入正常状态。Optionally, after the eUICC enters the locked state, the LPA may also obtain the unlock request and the authentication confirmation input information of the user, and send an eUICC unlocking instruction to the eUICC when the verification of the authentication confirmation input information is passed, and the eUICC according to the eUICC The unlock command enters the normal state.
具体地,LPA通过终端的用户交互界面获取用户输入的ACP或代替ACP的用户指纹/声纹/虹膜等鉴权确认输入信息,将所述鉴权确认输入信息与本地保存的ACP或代替ACP的用户指纹/声纹/虹膜等信息进行匹配,若匹配一致则对鉴权确认输入信息的验证通过,LPA向eUICC发送eUICC存储复位指令(eUICCMemoryReset),eUICCMemoryReset中携带euiccLock,euiccLock=False,eUICC接收到eUICCMemoryReset,在euiccLock=False的情况下eUICC不执行对Operational Profile的删除操作,而是根据euiccLock进入正常状态,eUICC进入正常状态后,用户可重新下载Profile。Specifically, the LPA obtains the ACP input by the user or the authentication fingerprint input information of the user fingerprint/voiceprint/iris instead of the ACP through the user interaction interface of the terminal, and inputs the authentication confirmation input information with the locally saved ACP or replaces the ACP. User fingerprint/voiceprint/iris and other information are matched. If the matching is consistent, the authentication confirmation input information is verified. The LPA sends an eUICC storage reset command (eUICCMemoryReset) to the eUICC, eUICCMemoryReset carries eucicLock, euciclock=False, and eUICC receives eUICCMemoryReset, in the case of eucicLock=False, the eUICC does not perform the deletion operation of the Operational Profile, but enters the normal state according to eucicLock. After the eUICC enters the normal state, the user can re-download the profile.
具体地,eUICCMemoryReset为全球移动通信系统(Global System for Mobile Communiacation,GSM)协会的官方文档(SGP22)中定义的LPA向eUICC发送的一个功能指令,可用于指示eUICC删除所有的Operational Profile和存储在eUICC中的Profile元数据(Metadata)。Specifically, the eUICCMemoryReset is a function instruction sent by the LPA defined in the official document (SGP22) of the Global System for Mobile Communication (GSM) Association to the eUICC, and can be used to instruct the eUICC to delete all the Operational Profiles and store them in the eUICC. Profile metadata (Metadata).
下面以终端为手机为例对eUICC的锁定状态与正常状态进行说明,参见图4a—4d。The following uses the terminal as a mobile phone as an example to describe the locked state and normal state of the eUICC. See Figures 4a-4d.
图4a是eUICC处于锁定状态时用户进入LPA后的用户交互界面,用户交互界面上存在“eUICC解锁”选项、“Profile下载”选项、“Profile管理”选项,当用户点击“eUICC解锁”选项、“Profile下载”选项或“Profile管理”选项中的任意一个选项时,用户交互界面如图4b所示,提示用户输入ACP,只有在用户输入的ACP正确的情况下,才能进入对应的功能界面(若用户点击的是“Profile管理”选项,则在用户输入的ACP正确的情况下,进入Profile管理界面;若用户点击的是“Profile下载”选项,则在用户输入的ACP正确的情况下,进入Profile下载界面;若用户点击的是“eUICC解锁”,则在用户输入的ACP正确的情况下,进入解锁后的界面,即eUICC处于正常状态时的用户交互界面,如图4c)。Figure 4a shows the user interaction interface after the user enters the LPA when the eUICC is in the locked state. The user interface has the “eUICC Unlock” option, the “Profile Download” option, and the “Profile Management” option. When the user clicks the “eUICC Unlock” option, “ When the profile download option or the "Profile management" option is selected, the user interaction interface is as shown in FIG. 4b, prompting the user to input ACP, and only when the ACP input by the user is correct, can the user enter the corresponding function interface (if The user clicks on the “Profile Management” option, and enters the profile management interface if the ACP entered by the user is correct; if the user clicks on the “Profile Download” option, the user enters the profile if the ACP entered by the user is correct. Download interface; if the user clicks "eUICC unlock", when the ACP input by the user is correct, the unlocked interface is entered, that is, the user interaction interface when the eUICC is in a normal state, as shown in FIG. 4c).
需要说明的是,用户还可提示用户输入指纹等代替ACP的鉴权确认输入信息,此处仅以提示用户输入ACP作为其中一种示例。It should be noted that the user may also prompt the user to input a fingerprint or the like instead of the ACP authentication confirmation input information. Here, only the user is prompted to input the ACP as one of the examples.
图4c是eUICC处于正常状态时用户进入LPA后的用户交互界面,用户交互界面上存在“Profile下载选项、“Profile管理”选项,当用户点击“Profile下载”选项时,用户交互界面如图4d所示,进入Profile下载界面。Figure 4c shows the user interaction interface after the user enters the LPA when the eUICC is in a normal state. The user interaction interface has the "Profile download option and the "Profile management" option. When the user clicks the "Profile download" option, the user interaction interface is as shown in Fig. 4d. Show, enter the profile download interface.
在本发明实施例中,用户在终端丢失后可通过Operator BSS向SM-DP+发送RPMOrder,SM-DP+生成pending RPM order,然后将RPMOrder中携带的RPM Command、euiccLock以及Hash(ACP)携带在eUICC配置文件删除请求中发送给LPA,LPA对Hash(ACP)验证通过后,向eUICC发送LoadRPMCommand,LoadRPMCommand中携带RPM Command、euiccLock,eUICC接收到RPM Command,根据RPM Command的操作类型删除所有运营Profile并根据euiccLock进入锁定状态,在终端丢失的情况下能及时删除 Profile,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险,同时eUICC进入锁定状态以使得终端使用者(比如偷盗者)无法进行Profile下载,进一步提高终端的安全性。In the embodiment of the present invention, after the terminal is lost, the user can send the RPMorder to the SM-DP+ through the Operator BSS, and the SM-DP+ generates the pending RPM order, and then carries the RPM Command, the euciclock, and the Hash (ACP) carried in the RPMorder in the eUICC configuration. The file deletion request is sent to the LPA. After the LPA verifies the Hash (ACP), the LPA sends the LoadRPMCommand to the eUICC. The LoadRPMCommand carries the RPM Command and the euciclock. The eUICC receives the RPM Command, and deletes all the operation profiles according to the RPM Command operation type and according to the eucicLock. Enter the locked state and delete it in time if the terminal is lost. Profile, which reduces the risk of asset loss associated with eUICC data or information leakage associated with eUICC data after the terminal is lost, and the eUICC enters a locked state so that the terminal user (such as a thief) cannot perform profile downloading, further improving Terminal security.
再请参见图5,图5是本发明实施例提供的另一种eUICC配置文件的删除方法,本发明实施例的方法可以实现在如图2所示的系统架构上,该方法包括但不限于如下步骤:Referring to FIG. 5, FIG. 5 is a method for deleting another eUICC configuration file according to an embodiment of the present invention. The method of the embodiment of the present invention may be implemented on the system architecture shown in FIG. 2, where the method includes but is not limited to The following steps:
步骤S201:OEM门户(Portal)获取用户输入的账号和密码。Step S201: The OEM portal (Portal) obtains the account and password input by the user.
具体地,所述账号和密码为用户事先在终端上注册的,注册过程中,OEM Portal对应的OEM Server保存所述账号和密码与终端的关联关系。例如终端的IMEI为123456789012345,用户在IMEI为123456789012345的终端上注册的账号为1234,密码为5678,则OEM Server将IMEI(123456789012345)、账号(1234)以及密码(5678)关联起来(如保存在同一个数据表中),当用户登录账号1234时,OEM Server可以通过1234知道该用户是IMEI为123456789012345的终端的用户。Specifically, the account and the password are registered by the user in the terminal in advance. During the registration process, the OEM server corresponding to the OEM Portal saves the association relationship between the account and the password and the terminal. For example, the IMEI of the terminal is 123456789012345, the account registered by the user on the terminal with IMEI 123456789012345 is 1234, and the password is 5678. The OEM Server associates IMEI (123456789012345), account number (1234) and password (5678) (if saved in the same In a data table, when the user logs in to the account 1234, the OEM Server can know through 1234 that the user is the user of the terminal with the IMEI of 123456789012345.
步骤S202:OEM Portal获取用户登录后的终端找回操作以及ACP。Step S202: The OEM Portal obtains the terminal recovery operation and the ACP after the user logs in.
具体地,例如用户OEM Portal上点击“找回终端”选项,则OEM Portal获取到用户的终端找回操作。Specifically, for example, when the user searches for the “Retrieve Terminal” option on the OEM Portal, the OEM Portal obtains the user's terminal retrieval operation.
可选地,OEM Portal还可以获取终端的EID、ICCID等Profile信息。Optionally, the OEM Portal can also obtain profile information such as the EID and ICCID of the terminal.
步骤S203:OEM Portal将Hash(ACP)、存储复位指示(euiccmemoryReset)、euiccLock发送给本地防盗应用。Step S203: The OEM Portal sends the Hash (ACP), the storage reset indication (euiccmemoryReset), and the eucicLock to the local anti-theft application.
具体地,euiccLock=True,用于指示eUICC进入锁定状态。Specifically, eucicLock=True is used to indicate that the eUICC enters a locked state.
其中,Hash(ACP)为鉴权确认信息,鉴权确认信息的描述可参考图3对应的实施例中步骤S101对鉴权确认信息的描述,不再赘述。The Hash (ACP) is the authentication confirmation information. For the description of the authentication confirmation information, refer to the description of the authentication confirmation information in step S101 in the embodiment corresponding to FIG. 3, and details are not described herein.
至此,本地防盗应用已经确认终端当前处于丢失状态,则通知LPA删除Profile。At this point, the local anti-theft application has confirmed that the terminal is currently in a lost state, and then notifies the LPA to delete the profile.
步骤S204:本地防盗应用向LPA发送Profile删除请求,其中,Profile删除请求中携带Hash(ACP)、euiccmemoryReset以及euiccLock。Step S204: The local anti-theft application sends a profile deletion request to the LPA, wherein the profile deletion request carries Hash (ACP), eucememoryReset, and eucicLock.
具体地,本地防盗应用通过API向LPA发送Profile删除请求,即向LPA发送API Request(Hash(ACP),euiccmemoryReset,euiccLock)。Specifically, the local anti-theft application sends a profile deletion request to the LPA through the API, that is, sends an API Request (Hash (ACP), euciccmoryReset, eucicLock) to the LPA.
步骤S205:LPA对Hash(ACP)进行验证。Step S205: The LPA verifies the Hash (ACP).
具体地,LPA对Hash(ACP)的验证过程或鉴权确认信息为其他情况(鉴权确认信息为第一数据的消息摘要、鉴权确认信息为第二数据的消息摘要或鉴权确认信息为ACP)的验证过程可参考图3对应的实施例中步骤S112的描述,不再赘述。Specifically, the verification process or the authentication confirmation information of the LSA to the Hash (ACP) is otherwise (the message confirmation that the authentication confirmation information is the first data, the message digest of the authentication data as the second data, or the authentication confirmation information is For the verification process of the ACP, reference may be made to the description of step S112 in the embodiment corresponding to FIG. 3, and details are not described herein again.
具体地,在对Hash(ACP)的验证通过的情况下,LPA执行步骤S206;在对Hash(ACP)验证不通过的情况下,LPA终止本次Profile删除流程。Specifically, in the case where the verification of the Hash (ACP) is passed, the LPA performs step S206; in the case where the verification of the Hash (ACP) fails, the LPA terminates the profile deletion process.
