WO2021115629A1 - Personnalisation d'un élément d'identification sécurisé - Google Patents

Personnalisation d'un élément d'identification sécurisé Download PDF

Info

Publication number
WO2021115629A1
WO2021115629A1 PCT/EP2020/025562 EP2020025562W WO2021115629A1 WO 2021115629 A1 WO2021115629 A1 WO 2021115629A1 EP 2020025562 W EP2020025562 W EP 2020025562W WO 2021115629 A1 WO2021115629 A1 WO 2021115629A1
Authority
WO
WIPO (PCT)
Prior art keywords
identification element
personalization
secure identification
mobile radio
data
Prior art date
Application number
PCT/EP2020/025562
Other languages
German (de)
English (en)
Inventor
Andreas Zinke
Original Assignee
Giesecke+Devrient Mobile Security Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke+Devrient Mobile Security Gmbh filed Critical Giesecke+Devrient Mobile Security Gmbh
Publication of WO2021115629A1 publication Critical patent/WO2021115629A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/42Security arrangements using identity modules using virtual identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Definitions

  • the present invention relates to a method for personalizing a secure identification element as well as a personalization system and an identification element.
  • Secure identification elements for example in the form of cellular radio or SIM cards, are required to identify a subscriber in certain networks, such as, for example, in cellular networks, and to authenticate the subscriber to these networks. For these purposes, among other things, secure identification elements are personalized.
  • the personalization of secure identification elements often requires sensitive data that may only be processed in specially secured, possibly specially certified, environments.
  • the personalization of a secure identification element is therefore typically carried out separately and independently of its production.
  • the secure identification elements are first produced by a card manufacturer and sent to a personalization instance in a non-personalized state.
  • the secure identification elements have to be stored there, a personalization configuration has to be prepared and the secure identification elements have to be personalized, repackaged and sent to the customers, for example to manufacturers of mobile radio terminals.
  • configuration changes to secure identification elements are required on the part of a terminal manufacturer, the corresponding lead times and complexities arise again. This results in a low level of flexibility, for example in order to remedy configuration errors at short notice.
  • different products from manufacturers of identification elements require different configurations. With certain personalization processes, the lead times are particularly long, such as for on-wafer personalization, since industrialization processes at the card manufacturer are particularly time-consuming and therefore cost-intensive.
  • the object of the present invention is to propose a solution which avoids the above-mentioned and other disadvantages of the prior art.
  • a secure identification element, a personalization system and a corresponding personalization method are desirable, which reduce planning requirements and lead time, require less stock of secure identification elements, reduce transport routes, allow greater flexibility for the customer, a simple one
  • the method according to the invention is used to personalize a secure identification element according to the invention by means of a personalization system according to the invention.
  • the personalization system has a database that contains personalization data that are uploaded to an identification element during personalization.
  • the secure identification element is equipped with a generic, electronic basic configuration.
  • the basic configuration configures the secure identification element for later personalization or prepares it for this.
  • the secure identification element is connected to the personalization system and the personalization data is read out from the database by the personalization system and transmitted to the secure identification element. The transfer of the personalization data is secured by security information that is contained in the basic configuration.
  • personalization of the secure identification element is generated using the transmitted personalization data.
  • the secure identification element can be used in some embodiments for identification and authentication with respect to a network.
  • the secure identification element is initially provided with a generic, electronic basic configuration. Personalization can then take place later, after connecting to the personalization system and transferring personalization data.
  • the secure identification element is produced at a card manufacturer and then personalized at another location, namely at the personalization instance. Only then can it be sent to the customer, for example to a manufacturer of mobile radio terminals.
  • the method according to the invention enables the secure identification element to be sent only once instead of twice on the way from the card manufacturer to the customer.
  • the card manufacturer is able to produce a secure identification element and, according to the invention, to equip it with a generic basic configuration, the secure identification element can be transported directly to the customer. It is no longer necessary to store the secure identification elements at a personalization instance.
  • the saved transport route reduces manufacturing costs and environmental pollution.
  • the procedures are simplified and less prone to errors. This can result in reduced lead times and thereby increase the flexibility of the customer to make changes at short notice, for example to a mobile radio terminal in which the secure identification element is to be built. Since there is no longer any need to be handled by a personalization instance, all associated risks can be avoided, in particular risks for hardware defects or damage.
