WO2022141157A1 - 一种 Profile 数据的安全传输方法和相应装置 - Google Patents
一种 Profile 数据的安全传输方法和相应装置 Download PDFInfo
- Publication number
- WO2022141157A1 WO2022141157A1 PCT/CN2020/141257 CN2020141257W WO2022141157A1 WO 2022141157 A1 WO2022141157 A1 WO 2022141157A1 CN 2020141257 W CN2020141257 W CN 2020141257W WO 2022141157 A1 WO2022141157 A1 WO 2022141157A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- profile data
- management system
- preparation server
- subscription management
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 78
- 230000005540 biological transmission Effects 0.000 title claims abstract description 52
- 238000002360 preparation method Methods 0.000 claims abstract description 270
- 230000003993 interaction Effects 0.000 claims description 20
- 230000004044 response Effects 0.000 claims description 12
- 238000003860 storage Methods 0.000 claims description 9
- 230000008569 process Effects 0.000 abstract description 21
- 230000006870 function Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 8
- 238000012546 transfer Methods 0.000 description 7
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
Definitions
- the invention relates to a secure transmission method of Profile data, a subscription management data preparation server, an operator system, a key management system and an Internet of Things terminal.
- Network security is an increasingly important issue in the Internet age, especially the protection of users' personal privacy data is valued by various countries.
- Personal user data in the telecommunications industry is not only related to privacy, but also to the security of personal financial properties.
- part of the data contained in the profile is strictly protected by operators through various means.
- the operator's code number As a reusable resource, still needs to be protected by high standards.
- the present invention mainly provides a secure transmission method of Profile data, a subscription management data preparation server, an operator system, a key management system and an Internet of Things terminal, which are described in detail below.
- an embodiment provides a method for secure transmission of Profile data, comprising:
- the key management system initiates a key ceremony to create a key pair for the operator
- the key management system saves the key pair to the hardware security module
- the subscription management data preparation server sends a message requesting a key to the key management system according to the operator's identifier
- the key management system initiates a message requesting the corresponding key to the hardware security module
- the hardware security module returns the public key in the key pair and the corresponding key ID to the key management system;
- the key management system returns the received public key and the corresponding key ID to the subscription management data preparation server, and the key ceremony is completed;
- the operator sends a message requesting a public key to the subscription management data preparation server, and the public key is used to encrypt the Profile data;
- the subscription management data preparation server selects the corresponding public key according to the operator identification and returns it to the operator;
- the operator generates a session-based symmetric key, encrypts the sensitive part of the profile data with the symmetric key, and encrypts the symmetric key with the received public key, and then encrypts the encrypted profile data with the encrypted data.
- the symmetric key is sent to the subscription management data preparation server;
- the subscription management data preparation server returns a message to the operator that the Profile data is successfully added
- the subscription management data preparation server transmits the non-sensitive part of the profile data to the key management system, and transmits the encrypted sensitive part of the profile data and the key ID carrying the corresponding public key to the key management system;
- the key management system obtains the corresponding protected private key from the hardware security module according to the key ID, uses the private key to decrypt the encrypted symmetric key, and then uses the decrypted symmetric key to encrypt the profile data. decrypt the sensitive part of the
- the subscription management data preparation server sends a command to splicing Profile data to the key management system
- the key management system synthesizes the non-sensitive part in the Profile data and the decrypted sensitive part in the Profile data into a complete Profile data package;
- the subscription management data preparation server sends a command to the key management system to encrypt the Profile data package with a random key
- the key management system uses the random key to encrypt the entire Profile data packet, and saves the random key to the hardware security module;
- the key management system sends the encrypted Profile data package and random key ID to the subscription management data preparation server;
- the terminal initiates an InitiateAuthentication request to the subscription management data preparation server;
- the subscription management data preparation server returns InitiateAuthOk to the terminal;
- the terminal initiates an AuthenticateClient request to the subscription management data preparation server;
- the subscription management data preparation server returns AuthClientOk to the terminal;
- the terminal requests GetBoundProfilePackage from the subscription management data preparation server;
- the subscription management data preparation server transmits the session key, the encrypted Profile data packet and the random key ID obtained during the interaction with the terminal to the key management system;
- the key management system obtains the corresponding protected random key from the hardware security module according to the random key ID, and uses the random key to decrypt the encrypted Profile data packet;
- the key management system uses the session key cycle to encrypt the decrypted Profile data packet with the SCP03t algorithm
- the key management system transmits the encrypted and bound Profile data package to the subscription management data preparation server;
- the subscription management data preparation server returns GetBppOk to the terminal.
- an embodiment provides a method for secure transmission of Profile data, comprising:
- the subscription management data preparation server sends a message requesting a key to the key management system according to the operator's identity, so that the key management system initiates a message requesting a corresponding key to the hardware security module, and receives a message sent by the hardware security module to the key management system.
- the key management system returns the public key in the key pair and the corresponding key ID; the operator's key is created by the operator when the key management system initiates the key ceremony and is stored in the hardware security module;
- the subscription management data preparation server receives the public key and the corresponding key ID returned by the key management system;
- the subscription management data preparation server receives the message sent by the operator requesting the public key, and the public key is used to encrypt the profile data;
- the subscription management data preparation server selects the corresponding public key according to the operator identification and returns it to the operator, so that the operator generates a session-based symmetric key, and uses the symmetric key to encrypt the sensitive part of the Profile data, and use the
- the received public key is encrypted with the symmetric key;
- the subscription management data preparation server receives the encrypted Profile data and the encrypted symmetric key transmitted by the operator;
- the subscription management data preparation server transmits the non-sensitive part of the profile data to the key management system, and transmits the encrypted sensitive part of the profile data and the key ID carrying the corresponding public key to the key management system, so that the :
- the key management system obtains the corresponding protected private key from the hardware security module according to the key ID, uses the private key to decrypt the encrypted symmetric key, and then uses the decrypted symmetric key to decrypt the encrypted private key in the Profile data. Decrypt the encrypted sensitive part, and combine the non-sensitive part of the profile data and the decrypted sensitive part of the profile data into a complete profile data package;
- the subscription management data preparation server sends a command to the key management system to encrypt the Profile data package with a random key, so that the key management system uses the random key to encrypt the entire Profile data package and saves the random key to the hardware security module;
- the subscription management data preparation server receives the encrypted Profile data package and the random key ID transmitted by the key management system.
- the secure transmission method of Profile data further includes:
- the subscription management data preparation server receives the InitiateAuthentication request initiated by the terminal;
- the subscription management data preparation server returns InitiateAuthOk to the terminal;
- the subscription management data preparation server receives the AuthenticateClient request initiated by the terminal;
- the subscription management data preparation server returns AuthClientOk to the terminal;
- the subscription management data preparation server receives the request GetBoundProfilePackage initiated by the terminal;
- the subscription management data preparation server transmits the session key, the encrypted Profile data package and the random key ID obtained during the interaction with the terminal to the key management system, so that: Obtain the corresponding protected random key in the security module, and use the random key to decrypt the encrypted Profile data packet, and then use the session key cycle to encrypt the decrypted Profile data packet using the SCP03t algorithm;
- the subscription management data preparation server receives the encrypted and bound Profile data package transmitted by the key management system
- the subscription management data preparation server returns GetBppOk to the terminal.
- an embodiment provides a method for secure transmission of Profile data, including:
- the operator sends a message requesting a public key to the subscription management data preparation server, and the public key is used to encrypt the Profile data; wherein the operator is created a key pair in a key ceremony initiated by the key management system, specifically, the After the key pair is created, it is saved to the hardware security module by the key management system.
- the subscription management data preparation server sends a message requesting the key to the key management system according to the operator's identification, and the key management system initiates a request to the hardware security module for corresponding The message of the key; the hardware security module returns the public key in the key pair and the corresponding key ID to the key management system, and the key management system returns the received public key and the corresponding key to the subscription management data preparation server ID, key ceremony completed;
- the operator receives the corresponding public key selected according to the operator identification and returned by the subscription management data preparation server;
- the operator generates a session-based symmetric key, encrypts the sensitive part of the profile data with the symmetric key, and encrypts the symmetric key with the received public key, and then encrypts the encrypted profile data with the encrypted data.
- the symmetric key of the profile data is sent to the subscription management data preparation server, so that the subscription management data preparation server transmits the non-sensitive part of the profile data to the key management system, and the encrypted sensitive part of the profile data carries the corresponding
- the key ID of the public key is transmitted to the key management system, and the key management system obtains the corresponding protected private key from the hardware security module according to the key ID, uses the private key to decrypt the encrypted symmetric key, and then decrypts the encrypted symmetric key.
- the encrypted Profile data package is sent to the subscription management data preparation server, it can make:
- the subscription management data preparation server receives the InitiateAuthentication request initiated by the terminal;
- the subscription management data preparation server returns InitiateAuthOk to the terminal;
- the subscription management data preparation server receives the AuthenticateClient request initiated by the terminal;
- the subscription management data preparation server returns AuthClientOk to the terminal;
- the subscription management data preparation server receives the request GetBoundProfilePackage initiated by the terminal;
- the subscription management data preparation server transmits the session key, the encrypted Profile data package and the random key ID obtained during the interaction with the terminal to the key management system, so that: Obtain the corresponding protected random key in the security module, and use the random key to decrypt the encrypted Profile data packet, and then use the session key cycle to encrypt the decrypted Profile data packet using the SCP03t algorithm;
- the subscription management data preparation server receives the encrypted and bound Profile data package transmitted by the key management system
- the subscription management data preparation server returns GetBppOk to the terminal.
- an embodiment provides a method for secure transmission of Profile data, comprising:
- the key management system initiates a key ceremony to create a key pair for the operator
- the key management system saves the key pair to the hardware security module
- the key management system receives a message requesting a key sent by the subscription management data preparation server according to the operator's identifier
- the key management system initiates a message requesting the corresponding key to the hardware security module
- the key management system receives the public key and the corresponding key ID in the key pair returned by the hardware security module;
- the key management system returns the received public key and the corresponding key ID to the subscription management data preparation server, and the key ceremony is completed;
- the key management system receives the non-sensitive part in the profile data transmitted by the subscription management data preparation server, the encrypted sensitive part in the profile data and the key ID carrying the corresponding public key; wherein the non-sensitive part in the profile data
- the sensitive part, the encrypted sensitive part in the profile data and the key ID carrying the corresponding public key are received by the subscription management data preparation server from the operator, specifically: the operator sends a request to the subscription management data preparation server public key message, the public key is used to encrypt the profile data; the subscription management data preparation server selects the corresponding public key and returns it to the operator according to the operator identification; the operator generates a session-based symmetric key, and uses the The symmetric key encrypts the sensitive part of the Profile data, and uses the received public key to encrypt the symmetric key, and then sends the encrypted Profile data and the encrypted symmetric key to the subscription management data preparation server;
- the key management system obtains the corresponding protected private key from the hardware security module according to the key ID, uses the private key to decrypt the encrypted symmetric key, and then uses the decrypted symmetric key to encrypt the profile data. decrypt the sensitive part of the
- the key management system combines the non-sensitive part of the profile data and the decrypted sensitive part of the profile data into a complete profile data package;
- the key management system receives the command issued by the subscription management data preparation server to encrypt the Profile data package with a random key
- the key management system uses a random key to encrypt the entire Profile data package, and saves the random key to the hardware security module;
- the key management system sends the encrypted Profile data package and the random key ID to the subscription management data preparation server.