步骤S206:LPA将存储复位指令(eUICCMemoryReset)发送给eUICC,其中,eUICCMemoryReset携带euiccLock。Step S206: The LPA sends a storage reset instruction (eUICCMemoryReset) to the eUICC, where the eUICCMemoryReset carries the eucicLock.
具体地,eUICCMemoryReset为删除Profile的指令,用于指示eUICC删除所有的Operational Profile。Specifically, the eUICCMemoryReset is an instruction to delete the profile, and is used to instruct the eUICC to delete all the Operational Profiles.
步骤S207:eUICC根据eUICCMemoryReset删除所有的Operational Profile。 Step S207: The eUICC deletes all the Operational Profiles according to the eUICCMemoryReset.
步骤S208:eUICC根据euiccLock进入锁定状态。Step S208: The eUICC enters a locked state according to euciclock.
具体地,eUICC从中eUICCMemoryReset提取得到euiccLock,euiccLock=True。Specifically, the eUICC extracts eucicLock, eucicLock=True from the eUICCMemoryReset.
具体地,eUICC进入锁定状态后的具体情况可参考图3对应的实施例中步骤S117的描述,不再赘述。For details, refer to the description of step S117 in the embodiment corresponding to FIG. 3 for details of the eUICC after entering the locked state, and details are not described herein.
可选地,eUICC也可以根据LPA发送的eUICC解锁指令进入正常状态,具体实现过程可参考图3对应的实施中步骤S117对eUICC进入正常状态的过程的描述,不再赘述。Optionally, the eUICC can also enter the normal state according to the eUICC unlocking command sent by the LPA. For a specific implementation process, refer to the description of the process in which the eUICC enters the normal state in step S117 in the implementation corresponding to FIG. 3, and details are not described herein.
在本发明实施例中,用户在终端丢失后通过在OEM Portal登录事先注册的账号,通过OEM Portal的终端找回功能向终端的本地防盗应用发送Profile删除请求,Profile删除请求中携带euiccLock、euiccmemoryReset及Hash(ACP),本地防盗应用通过API将Profile删除请求转发给LPA,LPA对Hash(ACP)的验证通过后,向eUICC发送携带euiccLock的eUICCMemoryReset,eUICC接收到eUICCMemoryReset后,根据eUICCMemoryReset删除所有运营Profile并根据euiccLock进入锁定状态,在终端丢失的情况下能及时删除Profile,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险,同时eUICC进入锁定状态以使得终端使用者(比如偷盗者)无法进行Profile下载,进一步提高终端的安全性。In the embodiment of the present invention, after the terminal is lost, the user logs the previously registered account in the OEM Portal, and sends a profile deletion request to the local anti-theft application of the terminal through the terminal recovery function of the OEM Portal. The profile deletion request carries the eucicLock, the euciccmoryReset and the Hash (ACP), the local anti-theft application forwards the profile deletion request to the LPA through the API. After the LPA verifies the Hash (ACP), the LCA sends the eUICCMemoryReset carrying the euciclock to the eUICC. After receiving the eUICCMemoryReset, the eUICC deletes all the operational profiles according to the eUICCMemoryReset. According to eucicLock entering the locked state, the profile can be deleted in time when the terminal is lost, and the risk of asset loss associated with the eUICC data or information leakage associated with the eUICC data after the terminal is lost is reduced, and the eUICC enters the locked state to make Terminal users (such as thieves) cannot perform profile downloads to further improve the security of the terminal.
再请参见图6,图6是本发明实施例提供的又一种eUICC配置文件的删除方法,本发明实施例的方法可以实现在如图2所示的系统架构上,该方法包括但不限于如下步骤:Referring to FIG. 6 , FIG. 6 is a method for deleting an eUICC configuration file according to an embodiment of the present invention. The method of the embodiment of the present invention may be implemented in the system architecture shown in FIG. 2 , where the method includes but is not limited to The following steps:
步骤S301:本地防盗应用通过终端的情景感知模块确定终端处于丢失状态。Step S301: The local anti-theft application determines that the terminal is in a lost state by using the context awareness module of the terminal.
在一种具体实现中,所述情景感知模块可作为所述本地防盗应用的一个子模块,接收本地应用发出的指令,只为本地防盗应用提供服务;在另一种具体实现中,所述情景感知模块作为一个独立的功能单元,向本地防盗应用发送相关信息,为本地防盗应用提供服务的同时还为终端的其他应用提供服务。In a specific implementation, the context awareness module can serve as a sub-module of the local anti-theft application, receive an instruction issued by the local application, and only provide services for the local anti-theft application; in another specific implementation, the scenario As a separate functional unit, the sensing module sends relevant information to the local anti-theft application to provide services for the local anti-theft application while also serving other applications of the terminal.
具体地,本地防盗应用可以通过终端的语音识别模块获取终端周围的声音信息;本地防盗应用也可以通过终端的行为分析模块获取用户在终端上的操作,进而确定终端的情景信息;本地防盗应用还可以通过终端的图像识别模块获取终端前方的人脸信息。Specifically, the local anti-theft application can obtain the sound information around the terminal through the voice recognition module of the terminal; the local anti-theft application can also obtain the operation of the user on the terminal through the behavior analysis module of the terminal, thereby determining the context information of the terminal; The face information in front of the terminal can be obtained through the image recognition module of the terminal.
具体地,当本地防盗应用检测到情景信息处于异常情况则判断终端当前处于丢失状态,例如终端的语音识别模块识别到“捡到手机”等异常词汇则确定终端当前处于丢失状态;又如终端的图像识别模块识别到终端前方的人脸属于陌生人脸信息且终端的行为分析模块感知到用户多次输错锁屏密码,则确定终端当前处于丢失状态。Specifically, when the local anti-theft application detects that the context information is in an abnormal situation, it is determined that the terminal is currently in a lost state. For example, if the voice recognition module of the terminal recognizes an abnormal vocabulary such as “going to the mobile phone”, it is determined that the terminal is currently in a lost state; The image recognition module recognizes that the face in front of the terminal belongs to the strange face information and the behavior analysis module of the terminal senses that the user inputs the wrong lock screen password a plurality of times, and determines that the terminal is currently in a lost state.
步骤S302:本地防盗应用向LPA发送Profile删除请求,其中,Profile删除请求中携带存储复位指示(euiccmemoryReset)以及euiccLock。Step S302: The local anti-theft application sends a profile deletion request to the LPA, wherein the profile deletion request carries a storage reset indication (euiccmemoryReset) and eucicLock.
具体地,euiccLock=True。Specifically, eucicLock=True.
具体地,本地防盗应用通过API向LPA发送Profile删除请求,即向LPA发送API Request(euiccmemoryReset,euiccLock)。Specifically, the local anti-theft application sends a profile deletion request to the LPA through the API, that is, sends an API Request (euiccmemoryReset, euciclock) to the LPA.
步骤S303:LPA将eUICCMemoryReset发送给eUICC,其中,eUICCMemoryReset携带euiccLock。Step S303: The LPA sends the eUICCMemoryReset to the eUICC, where the eUICCMemoryReset carries the eucicLock.
需要说明的是,在本发明实施例中,终端的丢失状态由本地防盗应用感知确定,终 端未接收到其他服务器发送来的远程指令,所以Profile删除请求中不存在鉴权确认信息,在未接收到鉴权确认信息且确定Profile删除请求为API Request的情况下,LPA可省去对鉴权确认信息的验证这一步骤。It should be noted that, in the embodiment of the present invention, the lost state of the terminal is determined by the local anti-theft application, and finally The terminal does not receive the remote command sent by other servers, so there is no authentication confirmation information in the profile deletion request. If the authentication confirmation information is not received and the profile deletion request is determined as the API Request, the LPA can save the reference. The right to verify the verification of this step.
步骤S304:eUICC根据eUICCMemoryReset删除所有的Operational Profile。Step S304: The eUICC deletes all the Operational Profiles according to the eUICCMemoryReset.
步骤S305:eUICC根据euiccLock进入锁定状态。Step S305: The eUICC enters a locked state according to eucicLock.
具体地,步骤S303~S305的具体实现可参考图4对应的实施例中步骤S206~S208的描述,不再赘述。For details, refer to the description of steps S206 to S208 in the embodiment corresponding to FIG. 4 for specific implementation of steps S303-S305, and details are not described herein.
在本发明实施例中,本地防盗应用通过终端的情景感知模块确定终端处于丢失状态,本地防盗应用生成Profile删除请求,Profile删除请求中携带euiccLock和euiccmemoryReset,LPA根据euiccmemoryReset向eUICC发送携带euiccLock的eUICCMemoryReset,eUICC接收到eUICCMemoryReset后,根据eUICCMemoryReset删除所有运营Profile并根据euiccLock进入锁定状态,在终端丢失的情况下能及时删除Profile,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险,同时eUICC进入锁定状态,以使得终端使用者(比如偷盗者)无法进行Profile下载,进一步提高终端的安全性。In the embodiment of the present invention, the local anti-theft application determines that the terminal is in a lost state by using the context awareness module of the terminal, and the local anti-theft application generates a profile deletion request, and the profile deletion request carries eucicLock and euciccmoryReset, and the LPA sends eUICCMemoryReset carrying euciclock to the eUICC according to eucememoryReset. After receiving the eUICCMemoryReset, the eUICC deletes all the operating profiles according to eUICCMemoryReset and enters the locked state according to eucicLock. In the case that the terminal is lost, the profile can be deleted in time, and the assets associated with the eUICC data are lost or associated with the eUICC data after the terminal is lost. The risk of information leakage, while eUICC enters a locked state, so that the end user (such as the thief) can not perform profile download, further improving the security of the terminal.
再请参见图7,图7是本发明本发明实施例提供的又一种eUICC配置文件的删除方法,本发明实施例的方法可以实现在如图1或图2所示的系统架构上,该方法包括但不限于如下步骤:Referring to FIG. 7, FIG. 7 is a method for deleting an eUICC configuration file according to an embodiment of the present invention. The method of the embodiment of the present invention may be implemented on the system architecture shown in FIG. 1 or FIG. Methods include, but are not limited to, the following steps:
步骤S401:LPA接收Profile删除请求,Profile删除请求携带鉴权确认信息。Step S401: The LPA receives the profile deletion request, and the profile deletion request carries the authentication confirmation information.
具体地,鉴权确认信息可参考图3对应的实施例中步骤S101对鉴权确认信息的描述,即鉴权确认信息可以为ACP;也可以为Hash(ACP);也可以为Hash(ACP|Profile信息);还可以为Hash(部分ACP|Profile信息)。Specifically, the authentication confirmation information may refer to the description of the authentication confirmation information in step S101 in the embodiment corresponding to FIG. 3, that is, the authentication confirmation information may be ACP; may also be Hash (ACP); or may be Hash (ACP| Profile information); can also be Hash (partial ACP|Profile information).
具体地,Profile删除请求的发送端可以为图1的系统架构中的SM-DP+或图2的系统架构中的终端的本地防盗应用。Specifically, the sender of the profile deletion request may be the SM-DP+ in the system architecture of FIG. 1 or the local anti-theft application of the terminal in the system architecture of FIG. 2.