  • a personalization system comprises, in addition to the usual components of such systems, such as a processor unit, a volatile and a non-volatile memory, in particular a database with personalization data for at least one secure identification element that contains a basic configuration.
  • a connecting device of the A data communication connection to the identification element is established and the personalization data is transmitted from the database to the secure identification element by means of a transmission device of the personalization system.
  • the processor unit of the personalization system controls this process and is connected to the volatile and the non-volatile memory, the database, the connection device and the transmission device.
  • the personalization system according to the invention is set up to carry out the method according to the invention or to be employed or used within its framework and thereby personalize the secure identification element according to the invention.
  • the personalization system, in particular its database is preferably set up at the personalization instance or at a manufacturer of mobile radio terminals.
  • the personalization system, in particular its database is particularly preferably located in a specifically certified environment, in particular in a GSMA-SAS-certified environment.
  • the secure identification element according to the invention comprises, in addition to the usual components of such elements, such as a processor unit, a volatile and a non-volatile memory, a basic configuration, a connection device for connecting the secure identification element to a database of a personalization system and a transmission device for Transfer of personalization data from the database to the secure identification element.
  • the processor unit controls this process and is connected to the volatile and non-volatile memory, the connection device and the transmission device.
  • the secure identification element according to the invention is set up to carry out the method according to the invention or to be employed or used within its framework and thereby to be personalized according to the invention.
  • the basic configuration of the secure identification element preferably comprises at least one cryptographic key, at least one digital certificate and at least one test profile.
  • the at least one cryptographic key is preferably used to encrypt data communication connections of the secure identification element, for example those to the database of the personalization system.
  • the at least one digital certificate is preferably used to check cryptographic signatures.
  • the at least one test profile is preferably used to test the secure identification element and / or to test a device that is connected to the secure identification element or in which it is inserted.
  • the at least one test profile is preferably used in connection with a specific mobile radio network, in particular a test network.
  • the test profile can be used, for example, in a test during device development, in device certification, during device manufacture, immediately after device manufacture ("end of line test") and / or after the device has been sold (“after sales test”) become.
  • the secure identification element is preferably configured by the basic configuration for authentication with respect to the personalization system.
  • connection of the secure identification element with the personalization system and / or the transmission of personalization data from the database is preferred cryptographically secured to the secure identification element.
  • previously encrypted personalization data can preferably be decrypted by the secure identification element, for example using a cryptographic key that is stored in the basic configuration.
  • the personalization data are preferably signed, for example by the personalization system.
  • the signature can preferably be checked with the aid of at least one certificate contained in the basic configuration.
  • the cryptographic securing of the personalization data prevents theft and any other use of security-relevant or personal data. It also prevents unauthorized personalization of other secure identity elements.
  • the personalization method according to the invention preferably includes the additional step of permanently installing the secure identification element with the basic configuration in a mobile radio terminal before the personalization data are transmitted. Since the secure identification element is configured for later personalization by its basic configuration, personalization can preferably also only take place after the identification element has been installed in a mobile radio terminal. This makes the transport of the secure identification element from the card manufacturer to the personalization instance, the stockpiling by the personalization instance and the personalization at the location of the personalization instance superfluous.
  • a test of a mobile radio terminal and / or the secure identification element built into it is preferably carried out before the personalization data is transmitted from the database to the secure identification element.
  • the secure identification element is preferably already in a basic configuration configured prior to personalization in such a way that tests of the identification element and its interaction with a connected mobile radio terminal can be carried out. Since in some embodiments of the method according to the invention there is no personalization before the testing of the secure identification element and / or the connected mobile radio terminal, it is possible to reduce the manufacturing effort of the mobile radio terminal. Optionally, tests can also be carried out after personalization.
  • a personalization of the relevant secure identification element is generally required for testing a mobile radio terminal.