- the key management system sends the encrypted Profile data package and the random key ID to the subscription management data preparation server, so that:
- the subscription management data preparation server receives the InitiateAuthentication request initiated by the terminal;
- the subscription management data preparation server returns InitiateAuthOk to the terminal;
- the subscription management data preparation server receives the AuthenticateClient request initiated by the terminal;
- the subscription management data preparation server returns AuthClientOk to the terminal;
- the subscription management data preparation server receives the request GetBoundProfilePackage initiated by the terminal;
- the subscription management data preparation server transmits the session key, the encrypted Profile data package and the random key ID obtained during the interaction with the terminal to the key management system, so that: Obtain the corresponding protected random key in the security module, and use the random key to decrypt the encrypted Profile data packet, and then use the session key cycle to encrypt the decrypted Profile data packet using the SCP03t algorithm;
- the subscription management data preparation server receives the encrypted and bound Profile data package transmitted by the key management system
- the subscription management data preparation server returns GetBppOk to the terminal.
- an embodiment provides a method for secure transmission of Profile data, including:
- the terminal initiates an InitiateAuthentication request to the subscription management data preparation server;
- the terminal receives the InitiateAuthOk returned by the subscription management data preparation server;
- the terminal initiates an AuthenticateClient request to the subscription management data preparation server;
- the terminal receives the AuthClientOk returned by the subscription management data preparation server;
- the terminal requests GetBoundProfilePackage from the subscription management data preparation server, so that: the subscription management data preparation server transmits the session key, the encrypted Profile data package and the random key ID obtained during the interaction with the terminal to the key management system, and the encrypted data is encrypted.
- the key management system obtains the corresponding protected random key from the hardware security module according to the random key ID, and uses the random key to decrypt the encrypted Profile data packet, and the key management system uses the session key to loop
- the decrypted Profile data packet is encrypted using the SCP03t algorithm, and then the encrypted and bound Profile data packet is transmitted to the subscription management data preparation server, so that the subscription management data preparation server can return GetBppOk to the terminal;
- the terminal receives GetBppOk returned by the subscription management data preparation server.
- the profile data packet after described encryption is obtained through the following steps:
- the key management system initiates a key ceremony to create a key pair for the operator
- the key management system saves the key pair to the hardware security module
- the subscription management data preparation server sends a message requesting a key to the key management system according to the operator's identifier
- the key management system initiates a message requesting the corresponding key to the hardware security module
- the hardware security module returns the public key in the key pair and the corresponding key ID to the key management system;
- the key management system returns the received public key and the corresponding key ID to the subscription management data preparation server, and the key ceremony is completed;
- the operator sends a message requesting a public key to the subscription management data preparation server, and the public key is used to encrypt the Profile data;
- the subscription management data preparation server selects the corresponding public key according to the operator identification and returns it to the operator;
- the operator generates a session-based symmetric key, uses the symmetric key to encrypt sensitive parts of the Profile data, and uses the received public key to encrypt the symmetric key, and then encrypts the encrypted Profile data with the encrypted data.
- the symmetric key is sent to the subscription management data preparation server;
- the subscription management data preparation server returns a message to the operator that the Profile data is added successfully;
- the subscription management data preparation server transmits the non-sensitive part of the profile data to the key management system, and transmits the encrypted sensitive part of the profile data and the key ID carrying the corresponding public key to the key management system;
- the key management system obtains the corresponding protected private key from the hardware security module according to the key ID, uses the private key to decrypt the encrypted symmetric key, and then uses the decrypted symmetric key to encrypt the profile data. decrypt the sensitive parts of the
- the subscription management data preparation server sends a command to splicing Profile data to the key management system
- the key management system synthesizes the non-sensitive part in the Profile data and the decrypted sensitive part in the Profile data into a complete Profile data package;
- the subscription management data preparation server sends a command to the key management system to encrypt the Profile data package with a random key
- the key management system uses the random key to encrypt the entire Profile data packet, and saves the random key to the hardware security module;
- the key management system sends the encrypted Profile data package and the random key ID to the subscription management data preparation server.
- an embodiment provides a subscription management data preparation server, including:
- the processor is configured to implement the secure transmission method of Profile data described in any of the embodiments herein by executing the program stored in the memory.
- an embodiment provides an operator system, including:
- the processor is configured to implement the secure transmission method of Profile data described in any of the embodiments herein by executing the program stored in the memory.
- an embodiment provides a key management system, including:
- the processor is configured to implement the secure transmission method of Profile data described in any of the embodiments herein by executing the program stored in the memory.
- an embodiment provides an Internet of Things terminal, including:
- the processor is configured to implement the secure transmission method of Profile data described in any of the embodiments herein by executing the program stored in the memory.
- an embodiment provides a computer-readable storage medium, including a program that can be executed by a processor to implement the method for securely transmitting Profile data described in any of the embodiments herein.
- FIG. 1 is a schematic diagram of the interaction between a key management system, a subscription management data preparation server, an operator and a terminal in an embodiment
- Fig. 2 is a process interaction diagram of an operator's safe transmission code number to a subscription management data preparation server according to an embodiment
- Fig. 3 is a process interaction diagram of a terminal downloading standard GSMA Profile according to an embodiment
- Fig. 4 is the flow chart of the safe transmission method of Profile data of a kind of embodiment
- Fig. 5 is the flow chart of the safe transmission method of Profile data of a kind of embodiment
- FIG. 6 is a schematic structural diagram of a subscription management data preparation server according to an embodiment
- FIG. 7 is a flow chart of a method for securely transmitting Profile data according to an embodiment
- FIG. 9 is a schematic structural diagram of an operator system according to an embodiment
- FIG. 10 is a flowchart of a method for securely transmitting Profile data according to an embodiment
- FIG. 11 is a schematic structural diagram of a key management system according to an embodiment
- FIG. 13 is a schematic structural diagram of an IoT terminal according to an embodiment
- FIG. 14 is a flowchart of a method for securely transmitting Profile data according to an embodiment.
- connection and “connection” mentioned in this application, unless otherwise specified, include both direct and indirect connections (connections).
- SIM is the abbreviation of Subscriber Identity Module, which is the identity authentication module in Chinese, that is, the SIM card in the usual sense. It is a kind of general integrated circuit card.
- UICC is the abbreviation of Universal Integrated Circuit Card, which means universal integrated circuit card.
- the communication SIM card, financial bank card and bus card mentioned above are all universal integrated circuit cards.
- eUICC is derived from a further abbreviation of embedded UICC, referring to a pluggable or embedded universal integrated circuit card, usually referred to as eSIM card, which supports remote and local management of Profiles in a secure manner.
- EID is a further abbreviation of eUICC ID, which refers to the unique identification of the eUICC card.
- Profile refers to the corresponding data and applications that can be installed and stored in an ordinary SIM card or eUICC for the purpose of providing certain services.
- LPA is the abbreviation of Local Profile Assistant, which means Local Profile Assistant. Its functions include assisting Profile download, Profile Management (including Profile enable, Profile close, Profile deletion, Profile information query) and provide Profile management interface.
- SM-DP+ is the abbreviation of Subscription Manager Data Preparation Plus
- Chinese is the subscription management data preparation server, the main functions are to prepare Profile, secure encryption, storage and distribution Profile to the specified EID. by binding an encrypted Profile is securely delivered to LPA via LPA on eUICC.
- MNO is the abbreviation of Mobile Network Operator, which means mobile operator.
- Mobile operators can be China Mobile, China Unicom and operators in various overseas countries, etc., which are used to provide users with mobile network services, including voice, SMS and data. Wait.
- GSMA stands for GSM Association, which refers to the International Telecommunications Union.
- the main participants are operators, card dealers, terminal equipment manufacturers, etc., and are responsible for the overall technical standard specification and unified coordination in the fields of communication, profile, and core network.
- HSM Hardware Security Module
- Hardware Security Module refers to a hardware security module. It is a computer hardware device used to secure and manage the digital keys used by the strong authentication system and provide related cryptographic operations.
- Hardware security modules are usually directly connected to a computer or network server in the form of expansion cards or external devices.
- KMS is the abbreviation of Key Management System, which refers to the key management system.
- Symmetric key English is Symmetric Key.
- Symmetric key encryption is also called private key encryption or shared key encryption, that is, both parties sending and receiving data must use the same key to encrypt and decrypt the plaintext.
- Symmetric key encryption algorithms mainly include: DES, 3DES, AES, RC5, RC6, etc.
- Asymmetric Cryptography Asymmetric Cryptography in English, is an algorithm of cryptography, which requires two keys, one is the public key (Public Key) and the other is the private key (Private Key) Key); the public key is used for encryption and the private key is used for decryption.
- the ciphertext obtained by encrypting the plaintext with the public key can only be decrypted with the corresponding private key to obtain the original plaintext.
- the public key originally used for encryption cannot be used for decryption. Since encryption and decryption require two different keys, it is called asymmetric encryption; it is different from symmetric encryption, which uses the same key for both encryption and decryption.
- the public key can be made public and can be released at will; the private key cannot be made public, and must be kept strictly secret by the user, never provided to anyone through any means, and will not be disclosed to the trusted other party to communicate. Based on the characteristics of public key encryption, it can also provide digital signatures (Digital Signature) function, so that electronic documents can get the same effect as handwriting on paper documents.
- digital signatures Digital Signature
- SFTP stands for SSH File Transfer Protocol, also known as Secure File Transfer Protocol
- Chinese is a secure file transfer protocol, which is a data stream connection, a network transfer protocol that provides file access, transfer and management functions.
- the current SIM card production line generally uses the method of burning to write the Profile data into the SIM card; however, the way operators pass the Profile data to the SIM card manufacturer is different, and the storage media used are also different. Disk or CD, or transfer by e-mail or SFTP, etc. After receiving the data, the SIM card manufacturer enters it into the PC database of the SIM card production line.