具体地,Profile删除请求的发送端为SM-DP+时,Profile删除请求携带smdpSigned3、smdpSignature3及CERT.DPrpm.ECDSA。Specifically, when the sender of the profile deletion request is SM-DP+, the profile deletion request carries smdpSigned3, smdpSignature3, and CERT.DPrpm.ECDSA.
具体地,Profile删除请求的发送端为本地防盗应用时,Profile删除请求可以为API Request(Hash(ACP),euiccmemoryReset,euiccLock),即图5对应的实施例中涉及的场景;Profile删除请求也可以为API Request(euiccmemoryReset,euiccLock),即图6对应的实施例中涉及的场景。Specifically, when the sending end of the profile deletion request is a local anti-theft application, the profile deletion request may be an API Request (Hash (ACP), eucememoryReset, euciclock), that is, the scenario involved in the embodiment corresponding to FIG. 5; the profile deletion request may also be It is an API Request (euiccmemoryReset, eucicLock), that is, the scenario involved in the embodiment corresponding to FIG. 6.
步骤S402:LPA对鉴权确认信息进行验证。Step S402: The LPA verifies the authentication confirmation information.
具体地,LPA对鉴权确认信息进行验证的具体实现可参考图3对应的实施例中步骤S112的描述,不再赘述。For a specific implementation of the LPA to verify the authentication confirmation information, refer to the description of step S112 in the embodiment corresponding to FIG. 3, and details are not described herein.
具体地,在对所述鉴权确认信息的验证通过的情况下,LPA执行步骤S403。Specifically, in the case where the verification of the authentication confirmation information is passed, the LPA performs step S403.
步骤S403:LPA向eUICC发送删除Profile的指令,删除Profile的指令中携带euiccLock。Step S403: The LPA sends an instruction to delete the profile to the eUICC, and the instruction to delete the profile carries eucicLock.
具体地,euiccLock=True。 Specifically, eucicLock=True.
具体地,删除Profile的指令可以为图3对应的实施例中的LoadRPMCommand,也可以为图5或图6对应的实施例中的eUICCMemoryReset。Specifically, the instruction to delete the profile may be the LoadRPMCommand in the embodiment corresponding to FIG. 3, or may be the eUICCMemoryReset in the embodiment corresponding to FIG. 5 or FIG. 6.
步骤S404:eUICC删除Profile。Step S404: The eUICC deletes the profile.
具体地,eUICC可从LoadRPMCommand中携带的smdpSigned3中提取得到RPM Command,PRM Command的操作类型被设置为euiccmemoryReset,则根据PRM Command的类型删除所有的Operational Profile。Specifically, the eUICC may extract the RPM Command from the smdpSigned3 carried in the LoadRPMCommand, and the operation type of the PRM Command is set to euciccmoryReset, and all the Operational Profiles are deleted according to the type of the PRM Command.
具体地,eUICC还可以根据eUICCMemoryReset删除所有的Operational Profile。Specifically, the eUICC can also delete all Operational Profiles according to eUICCMemoryReset.
步骤S405:eUICC根据euiccLock进入锁定状态。Step S405: The eUICC enters a locked state according to eucicLock.
具体地,步骤S405的具体实现可参考图3对应的实施例中步骤S117的描述,不再赘述。Specifically, the specific implementation of step S405 may refer to the description of step S117 in the embodiment corresponding to FIG. 3, and details are not described herein again.
可选地,eUICC也可以根据LPA发送的eUICC解锁指令进入正常状态,具体实现过程可参考图3对应的实施中步骤S117对eUICC进入正常状态的过程的描述,不再赘述。Optionally, the eUICC can also enter the normal state according to the eUICC unlocking command sent by the LPA. For a specific implementation process, refer to the description of the process in which the eUICC enters the normal state in step S117 in the implementation corresponding to FIG. 3, and details are not described herein.
步骤S406:终端重启或开机时eUICC向LPA发送复用应答(Answer to reset,ATR)响应,其中,ATR响应中携带euiccLock。Step S406: The eUICC sends an Answer to Reset (ATR) response to the LPA when the terminal is restarted or powered on, where the ATR response carries eucicLock.
具体地,euiccLock=True。Specifically, eucicLock=True.
可选地,步骤S408可替换为:LPA向eUICC发送选择ISD-R应用(Select ISD-R)指令,eUICC向LPA发送文件控制参数(File Control Parameters,FCP)响应,FCP响应中携带euiccLock。Optionally, step S408 may be replaced by: the LPA sends a Select ISD-R Application (Select ISD-R) instruction to the eUICC, and the eUICC sends a File Control Parameters (FCP) response to the LPA, and the FCP response carries eucicLock.
可选地,当eUICC处于正常状态时(即eUICC已经解锁),euiccLock=False。Optionally, when the eUICC is in a normal state (ie, the eUICC has been unlocked), eucicLock=False.
通过步骤S406,LPA可以获知eUICC的状态,从而对步骤S407作出进一步判断,在euiccLock=True的情况下,LPA执行步骤S407。Through step S406, the LPA can know the state of the eUICC, thereby making further judgment on step S407. In the case of eucicLock=True, the LPA performs step S407.
步骤S407:在本地ACP不存在的情况下,LPA进入不可接收Profile下载请求状态。Step S407: In the case where the local ACP does not exist, the LPA enters a state in which the profile download request cannot be received.
具体地,LPA通过对Profile下载的按钮、菜单项或图标进行灰度处理以进入不可接收Profile下载请求状态。具体可以如图4e所示,图4e是LPA进入不可接收Profile下载请求状态时用户进入LPA后的用户交互界面,此时用户交互界面上的“Profile下载”选项、“Profile管理”选项处于阴影状态,终端使用者点击选项后界面不会有任何变化。Specifically, the LPA performs grayscale processing on the button, menu item or icon downloaded by the profile to enter the unreceivable profile download request state. Specifically, as shown in FIG. 4 e, FIG. 4 e is a user interaction interface after the user enters the LPA when the LPA enters the unreceivable profile download request state, and the “Profile Download” option and the “Profile Management” option on the user interaction interface are in a shadow state. After the end user clicks on the option, the interface will not change.
具体地,LPA进入不可接收Profile下载请求状态后,LPA不具备“接收终端使用者的Profile下载请求、eUICC解锁请求和鉴权确认输入信息”这一功能,终端使用者无法对eUICC进行解锁,也无法通过LPA进行Profile下载,即LPA不能执行图3对应的实施例步骤S117中“LPA通过终端的用户交互界面获取用户输入的ACP或用户指纹等用于证明用户身份的鉴权确认输入信息”这一操作及其后续的操作。具体可以如图4f所示,当用户想要进入LPA时,用户交互界面如图4f所示,显示“服务异常”的弹框;进一步地,还可以在显示如图4f的用户交互界面后退出LPA的用户交互界面回到终端的主界面。Specifically, after the LPA enters the unreceivable profile download request state, the LPA does not have the function of “receiving the terminal user's profile download request, eUICC unlock request, and authentication confirmation input information”, and the terminal user cannot unlock the eUICC. The profile download cannot be performed by the LPA, that is, the LPA cannot perform the embodiment of the embodiment corresponding to FIG. 3, in step S117, “the LPA obtains the user-entered ACP or user fingerprint, etc., and the authentication confirmation input information used to prove the identity of the user through the user interaction interface of the terminal”. An operation and its subsequent operations. Specifically, as shown in FIG. 4f, when the user wants to enter the LPA, the user interaction interface displays a "service abnormality" bullet box as shown in FIG. 4f; further, may also exit after displaying the user interaction interface as shown in FIG. 4f. The user interface of the LPA is returned to the main interface of the terminal.
在本发明实施例中,LPA接收Profile删除请求,对Profile删除请求中的鉴权确认信息进行验证,在对鉴权确认信息的验证通过的情况下,向eUICC发送Profile删除指令,Profile删除指令中携带euiccLock,eUICC删除所有的Profile根据euiccLock进入锁定状态,在终端丢失的情况下能及时删除Profile,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险;LPA还获取eUICC的状态,在发 现eUICC进入锁定状态且ACP不存在的情况下进入不可接收Profile下载请求状态,即用户无法对eUICC进行解锁,即使终端使用者通过双清(清除用户数据并恢复出厂设置)的方式清除了ACP,也无法进行Profile下载。In the embodiment of the present invention, the LPA receives the profile deletion request, and verifies the authentication confirmation information in the profile deletion request, and sends a profile deletion instruction to the eUICC in the case of verifying the authentication confirmation information, in the profile deletion instruction. Carrying eucicLock, eUICC deletes all profiles according to eucicLock to enter the locked state, and can delete the profile in time when the terminal is lost, reducing the risk of asset loss associated with eUICC data or information leakage associated with eUICC data after the terminal is lost. ;LPA also gets the status of eUICC, in the hair If the eUICC enters the locked state and the ACP does not exist, the user cannot enter the unreceived profile download request state, that is, the user cannot unlock the eUICC, even if the terminal user clears the ACP by double clearing (clearing the user data and restoring the factory settings). Profile download is also not possible.
上述实施例中涉及的均为eUICC根据LPA发送的删除Profile的指令删除所有的Operational Profile的情况,在具体实现中,若Profile删除请求的发送端为SM-DP+,SM-DP+的RPM Command的操作类型还可以设置为删除(Delete),用Delete指示eUICC删除目标Profile,即RPM Command对应的Profile。以下介绍RPM Command的操作类型为Delete时的情况。In the foregoing embodiment, the eUICC deletes all the Operational Profiles according to the instruction of deleting the profile sent by the LPA. In the specific implementation, if the sender of the profile deletion request is SM-DP+, the operation of the RPM Command of the SM-DP+ The type can also be set to Delete (Delete), and Delete indicates that the eUICC deletes the target profile, that is, the profile corresponding to the RPM Command. The following describes the case when the RPM Command operation type is Delete.
参见图8,图8是本发明实施例提供的又一种eUICC配置文件的删除方法,该方法包括但不限于如下步骤:Referring to FIG. 8, FIG. 8 is a method for deleting an eUICC configuration file according to an embodiment of the present invention, where the method includes but is not limited to the following steps:
步骤S501:Operator BSS向SM-DP+发送RPMOrder,其中,RPMOrder中携带RPM Command,EID,ICCID,Profile策略规则清除指示(Profile Policy Rules Unset,PPR Unset),其中,RPM Command操作类型设置为删除(Delete)。Step S501: The Operator BSS sends an RPMorder to the SM-DP+, where the RPMorer carries an RPM Command, an EID, an ICCID, and a Profile Policy Rules Unset (PPR Unset), where the RPM Command operation type is set to delete (Delete ).
在另一种实现方式中,ICCID还可携带在RPM Command中,即PRMOrder携带RPM Command,EID,PPR Unset,RPM Command(ICCID Delete)。In another implementation, the ICCID may also be carried in the RPM Command, that is, the PRMOrder carries the RPM Command, EID, PPR Unset, RPM Command (ICCID Delete).
其中,PPR Unset用于指示eUICC清除用户要删除的目标Profile对应的PPR设置。The PPR Unset is used to instruct the eUICC to clear the PPR setting corresponding to the target profile that the user wants to delete.
可选地,RPMOrder还可以携带SM-DS Address,locationFlag,其中,SM-DS Address用于SM-DP+生成远程管理事件的同时通知SM-DS进行事件记录,locationFlag用于指示LPA获取终端的当前或历史位置信息。Optionally, the RPMOrder may also carry an SM-DS Address, a locationFlag, where the SM-DS Address is used to notify the SM-DS to perform event recording while the SM-DP+ generates a remote management event, and the locationFlag is used to indicate that the LPA acquires the current or terminal of the terminal. Historical location information.