  • the manufacturer requests samples of secure identification elements from the personalization instance in order to carry out hardware and software tests and to ensure the functionalities of the various components of the mobile radio terminal.
  • the personalization system enables a more efficient way of working, because the manufacturer of the mobile radio terminal can agree with the personalization instance on how secure identification elements are to be configured in order to guarantee or check the functionality of the mobile radio terminal.
  • the manufacturer of the mobile radio terminal can specify to the personalization instance which specific certificates, cryptographic keys and specific SIM profiles, operating system adaptations and updates are to be present on the personalized secure identification element.
  • the personalization instance can use this information to create a final personalization image and store it in the database of the personalization system.
  • the manufacturer of the mobile radio terminal can then connect to the personalization system, the personalization data in the form of the final personalization image Read out from the database and store in the secure identification element.
  • the secure identification element then preferably carries out an update using the received personalization data, as a result of which the secure identification element is personalized.
  • the update can be triggered, for example, during the production of the mobile radio terminal or when the device is first switched on by the end user or mobile radio subscriber. This procedure can be used to generate the above-mentioned patterns and the personalized secure identification elements
  • Personalization instance can be dispensed with.
  • the personalization method according to the invention preferably has the additional step of remote updating of the operating system of the secure identification element.
  • the basic configuration of the secure identification element preferably enables remote updating, that is to say security-relevant or other updates or upgrades of the operating system via the cellular network.
  • personalization data containing an operating system update are preferably transmitted to the secure identification element. This leads to increased flexibility for the manufacturer of the mobile radio device and to improved security of the mobile radio device, since important updates can be provided at short notice.
  • one or more further personalizations are preferably carried out after a first personalization.
  • a mobile radio terminal with an integrated secure identification element is to be operated first by a first person and then by one or more additional persons.
  • a mobile radio terminal is first in a first mobile radio network and is then operated in another cellular network. In such cases, further personalization may be necessary.
  • a personalized secure identification element can be reset to the state before the personalization, so that a non-personalized secure identification element with a generic, electronic basic configuration is created again. This is advantageous, for example, when the relevant mobile radio terminal is passed on, so that no data associated with the previous owner remain on the identification element.
  • the transmission of personalization data from the database to the secure identification element preferably takes place "over-the-air" or "over-the-wire".
  • the personalization data are preferably transmitted to the secure identification element via a physical connection, for example via a data cable (over-the-wire).
  • the personalization data can be transmitted via a wireless data communication connection (over-the-air), for example via a cellular network.
  • the "over-the-wire" data transmission enables a high data rate and makes it difficult to intercept the transmitted data.
  • the "over-the-air" data transmission can be performed anywhere in the cellular network, for example when the cellular terminal is used for the first time.
  • the secure identification element with the basic configuration is preferred over the personalization.
  • manner manufacturer-unspecific and / or device-unspecific in relation to a mobile radio terminal and only the personalization makes the secure identification element manufacturer-specific and / or device-specific.
  • the basic configuration can be used universally in any compatible mobile radio terminal and provides basic functions there, such as test functions or the cryptographic security of data transmissions.
  • the further or final configuration of the secure identification element so that it provides the full range of functions that is required for the regular operation of the relevant mobile radio terminal is preferably only done through the personalization.
  • This universal usability of secure identification elements with a basic configuration in compatible mobile radio terminals eliminates the need to provide basic configurations for different mobile radio terminals and / or mobile radio networks.
  • the secure identification element according to the invention is preferably designed as a UICC card (Universal Integrated Circuit Card), as an eUICC (embedded UICC) or as an iUICC (integrated UICC).
  • the secure identification element can be designed as a SIM card or eSIM, so that the secure identification element can be used in connection with common mobile radio terminals.
  • the secure identification element is preferably installed in a mobile radio terminal, for example in a mobile radio telephone, a desktop or tablet computer capable of mobile radio.
  • the mobile radio terminal can, for example, also have a embedded device and / or an Internet of Things device (IoT device).
  • IoT device Internet of Things device
  • FIG. 1A shows a personalization system according to the invention
  • FIG. 1B shows a secure identification element according to the invention