- the prior art has many disadvantages. For example, the transmission of physical media takes a long time and is easy to be lost in the process. Another example is that the reception of Profile data through offline or electronic transmission requires manual intervention, which is inefficient. For another example, the key to protect Profile data may be leaked. .
- This paper describes a secure transmission scheme of profile data, which is used to solve the problem that the operator safely transmits the subscription management data preparation server (SM-DP+) of the eSIM to the eSIM at the beginning of the code number transmission, so as to ensure the security of the subsequent code number distribution. completeness.
- SM-DP+ subscription management data preparation server
- FIG. 1 is a schematic diagram of the interaction of various parties in the present invention.
- the key management system KMS mainly provides two functions, one is to access the hardware security module HSM, and the other is to manage all keys and certificates.
- GSMA Consumer defines the ES2+ interface between SM-DP+ and the operator's subscription Profile, and the ES9+ interface between SM-DP+ and eUICC to download the Profile, but does not define how the SM-DP+ and the operator transfer the code number Profile at the beginning, and use the A safe and efficient way.
- SM-DP+ is improved.
- the improved SM-DP+ complements and improves this part of the function. On the one hand, it ensures the safe reception of Profile data passed by the operator, and on the other hand, it is responsible for using the encryption function of KMS to save sensitive data so that Subsequent maintenance and use.
- the following may illustrate how the present invention is implemented by taking the operator's secure transmission code number (Profile) to SM-DP+ as an example.
- Profile secure transmission code number
- the key management system KMS initiates the key ceremony, that is, the key creation process, and creates a pair of key pairs (Key pair).
- the key pair includes the public key (mPK, MNO Public Key) and private key (mSK, MNO Private Key).
- the subscription management data preparation server SM-DP+ sends a message requesting a key to the key management system KMS according to the identity of the operator MNO.
- the key management system KMS sends a message requesting the corresponding key to the hardware security module HSM;
- the hardware security module HSM returns the public key (mPK, MNO Public Key) and the corresponding key ID (KID, Key Identity) in the key pair to the key management system KMS;
- the key management system KMS returns the received public key mPK and the corresponding key ID to the subscription management data preparation server SM-DP+, the key ceremony is completed, and the subsequent code number data (Profile) addition action does not need to be repeated key ceremony.
- Profile code number data
- the operator MNO sends the public key mPK for requesting encrypted Profile data to the subscription management data preparation server SM-DP+.
- the subscription management data preparation server SM-DP+ selects the corresponding public key mPK according to the operator MNO identifier and returns it to the operator MNO.
- the operator MNO generates a session-based symmetric key (AES Key), and uses the symmetric key to encrypt the sensitive part of the Profile data, and uses the received public key mPK to encrypt the symmetric key AES Key encryption processing, and then send the encrypted Profile data and the encrypted symmetric key AES Key to the subscription management data preparation server SM-DP+.
- AES Key a session-based symmetric key
- the subscription management data preparation server SM-DP+ returns a message of successful addition of Profile data to the operator MNO.
- the subscription management data preparation server SM-DP+ transmits the non-sensitive part of the Profile data to the key management system KMS.
- the subscription management data preparation server SM-DP+ transmits the encrypted sensitive part of the Profile data and the key ID carrying the corresponding public key mPK to the key management system KMS.
- the key management system KMS obtains the corresponding protected private key (mSK, MNO Private Key) from the hardware security module HSM according to the key ID - understandably, since the private key is stored in the hardware security module HSM, so The private key is protected; use the private key mSK to decrypt the encrypted symmetric key AES Key, and then use the decrypted symmetric key AES Key decrypts the encrypted sensitive part of Profile data.
- mSK protected private key
- MNO Private Key MNO Private Key
- the above-mentioned step (11) and the process formed by the two steps (12) and (13) are actually alternating.
- the loop is executed so that the key management system KMS finally has all the non-sensitive parts of the Profile data and all the decrypted sensitive parts.
- the subscription management data preparation server SM-DP+ issues a command to splicing the Profile data to the key management system KMS.
- the key management system KMS In response to the command to splicing the profile data, the key management system KMS combines the non-sensitive part in the profile data and the decrypted sensitive part in the profile data into a complete profile data package (Package).
- Package a complete profile data package
- the subscription management data preparation server SM-DP+ sends a command to the key management system KMS to encrypt the Profile data package with a random key;
- the key management system KMS uses the random key Random Key to encrypt the entire Profile data packet, and saves the random key Random Key to the hardware Security Module HSM.
- the key management system KMS sends the encrypted Profile data package and random key ID to the subscription management data preparation server SM-DP+, thus completing the secure transmission of the Profile.
- the following may illustrate how the present invention is implemented by taking the process of downloading a standard GSMA Profile by a terminal such as an Internet of Things terminal as an example.
- Profile can be installed and stored in the eUICC card of the terminal.
- the LPA of the terminal can be used to assist in Profile download, Profile management (including Profile activation, Profile closure, Profile deletion, and Profile information query) and provide Profile management interface.
- the terminal initiates an InitiateAuthentication request to the subscription management data preparation server SM-DP+.
- the terminal initiates an AuthenticateClient request to the subscription management data preparation server SM-DP+;
- the subscription management data preparation server SM-DP+ returns AuthClientOk to the terminal;
- the terminal requests GetBoundProfilePackage from the subscription management data preparation server SM-DP+;
- the subscription management data preparation server SM-DP+ has obtained the session key Session Keys in the above interaction steps with the terminal (ie, InitiateAuthentication request to InitiateAuthOk, AuthenticateClient request to AuthClientOk two interaction processes), so the subscription management data preparation
- the server SM-DP+ will set the session key Session Keys, encrypted Profile packets or protected Profile packets (PPP, Protected Profile Package), and the random key ID is transmitted to the key management system KMS.
- PPP Protected Profile Package
- the key management system KMS obtains the corresponding protected random key Random Key from the hardware security module HSM according to the random key ID - understandably, because the random key Random The Key is stored in the hardware security module HSM, so the random key is Random The Key is protected; and the Random Key is used to decrypt the PPP to obtain the decrypted Profile data package, or unprotected Profile data package (UPP, Unprotected Profile Package)
- UPP Unprotected Profile Package
- the key management system KMS uses the Session Keys mentioned in (6) to cyclically encrypt the UPP using the SCP03t algorithm.
- the subscription management data preparation server SM-DP+ returns GetBppOk to the terminal.
- steps (1), (2), (3), (4), (5), (9) and (10) are all steps in the profile download process of the standard eUICC Consumer eSIM solution formulated by GSMA.
- a hardware security module HSM is also introduced, which ensures that the key cannot be leaked or cracked.
- a method for securely transmitting Profile data is disclosed, which will be described in detail below.
- the safe transmission method of Profile data in some embodiments comprises the following steps:
- Step 100 The key management system KMS initiates a key ceremony to create a pair of key pairs for the operator MNO.
- Step 101 The key management system KMS saves the key pair to the hardware security module HSM.
- Step 103 The subscription management data preparation server SM-DP+ sends a message requesting a key to the key management system KMS according to the identifier of the operator MNO.
- Step 105 The key management system KMS sends a message requesting a corresponding key to the hardware security module HSM.
- Step 107 The hardware security module HSM returns the public key in the key pair and the corresponding key ID to the key management system KMS.
- Step 109 The key management system KMS returns the received public key and the corresponding key ID to the subscription management data preparation server SM-DP+, and the key ceremony is completed.
- Step 111 The operator MNO sends a message requesting a public key to the subscription management data preparation server SM-DP+, where the public key is used to encrypt Profile data.
- Step 113 The subscription management data preparation server SM-DP+ selects a corresponding public key according to the operator MNO identifier and returns it to the operator MNO.
- Step 115 The operator MNO generates a session-based symmetric key, uses the symmetric key to encrypt the sensitive part of the Profile data, and uses the received public key to encrypt the symmetric key, and then encrypts the encrypted Profile
- the data and the encrypted symmetric key are sent to the subscription management data preparation server SM-DP+.
- Step 117 The subscription management data preparation server SM-DP+ returns a message that the profile data is successfully added to the operator MNO.
- Step 119 The subscription management data preparation server SM-DP+ transmits the non-sensitive part of the profile data to the key management system KMS, and transmits the encrypted sensitive part of the profile data and the key ID carrying the corresponding public key to the key management system KMS. Key Management System KMS.
- Step 121 The key management system KMS obtains the corresponding protected private key from the hardware security module HSM according to the key ID, uses the private key to decrypt the encrypted symmetric key, and then uses the decrypted symmetric key pair The encrypted sensitive part of the profile data is decrypted.
- Step 123 The subscription management data preparation server SM-DP+ sends a command for splicing the Profile data to the key management system KMS.
- Step 125 In response to the command for splicing the profile data, the key management system KMS combines the non-sensitive part in the profile data and the decrypted sensitive part in the profile data into a complete profile data package.
- Step 127 The subscription management data preparation server SM-DP+ sends a command to the key management system KMS to encrypt the Profile data package with a random key.
- Step 129 In response to the command to encrypt the Profile data packet using the random key, the key management system KMS uses the random key to encrypt the entire Profile data packet, and saves the random key to the hardware security module HSM.
- Step 131 The key management system KMS sends the encrypted Profile data package and the random key ID to the subscription management data preparation server SM-DP+.
- the secure transmission method of Profile data further includes the following steps:
- Step 140 the terminal initiates an InitiateAuthentication request to the subscription management data preparation server SM-DP+;
- Step 141 The subscription management data preparation server SM-DP+ returns InitiateAuthOk to the terminal;
- Step 143 The terminal initiates an AuthenticateClient request to the subscription management data preparation server SM-DP+;
- Step 145 The subscription management data preparation server SM-DP+ returns AuthClientOk to the terminal;
- Step 147 The terminal requests GetBoundProfilePackage from the subscription management data preparation server SM-DP+;
- Step 149 The subscription management data preparation server SM-DP+ obtains the session key, the encrypted Profile data package and the random password obtained during the interaction process with the terminal (that is, the InitiateAuthentication request to InitiateAuthOk, the AuthenticateClient request to the AuthClientOk two interaction processes).
- the key ID is transmitted to the key management system KMS;
- Step 151 The key management system KMS obtains the corresponding protected random key from the hardware security module HSM according to the random key ID, and uses the random key to decrypt the encrypted Profile data packet;
- Step 153 The key management system KMS uses the session key to encrypt the decrypted Profile data packet using the SCP03t algorithm;
- Step 155 the key management system KMS transmits the encrypted and bound Profile data package to the subscription management data preparation server SM-DP+;
- Step 157 The subscription management data preparation server SM-DP+ returns GetBppOk to the terminal.