需要说明的是,在本发明实施例中,只删除一个Profile,因此可用PPR Unset代替鉴权确认信息,LPA接收到PPR Unset默认对鉴权确认信息的验证通过并将PPR Unset发送给eUICC,eUICC接收到PPR Unset即可完成清除PPR设置,本发明实施例中省去对LPA对鉴权确认信息的验证过程的描述。It should be noted that, in the embodiment of the present invention, only one profile is deleted, so the PPR Unset can be used instead of the authentication confirmation information, and the LPA receives the PPR Unset default verification of the authentication confirmation information and sends the PPR Unset to the eUICC, eUICC. The PPR setting can be cleared by receiving the PPR Unset. In the embodiment of the present invention, the description of the verification process of the LPA authentication confirmation information is omitted.
步骤S502:SM-DP+进行合法性检查。Step S502: The SM-DP+ performs a legality check.
步骤S503:SM-DP+生成pending RPM order。Step S503: SM-DP+ generates a pending RPM order.
具体地,步骤S502~S503的具体过程与图3对应的实施例中步骤S102~S103介绍一致,在此不再赘述。Specifically, the specific processes of the steps S502 to S503 are the same as those of the steps S102 to S103 in the embodiment corresponding to FIG. 3, and details are not described herein again.
至此,SM-DP+保存有终端的eUICC的远程管理事件,等待终端的LPA发起连接并执行远程管理操作。At this point, the SM-DP+ saves the remote management event of the eUICC of the terminal, waits for the LPA of the terminal to initiate a connection and performs a remote management operation.
具体地,LPA获取到SM-DP+的地址即可向SM-DP+发起连接,LPA获取SM-DP+的地址的具体方式在图3对应的实施例中步骤S103已经介绍,不再赘述。Specifically, the LPA obtains the address of the SM-DP+ to initiate the connection to the SM-DP+, and the specific manner in which the LPA obtains the address of the SM-DP+ is introduced in step S103 in the embodiment corresponding to FIG. 3, and details are not described herein again.
以下以LPA获取本地保存的SM-DP+的地址为例介绍后续流程。The following takes the LPA to obtain the address of the locally saved SM-DP+ as an example to describe the subsequent process.
步骤S504:LPA与SM-DP+建立TLS连接。Step S504: The LPA establishes a TLS connection with the SM-DP+.
步骤S505:SM-DP+与eUICC基于HTTPS进行双向鉴权。Step S505: The SM-DP+ and the eUICC perform mutual authentication based on the HTTPS.
步骤S506:SM-DP+查找得到pending RPM order。Step S506: The SM-DP+ lookup obtains the pending RPM order.
具体地,步骤S504~S506在图3对应的实施例中步骤S106~S108已经进行介绍,不再赘述。Specifically, steps S504 to S506 have been introduced in steps S106 to S108 in the embodiment corresponding to FIG. 3, and details are not described herein.
步骤S507:SM-DP+生成smdpSigned3,smdpSigned3={TransactionID,RPM  Command,PPR Unset,ICCID}。Step S507: SM-DP+ generates smdpSigned3, smdpSigned3={TransactionID, RPM Command, PPR Unset, ICCID}.
在另一种实现方式中,smdpSigned3={TransactionID,RPM Command,PPR Unset,ICCID,locationFlag}。In another implementation, smdpSigned3={TransactionID, RPM Command, PPR Unset, ICCID, locationFlag}.
具体地,当RPM Command中携带ICCID时,smdpSigned3={TransactionID,RPM Command,PPR Unset}。Specifically, when the ICDRID is carried in the RPM Command, smdpSigned3={TransactionID, RPM Command, PPR Unset}.
步骤S508:SM-DP+利用SK.DPrpm.ECDSA对smdpSigned3和euiccSignature1进行签名计算生成smdpSignature3。Step S508: SM-DP+ performs signature calculation on smdpSigned3 and eucicSignature1 by using SK.DPrpm.ECDSA to generate smdpSignature3.
步骤S509:SM-DP+将smdpSigned3、smdpSignature3及CERT.DPrpm.ECDSA发送给LPA。Step S509: SM-DP+ sends smdpSigned3, smdpSignature3 and CERT.DPrpm.ECDSA to the LPA.
具体地,步骤S507~S509的具体实现可参考图3对应的实施例中步骤S109~S111的介绍,不再赘述。For details, refer to the description of steps S109 to S111 in the embodiment corresponding to FIG. 3, and details are not described herein again.
至此,SM-DP+将携RPM Command的Profile删除请求发送给LPA,指示终端对Profile进行删除,即Profile删除请求携带smdpSigned3、smdpSignature3及CERT.DPrpm.ECDSA。At this point, the SM-DP+ sends a profile deletion request carrying the RPM Command to the LPA, instructing the terminal to delete the profile, that is, the profile deletion request carries smdpSigned3, smdpSignature3, and CERT.DPrpm.ECDSA.
步骤S510:LPA将LoadRPMCommand发送给eUICC,其中,LoadRPMCommand中携带smdpSigned3、smdpSignature3及CERT.DPrpm.ECDSA。Step S510: The LPA sends the LoadRPMCommand to the eUICC, where the LoadRPMCommand carries smdpSigned3, smdpSignature3, and CERT.DPrpm.ECDSA.
可选地,若smdpSigned3={TransactionID,RPM Command,PPR Unset,ICCID,locationFlag},LPA还获取终端的当前或历史位置信息,具体可参考图3对应的实施例中步骤S113的描述。Optionally, if the smdpSigned3={TransactionID, RPM Command, PPR Unset, ICCID, locationFlag}, the LPA also obtains the current or historical location information of the terminal. For details, refer to the description of step S113 in the embodiment corresponding to FIG. 3 .
步骤S511:eUICC验证CERT.DPrpm.ECDSA合法且与CERT.DPauth.ECDSA属于同一SM-DP+,验证TransactionID匹配当前的RSP会话。Step S511: The eUICC verifies that CERT.DPrpm.ECDSA is legal and belongs to the same SM-DP+ as CERT.DPauth.ECDSA, and verifies that the TransactionID matches the current RSP session.
步骤S512:eUICC对smdpSignature3进行验证。Step S512: The eUICC verifies the smdpSignature3.
具体地,步骤S510~S512的具体实现方式与图3对应的实施例中步骤S113~S115一致,不再赘述。Specifically, the specific implementation manners of the steps S510 to S512 are the same as the steps S113 to S115 in the embodiment corresponding to FIG. 3, and details are not described herein again.
步骤S513:eUICC根据PPR Unset清除PPR设置。Step S513: The eUICC clears the PPR setting according to the PPR Unset.
具体地,eUICC从smdpSigned3中提取得到PPR Unset和ICCID,根据ICCID确定要删除的目标Profile,根据PPR Unset清除目标Profile中的PPR设置。Specifically, the eUICC extracts the PPR Unset and the ICCID from the smdpSigned3, determines the target profile to be deleted according to the ICCID, and clears the PPR setting in the target profile according to the PPR Unset.
进一步地,eUICC还可以清除Profile Policy Enabler中目标Profile的PPR信息。Further, the eUICC can also clear the PPR information of the target profile in the Profile Policy Enabler.
步骤S514:eUICC删除ICCID对应的目标Profile。Step S514: The eUICC deletes the target profile corresponding to the ICCID.
具体地,eUICC根据ICCID确定目标Profile,对目标Profile执行删除操作。Specifically, the eUICC determines the target profile according to the ICCID, and performs a delete operation on the target profile.
在本发明实施例中,用户在终端丢失后可通过Operator BSS向SM-DP+发送RPMOrder,SM-DP+生成pending RPM order,然后将RPMOrder中携带的RPM Command、ICCID、PPR Unset携带在eUICC配置文件删除请求中发送给LPA,LPA向eUICC发送LoadRPMCommand,LoadRPMCommand中携带RPM Command、ICCID以及PPR Unset,eUICC根据ICCID确定要删除的目标Profile,根据PPR Unset删除目标Profile的PPR设置,从而删除Profile,一方面可在在终端丢失的情况下能及时删除Profile,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险,另一方面用户在将终端找回的情况下还可以重新进行Profile下载。 In the embodiment of the present invention, after the terminal is lost, the user can send the RPMorder to the SM-DP+ through the Operator BSS, and the SM-DP+ generates the pending RPM order, and then the RPM Command, the ICCID, and the PPR Unset carried in the RPMOrder are deleted in the eUICC configuration file. The request is sent to the LPA, and the LPA sends a LoadRPMCommand to the eUICC. The LoadRPMCommand carries the RPM Command, the ICCID, and the PPR Unset. The eUICC determines the target profile to be deleted according to the ICCID, and deletes the PPR setting of the target profile according to the PPR Unset, thereby deleting the profile. In the case that the terminal is lost, the profile can be deleted in time, and the risk of asset loss associated with the eUICC data or information leakage associated with the eUICC data after the terminal is lost is reduced, and on the other hand, the user retrieves the terminal. You can also re-download the profile.
上述详细阐述了本发明实施例的方法,下面提供了本发明实施例的装置。The above describes the method of the embodiment of the present invention in detail, and the apparatus of the embodiment of the present invention is provided below.
请参见图9,图9是本发明实施例提供的一种本地eUICC配置文件辅助模块的结构示意图,该本地eUICC配置文件辅助模块可以包括删除请求接收单元610、验证单元620以及删除指令发送单元630,其中,各个单元的详细描述如下:Referring to FIG. 9, FIG. 9 is a schematic structural diagram of a local eUICC configuration file auxiliary module according to an embodiment of the present invention. The local eUICC configuration file auxiliary module may include a deletion request receiving unit 610, a verification unit 620, and a deletion instruction sending unit 630. , wherein the detailed description of each unit is as follows:
删除请求接收单元610,用于接收eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;a deletion request receiving unit 610, configured to receive an eUICC configuration file deletion request, where the eUICC configuration file deletion request carries authentication confirmation information;
验证单元620,用于对所述鉴权确认信息进行验证;The verification unit 620 is configured to verify the authentication confirmation information.
删除指令发送单元630,用于在对所述鉴权确认信息的验证通过的情况下,向终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。The deletion instruction sending unit 630 is configured to send, to the eUICC of the terminal, an instruction to delete the eUICC configuration file, where the instruction to delete the eUICC configuration file is used to indicate the eUICC deletion, if the verification of the authentication confirmation information is passed. eUICC configuration file.
具体地,所述删除请求接收单元610具体用于接收eUICC远程管理服务器发送的eUICC配置文件删除请求;或通过应用程序接口接收eUICC配置文件删除请求。Specifically, the deletion request receiving unit 610 is specifically configured to receive an eUICC configuration file deletion request sent by the eUICC remote management server; or receive an eUICC configuration file deletion request through an application program interface.
可选地,所述所述本地eUICC配置文件辅助模块还包括:Optionally, the local eUICC profile auxiliary module further includes:
指示接收单元640,用于接收所述eUICC发送的连接eUICC远程管理服务器的指示,所述指示中携带所述eUICC远程管理服务器的地址。The indication receiving unit 640 is configured to receive an indication sent by the eUICC to connect to the eUICC remote management server, where the indication carries an address of the eUICC remote management server.
可选地,所述eUICC配置文件删除请求还携带位置获取指示;所述本地eUICC配置文件辅助模块还包括:Optionally, the eUICC configuration file deletion request further carries a location acquisition indication; the local eUICC configuration file auxiliary module further includes:
删除成功接收单元650,用于接收所述eUICC返回的删除成功指示;Deleting a successful receiving unit 650, configured to receive a deletion success indication returned by the eUICC;
位置信息返回单元660,用于根据所述位置获取指示向所述eUICC远程管理服务器返回所述删除成功指示和所述终端的位置信息。The location information returning unit 660 is configured to return the deletion success indication and the location information of the terminal to the eUICC remote management server according to the location acquisition indication.