  • FIG. 2A shows a personalization method according to the invention in accordance with a first preferred embodiment
  • FIG. 2B shows a personalization method according to the invention in accordance with a second preferred embodiment
  • FIG. 3 shows a personalization method according to the invention in accordance with a third embodiment
  • FIG. 4 shows a personalization method according to the invention in accordance with a fourth embodiment.
  • FIG. 1A shows a personalization system 100 with a processor unit 102, each with a volatile memory 101, a non-volatile memory 103, a connection device 105 and a transmission device 106 is connected.
  • connection device 105 of the personalization system 100 is used to connect the personalization system 100 to a secure identification element 200.
  • a suitable interface or interface device that is compatible with a corresponding interface or interface device of the secure identification element 200, as well as suitable, Methods and protocols usually implemented in software, for example in the form of operating system routines of the personalization system 100, which establish and operate data communication connections.
  • the transmission device 106 is used to transmit data between the personalization system 100 and the secure identification element 200, for example personalization data 208 Control and carry out data communication via an existing data communication connection.
  • a database 104 containing personalization data 208 is stored in the non-volatile memory 103 of the personalization system 100.
  • the personalization data 208 can be generated outside the personalization system 100 and stored in the database 104.
  • Such personalization data 208 include a variety of data elements, such as a unique identification (EID), cryptographic certificates and keys, test profiles for testing a mobile radio terminal, profiles of a mobile network operator ("Mobile Network Operator", MNO), operating system updates lizations for the secure identification element 200 and / or chip-individual personalization data 208.
  • EID unique identification
  • MNO mobile network operator
  • Such data elements can be transmitted to the secure identification element 200 individually or as a bundle of several data elements. For example, certificates can be transferred to the secure identification element 200 at a specific point in the production process. Profiles can then later be transmitted to the secure identification element 200, for example.
  • the 1B shows the secure identification element 200 with its own processor unit 202, which controls its functions and data communication.
  • the processor unit 202 is each connected to a volatile memory 201, a non-volatile memory 203, a connection device 205 and a transmission device 206.
  • the connection device 205 of the secure identification element 200 is used to connect the secure identification element 200 to the personalization system 100. To this extent, it comprises a suitable interface or interface device that is compatible with a corresponding interface or interface device of the personalization system 100, as well as suitable. Nete methods and protocols, usually implemented in software, for example in the form of operating system routines of the identification element 200, which establish and operate data communication connections.
  • the transmission device 206 is used to transmit data between the secure identification element 200 and the personalization system 100, for example the reception of personalization data 208. To this extent, it includes suitable methods and protocols usually implemented in software, for example in the form of operating system routines Identification element 200 which control and carry out the data communication via existing data communication connections. After the two connection devices 105, 205 have set up a data communication link between the personalization system 100 and the secure identification element 200, the transmission device 106 of the personalization system 100 and the transmission device 206 of the secure identification element 200 can use it to exchange data, in particular personalization data 208.
  • FIG. 2A illustrates a first preferred embodiment of a method according to the invention for personalizing the secure identification element 200 using the data in the database 104 of the personalization system 100 stored personalization data 208.
  • the secure identification element 200 has a generic basic configuration 204 which allows a later personalization 207 to be carried out based on the personalization data 208.
  • the personalization data 208 are transmitted from the personalization system 100 to the secure identification element 200 by means of the transmission devices 106, 206.
  • the personalization 207 is then set up on the secure identification element 200 using the received personalization data 208.
  • the existing basic configuration 204 can, for example, be overwritten with the personalization 207 in order to bring about a better adaptation to the intended use of the secure identification element 200.
  • FIG. 2B shows the personalization method in a second preferred embodiment, the personalization system 100 personalizing a secure identification element 200 which is permanently installed in a mobile radio terminal 300.
  • the personalization system 100 again includes a database 104 with personalization data 208.
  • the personalization data 208 required for the specific mobile radio terminal 300 are retrieved from the database 104 and transmitted to the mobile radio terminal 300. This can be done "over-the-wire", for example using a data cable, or "over-the-air", for example using a cellular network.
  • the received personalization data 208 are forwarded within the mobile radio terminal 300 to the secure identification element 200 built therein.