- a subscription management data preparation server SM-DP+ including a memory 10 and a processor 11; the memory 10 is used for storing programs; the processor 11 is used for executing the programs stored in the memory 10.
- Step 200 The subscription management data preparation server SM-DP+ sends a message requesting a key to the key management system KMS according to the identity of the operator MNO, so that the key management system KMS sends a message requesting a corresponding key to the hardware security module HSM , and receive the public key and the corresponding key ID in the key pair returned by the hardware security module HSM to the key management system KMS; the key of the operator MNO is when the key management system KMS initiates the key ceremony. Created by the operator MNO and saved to the hardware security module HSM.
- Step 201 The subscription management data preparation server SM-DP+ receives the public key and the corresponding key ID returned by the key management system KMS.
- Step 203 The subscription management data preparation server SM-DP+ receives a message sent by the operator MNO requesting a public key, where the public key is used to encrypt Profile data.
- Step 205 The subscription management data preparation server SM-DP+ selects the corresponding public key according to the operator MNO identifier and returns it to the operator MNO, so that the operator MNO generates a session-based symmetric key, and uses the symmetric key to Sensitive parts of the profile data are encrypted, and the symmetric key is encrypted using the received public key.
- Step 207 The subscription management data preparation server SM-DP+ receives the encrypted Profile data and the encrypted symmetric key transmitted by the operator MNO.
- Step 209 The subscription management data preparation server SM-DP+ transmits the non-sensitive part of the profile data to the key management system KMS, and transmits the encrypted sensitive part of the profile data and the key ID carrying the corresponding public key to the key management system KMS.
- the key management system KMS so that: the key management system KMS obtains the corresponding protected private key from the hardware security module HSM according to the key ID, uses the private key to decrypt the encrypted symmetric key, and then uses the decryption
- the symmetric key decrypts the encrypted sensitive part of the profile data, and combines the non-sensitive part of the profile data and the decrypted sensitive part of the profile data into a complete profile data package.
- Step 211 The subscription management data preparation server SM-DP+ sends a command to the key management system KMS to encrypt the Profile data package with a random key, so that: the key management system KMS uses the random key to encrypt the entire Profile data package. Encrypt and save the random key to the hardware security module HSM.
- Step 213 The subscription management data preparation server SM-DP+ receives the encrypted Profile data package and the random key ID transmitted by the key management system KMS.
- the processor 11 can also perform the following steps, or the method for securely transmitting Profile data executed by the processor 11 can also include the following steps:
- Step 220 The subscription management data preparation server SM-DP+ receives the InitiateAuthentication request initiated by the terminal.
- Step 221 The subscription management data preparation server SM-DP+ returns InitiateAuthOk to the terminal.
- Step 223 The subscription management data preparation server SM-DP+ receives the AuthenticateClient request initiated by the terminal.
- Step 225 The subscription management data preparation server SM-DP+ returns AuthClientOk to the terminal;
- Step 227 The subscription management data preparation server SM-DP+ receives the request GetBoundProfilePackage initiated by the terminal.
- Step 229 The subscription management data preparation server SM-DP+ obtains the session key, encrypted Profile data package and random password obtained during the interaction process with the terminal (that is, the InitiateAuthentication request to InitiateAuthOk, and the AuthenticateClient request to AuthClientOk).
- the key ID is transmitted to the key management system KMS, so that the key management system KMS obtains the corresponding protected random key from the hardware security module HSM according to the random key ID, and uses the random key to pair the encrypted Profile Decrypt the data packet, and then use the session key to encrypt the decrypted Profile data packet using the SCP03t algorithm.
- Step 231 The subscription management data preparation server SM-DP+ receives the encrypted and bound Profile data package transmitted from the key management system KMS.
- Step 233 The subscription management data preparation server SM-DP+ returns GetBppOk to the terminal.
- some embodiments disclose an operator system, including a memory 20 and a processor 21; the memory 20 is used for storing programs; the processor 21 is used for executing the programs stored in the memory 20 as described in any of the embodiments herein.
- the safe transmission method of the described Profile data for example, please refer to FIG. 10, the processor 21 can perform the following steps, or the safe transmission method of the Profile data that it performs can include the following steps:
- Step 300 The operator MNO or the operator system sends a message requesting the public key to the subscription management data preparation server SM-DP+, and the public key is used to encrypt the Profile data;
- the key pair is created in the key ceremony. Specifically, after the key pair is created, it is saved to the hardware security module HSM by the key management system KMS, and the subscription management data preparation server SM-DP+ sends the key to the key according to the identity of the operator MNO.
- the management system KMS sends a message requesting a key, and the key management system KMS sends a message requesting a corresponding key to the hardware security module HSM; the hardware security module HSM returns the public key and the corresponding key in the key pair to the key management system KMS. Key ID, the key management system KMS returns the received public key and the corresponding key ID to the subscription management data preparation server SM-DP+, and the key ceremony is completed.
- Step 301 the operator MNO receives the corresponding public key selected according to the operator MNO identity and returned by the subscription management data preparation server SM-DP+.
- Step 303 The operator MNO generates a session-based symmetric key, uses the symmetric key to encrypt the sensitive part of the Profile data, and uses the received public key to encrypt the symmetric key, and then encrypts the encrypted Profile.
- the data and the encrypted symmetric key are sent to the subscription management data preparation server SM-DP+, so that: the subscription management data preparation server SM-DP+ transmits the non-sensitive part of the Profile data to the key management system KMS, and the Profile
- the encrypted sensitive part of the data and the key ID carrying the corresponding public key are transmitted to the key management system KMS, and the key management system KMS obtains the corresponding protected private key from the hardware security module HSM according to the key ID, and uses The private key decrypts the encrypted symmetric key, then uses the decrypted symmetric key to decrypt the encrypted sensitive part of the profile data, and then decrypts the non-sensitive part of the profile data and the decrypted part of the profile data
- the sensitive part is synthesized into a complete Profile data
- a key management system KMS including a memory 30 and a processor 31; the memory 30 is used to store programs; the processor 31 is used to execute any of the programs stored in the memory 30.
- Step 400 The key management system KMS initiates a key ceremony to create a pair of key pairs for the operator MNO.
- Step 401 The key management system KMS saves the key pair to the hardware security module HSM.
- Step 403 The key management system KMS receives a message requesting a key sent by the subscription management data preparation server SM-DP+ according to the identifier of the operator MNO.
- Step 405 The key management system KMS sends a message requesting a corresponding key to the hardware security module HSM.
- Step 407 The key management system KMS receives the public key and the corresponding key ID in the key pair returned by the hardware security module HSM.
- Step 409 The key management system KMS returns the received public key and the corresponding key ID to the subscription management data preparation server SM-DP+, and the key ceremony is completed.
- Step 411 the key management system KMS receives the non-sensitive part in the Profile data transmitted by the subscription management data preparation server SM-DP+, the encrypted sensitive part in the Profile data and the key ID carrying the corresponding public key; wherein The non-sensitive part in the profile data, the encrypted sensitive part in the profile data and the key ID carrying the corresponding public key are received by the subscription management data preparation server SM-DP+ from the operator MNO, specifically : The operator MNO sends a message requesting the public key to the subscription management data preparation server SM-DP+, and the public key is used to encrypt the Profile data; the subscription management data preparation server SM-DP+ selects the corresponding public key according to the operator MNO identifier and Returned to the operator MNO; the operator MNO generates a session-based symmetric key, and uses the symmetric key to encrypt the sensitive part of the Profile data, and uses the received public key to encrypt the symmetric key, and then encrypt the The resulting Profile data and the encrypted symmetric key are sent to the subscription management
- Step 413 The key management system KMS obtains the corresponding protected private key from the hardware security module HSM according to the key ID, uses the private key to decrypt the encrypted symmetric key, and then uses the decrypted symmetric key pair The encrypted sensitive part of the profile data is decrypted.
- Step 415 The key management system KMS combines the non-sensitive part in the Profile data and the decrypted sensitive part in the Profile data into a complete Profile data package.
- Step 417 The key management system KMS receives the command sent by the subscription management data preparation server SM-DP+ to encrypt the Profile data packet with a random key.
- Step 419 The key management system KMS uses the random key to encrypt the entire Profile data package, and saves the random key to the hardware security module HSM.
- Step 421 The key management system KMS sends the encrypted Profile data package and the random key ID to the subscription management data preparation server SM-DP+.
- the subscription management data preparation server SM-DP+ can perform the method flow and steps shown in FIG. 8 .
- an IoT terminal including a memory 40 and a processor 41; the memory 40 is used for storing programs; the processor 41 is used for executing the programs stored in the memory 40 as described in any of the embodiments herein.
- Described safe transmission method of Profile data for example, please refer to Fig. 14, processor 41 can carry out the following steps, or the safe transmission method of Profile data that it executes can comprise the following steps:
- Step 500 The terminal, that is, the IoT terminal shown in FIG. 13, initiates an InitiateAuthentication request to the subscription management data preparation server SM-DP+.
- Step 501 The terminal receives the InitiateAuthOk returned by the subscription management data preparation server SM-DP+.
- Step 503 The terminal initiates an AuthenticateClient request to the subscription management data preparation server SM-DP+.
- Step 505 The terminal receives the AuthClientOk returned by the subscription management data preparation server SM-DP+.
- Step 507 The terminal requests GetBoundProfilePackage from the subscription management data preparation server SM-DP+, so that the subscription management data preparation server SM-DP+ interacts with the terminal (ie, InitiateAuthentication requests to InitiateAuthOk, and AuthenticateClient requests to AuthClientOk for these two interaction processes).
- the obtained session key, encrypted Profile data package and random key ID are transmitted to the key management system KMS, and the key management system KMS obtains the corresponding protected random key from the hardware security module HSM according to the random key ID.
- the data packet is transmitted to the subscription management data preparation server SM-DP+, so that the subscription management data preparation server SM-DP+ can return GetBppOk to the terminal.
- Step 509 The terminal receives the GetBppOk returned by the subscription management data preparation server SM-DP+.
- the encrypted Profile data packet involved in FIG. 14 may be obtained by, for example, the method steps shown in FIG. 4 , FIG. 7 , FIG. 10 or FIG. 12 .
- This article can automate the preparation of adding single or batch code numbers (Profile) to improve the efficiency of data transmission.
- Profile single or batch code numbers
- any tangible, non-transitory computer-readable storage medium may be used, including magnetic storage devices (hard disks, floppy disks, etc.), optical storage devices (CD to ROM, DVD, Blu Ray disks, etc.), flash memory, and/or the like .