具体地,所述鉴权确认信息包括:鉴权确认个人码的消息摘要;或第一数据的消息摘要,其中,所述第一数据包括所述鉴权确认个人码和eUICC配置文件信息;或第二数据的消息摘要,其中,所述第二数据包括所述eUICC配置文件信息和部分的所述鉴权确认个人码。Specifically, the authentication confirmation information includes: a message digest of the authentication confirmation personal code; or a message digest of the first data, where the first data includes the authentication confirmation personal code and eUICC configuration file information; or a message digest of the second data, wherein the second data includes the eUICC profile information and a portion of the authentication confirmation personal code.
具体地,所述删除eUICC配置文件的指令包括eUICC存储复位指令;所述eUICC存储复位指令用于指示所述eUICC删除全部运营eUICC配置文件。Specifically, the instruction to delete the eUICC configuration file includes an eUICC storage reset instruction, and the eUICC storage reset instruction is used to instruct the eUICC to delete all the operating eUICC configuration files.
具体地,所述删除eUICC配置文件的指令携带eUICC锁定指示;所述eUICC锁定指示用于指示所述eUICC进入锁定状态。Specifically, the instruction to delete the eUICC configuration file carries an eUICC lock indication; the eUICC lock indication is used to indicate that the eUICC enters a locked state.
可选地,所述本地eUICC配置文件辅助模块还包括:Optionally, the local eUICC configuration file auxiliary module further includes:
解锁请求接收单元670,用于接收用户的eUICC解锁请求和鉴权确认输入信息;The unlock request receiving unit 670 is configured to receive an eUICC unlock request and an authentication confirmation input information of the user;
解锁指令发送单元680,用于在对所述鉴权确认输入信息的验证通过的情况下,向所述eUICC发送eUICC解锁指令,所述eUICC解锁指令用于指示所述eUICC进入正常状态。The unlocking instruction sending unit 680 is configured to send an eUICC unlocking instruction to the eUICC, where the verification of the authentication confirmation input information is passed, where the eUICC unlocking instruction is used to indicate that the eUICC enters a normal state.
可选地,所述本地eUICC配置文件辅助模块还包括:Optionally, the local eUICC configuration file auxiliary module further includes:
拒绝状态进入单元690,用于在本地鉴权确认个人识别码不存在且接收到所述eUICC发送的eUICC锁定指示的情况下,进入不可接收eUICC配置文件下载请求状态。The reject status entry unit 690 is configured to enter the unreceivable eUICC profile download request status if the local authentication confirms that the personal identification code does not exist and receives the eUICC lock indication sent by the eUICC.
需要说明的是,各个单元的实现还可以对应参照图3、图5、图6、图7或图8所示 的方法实施例的相应描述。It should be noted that the implementation of each unit may also be referred to FIG. 3, FIG. 5, FIG. 6, FIG. 7, or FIG. Corresponding description of the method embodiment.
在图9所描述的本地eUICC配置文件辅助模块中,本地eUICC配置文件辅助模块接收eUICC配置文件删除请求并对eUICC配置文件删除请求中携带的鉴权确认信息进行验证,在验证通过的情况下向eUICC发送删除eUICC配置文件的指令,指示eUICC删除eUICC配置文件,本地eUICC配置文件辅助模块可在终端丢失后执行上述操作,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险。In the local eUICC configuration file auxiliary module described in FIG. 9, the local eUICC configuration file auxiliary module receives the eUICC configuration file deletion request and verifies the authentication confirmation information carried in the eUICC configuration file deletion request, and if the verification is passed, The eUICC sends an instruction to delete the eUICC configuration file, instructing the eUICC to delete the eUICC configuration file, and the local eUICC configuration file auxiliary module may perform the foregoing operations after the terminal is lost, and reduce the asset loss associated with the eUICC data after the terminal is lost or related to the eUICC data. The risk of information disclosure.
请参见图10,图10是本发明实施例提供的一种终端70,该终端70包括处理器701、存储器702和收发器703,所述处理器701、存储器702和收发器703通过总线相互连接。Referring to FIG. 10, FIG. 10 is a terminal 70. The terminal 70 includes a processor 701, a memory 702, and a transceiver 703. The processor 701, the memory 702, and the transceiver 703 are connected to each other through a bus. .
存储器702包括但不限于是随机存储记忆体(英文:Random Access Memory,简称:RAM)、只读存储器(英文:Read-Only Memory,简称:ROM)、可擦除可编程只读存储器(英文:Erasable Programmable Read Only Memory,简称:EPROM)、或便携式只读存储器(英文:Compact Disc Read-Only Memory,简称:CD-ROM),该存储器702用于相关指令及数据。收发器703用于接收和发送数据。The memory 702 includes, but is not limited to, a random access memory (English: Random Access Memory, RAM for short), a read-only memory (English: Read-Only Memory, abbreviated as: ROM), and an erasable programmable read-only memory (English: Erasable Programmable Read Only Memory (EPROM), or Portable Read-Only Memory (CD-ROM), which is used for related commands and data. The transceiver 703 is configured to receive and transmit data.
处理器701可以是一个或多个中央处理器(英文:Central Processing Unit,简称:CPU),在处理器701是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。The processor 701 may be one or more central processing units (English: Central Processing Unit, CPU for short). In the case that the processor 701 is a CPU, the CPU may be a single core CPU or a multi-core CPU.
该终端70中的处理器701用于读取所述存储器702中存储的程序代码,执行以下操作:The processor 701 in the terminal 70 is configured to read the program code stored in the memory 702, and perform the following operations:
接收eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;Receiving an eUICC configuration file deletion request, where the eUICC configuration file deletion request carries authentication confirmation information;
对所述鉴权确认信息进行验证;Verifying the authentication confirmation information;
在对所述鉴权确认信息的验证通过的情况下,向终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。When the verification of the authentication confirmation information is passed, the instruction to delete the eUICC configuration file is sent to the eUICC of the terminal, where the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
需要说明的是,各个操作的实现还可以对应参照图3、图5、图6、图7或图8所示的方法实施例的相应描述。It should be noted that the implementation of each operation may also correspond to the corresponding description of the method embodiment shown in FIG. 3, FIG. 5, FIG. 6, FIG. 7, or FIG.
在图10所描述的终端70中,终端可在丢失后执行上述操作,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险。In the terminal 70 depicted in FIG. 10, the terminal may perform the above operations after the loss, reducing the risk of asset loss associated with the eUICC data or information leakage associated with the eUICC data after the terminal is lost.
请参见图11,图11是本发明实施例提供的一种eUICC的结构示意图,该eUICC可以包括删除指令接收单元810及删除单元820,其中,各个单元的详细描述如下:FIG. 11 is a schematic structural diagram of an eUICC according to an embodiment of the present invention. The eUICC may include a deletion instruction receiving unit 810 and a deleting unit 820. The detailed description of each unit is as follows:
删除指令接收单元810,用于接收终端的本地eUICC配置文件辅助模块发送的删除eUICC配置文件的指令;The deletion instruction receiving unit 810 is configured to receive an instruction for deleting the eUICC configuration file sent by the local eUICC configuration file auxiliary module of the terminal;
删除单元820,用于根据所述删除eUICC配置文件的指令删除eUICC配置文件。The deleting unit 820 is configured to delete the eUICC configuration file according to the instruction to delete the eUICC configuration file.
可选地,所述eUICC还包括:Optionally, the eUICC further includes:
推送命令接收单元830,用于接收eUICC远程管理服务器发送的推送命令;The push command receiving unit 830 is configured to receive a push command sent by the eUICC remote management server;
指示发送单元840,用于根据所述推送命令向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示,所述指示中携带所述eUICC远程管理服务器的地址。The indication sending unit 840 is configured to send an indication of connecting the eUICC remote management server to the local eUICC profile auxiliary module according to the push command, where the indication carries an address of the eUICC remote management server.
具体地,所述推送命令接收单元830具体用于接收安全分组,其中,所述安全分组 中携带所述eUICC远程管理服务器发送的推送命令以及根发行者安全域信息;所述指示发送单元包括根发行者安全域,用于根据所述推送命令向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示。Specifically, the push command receiving unit 830 is specifically configured to receive a security packet, where the security packet is Carrying a push command sent by the eUICC remote management server and root issuer security domain information; the indication sending unit includes a root issuer security domain, configured to send a connection to the local eUICC profile auxiliary module according to the push command The eUICC remote management server instructions.
可选地,所述eUICC还包括:Optionally, the eUICC further includes:
删除成功发送单元850,用于向所述本地eUICC配置文件辅助模块发送删除成功指示。The deletion success sending unit 850 is configured to send a deletion success indication to the local eUICC profile auxiliary module.
具体地,所述删除eUICC配置文件的指令包括eUICC存储复位指令;所述删除单元820具体用于根据所述eUICC存储复位指令删除全部运营eUICC配置文件。Specifically, the instruction to delete the eUICC configuration file includes an eUICC storage reset instruction, and the deleting unit 820 is specifically configured to delete all the operating eUICC configuration files according to the eUICC storage reset instruction.
可选地,所述eUICC还包括:Optionally, the eUICC further includes:
解锁指令接收单元860,用于接收所述本地eUICC配置文件辅助模块发送的eUICC解锁指令,所述eUICC解锁指令由所述本地eUICC配置文件辅助模块在对用户的鉴权确认输入信息的验证通过的情况下发送;The unlocking instruction receiving unit 860 is configured to receive an eUICC unlocking instruction sent by the local eUICC configuration file auxiliary module, where the eUICC unlocking instruction is verified by the local eUICC configuration file auxiliary module in verifying the authentication input information of the user. Send in case;
正常状态进入单元870,用于根据所述eUICC解锁指令进入正常状态。The normal state entering unit 870 is configured to enter a normal state according to the eUICC unlocking instruction.
可选地,所述eUICC还包括:Optionally, the eUICC further includes:
锁定指示发送单元880,用于向所述本地eUICC配置文件辅助模块发送eUICC锁定指示,所述eUICC锁定指示用于指示所述本地eUICC配置文件辅助模块在本地鉴权确认个人识别码不存在的情况下,进入不可接收Profile下载请求状态。The lock indication sending unit 880 is configured to send an eUICC lock indication to the local eUICC profile auxiliary module, where the eUICC lock indication is used to indicate that the local eUICC profile auxiliary module confirms that the personal identifier does not exist in the local authentication Next, enter the unreceivable profile download request status.
需要说明的是,各个单元的实现还可以对应参照图3、图5、图6、图7或图8所示的方法实施例的相应描述。It should be noted that the implementation of each unit may also correspond to the corresponding description of the method embodiment shown in FIG. 3, FIG. 5, FIG. 6, FIG. 7, or FIG.
在图11所描述的本地eUICC配置文件辅助模块中,eUICC可在终端丢失后删除eUICC配置文件,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险。In the local eUICC profile auxiliary module described in FIG. 11, the eUICC may delete the eUICC configuration file after the terminal is lost, and reduce the risk of asset loss associated with the eUICC data or information leakage associated with the eUICC data after the terminal is lost. .