  • the secure identification element 200 is configured in such a way that it receives the personalization data 208 and thereupon generates its own personalization 207. Therefore, for example, a manufacturer of the mobile radio terminal 300 can request the personalization data 208 from the database 104 of the personalization system 100, whereupon the personalization system 100 transmits the personalization data 208 to the mobile radio terminal 300.
  • the personalization system 200 can, for example, transmit the following services and / or functionalities as part of the personalization data 208: download or update of a unique EID, of cryptographic certificates and keys, of UICC, eUICC, iUICC test profiles for tests or Repairs of the mobile radio terminal, of UICC, eUICC, iUICC mobile radio operator profiles (“MNO profiles”), of UICC, eUICC, iUICC operating systems and / or of chip-specific personalization data 208.
  • download or update of a unique EID, of cryptographic certificates and keys of UICC, eUICC, iUICC test profiles for tests or Repairs of the mobile radio terminal, of UICC, eUICC, iUICC mobile radio operator profiles (“MNO profiles”), of UICC, eUICC, iUICC operating systems and / or of chip-specific personalization data 208.
  • FIG. 3 shows a possible sequence of the personalization method according to the invention according to a third embodiment.
  • a generic, electronic basic configuration is used 501 is generated as a secure identification element 200 for an eUICC card.
  • the basic configuration 501 can be used universally in all mobile radio terminals 300 that are compatible with the eUICC card.
  • the basic configuration 501 is transmitted to the card manufacturer 3, who produces the non-personalized eUICC card as a secure identification element 200. During the manufacturing process of the card manufacturer 3, the basic configuration 501 is transferred to the eUICC card, so that an eUICC card with a generic, electronic basic configuration 701 is created. This eUICC card with basic configuration 701 is sent to the manufacturer of the mobile radio terminal 2.
  • the terminal manufacturer 2 In a corresponding production process 602, the terminal manufacturer 2 generates a mobile radio terminal 300 with the eUICC card and tests this in a so-called end-of-line test 603.
  • the terminal manufacturer 2 transmits a project-specific personalization image 601 to the personalization instance 1 (EUM).
  • the project-specific personalization image 601 contains data that are required for the proper functioning of the eUICC card in the mobile radio terminal 300.
  • the personalization instance 1 (EUM) generates a final personalization image 502 from the project-specific personalization image 601, which contains project-specific profiles, GSMA certificates and keys. This final personalization image 502 is created in a correspondingly secured and certified environment.
  • the personalization instance 1 (EUM) then uploads 503 the final personalization image 502 to the database 104 of the personalization system 100.
  • the eUICC card is finally personalized 504 with the aid of the final personalization image 502.
  • the transmission 505 of the personalization data 208 can be carried out “over-the-wire”, that is to say in a wired manner.
  • the mobile radio terminal 300 can transmit 505 the personalization data 208 “over-the-wire” during the end-of-line check 603 " carry out.
  • the mobile radio terminal 300 needs a repair 804, this can be repaired 901 in a corresponding workshop 5.
  • personalization 504 can be carried out, in which personalization data 208 can be transmitted 507 both “over-the-air” and “over-the-wire”, so that a functional mobile radio terminal 300 is created 805.
  • eUICC cards can in principle also be carried out with other secure identification elements 200, for example with UICC cards or iUICC cards.
  • the process does not require any physical handling of the eUICC cards by the personalization instance 1 (EUM). This reduces the costs of producing a personalized eUICC card and minimizes the sources of error.
  • FIG. 4 shows a fourth embodiment of the method for personalizing 207 a secure identification element 200 by means of a personalization system 100 with a database 104 which contains personalization data 208.
  • the method initially comprises equipping the secure identification element 200 with a generic, electronic basic configuration 204 which configures the secure identification element 200 for later personalization 207.
  • the method then includes connecting 11 secure identification element 200 to personalization system 100 and transferring 12 personalization data 208 from database 104 through personalization system 100 to secure identification element 200 Security information secured. After all, that includes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé pour personnaliser un élément d'identification sécurisé (200) au moyen d'un système de personnalisation (100) ayant une base de données (104) qui contient des données de personnalisation (208). Premièrement, l'élément d'identification sécurisé (200) est équipé (10) d'une configuration de base électronique générique (204) qui configure l'élément d'identification sécurisé (200) pour un processus de personnalisation ultérieur (207). L'élément d'identification sécurisé (200) est ensuite connecté (11) au système de personnalisation (100), et les données de personnalisation (208) provenant de la base de données (104) sont transmises (12) à l'élément d'identification sécurisé (200) au moyen du système de personnalisation (100). Le processus de transmission (12) ainsi que le processus de génération (13) d'une personnalisation (207) de l'élément d'identification sécurisé (200) à l'aide des données de personnalisation (208) sont sécurisés à l'aide d'informations de sécurité contenues dans la configuration de base (204).
PCT/EP2020/025562 2019-12-13 2020-12-04 Personnalisation d'un élément d'identification sécurisé WO2021115629A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102019008643.0A DE102019008643A1 (de) 2019-12-13 2019-12-13 Personalisierung eines sicheren Identifikationselements
DE102019008643.0 2019-12-13