- These computer program instructions may be loaded on a general purpose computer, special purpose computer or other programmable data processing apparatus to form a machine such that the instructions executed on the computer or other programmable data processing apparatus may generate means for implementing the specified functions.
- These computer program instructions may also be stored in a computer-readable memory that instructs a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer-readable memory form a piece of Articles of manufacture, including implementing means for implementing specified functions.
- Computer program instructions may also be loaded on a computer or other programmable data processing device to perform a series of operational steps on the computer or other programmable device to produce a computer-implemented process such that a process executed on the computer or other programmable device Instructions may provide steps for implementing specified functions.
- the term “comprising” and any other variations thereof are non-exclusive inclusion, such that a process, method, article or device including a list of elements includes not only those elements, but also not expressly listed or included in the process , method, system, article or other elements of a device.
- the term “coupled” and any other variations thereof refer to physical connections, electrical connections, magnetic connections, optical connections, communication connections, functional connections, and/or any other connection.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
一种Profile数据的安全传输方法、订阅管理数据准备服务器、运营商系统、密钥管理系统和物联网终端,提出了一种Profile的线上传输方案,这种线上传输方案高效安全,且流程高度自动化,不需要人为介入。
Description
本发明涉及一种Profile数据的安全传输方法、订阅管理数据准备服务器、运营商系统、密钥管理系统和物联网终端。
网络安全问题是互联网时代日趋重要的问题,尤其是用户个人隐私数据的保护被各个国家所重视。电信行业的个人用户数据不仅涉及到隐私,更事关个人在金融财产方面的安全,特别是码号(Profile)所包含的部分数据是被运营商通过各种手段所严格保护的。当SIM卡行业进入到eSIM和物联网时代,运营商的码号作为一项可重复利用的资源,依然有被高标准保护的需求。
本发明主要提供一种Profile数据的安全传输方法、订阅管理数据准备服务器、运营商系统、密钥管理系统和物联网终端,下面具体说明。
根据第一方面,一种实施例中提供一种Profile数据的安全传输方法,包括:
密钥管理系统发起密钥典礼,为运营商创建一对密钥对;
所述密钥管理系统将密钥对保存至硬件安全模块;
订阅管理数据准备服务器根据运营商的标识向密钥管理系统发送请求密钥的消息;
密钥管理系统向硬件安全模块发起请求相应密钥的消息;
硬件安全模块向密钥管理系统返回密钥对中的公钥及对应的密钥ID;
密钥管理系统向订阅管理数据准备服务器返回所接收到的公钥及对应的密钥ID,密钥典礼完成;
运营商向订阅管理数据准备服务器发送请求公钥的消息,所述公钥用于加密Profile数据;
订阅管理数据准备服务器根据运营商标识,选择相应的公钥并向运营商返回;
运营商生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理,然后将加密后的Profile数据和加密后的对称密钥发送给订阅管理数据准备服务器;
订阅管理数据准备服务器向运营商返回Profile数据添加成功的消息;
订阅管理数据准备服务器将Profile数据中的非敏感的部分传输至密钥管理系统,以及将Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID传输至密钥管理系统;
密钥管理系统根据密钥ID从硬件安全模块中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密;
订阅管理数据准备服务器向密钥管理系统发出将Profile数据进行拼接的命令;
响应于将Profile数据进行拼接的命令,密钥管理系统将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包;
订阅管理数据准备服务器向密钥管理系统发出使用随机密钥将Profile数据包进行加密的命令;
响应于使用随机密钥将Profile数据包进行加密的命令,密钥管理系统使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块;
密钥管理系统将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器;
终端向订阅管理数据准备服务器发起InitiateAuthentication请求;
订阅管理数据准备服务器向终端返回InitiateAuthOk;
终端向订阅管理数据准备服务器发起AuthenticateClient请求;
订阅管理数据准备服务器向终端返回AuthClientOk;
终端向订阅管理数据准备服务器请求GetBoundProfilePackage;
订阅管理数据准备服务器将其与终端交互过程获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统;
密钥管理系统根据随机密钥ID从硬件安全模块中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密;
密钥管理系统使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密;
密钥管理系统将加密并绑定的Profile数据包传输至订阅管理数据准备服务器;
订阅管理数据准备服务器向终端返回GetBppOk。
根据第二方面,一种实施例中提供一种Profile数据的安全传输方法,包括:
订阅管理数据准备服务器根据运营商的标识向密钥管理系统发送请求密钥的消息,以使得:密钥管理系统向硬件安全模块发起请求相应密钥的消息,并接收到由硬件安全模块向密钥管理系统返回密钥对中的公钥及对应的密钥ID;其中运营商的密钥是由密钥管理系统发起密钥典礼时为运营商所创建并被保存至硬件安全模块;
订阅管理数据准备服务器接收密钥管理系统返回的公钥及对应的密钥ID;
订阅管理数据准备服务器接收由运营商发送的请求公钥的消息,该公钥用于加密Profile数据;
订阅管理数据准备服务器根据运营商标识,选择相应的公钥并向运营商返回,以使得运营商生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理;
订阅管理数据准备服务器接收由运营商传输的加密后的Profile数据和加密后的对称密钥;
订阅管理数据准备服务器将Profile数据中的非敏感的部分传输至密钥管理系统,以及将Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID传输至密钥管理系统,以使得:密钥管理系统根据密钥ID从硬件安全模块中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密,并将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包;
订阅管理数据准备服务器向密钥管理系统发出使用随机密钥将Profile数据包进行加密的命令,以使得:密钥管理系统使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块;
订阅管理数据准备服务器接收由密钥管理系统传输过来的加密后的Profile数据包和随机密钥ID。
一实施例中,Profile数据的安全传输方法还包括:
订阅管理数据准备服务器接收由终端发起的InitiateAuthentication请求;
订阅管理数据准备服务器向终端返回InitiateAuthOk;
订阅管理数据准备服务器接收由终端发起的AuthenticateClient请求;
订阅管理数据准备服务器向终端返回AuthClientOk;
订阅管理数据准备服务器接收由终端发起的请求GetBoundProfilePackage;
订阅管理数据准备服务器将其与终端交互过程获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统,以使得:密钥管理系统根据随机密钥ID从硬件安全模块中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密,再使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密;
订阅管理数据准备服务器接收密钥管理系统传输过来的加密并绑定的Profile数据包;
订阅管理数据准备服务器向终端返回GetBppOk。
根据第三方面,一种实施例提供一种Profile数据的安全传输方法,包括:
运营商向订阅管理数据准备服务器发送请求公钥的消息,所述公钥用于加密Profile数据;其中运营商在由密钥管理系统发起的密钥典礼中被创建密钥对,具体地,该密钥对被创建后被密钥管理系统保存至硬件安全模块,订阅管理数据准备服务器根据运营商的标识向密钥管理系统发送请求密钥的消息,密钥管理系统向硬件安全模块发起请求相应密钥的消息;硬件安全模块向密钥管理系统返回密钥对中的公钥及对应的密钥ID,密钥管理系统向订阅管理数据准备服务器返回所接收到的公钥及对应的密钥ID,密钥典礼完成;
运营商接收由订阅管理数据准备服务器返回的根据运营商标识所选择的相应的公钥;
运营商生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理,然后将加密后的Profile数据和加密后的对称密钥发送给订阅管理数据准备服务器,以使得:订阅管理数据准备服务器将Profile数据中的非敏感的部分传输至密钥管理系统,以及将Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID传输至密钥管理系统,密钥管理系统根据密钥ID从硬件安全模块中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密,再将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包,再使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块,以及将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器。
一实施例中,加密后的Profile数据包发送至订阅管理数据准备服务器后,能够使得:
订阅管理数据准备服务器接收由终端发起的InitiateAuthentication请求;
订阅管理数据准备服务器向终端返回InitiateAuthOk;
订阅管理数据准备服务器接收由终端发起的AuthenticateClient请求;
订阅管理数据准备服务器向终端返回AuthClientOk;
订阅管理数据准备服务器接收由终端发起的请求GetBoundProfilePackage;
订阅管理数据准备服务器将其与终端交互过程获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统,以使得:密钥管理系统根据随机密钥ID从硬件安全模块中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密,再使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密;