请参见图12,图12是本发明实施例提供的一种eUICC 90,该eUICC 90包括处理器901、存储器902和通信接口903,所述处理器901、存储器902和通信接口903相互连接。Referring to FIG. 12, FIG. 12 is an eUICC 90 according to an embodiment of the present invention. The eUICC 90 includes a processor 901, a memory 902, and a communication interface 903. The processor 901, the memory 902, and the communication interface 903 are connected to each other.
存储器902包括但不限于是随机存储记忆体(英文:Random Access Memory,简称:RAM)、只读存储器(英文:Read-Only Memory,简称:ROM)、可擦除可编程只读存储器(英文:Erasable Programmable Read Only Memory,简称:EPROM)、或便携式只读存储器(英文:Compact Disc Read-Only Memory,简称:CD-ROM),该存储器902用于存储相关指令及数据。通信接口903用于接收和发送数据。The memory 902 includes, but is not limited to, a random access memory (English: Random Access Memory, RAM for short), a read-only memory (English: Read-Only Memory, ROM for short), and an erasable programmable read-only memory (English: Erasable Programmable Read Only Memory (EPROM) or Portable Read-Only Memory (CD-ROM) is used to store related commands and data. Communication interface 903 is used to receive and transmit data.
处理器901可以是一个或多个中央处理器(英文:Central Processing Unit,简称:CPU),在处理器901是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。The processor 901 may be one or more central processing units (English: Central Processing Unit, CPU for short). In the case that the processor 901 is a CPU, the CPU may be a single core CPU or a multi-core CPU.
该eUICC 90中的处理器901用于读取所述存储器902中存储的程序代码,执行以下操作:The processor 901 in the eUICC 90 is configured to read the program code stored in the memory 902, and perform the following operations:
接收本地eUICC配置文件辅助模块发送的用户意图验证指令,其中,所述用户意图验证指令中携带用户意图配置信息,所述用户意图配置信息为所述本地eUICC配置文件辅助模块从与eUICC远程管理服务器的eUICC管理会话获取; Receiving a user intent verification instruction sent by the local eUICC configuration file auxiliary module, where the user intent verification instruction carries user intent configuration information, where the local intent configuration information is the local eUICC configuration file auxiliary module from the eUICC remote management server The eUICC management session is obtained;
接收终端的本地eUICC配置文件辅助模块发送的删除eUICC配置文件的指令;Receiving, by the local eUICC configuration file auxiliary module of the terminal, an instruction to delete the eUICC configuration file;
根据所述删除eUICC配置文件的指令删除eUICC配置文件。The eUICC configuration file is deleted according to the instruction to delete the eUICC configuration file.
需要说明的是,各个操作的实现还可以对应参照图3、图5、图6、图7或图8所示的方法实施例的相应描述。It should be noted that the implementation of each operation may also correspond to the corresponding description of the method embodiment shown in FIG. 3, FIG. 5, FIG. 6, FIG. 7, or FIG.
在图12所描述的eUICC中,eUICC可在终端丢失后执行上述操作,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险。In the eUICC described in FIG. 12, the eUICC may perform the above operations after the terminal is lost, reducing the risk of asset loss associated with the eUICC data or information leakage associated with the eUICC data after the terminal is lost.
请参见图13,图13是本发明实施例提供的一种eUICC远程管理服务器的结构示意图,该eUICC远程管理服务器可以包括删除请求发送单元1010,其中,删除请求发送单元的详细描述如下:Referring to FIG. 13, FIG. 13 is a schematic structural diagram of an eUICC remote management server according to an embodiment of the present invention. The eUICC remote management server may include a deletion request sending unit 1010, where a detailed description of the deletion request sending unit is as follows:
删除请求发送单元1010,用于向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;The deletion request sending unit 1010 is configured to send an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal, where the eUICC configuration file deletion request carries the authentication confirmation information;
所述鉴权确认信息被所述本地eUICC配置文件辅助模块用于进行验证,并在对所述鉴权确认信息的验证通过的情况下,向所述终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。The authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and if the verification of the authentication confirmation information is passed, sending an instruction to delete the eUICC configuration file to the eUICC of the terminal, The instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
具体地,所述鉴权确认信息包括:鉴权确认个人码;或所述鉴权确认个人码的消息摘要;或第一数据的消息摘要,其中,所述第一数据包括所述鉴权确认个人码和eUICC配置文件信息;或第二数据的消息摘要,其中,所述第二数据包括部分的所述鉴权确认个人码和所述eUICC配置文件信息。Specifically, the authentication confirmation information includes: an authentication confirmation personal code; or a message digest of the authentication confirmation personal code; or a message digest of the first data, where the first data includes the authentication confirmation a personal code and eUICC profile information; or a message digest of the second data, wherein the second data includes a portion of the authentication confirmation personal code and the eUICC profile information.
可选地,所述eUICC配置文件删除请求还携带位置获取指示;所述eUICC远程管理服务器还包括:Optionally, the eUICC configuration file deletion request further carries a location acquisition indication; the eUICC remote management server further includes:
位置信息接收单元1020,用于接收所述本地eUICC配置文件辅助模块返回的删除成功指示和所述终端的位置信息。The location information receiving unit 1020 is configured to receive a deletion success indication returned by the local eUICC profile auxiliary module and location information of the terminal.
具体地,所述eUICC远程管理服务器还包括:位置信息接收单元,用于接收所述本地eUICC配置文件辅助模块返回的所述终端的位置信息。Specifically, the eUICC remote management server further includes: a location information receiving unit, configured to receive location information of the terminal returned by the local eUICC profile auxiliary module.
需要说明的是,各个单元的实现还可以对应参照图3或图8所示的方法实施例的相应描述。It should be noted that the implementation of each unit may also correspond to the corresponding description of the method embodiment shown in FIG. 3 or FIG. 8.
在图13所描述的eUICC远程管理服务器中,eUICC远程管理服务器在终端丢失的情况下向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求以使终端能及时删除eUICC配置文件,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险。In the eUICC remote management server described in FIG. 13, the eUICC remote management server sends an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal in case the terminal is lost, so that the terminal can delete the eUICC configuration file in time, thereby reducing the terminal loss. The risk of missing assets associated with eUICC's data or information disclosure associated with eUICC's data.
请参见图14,图14是本发明实施例提供的一种eUICC远程管理服务器110,该eUICC远程管理服务器110包括处理器1101、存储器1102和收发器1103,所述处理器1101、存储器1102和收发器1103通过总线相互连接。Referring to FIG. 14, FIG. 14 is an eUICC remote management server 110 according to an embodiment of the present invention. The eUICC remote management server 110 includes a processor 1101, a memory 1102, and a transceiver 1103. The processor 1101, the memory 1102, and the transceiver 1102 The units 1103 are connected to each other through a bus.
存储器1102包括但不限于是随机存储记忆体(英文:Random Access Memory,简称:RAM)、只读存储器(英文:Read-Only Memory,简称:ROM)、可擦除可编程只读存储器(英文:Erasable Programmable Read Only Memory,简称:EPROM)、或便携式只读存 储器(英文:Compact Disc Read-Only Memory,简称:CD-ROM),该存储器1102用于相关指令及数据。收发器1103用于接收和发送数据。The memory 1102 includes, but is not limited to, a random access memory (English: Random Access Memory, RAM for short), a read-only memory (English: Read-Only Memory, ROM for short), and an erasable programmable read-only memory (English: Erasable Programmable Read Only Memory (EPROM), or portable read-only memory The memory (English: Compact Disc Read-Only Memory, CD-ROM for short) is used for the related instructions and data. The transceiver 1103 is for receiving and transmitting data.
处理器1101可以是一个或多个中央处理器(英文:Central Processing Unit,简称:CPU),在处理器1101是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。The processor 1101 may be one or more central processing units (English: Central Processing Unit, CPU for short). In the case where the processor 1101 is a CPU, the CPU may be a single core CPU or a multi-core CPU.
该eUICC远程管理服务器110的处理器1101用于读取所述存储器1102中存储的程序代码,执行以下操作:The processor 1101 of the eUICC remote management server 110 is configured to read the program code stored in the memory 1102, and perform the following operations:
向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;Sending an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal, where the eUICC configuration file deletion request carries the authentication confirmation information;
所述鉴权确认信息被所述本地eUICC配置文件辅助模块用于进行验证,并在对所述鉴权确认信息的验证通过的情况下,向所述终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。The authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and if the verification of the authentication confirmation information is passed, sending an instruction to delete the eUICC configuration file to the eUICC of the terminal, The instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
需要说明的是,各个操作的实现还可以对应参照图3或图8所示的方法实施例的相应描述。It should be noted that the implementation of each operation may also correspond to the corresponding description of the method embodiment shown in FIG. 3 or FIG. 8.
在图14所描述的eUICC远程管理服务器110中,eUICC远程管理服务器在终端丢失的情况下向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求以使终端能及时删除eUICC配置文件,降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险。In the eUICC remote management server 110 described in FIG. 14, the eUICC remote management server sends an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal in case the terminal is lost, so that the terminal can delete the eUICC configuration file in time, and lower the terminal. The risk of loss of assets associated with eUICC's data or information disclosure associated with eUICC's data after loss.
综上所述,通过实施本发明实施例,可降低终端丢失后与eUICC的数据相关联的资产丢失或与eUICC的数据相关联的信息泄露的风险。In summary, by implementing the embodiments of the present invention, the risk of asset loss associated with the data of the eUICC or information leakage associated with the data of the eUICC after the terminal is lost can be reduced.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,该流程可以由计算机程序来指令相关的硬件完成,该程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。而前述的存储介质包括:ROM或随机存储记忆体RAM、磁碟或者光盘等各种可存储程序代码的介质。 One of ordinary skill in the art can understand all or part of the process of implementing the above embodiments, which can be completed by a computer program to instruct related hardware, the program can be stored in a computer readable storage medium, when the program is executed The flow of the method embodiments as described above may be included. The foregoing storage medium includes various media that can store program codes, such as a ROM or a random access memory RAM, a magnetic disk, or an optical disk.