Publications (1)

Publication Number Publication Date
WO2021115629A1 true WO2021115629A1 (fr) 2021-06-17

Family

ID=73793172

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2020/025562 WO2021115629A1 (fr) 2019-12-13 2020-12-04 Personnalisation d'un élément d'identification sécurisé

Country Status (2)

Country Link
DE (1) DE102019008643A1 (fr)
WO (1) WO2021115629A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102008025792A1 (de) * 2008-05-29 2009-12-17 T-Mobile International Ag Personalisierung einer SIM mittels einer eindeutigen, personlisierten MasterSIM
EP2448216A1 (fr) * 2010-10-28 2012-05-02 Apple Inc. Procédés et appareil pour la fourniture de composants d'identification électronique dans un réseau sans fil
DE102014014561A1 (de) * 2014-09-30 2016-03-31 Giesecke & Devrient Gmbh Verfahren und System zum Personalisieren eines Sicherheitselements eines mobilen Endgeräts

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102008024798A1 (de) * 2008-05-23 2009-12-17 T-Mobile International Ag Verfahren zur Over-The-Air Personalisierung von Chipkarten in der Telekommunikation
CA2810360C (fr) * 2012-06-27 2016-05-10 Rogers Communications Inc. Systeme et procede de mise a disposition a distance de cartes a circuits integres universelles integrees

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102008025792A1 (de) * 2008-05-29 2009-12-17 T-Mobile International Ag Personalisierung einer SIM mittels einer eindeutigen, personlisierten MasterSIM
EP2448216A1 (fr) * 2010-10-28 2012-05-02 Apple Inc. Procédés et appareil pour la fourniture de composants d'identification électronique dans un réseau sans fil
DE102014014561A1 (de) * 2014-09-30 2016-03-31 Giesecke & Devrient Gmbh Verfahren und System zum Personalisieren eines Sicherheitselements eines mobilen Endgeräts

Also Published As

Publication number Publication date
DE102019008643A1 (de) 2021-06-17

Similar Documents

Publication Publication Date Title
DE102005021103B4 (de) Verfahren für eine Fernaktualisierung
DE102014204222A1 (de) Verfahren und vorrichtung für die umprogrammierung mehrerer fahrzeugsoftwaremodule
DE112014005412T5 (de) Programmaktualisierungssystem und Programmaktualisierungsverfahren
WO2016045786A1 (fr) Procédé et dispositifs de mise à disposition d'un profil d'abonnement sur un terminal mobile
EP2941697A1 (fr) Procédé de chargement d'une application comprenant plusieurs composants, dans un appareil comprenant plusieurs composants
EP4329348A2 (fr) Personnalisation d'un élément sécurisé
EP2673731B1 (fr) Procédé de programmation d'une puce pour terminal mobile
EP1802148B1 (fr) Procédé et dispositifs pour l'autorisation des modules d'un appareil radiotéléphonique mobile
DE102014009242A1 (de) Verfahren zum Aufbau und zum Betrieb eines drahtlosen Netzwerks
DE202015106611U1 (de) Vorrichtung zum Testen eines Gerätes
WO2021115629A1 (fr) Personnalisation d'un élément d'identification sécurisé
EP2895985A1 (fr) Gestion de contenu pour station mobile dotée d'un environnement d'exécution
WO2002007406A2 (fr) Procede de mise a disposition d'un module de programme dans un systeme de communication
EP1798620A1 (fr) Système et procédé d'analyse,d'entretien et de dépannage à distance d'un appareil technique.
EP1569475A1 (fr) Dispositif et procédé pour la mise-à-jour de la configuration d'une mémoire de données dans une carte à puce d'un terminal mobile
DE102010009257A1 (de) Steuergerät und Verfahren zum Betrieb des Steuergeräts
WO2006037285A1 (fr) Procede pour mettre a disposition dans un dispositif de communication mobile, des informations de terminal identifiant le terminal de communication mobile dans un reseau de communication mobile
WO2015018510A2 (fr) Procédé et dispositifs de changement de réseau de téléphonie mobile
DE102020130180B3 (de) Intelligente wearable-vorrichtung, mobilfunk-kommunikationsendgerät, mobilfunk-kommunikations-system und verfahren zum betreiben eines mobilfunk-kommunikations-systems
DE102021003391B3 (de) Flexible SIM-Fernbereitstellung
DE102004025734B4 (de) Verfahren zur Optimierung von Rekonfigurationsprozessen in Mobilfunknetzwerken mit rekonfigurierbaren Endgeräten durch Sammlung und Bereitstellung geeigneter Messdaten sowie eine entsprechende Anordnung
DE102023110087A1 (de) Verfahren und System zur Personalisierung eines sicheren Elements
WO2022184407A1 (fr) Procédé pour faire fonctionner un dispositif de commande et dispositif de commande
DE102022207240A1 (de) Fahrzeugdiagnosesystem und -verfahren mit spezialisierten Daten
DE102022103950A1 (de) Verfahren zum Überprüfen der Originalität einer Firmware eines Feldgeräts der Automatisierungstechnik

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20823729

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20823729

Country of ref document: EP

Kind code of ref document: A1