订阅管理数据准备服务器接收密钥管理系统传输过来的加密并绑定的Profile数据包;
订阅管理数据准备服务器向终端返回GetBppOk。
根据第四方面,一种实施例提供一种Profile数据的安全传输方法,包括:
密钥管理系统发起密钥典礼,为运营商创建一对密钥对;
所述密钥管理系统将密钥对保存至硬件安全模块;
密钥管理系统接收订阅管理数据准备服务器根据运营商的标识所发送的请求密钥的消息;
密钥管理系统向硬件安全模块发起请求相应密钥的消息;
密钥管理系统接收硬件安全模块返回的密钥对中的公钥及对应的密钥ID;
密钥管理系统向订阅管理数据准备服务器返回所接收到的公钥及对应的密钥ID,密钥典礼完成;
密钥管理系统接收由订阅管理数据准备服务器传输过来的Profile数据中的非敏感的部分、Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID;其中所述Profile数据中的非敏感的部分、Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID,是由订阅管理数据准备服务器从运营商处接收得到,具体地:运营商向订阅管理数据准备服务器发送请求公钥的消息,所述公钥用于加密Profile数据;订阅管理数据准备服务器根据运营商标识,选择相应的公钥并向运营商返回;运营商生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理,然后将加密后的Profile数据和加密后的对称密钥发送给订阅管理数据准备服务器;
密钥管理系统根据密钥ID从硬件安全模块中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密;
密钥管理系统将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包;
密钥管理系统接收由订阅管理数据准备服务器发出的使用随机密钥将Profile数据包进行加密的命令;
密钥管理系统使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块;
密钥管理系统将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器。
一实施例中,密钥管理系统将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器,能够使得:
订阅管理数据准备服务器接收由终端发起的InitiateAuthentication请求;
订阅管理数据准备服务器向终端返回InitiateAuthOk;
订阅管理数据准备服务器接收由终端发起的AuthenticateClient请求;
订阅管理数据准备服务器向终端返回AuthClientOk;
订阅管理数据准备服务器接收由终端发起的请求GetBoundProfilePackage;
订阅管理数据准备服务器将其与终端交互过程获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统,以使得:密钥管理系统根据随机密钥ID从硬件安全模块中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密,再使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密;
订阅管理数据准备服务器接收密钥管理系统传输过来的加密并绑定的Profile数据包;
订阅管理数据准备服务器向终端返回GetBppOk。
根据第五方面,一种实施例提供一种Profile数据的安全传输方法,包括:
终端向订阅管理数据准备服务器发起InitiateAuthentication请求;
终端接收由订阅管理数据准备服务器返回的InitiateAuthOk;
终端向订阅管理数据准备服务器发起AuthenticateClient请求;
终端接收由订阅管理数据准备服务器返回的AuthClientOk;
终端向订阅管理数据准备服务器请求GetBoundProfilePackage,以使得:订阅管理数据准备服务器将其与终端交互过程获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统,密钥管理系统根据随机密钥ID从硬件安全模块中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密,以及密钥管理系统使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密,再将加密并绑定的Profile数据包传输至订阅管理数据准备服务器,以使得订阅管理数据准备服务器能够向终端返回GetBppOk;
终端接收由订阅管理数据准备服务器返回的GetBppOk。
一实施例中,所述加密后的Profile数据包经过下述步骤得到:
密钥管理系统发起密钥典礼,为运营商创建一对密钥对;
所述密钥管理系统将密钥对保存至硬件安全模块;
订阅管理数据准备服务器根据运营商的标识向密钥管理系统发送请求密钥的消息;
密钥管理系统向硬件安全模块发起请求相应密钥的消息;
硬件安全模块向密钥管理系统返回密钥对中的公钥及对应的密钥ID;
密钥管理系统向订阅管理数据准备服务器返回所接收到的公钥及对应的密钥ID,密钥典礼完成;
运营商向订阅管理数据准备服务器发送请求公钥的消息,所述公钥用于加密Profile数据;
订阅管理数据准备服务器根据运营商标识,选择相应的公钥并向运营商返回;
运营商生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理,然后将加密后的Profile数据和加密后的对称密钥发送给订阅管理数据准备服务器;
订阅管理数据准备服务器向运营商返回Profile数据添加成功的消息;
订阅管理数据准备服务器将Profile数据中的非敏感的部分传输至密钥管理系统,以及将Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID传输至密钥管理系统;
密钥管理系统根据密钥ID从硬件安全模块中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密;
订阅管理数据准备服务器向密钥管理系统发出将Profile数据进行拼接的命令;
响应于将Profile数据进行拼接的命令,密钥管理系统将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包;
订阅管理数据准备服务器向密钥管理系统发出使用随机密钥将Profile数据包进行加密的命令;
响应于使用随机密钥将Profile数据包进行加密的命令,密钥管理系统使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块;
密钥管理系统将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器。
根据第六方面,一种实施例提供一种订阅管理数据准备服务器,包括:
存储器,用于存储程序;
处理器,用于通过执行所述存储器存储的程序以实现本文任一实施例所述的Profile数据的安全传输方法。
根据第七方面,一种实施例提供一种运营商系统,包括:
存储器,用于存储程序;
处理器,用于通过执行所述存储器存储的程序以实现本文任一实施例所述的Profile数据的安全传输方法。
根据第八方面,一种实施例提供一种密钥管理系统,包括:
存储器,用于存储程序;
处理器,用于通过执行所述存储器存储的程序以实现本文任一实施例所述的Profile数据的安全传输方法。
根据第九方面,一种实施例提供一种物联网终端,包括:
存储器,用于存储程序;
处理器,用于通过执行所述存储器存储的程序以实现本文任一实施例所述的Profile数据的安全传输方法。
根据第十方面,一种实施例提供一种计算机可读存储介质,包括程序,所述程序能够被处理器执行以实现本文任一实施例所述的Profile数据的安全传输方法。
图1为一种实施例中密钥管理系统、订阅管理数据准备服务器、运营商和终端之间的交互示意图;
图2为一种实施例的运营商安全传输码号至订阅管理数据准备服务器的流程交互图;
图3为一种实施例的终端下载标准GSMA Profile的流程交互图;
图4为一种实施例的Profile数据的安全传输方法的流程图;
图5为一种实施例的Profile数据的安全传输方法的流程图;
图6为一种实施例的订阅管理数据准备服务器的结构示意图;
图7为一种实施例的Profile数据的安全传输方法的流程图;
图8为一种实施例的Profile数据的安全传输方法的流程图;
图9为一种实施例的运营商系统的结构示意图;
图10为一种实施例的Profile数据的安全传输方法的流程图;
图11为一种实施例的密钥管理系统的结构示意图;
图12为一种实施例的Profile数据的安全传输方法的流程图;
图13为一种实施例的物联网终端的结构示意图;
图14为一种实施例的Profile数据的安全传输方法的流程图。
下面通过具体实施方式结合附图对本发明作进一步详细说明。其中不同实施方式中类似元件采用了相关联的类似的元件标号。在以下的实施方式中,很多细节描述是为了使得本申请能被更好的理解。然而,本领域技术人员可以毫不费力的认识到,其中部分特征在不同情况下是可以省略的,或者可以由其他元件、材料、方法所替代。在某些情况下,本申请相关的一些操作并没有在说明书中显示或者描述,这是为了避免本申请的核心部分被过多的描述所淹没,而对于本领域技术人员而言,详细描述这些相关操作并不是必要的,他们根据说明书中的描述以及本领域的一般技术知识即可完整了解相关操作。
另外,说明书中所描述的特点、操作或者特征可以以任意适当的方式结合形成各种实施方式。同时,方法描述中的各步骤或者动作也可以按照本领域技术人员所能显而易见的方式进行顺序调换或调整。因此,说明书和附图中的各种顺序只是为了清楚描述某一个实施例,并不意味着是必须的顺序,除非另有说明其中某个顺序是必须遵循的。
本文中为部件所编序号本身,例如“第一”、“第二”等,仅用于区分所描述的对象,不具有任何顺序或技术含义。而本申请所说“连接”、“联接”,如无特别说明,均包括直接和间接连接(联接)。
先对本文所涉及的一些概念进行说明。
SIM是Subscriber Identity Module的缩写,中文为身份认证模块,即通常意义讲的 SIM 卡,它是通用集成电路卡的一种,作用是通过此模块来认证运营商网络的合法用户。
UICC是Universal Integrated Circuit Card的缩写,是通用集成电路卡的意思,例如上面提及的通信 SIM 卡、金融银行卡和公交卡等都是通用集成电路卡。
eUICC来源于embedded UICC的进一步缩写,指可插拔的或者嵌入式的通用集成电路卡,通常指 eSIM
卡,这种卡支持以一种安全的方式对 Profile 进行远程和本地的管理。
EID是eUICC ID的进一步缩写,指 eUICC 卡的唯一标识。
Profile的英文解释为:a combination of data and applications to be provisioned
on an SIM or eUICC for the purpose of providing services;Profile是指为了提供某些服务而能够被安装和存储在普通SIM卡或eUICC卡里面的相应数据和应用。
LPA,是Local Profile Assistant的缩写,是本地Profile助手的意思,其功能包括辅助Profile下载、Profile
管理(包括Profile启用、Profile关闭、Profile删除、Profile信息查询)和提供Profile管理界面。
SM-DP+是 Subscription Manager Data Preparation Plus的缩写,中文为订阅管理数据准备服务器,主要功能有准备 Profile,安全的加密、存储和分配
Profile 到指定的 EID。通过绑定一个加密的
Profile 安全的通过 LPA 下发到
eUICC 上。
MNO是Mobile Network Operator的缩写,是移动运营商的意思,移动运营商例如可以是中国移动、中国联通和海外各个国家的运营商等,用于给用户提供移动网络服务,包括语音、短信和数据等。
GSMA即GSM Association,是指国际电信联盟,主要参与者有运营商、卡商、终端设备厂商等,负责整体涉及到通信、Profile、核心网等领域的整体技术标准规范和统一协调。
HSM是Hardware Security Module的缩写,指硬件安全模块,是一种用于保障和管理强认证系统所使用的数字密钥,并同时提供相关密码学操作的计算机硬件设备。硬件安全模块一般通过扩展卡或外部设备的形式直接连接到电脑或网络服务器。
KMS是Key Management System的缩写,是指密钥管理系统。
对称密钥,英文为Symmetric Key。对称密钥加密又叫专用密钥加密或共享密钥加密,即发送和接收数据的双方必使用相同的密钥对明文进行加密和解密运算。对称密钥加密算法主要包括:DES、3DES、AES、RC5、RC6等。
非对称密码学,英文为Asymmetric Cryptography,是密码学的一种算法,它需要两个密钥,一个是公开密钥(Public Key),另一个是私有密钥(Private
Key);公钥用作加密,私钥则用作解密。使用公钥把明文加密后所得的密文,只能用相对应的私钥才能解密并得到原本的明文,最初用来加密的公钥不能用作解密。由于加密和解密需要两个不同的密钥,故被称为非对称加密;不同于加密和解密都使用同一个密钥的对称加密。公钥可以公开,可任意向外发布;私钥不可以公开,必须由用户自行严格秘密保管,绝不透过任何途径向任何人提供,也不会透露给被信任的要通信的另一方。基于公开密钥加密的特性,它还能提供数字签名(Digital