Claims (27)

  1. 一种eUICC配置文件的删除方法,其特征在于,包括:A method for deleting an eUICC configuration file, comprising:
    接收eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;Receiving an eUICC configuration file deletion request, where the eUICC configuration file deletion request carries authentication confirmation information;
    对所述鉴权确认信息进行验证;Verifying the authentication confirmation information;
    在对所述鉴权确认信息的验证通过的情况下,向终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。When the verification of the authentication confirmation information is passed, the instruction to delete the eUICC configuration file is sent to the eUICC of the terminal, where the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  2. 如权利要求1所述的方法,其特征在于,所述接收eUICC配置文件删除请求包括:The method of claim 1, wherein the receiving an eUICC profile delete request comprises:
    接收eUICC远程管理服务器发送的eUICC配置文件删除请求;或Receiving an eUICC profile deletion request sent by the eUICC remote management server; or
    通过应用程序接口接收eUICC配置文件删除请求。The eUICC configuration file deletion request is received through the application interface.
  3. 如权利要求2所述的方法,其特征在于,所述接收eUICC远程管理服务器发送的eUICC配置文件删除请求之前还包括:The method of claim 2, wherein the receiving the eUICC configuration file deletion request sent by the eUICC remote management server further comprises:
    接收所述eUICC发送的连接eUICC远程管理服务器的指示,所述指示中携带所述eUICC远程管理服务器的地址。Receiving an indication sent by the eUICC to connect to the eUICC remote management server, where the indication carries an address of the eUICC remote management server.
  4. 如权利要求2所述的方法,其特征在于,所述接收eUICC远程管理服务器发送的eUICC配置文件删除请求包括:The method of claim 2, wherein the receiving an eUICC configuration file deletion request sent by the eUICC remote management server comprises:
    接收eUICC远程管理服务器发送的eUICC配置文件删除请求,所述eUICC配置文件删除请求还携带位置获取指示;Receiving an eUICC configuration file deletion request sent by the eUICC remote management server, where the eUICC configuration file deletion request further carries a location acquisition indication;
    所述向终端的eUICC发送删除eUICC配置文件的指令之后还包括:After the sending, by the eUICC of the terminal, the instruction to delete the eUICC configuration file, the method further includes:
    接收所述eUICC返回的删除成功指示;Receiving a deletion success indication returned by the eUICC;
    根据所述位置获取指示向所述eUICC远程管理服务器返回所述删除成功指示和所述终端的位置信息。Returning the deletion success indication and the location information of the terminal to the eUICC remote management server according to the location acquisition indication.
  5. 如权利要求1-4任一项所述的方法,其特征在于,所述鉴权确认信息包括:The method according to any one of claims 1 to 4, wherein the authentication confirmation information comprises:
    鉴权确认个人码;或Authentication confirmation personal code; or
    所述鉴权确认个人码的消息摘要;或The authentication confirms the message digest of the personal code; or
    第一数据的消息摘要,其中,所述第一数据包括所述鉴权确认个人码和eUICC配置文件信息;或a message digest of the first data, wherein the first data includes the authentication confirmation personal code and eUICC profile information; or
    第二数据的消息摘要,其中,所述第二数据包括所述eUICC配置文件信息和部分的所述鉴权确认个人码。a message digest of the second data, wherein the second data includes the eUICC profile information and a portion of the authentication confirmation personal code.
  6. 如权利要求1-5任一项所述的方法,其特征在于,所述删除eUICC配置文件的指令包括eUICC存储复位指令;The method according to any one of claims 1 to 5, wherein the instruction to delete an eUICC configuration file comprises an eUICC storing a reset instruction;
    所述eUICC存储复位指令用于指示所述eUICC删除全部运营eUICC配置文件。 The eUICC storage reset instruction is used to instruct the eUICC to delete all operating eUICC configuration files.
  7. 如权利要求1-6任一项所述的方法,其特征在于,所述删除eUICC配置文件的指令携带eUICC锁定指示;The method according to any one of claims 1-6, wherein the instruction to delete an eUICC configuration file carries an eUICC lock indication;
    所述eUICC锁定指示用于指示所述eUICC进入锁定状态。The eUICC lock indication is used to indicate that the eUICC enters a locked state.
  8. 如权利要求7所述的方法,其特征在于,所述向终端的eUICC发送删除eUICC配置文件的指令之后还包括:The method of claim 7, wherein the sending, after the sending of the eUICC configuration file to the eUICC of the terminal, the method further comprises:
    接收用户的eUICC解锁请求和鉴权确认输入信息;Receiving an eUICC unlock request and an authentication confirmation input information of the user;
    在对所述鉴权确认输入信息的验证通过的情况下,向所述eUICC发送eUICC解锁指令,所述eUICC解锁指令用于指示所述eUICC进入正常状态。And sending, by the eUICC, an eUICC unlocking instruction, where the eUICC unlocking instruction is used to indicate that the eUICC enters a normal state, when the verification of the authentication confirmation input information is passed.
  9. 如权利要求7所述的方法,其特征在于,所述向终端的eUICC发送删除eUICC配置文件的指令之后还包括:The method of claim 7, wherein the sending, after the sending of the eUICC configuration file to the eUICC of the terminal, the method further comprises:
    在本地鉴权确认个人识别码不存在且接收到所述eUICC发送的eUICC锁定指示的情况下,进入不可接收eUICC配置文件下载请求状态。In the case where the local authentication confirms that the personal identification code does not exist and receives the eUICC lock indication sent by the eUICC, the unreceived eUICC profile download request state is entered.
  10. 一种eUICC配置文件的删除方法,其特征在于,包括:A method for deleting an eUICC configuration file, comprising:
    接收终端的本地eUICC配置文件辅助模块发送的删除eUICC配置文件的指令;Receiving, by the local eUICC configuration file auxiliary module of the terminal, an instruction to delete the eUICC configuration file;
    根据所述删除eUICC配置文件的指令删除eUICC配置文件。The eUICC configuration file is deleted according to the instruction to delete the eUICC configuration file.
  11. 如权利要求10所述的方法,其特征在于,所述接收终端的本地eUICC配置文件辅助模块发送的删除eUICC配置文件的指令之前还包括:The method of claim 10, wherein the instruction to delete the eUICC configuration file sent by the local eUICC profile auxiliary module of the receiving terminal further includes:
    接收eUICC远程管理服务器发送的推送命令;Receiving a push command sent by the eUICC remote management server;
    根据所述推送命令向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示,所述指示中携带所述eUICC远程管理服务器的地址。And sending, by the local eUICC configuration file auxiliary module, an indication of connecting to the eUICC remote management server, where the indication carries an address of the eUICC remote management server.
  12. 如权利要求11所述的方法,其特征在于,所述接收eUICC远程管理服务器发送的推送命令包括:The method of claim 11, wherein the receiving the push command sent by the eUICC remote management server comprises:
    接收安全分组,其中,所述安全分组中携带根发行者安全域信息以及所述eUICC远程管理服务器发送的推送命令;Receiving a security packet, wherein the security packet carries root issuer security domain information and a push command sent by the eUICC remote management server;
    所述根据所述推送命令向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示包括:And the sending, by the local eUICC configuration file auxiliary module, the indication for connecting the eUICC remote management server according to the pushing command includes:
    根发行者安全域根据所述推送命令向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示。The root issuer security domain sends an indication to the local eUICC profile support module to connect to the eUICC remote management server according to the push command.
  13. 如权利要求10所述的方法,其特征在于,所述根据所述删除eUICC配置文件的指令删除eUICC配置文件之后还包括:The method of claim 10, further comprising: deleting the eUICC configuration file according to the instruction to delete the eUICC configuration file, further comprising:
    向所述本地eUICC配置文件辅助模块发送删除成功指示。 Sending a delete success indication to the local eUICC profile auxiliary module.
  14. 如权利要求10-13任一项所述的方法,其特征在于,所述删除eUICC配置文件的指令包括eUICC存储复位指令;The method according to any one of claims 10 to 13, wherein the instruction to delete the eUICC configuration file comprises an eUICC storing a reset instruction;
    所述根据所述删除eUICC配置文件的指令删除eUICC配置文件包括:The deleting the eUICC configuration file according to the instruction to delete the eUICC configuration file includes:
    根据所述eUICC存储复位指令删除全部运营eUICC配置文件。All operating eUICC configuration files are deleted according to the eUICC storage reset instruction.
  15. 如权利要求10-14任一项所述的方法,其特征在于,所述删除eUICC配置文件的指令携带eUICC锁定指示;The method according to any one of claims 10 to 14, wherein the instruction to delete the eUICC configuration file carries an eUICC lock indication;
    所述方法还包括:The method further includes:
    根据所述eUICC锁定指示进入锁定状态。The locked state is entered according to the eUICC lock indication.
  16. 如权利要求15所述的方法,其特征在于,所述根据所述eUICC锁定指示进入锁定状态之后还包括:The method according to claim 15, wherein the entering the locked state according to the eUICC lock indication further comprises:
    接收所述本地eUICC配置文件辅助模块发送的eUICC解锁指令,所述eUICC解锁指令由所述本地eUICC配置文件辅助模块在对用户的鉴权确认输入信息的验证通过的情况下发送;And receiving an eUICC unlocking instruction sent by the local eUICC configuration file auxiliary module, where the eUICC unlocking instruction is sent by the local eUICC configuration file auxiliary module after the verification of the user's authentication confirmation input information is passed;
    根据所述eUICC解锁指令进入正常状态。The normal state is entered according to the eUICC unlocking instruction.
  17. 如权利要求15所述的方法,其特征在于,所述根据所述eUICC锁定指示进入锁定状态之后还包括:The method according to claim 15, wherein the entering the locked state according to the eUICC lock indication further comprises:
    向所述本地eUICC配置文件辅助模块发送eUICC锁定指示,所述eUICC锁定指示用于指示所述本地eUICC配置文件辅助模块在本地鉴权确认个人识别码不存在的情况下,进入不可接收Profile下载请求状态。Sending an eUICC lock indication to the local eUICC profile auxiliary module, where the eUICC lock indication is used to indicate that the local eUICC profile auxiliary module enters an unreceivable profile download request if the local authentication confirmation personal identifier does not exist status.
  18. 一种eUICC配置文件的删除方法,其特征在于,包括:A method for deleting an eUICC configuration file, comprising:
    向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;Sending an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal, where the eUICC configuration file deletion request carries the authentication confirmation information;
    所述鉴权确认信息被所述本地eUICC配置文件辅助模块用于进行验证,并在对所述鉴权确认信息的验证通过的情况下,向所述终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。The authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and if the verification of the authentication confirmation information is passed, sending an instruction to delete the eUICC configuration file to the eUICC of the terminal, The instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  19. 如权利要求18所述的方法,其特征在于,所述向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求之前还包括:The method of claim 18, wherein before the sending, by the local eUICC profile auxiliary module of the terminal, the eUICC profile deletion request, the method further comprises:
    向所述eUICC发送推送命令,所述推送命令用于指示所述eUICC向所述本地eUICC配置文件辅助模块发送连接eUICC远程管理服务器的指示,所述指示中携带所述eUICC远程管理服务器的地址。Sending a push command to the eUICC, the push command is used to instruct the eUICC to send an indication to the local eUICC profile auxiliary module to connect to the eUICC remote management server, where the indication carries the address of the eUICC remote management server.
  20. 如权利要求18或19所述的方法,其特征在于,所述eUICC配置文件删除请求 还携带位置获取指示;Method according to claim 18 or 19, wherein said eUICC profile delete request Also carrying a location acquisition indication;
    所述方法还包括:The method further includes:
    接收所述本地eUICC配置文件辅助模块返回的删除成功指示和所述终端的位置信息。And receiving a deletion success indication returned by the local eUICC configuration file auxiliary module and location information of the terminal.
  21. 如权利要求18-20任一项所述的方法,其特征在于,所述鉴权确认信息包括:The method according to any one of claims 18 to 20, wherein the authentication confirmation information comprises:
    鉴权确认个人码;或Authentication confirmation personal code; or
    所述鉴权确认个人码的消息摘要;或The authentication confirms the message digest of the personal code; or
    第一数据的消息摘要,其中,所述第一数据包括所述鉴权确认个人码和eUICC配置文件信息;或a message digest of the first data, wherein the first data includes the authentication confirmation personal code and eUICC profile information; or
    第二数据的消息摘要,其中,所述第二数据包括部分的所述鉴权确认个人码和所述eUICC配置文件信息。a message digest of the second data, wherein the second data includes a portion of the authentication confirmation personal code and the eUICC profile information.
  22. 一种本地eUICC配置文件辅助模块,其特征在于,包括:A local eUICC configuration file auxiliary module, comprising:
    删除请求接收单元,用于接收eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;a deletion request receiving unit, configured to receive an eUICC configuration file deletion request, where the eUICC configuration file deletion request carries authentication confirmation information;
    验证单元,用于对所述鉴权确认信息进行验证;a verification unit, configured to verify the authentication confirmation information;
    删除指令发送单元,用于在对所述鉴权确认信息的验证通过的情况下,向终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。a deletion instruction sending unit, configured to send an instruction to delete an eUICC configuration file to the eUICC of the terminal, where the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC, if the verification of the authentication confirmation information is passed Configuration file.
  23. 一种eUICC,其特征在于,包括:An eUICC, which is characterized by comprising:
    删除指令接收单元,用于接收终端的本地eUICC配置文件辅助模块发送的删除eUICC配置文件的指令;a deletion instruction receiving unit, configured to receive an instruction for deleting an eUICC configuration file sent by a local eUICC configuration file auxiliary module of the terminal;
    删除单元,用于根据所述删除eUICC配置文件的指令删除eUICC配置文件。And a deleting unit, configured to delete the eUICC configuration file according to the instruction to delete the eUICC configuration file.
  24. 一种eUICC远程管理服务器,其特征在于,包括:An eUICC remote management server, comprising:
    删除请求发送单元,用于向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;a deletion request sending unit, configured to send an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal, where the eUICC configuration file deletion request carries the authentication confirmation information;
    所述鉴权确认信息被所述本地eUICC配置文件辅助模块用于进行验证,并在对所述鉴权确认信息的验证通过的情况下,向所述终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。The authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and if the verification of the authentication confirmation information is passed, sending an instruction to delete the eUICC configuration file to the eUICC of the terminal, The instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  25. 一种终端,其特征在于,包括:处理器、存储器和收发器,所述处理器、存储器和收发器通过总线相互连接,其中,所述存储器用于存储程序代码,所述处理器用于调用所述程序代码,执行以下操作:A terminal, comprising: a processor, a memory and a transceiver, wherein the processor, the memory and the transceiver are connected to each other by a bus, wherein the memory is used to store program code, and the processor is used to call the The program code, do the following:
    接收eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;Receiving an eUICC configuration file deletion request, where the eUICC configuration file deletion request carries authentication confirmation information;
    对所述鉴权确认信息进行验证;Verifying the authentication confirmation information;
    在对所述鉴权确认信息的验证通过的情况下,向终端的eUICC发送删除eUICC配置 文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。Sending the deleted eUICC configuration to the eUICC of the terminal when the verification of the authentication confirmation information is passed The instruction of the file, the instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
  26. 一种eUICC,其特征在于,包括:处理器、存储器和通信接口,所述处理器、存储器和通信接口相互连接,其中,所述存储器用于存储程序代码,所述处理器用于调用所述程序代码,执行以下操作:An eUICC, comprising: a processor, a memory, and a communication interface, wherein the processor, the memory, and the communication interface are connected to each other, wherein the memory is configured to store program code, and the processor is configured to invoke the program Code, do the following:
    接收终端的本地eUICC配置文件辅助模块发送的删除eUICC配置文件的指令;Receiving, by the local eUICC configuration file auxiliary module of the terminal, an instruction to delete the eUICC configuration file;
    根据所述删除eUICC配置文件的指令删除eUICC配置文件。The eUICC configuration file is deleted according to the instruction to delete the eUICC configuration file.
  27. 一种eUICC远程管理服务器,其特征在于,包括:处理器、存储器和收发器,所述处理器、存储器和收发器通过总线相互连接,其中,所述存储器用于存储程序代码,所述处理器用于调用所述程序代码,执行以下操作:An eUICC remote management server, comprising: a processor, a memory and a transceiver, wherein the processor, the memory and the transceiver are connected to each other by a bus, wherein the memory is used for storing program code, and the processor is used by the processor To invoke the program code, do the following:
    向终端的本地eUICC配置文件辅助模块发送eUICC配置文件删除请求,所述eUICC配置文件删除请求携带鉴权确认信息;Sending an eUICC configuration file deletion request to the local eUICC configuration file auxiliary module of the terminal, where the eUICC configuration file deletion request carries the authentication confirmation information;
    所述鉴权确认信息被所述本地eUICC配置文件辅助模块用于进行验证,并在对所述鉴权确认信息的验证通过的情况下,向所述终端的eUICC发送删除eUICC配置文件的指令,所述删除eUICC配置文件的指令用于指示所述eUICC删除eUICC配置文件。 The authentication confirmation information is used by the local eUICC configuration file auxiliary module to perform verification, and if the verification of the authentication confirmation information is passed, sending an instruction to delete the eUICC configuration file to the eUICC of the terminal, The instruction to delete the eUICC configuration file is used to instruct the eUICC to delete the eUICC configuration file.
PCT/CN2017/077129 2017-03-17 2017-03-17 Euicc profile deletion method and device WO2018165983A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/077129 WO2018165983A1 (en) 2017-03-17 2017-03-17 Euicc profile deletion method and device
CN201780061896.6A CN109792601B (en) 2017-03-17 2017-03-17 Method and equipment for deleting eUICC configuration file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/077129 WO2018165983A1 (en) 2017-03-17 2017-03-17 Euicc profile deletion method and device

Publications (1)

Publication Number Publication Date
WO2018165983A1 true WO2018165983A1 (en) 2018-09-20

Family

ID=63522813

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/077129 WO2018165983A1 (en) 2017-03-17 2017-03-17 Euicc profile deletion method and device

Country Status (2)

Country Link
CN (1) CN109792601B (en)
WO (1) WO2018165983A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114647539A (en) * 2022-03-17 2022-06-21 北京涵鑫盛科技有限公司 Automatic data recovery method for distributed storage system

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818511B (en) * 2020-07-09 2023-04-25 联通物联网有限责任公司 Method and device for recycling seed card
CN113163392A (en) * 2021-03-17 2021-07-23 维沃移动通信有限公司 Method and device for deleting user identity data file
CN113132990B (en) * 2021-04-19 2022-09-16 东信和平科技股份有限公司 Profile remote subscription method based on eSIM
EP4352979A1 (en) * 2021-08-20 2024-04-17 Samsung Electronics Co., Ltd. Method and device for providing event in wireless communication system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150110035A1 (en) * 2012-05-23 2015-04-23 Kt Corporation Method for control and enforcement of policy rule and euicc
CN104703199A (en) * 2013-12-05 2015-06-10 华为终端有限公司 Management method for embedded universal integrated circuit card, related equipment and system
CN104883674A (en) * 2014-02-28 2015-09-02 华为终端有限公司 Profile relating management method and apparatus

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005359B (en) * 2006-01-18 2010-12-08 华为技术有限公司 Method and device for realizing safety communication between terminal devices
US9070116B2 (en) * 2008-10-09 2015-06-30 At&T Mobility Ii Llc On-demand spam reporting
CN101820615B (en) * 2010-04-09 2015-10-21 中兴通讯股份有限公司 The management method of the personal identification number under the many application of Universal Integrated Circuit Card and system
US8661257B2 (en) * 2010-05-18 2014-02-25 Nokia Corporation Generic bootstrapping architecture usage with Web applications and Web pages
WO2013036010A1 (en) * 2011-09-05 2013-03-14 주식회사 케이티 Certification method using an embedded uicc certificate, provisioning and mno changing methods using the certification method, embedded uicc therefor, mno system, and recording medium
CN103634791B (en) * 2012-08-27 2018-03-09 华为终端(东莞)有限公司 Method, user equipment and the remote management platform of switch operators network
KR20140136357A (en) * 2013-05-20 2014-11-28 종 진 임 The device and method to pay by online using telephone
CN103747104A (en) * 2014-01-24 2014-04-23 中国联合网络通信集团有限公司 Method and system for migrating user information among internet of things equipment
WO2015176304A1 (en) * 2014-05-23 2015-11-26 华为技术有限公司 Euicc management method, euicc, sm platform and system
CN104185161B (en) * 2014-09-11 2018-05-11 中国联合网络通信集团有限公司 Universal embedded integrated circuit card, the switching method of user signing contract information and system
CN105530106B (en) * 2015-12-03 2018-11-09 中国联合网络通信集团有限公司 Cancellation method based on eUICC and eUICC remote management platforms

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150110035A1 (en) * 2012-05-23 2015-04-23 Kt Corporation Method for control and enforcement of policy rule and euicc
CN104703199A (en) * 2013-12-05 2015-06-10 华为终端有限公司 Management method for embedded universal integrated circuit card, related equipment and system
CN104883674A (en) * 2014-02-28 2015-09-02 华为终端有限公司 Profile relating management method and apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114647539A (en) * 2022-03-17 2022-06-21 北京涵鑫盛科技有限公司 Automatic data recovery method for distributed storage system

Also Published As

Publication number Publication date
CN109792601B (en) 2021-04-09
CN109792601A (en) 2019-05-21

Similar Documents

Publication Publication Date Title
WO2018165983A1 (en) Euicc profile deletion method and device
US10162959B2 (en) Method and apparatus for providing subscriber identity module-based data encryption and remote management of portable storage devices
EP3008935B1 (en) Mobile device authentication in heterogeneous communication networks scenario
US9813399B2 (en) Secure remote user device unlock for carrier locked user devices
JP6567751B2 (en) Multi-number service provision method
DK2924944T3 (en) Presence authentication
CN101155212A (en) Method for limiting use of mobile terminal
US10869195B2 (en) Network assisted validation of secure connection to cellular infrastructure
KR101514753B1 (en) System and method for secure containment of sensitive financial information stored in a mobile communication terminal
US20120115455A1 (en) Secure bootstrap provisioning of electronic devices in carrier networks
WO2018129754A1 (en) Euicc configuration file management method and related device
CN106790251B (en) User access method and user access system
CN107317943B (en) Method and system for setting call forwarding
JP4663596B2 (en) Mutual authentication system, method and program
US20120278857A1 (en) Method for unlocking a secure device
CN110191464B (en) Method and system for preventing SIM card from being stolen
US10701557B2 (en) Authentication method for connecting a companion device when same is disconnected from a subscriber device
JP2004274602A (en) NETWORK COMMUNICATION SYSTEM FOR IDENTIFYING IMPERSONATION OF VoIP COMMUNICATION TERMINAL UNDER MANAGEMENT OF WIRELESS LAN
CN113316139B (en) Wireless network access method and wireless access point
KR101072930B1 (en) Method for approving the telephone number change request
US20130145434A1 (en) Unattended Authentication in a Secondary Authentication Service for Wireless Carriers
WO2016015199A1 (en) Locking method, device, terminal and server
CN114697050A (en) Address book remote calling method, mobile terminal and address book cloud platform
CN113079037A (en) Method and system for remotely updating authentication application certificate
JP2012208861A (en) Portable terminal, authentication system, and authentication method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17901315

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17901315

Country of ref document: EP

Kind code of ref document: A1