Signature)的功能,使电子文件可以得到如同在纸本文件上亲笔签署的效果。
SFTP即SSH File Transfer Protocol,也称Secure
File Transfer Protocol,中文为安全文件传送协议,这是一数据流连线,提供文件访问、传输和管理功能的网络传输协议。
解释完上面的概念后,下面对本发明进行说明。
当前SIM卡产线一般是采用烧录的方式将Profile数据写入SIM卡中;而运营商将Profile数据传递给SIM卡厂商的方式则不一,使用的存储介质也不尽相同,例如采用U盘或CD,亦或采用电子邮件或SFTP等方式传输,SIM卡厂商接收数据后录入到SIM卡产线的PC数据库内。
现有技术有诸多缺点。例如物理介质传递耗时较长且过程中容易丢失,再例如Profile数据通过线下或电子传输后的接收需要人工介入才能完成,效率低下,再例如,保护Profile数据的密钥存在被泄露的可能。
本文描述了一种Profile数据的安全传输方案,用于解决运营商在码号传输的开始阶段安全地传递给eSIM的订阅管理数据准备服务器(SM-DP+),以保证后续码号分发在安全上的完整性。
请参照图1,为本发明中各方交互的一个示意图。
密钥管理系统KMS主要提供两部分的功能,一是接入硬件安全模块HSM,二是管理所有密钥和证书。
GSMA Consumer
eSIM方案定义了SM-DP+与运营商订购Profile的ES2+接口,以及SM-DP+与eUICC下载Profile的ES9+接口,但并未定义SM-DP+与运营商在开始之初如何传递码号Profile,并且以一种安全高效的方式。本文对SM-DP+进行了改进,改进后的SM-DP+补充完善了这一部分功能,一方面保证安全接收运营商传递过来的Profile数据,另一方面负责使用KMS的加密功能将敏感数据保存,以便后续维护和使用。
请参照图2,下面不妨以运营商安全传输码号(Profile)至SM-DP+为例,说明本发明是如何实施的。
(1)密钥管理系统KMS发起密钥典礼,即密钥的创建流程,为一运营商MNO创建一对密钥对(Key
pair)。密钥对包括公钥(mPK,MNO
Public Key)和私钥(mSK,MNO
Private Key)。
可以理解地,此过程需要密钥经理、密钥管理员多人参与,分别以自身账号与口令登陆KMS,各人员的操作细节在此不表。密钥典礼需要多位安全人员参与,在技术的基础上实现制度方面的安全制衡,可以保证密钥在源头上不会被窃取与泄露。
(2)密钥管理系统KMS将密钥对保存至硬件安全模块HSM。至此,密钥本身的内容已无法被外界破获。
(3)订阅管理数据准备服务器SM-DP+根据运营商MNO的标识向密钥管理系统KMS发送请求密钥的消息。
(4)密钥管理系统KMS向硬件安全模块HSM发起请求相应密钥的消息;
(5)硬件安全模块HSM向密钥管理系统KMS返回密钥对中的公钥(mPK,MNO Public Key)及对应的密钥ID(KID,Key Identity);
(6)密钥管理系统KMS向订阅管理数据准备服务器SM-DP+返回所接收到的公钥mPK及对应的密钥ID,密钥典礼完成,后续的码号数据(Profile)添加动作不需要重复密钥典礼。
(7)运营商MNO向订阅管理数据准备服务器SM-DP+发送请求加密Profile数据的公钥mPK。
(8)订阅管理数据准备服务器SM-DP+根据运营商MNO标识,选择相应的公钥mPK并向运营商MNO返回。
(9)运营商MNO生成一个基于会话(Session)的对称密钥(AES Key),并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥mPK将对称密钥AES Key加密处理,然后将加密后的Profile数据和加密后的对称密钥AES Key发送给订阅管理数据准备服务器SM-DP+。
(10)订阅管理数据准备服务器SM-DP+向运营商MNO返回Profile数据添加成功的消息。
(11)订阅管理数据准备服务器SM-DP+将Profile数据中的非敏感的部分传输至密钥管理系统KMS。
(12)订阅管理数据准备服务器SM-DP+将Profile数据中被加密的敏感部分和携带着相应公钥mPK的密钥ID传输至密钥管理系统KMS。
(13)密钥管理系统KMS根据密钥ID从硬件安全模块HSM中获取相应的受保护的私钥(mSK,MNO Private Key)——可以理解地,由于私钥存放于硬件安全模块HSM,因此私钥是受保护的;使用该私钥mSK对加密后的对称密钥AES Key进行解密,再使用解密后的对称密钥AES
Key对Profile数据中被加密的敏感部分进行解密。
由于Profile数据中的非敏感的部分和敏感的部分可能是交替出现的,因此上述步骤(11)这一步骤,与步骤(12)和(13)这两个步骤所构成的流程,实际是交替循环执行,以使得密钥管理系统KMS中最终有Profile数据中所有的非敏感的部分,和所有的被解密后的敏感部分。
(14)订阅管理数据准备服务器SM-DP+向密钥管理系统KMS发出将Profile数据进行拼接的命令。
(15)响应于将Profile数据进行拼接的命令,密钥管理系统KMS将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包(Package)。
(16)订阅管理数据准备服务器SM-DP+向密钥管理系统KMS发出使用随机密钥(Random Key)将Profile数据包进行加密的命令;
(17)响应于使用随机密钥Random Key将Profile数据包进行加密的命令,密钥管理系统KMS使用随机密钥Random Key将整个的Profile数据包进行加密,并将随机密钥Random Key保存至硬件安全模块HSM。
(18)密钥管理系统KMS将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器SM-DP+,至此完成Profile的安全传输。
请参照图3,下面不妨以终端例如物联网终端下载标准GSMA Profile的流程为例,说明本发明是如何实施的。
Profile能够被安装和存储在终端的eUICC卡里面,具体地,可以通过终端的LPA来辅助Profile下载、Profile 管理(包括Profile启用、Profile关闭、Profile删除、Profile信息查询)和提供Profile管理界面。
(1)终端向订阅管理数据准备服务器SM-DP+发起InitiateAuthentication请求。
(2)订阅管理数据准备服务器SM-DP+向终端返回InitiateAuthOk;
(3)终端向订阅管理数据准备服务器SM-DP+发起AuthenticateClient请求;
(4)订阅管理数据准备服务器SM-DP+向终端返回AuthClientOk;
(5)终端向订阅管理数据准备服务器SM-DP+请求GetBoundProfilePackage;
(6)订阅管理数据准备服务器SM-DP+在与终端的上述交互步骤(即InitiateAuthentication请求到InitiateAuthOk,AuthenticateClient请求到AuthClientOk这两个交互过程)中已获取到会话密钥Session Keys,因此订阅管理数据准备服务器SM-DP+将会话密钥Session
Keys、加密后的Profile数据包或者说受保护的Profile数据包(PPP,Protected
Profile Package),和随机密钥ID传输给密钥管理系统KMS。
(7)密钥管理系统KMS根据随机密钥ID从硬件安全模块HSM中获取相应的受保护的随机密钥Random Key——可以理解地,由于随机密钥Random
Key存放于硬件安全模块HSM,因此随机密钥Random
Key是受保护的;并使用该随机密钥Random Key对PPP进行解密,得到解密后的Profile数据包,或者说未受保护的Profile数据包(UPP,Unprotected Profile Package)
(8)密钥管理系统KMS使用(6)中所提及的会话密钥Session Keys循环对UPP使用SCP03t算法进行加密。
(9)密钥管理系统KMS将加密并绑定的Profile数据包(BPP,Bound
Profile Package)传输至订阅管理数据准备服务器SM-DP+。
(10)订阅管理数据准备服务器SM-DP+向终端返回GetBppOk。
上述流程中,步骤(1)、(2)、(3)、(4)、(5)、(9)、(10)都是GSMA所制定的标准eUICC Consumer eSIM方案的Profile下载流程步骤。
可以看到,本发明一些实施例,提出了一种Profile的线上传输方案,这种线上传输方案高效安全,且流程高度自动化,不需要人为介入。
本发明一些实施例中,还引入硬件安全模块HSM,这确保密钥不会被泄露或破解。
本发明一些实施例中,公开了一种Profile数据的安全传输方法,下面具体说明。
请参照图4,一些实施例中Profile数据的安全传输方法包括以下步骤:
步骤100:密钥管理系统KMS发起密钥典礼,为运营商MNO创建一对密钥对。
步骤101:密钥管理系统KMS将密钥对保存至硬件安全模块HSM。
步骤103:订阅管理数据准备服务器SM-DP+根据运营商MNO的标识向密钥管理系统KMS发送请求密钥的消息。
步骤105:密钥管理系统KMS向硬件安全模块HSM发起请求相应密钥的消息。
步骤107:硬件安全模块HSM向密钥管理系统KMS返回密钥对中的公钥及对应的密钥ID。
步骤109:密钥管理系统KMS向订阅管理数据准备服务器SM-DP+返回所接收到的公钥及对应的密钥ID,密钥典礼完成。
步骤111:运营商MNO向订阅管理数据准备服务器SM-DP+发送请求公钥的消息,所述公钥用于加密Profile数据。
步骤113:订阅管理数据准备服务器SM-DP+根据运营商MNO标识,选择相应的公钥并向运营商MNO返回。
步骤115:运营商MNO生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理,然后将加密后的Profile数据和加密后的对称密钥发送给订阅管理数据准备服务器SM-DP+。
步骤117:订阅管理数据准备服务器SM-DP+向运营商MNO返回Profile数据添加成功的消息。
步骤119:订阅管理数据准备服务器SM-DP+将Profile数据中的非敏感的部分传输至密钥管理系统KMS,以及将Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID传输至密钥管理系统KMS。
步骤121:密钥管理系统KMS根据密钥ID从硬件安全模块HSM中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密。
步骤123:订阅管理数据准备服务器SM-DP+向密钥管理系统KMS发出将Profile数据进行拼接的命令。
步骤125:响应于将Profile数据进行拼接的命令,密钥管理系统KMS将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包。
步骤127:订阅管理数据准备服务器SM-DP+向密钥管理系统KMS发出使用随机密钥将Profile数据包进行加密的命令。
步骤129:响应于使用随机密钥将Profile数据包进行加密的命令,密钥管理系统KMS使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块HSM。
步骤131:密钥管理系统KMS将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器SM-DP+。
请参照图5,一些实施例中,Profile数据的安全传输方法还包括以下步骤:
步骤140:终端向订阅管理数据准备服务器SM-DP+发起InitiateAuthentication请求;
步骤141:订阅管理数据准备服务器SM-DP+向终端返回InitiateAuthOk;
步骤143:终端向订阅管理数据准备服务器SM-DP+发起AuthenticateClient请求;
步骤145:订阅管理数据准备服务器SM-DP+向终端返回AuthClientOk;
步骤147:终端向订阅管理数据准备服务器SM-DP+请求GetBoundProfilePackage;
步骤149:订阅管理数据准备服务器SM-DP+将其与终端交互过程(即InitiateAuthentication请求到InitiateAuthOk,AuthenticateClient请求到AuthClientOk这两个交互过程)获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统KMS;
步骤151:密钥管理系统KMS根据随机密钥ID从硬件安全模块HSM中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密;
步骤153:密钥管理系统KMS使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密;
步骤155:密钥管理系统KMS将加密并绑定的Profile数据包传输至订阅管理数据准备服务器SM-DP+;
步骤157:订阅管理数据准备服务器SM-DP+向终端返回GetBppOk。
请参照图6,一些实施例中公开了一种订阅管理数据准备服务器SM-DP+,包括存储器10和处理器11;存储器10用于存储程序;处理器11用于通过执行存储器10存储的程序本文任一实施例所述的Profile数据的安全传输方法,例如请参照图7,处理器11能够执行下面的步骤,或者说其所执行的Profile数据的安全传输方法可以包括以下的步骤:
步骤200:订阅管理数据准备服务器SM-DP+根据运营商MNO的标识向密钥管理系统KMS发送请求密钥的消息,以使得:密钥管理系统KMS向硬件安全模块HSM发起请求相应密钥的消息,并接收到由硬件安全模块HSM向密钥管理系统KMS返回密钥对中的公钥及对应的密钥ID;其中运营商MNO的密钥是由密钥管理系统KMS发起密钥典礼时为运营商MNO所创建并被保存至硬件安全模块HSM。
步骤201:订阅管理数据准备服务器SM-DP+接收密钥管理系统KMS返回的公钥及对应的密钥ID。
步骤203:订阅管理数据准备服务器SM-DP+接收由运营商MNO发送的请求公钥的消息,该公钥用于加密Profile数据。
步骤205:订阅管理数据准备服务器SM-DP+根据运营商MNO标识,选择相应的公钥并向运营商MNO返回,以使得运营商MNO生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理。
步骤207:订阅管理数据准备服务器SM-DP+接收由运营商MNO传输的加密后的Profile数据和加密后的对称密钥。
步骤209:订阅管理数据准备服务器SM-DP+将Profile数据中的非敏感的部分传输至密钥管理系统KMS,以及将Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID传输至密钥管理系统KMS,以使得:密钥管理系统KMS根据密钥ID从硬件安全模块HSM中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密,并将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包。
步骤211:订阅管理数据准备服务器SM-DP+向密钥管理系统KMS发出使用随机密钥将Profile数据包进行加密的命令,以使得:密钥管理系统KMS使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块HSM。
步骤213:订阅管理数据准备服务器SM-DP+接收由密钥管理系统KMS传输过来的加密后的Profile数据包和随机密钥ID。
请参照图8,一些实施例中,处理器11还能够执行下面的步骤,或者说其所执行的Profile数据的安全传输方法还可以包括以下的步骤:
步骤220:订阅管理数据准备服务器SM-DP+接收由终端发起的InitiateAuthentication请求。
步骤221:订阅管理数据准备服务器SM-DP+向终端返回InitiateAuthOk。
步骤223:订阅管理数据准备服务器SM-DP+接收由终端发起的AuthenticateClient请求。
步骤225:订阅管理数据准备服务器SM-DP+向终端返回AuthClientOk;
步骤227:订阅管理数据准备服务器SM-DP+接收由终端发起的请求GetBoundProfilePackage。
步骤229:订阅管理数据准备服务器SM-DP+将其与终端交互过程(即InitiateAuthentication请求到InitiateAuthOk,AuthenticateClient请求到AuthClientOk这两个交互过程)获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统KMS,以使得:密钥管理系统KMS根据随机密钥ID从硬件安全模块HSM中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密,再使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密。
步骤231:订阅管理数据准备服务器SM-DP+接收密钥管理系统KMS传输过来的加密并绑定的Profile数据包。
步骤233:订阅管理数据准备服务器SM-DP+向终端返回GetBppOk。
请参照图9,一些实施例中公开了一种运营商系统,包括存储器20和处理器21;存储器20用于存储程序;处理器21用于通过执行存储器20存储的程序本文任一实施例所述的Profile数据的安全传输方法,例如请参照图10,处理器21能够执行下面的步骤,或者说其所执行的Profile数据的安全传输方法可以包括以下的步骤:
步骤300:运营商MNO或者说运营商系统向订阅管理数据准备服务器SM-DP+发送请求公钥的消息,所述公钥用于加密Profile数据;其中运营商MNO在由密钥管理系统KMS发起的密钥典礼中被创建密钥对,具体地,该密钥对被创建后被密钥管理系统KMS保存至硬件安全模块HSM,订阅管理数据准备服务器SM-DP+根据运营商MNO的标识向密钥管理系统KMS发送请求密钥的消息,密钥管理系统KMS向硬件安全模块HSM发起请求相应密钥的消息;硬件安全模块HSM向密钥管理系统KMS返回密钥对中的公钥及对应的密钥ID,密钥管理系统KMS向订阅管理数据准备服务器SM-DP+返回所接收到的公钥及对应的密钥ID,密钥典礼完成。
步骤301:运营商MNO接收由订阅管理数据准备服务器SM-DP+返回的根据运营商MNO标识所选择的相应的公钥。
步骤303:运营商MNO生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理,然后将加密后的Profile数据和加密后的对称密钥发送给订阅管理数据准备服务器SM-DP+,以使得:订阅管理数据准备服务器SM-DP+将Profile数据中的非敏感的部分传输至密钥管理系统KMS,以及将Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID传输至密钥管理系统KMS,密钥管理系统KMS根据密钥ID从硬件安全模块HSM中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密,再将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包,再使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块HSM,以及将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器SM-DP+。一些实施例中,加密后的Profile数据包发送至订阅管理数据准备服务器SM-DP+后,能够使得订阅管理数据准备服务器SM-DP+进行如图8所示的方法流程和步骤。
请参照图11,一些实施例中公开了一种密钥管理系统KMS,包括存储器30和处理器31;存储器30用于存储程序;处理器31用于通过执行存储器30存储的程序本文任一实施例所述的Profile数据的安全传输方法,例如请参照图12,处理器31能够执行下面的步骤,或者说其所执行的Profile数据的安全传输方法可以包括以下的步骤:
步骤400:密钥管理系统KMS发起密钥典礼,为运营商MNO创建一对密钥对。
步骤401:密钥管理系统KMS将密钥对保存至硬件安全模块HSM。
步骤403:密钥管理系统KMS接收订阅管理数据准备服务器SM-DP+根据运营商MNO的标识所发送的请求密钥的消息。
步骤405:密钥管理系统KMS向硬件安全模块HSM发起请求相应密钥的消息。
步骤407:密钥管理系统KMS接收硬件安全模块HSM返回的密钥对中的公钥及对应的密钥ID。
步骤409:密钥管理系统KMS向订阅管理数据准备服务器SM-DP+返回所接收到的公钥及对应的密钥ID,密钥典礼完成。
步骤411:密钥管理系统KMS接收由订阅管理数据准备服务器SM-DP+传输过来的Profile数据中的非敏感的部分、Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID;其中所述Profile数据中的非敏感的部分、Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID,是由订阅管理数据准备服务器SM-DP+从运营商MNO处接收得到,具体地:运营商MNO向订阅管理数据准备服务器SM-DP+发送请求公钥的消息,所述公钥用于加密Profile数据;订阅管理数据准备服务器SM-DP+根据运营商MNO标识,选择相应的公钥并向运营商MNO返回;运营商MNO生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理,然后将加密后的Profile数据和加密后的对称密钥发送给订阅管理数据准备服务器SM-DP+。
步骤413:密钥管理系统KMS根据密钥ID从硬件安全模块HSM中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密。
步骤415:密钥管理系统KMS将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包。
步骤417:密钥管理系统KMS接收由订阅管理数据准备服务器SM-DP+发出的使用随机密钥将Profile数据包进行加密的命令。
步骤419:密钥管理系统KMS使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块HSM。
步骤421:密钥管理系统KMS将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器SM-DP+。一些实施例中,加密后的Profile数据包发送至订阅管理数据准备服务器SM-DP+后,能够使得订阅管理数据准备服务器SM-DP+进行如图8所示的方法流程和步骤。
请参照图13,一些实施例中公开了一种物联网终端,包括存储器40和处理器41;存储器40用于存储程序;处理器41用于通过执行存储器40存储的程序本文任一实施例所述的Profile数据的安全传输方法,例如请参照图14,处理器41能够执行下面的步骤,或者说其所执行的Profile数据的安全传输方法可以包括以下的步骤:
步骤500:终端即图13中所示的物联网终端,向订阅管理数据准备服务器SM-DP+发起InitiateAuthentication请求。
步骤501:终端接收由订阅管理数据准备服务器SM-DP+返回的InitiateAuthOk。
步骤503:终端向订阅管理数据准备服务器SM-DP+发起AuthenticateClient请求。
步骤505:终端接收由订阅管理数据准备服务器SM-DP+返回的AuthClientOk。
步骤507:终端向订阅管理数据准备服务器SM-DP+请求GetBoundProfilePackage,以使得:订阅管理数据准备服务器SM-DP+将其与终端交互过程(即InitiateAuthentication请求到InitiateAuthOk,AuthenticateClient请求到AuthClientOk这两个交互过程)获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统KMS,密钥管理系统KMS根据随机密钥ID从硬件安全模块HSM中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密,以及密钥管理系统KMS使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密,再将加密并绑定的Profile数据包传输至订阅管理数据准备服务器SM-DP+,以使得订阅管理数据准备服务器SM-DP+能够向终端返回GetBppOk。
步骤509:终端接收由订阅管理数据准备服务器SM-DP+返回的GetBppOk。
一些实施例中,图14中所涉及到的加密后的Profile数据包可以是通过例如图4、图7、图10或图12所示的方法步骤来获取。
本文中引入硬件安全模块HSM参与的线上Profile传输,这保证整体流程是安全可控的,端到端(End-to-End)的保护使得所有敏感数据都无法被获取和泄露。
本文中能将单个或批量码号(Profile)的添加准备实现自动化,提升数据传输的效率。
本文参照了各种示范实施例进行说明。然而,本领域的技术人员将认识到,在不脱离本文范围的情况下,可以对示范性实施例做出改变和修正。例如,各种操作步骤以及用于执行操作步骤的组件,可以根据特定的应用或考虑与系统的操作相关联的任何数量的成本函数以不同的方式实现(例如一个或多个步骤可以被删除、修改或结合到其他步骤中)。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。另外,如本领域技术人员所理解的,本文的原理可以反映在计算机可读存储介质上的计算机程序产品中,该可读存储介质预装有计算机可读程序代码。任何有形的、非暂时性的计算机可读存储介质皆可被使用,包括磁存储设备(硬盘、软盘等)、光学存储设备(CD至ROM、DVD、Blu Ray盘等)、闪存和/或诸如此类。这些计算机程序指令可被加载到通用计算机、专用计算机或其他可编程数据处理设备上以形成机器,使得这些在计算机上或其他可编程数据处理装置上执行的指令可以生成实现指定的功能的装置。这些计算机程序指令也可以存储在计算机可读存储器中,该计算机可读存储器可以指示计算机或其他可编程数据处理设备以特定的方式运行,这样存储在计算机可读存储器中的指令就可以形成一件制造品,包括实现指定功能的实现装置。计算机程序指令也可以加载到计算机或其他可编程数据处理设备上,从而在计算机或其他可编程设备上执行一系列操作步骤以产生一个计算机实现的进程,使得在计算机或其他可编程设备上执行的指令可以提供用于实现指定功能的步骤。
虽然在各种实施例中已经示出了本文的原理,但是许多特别适用于特定环境和操作要求的结构、布置、比例、元件、材料和部件的修改可以在不脱离本披露的原则和范围内使用。以上修改和其他改变或修正将被包含在本文的范围之内。
前述具体说明已参照各种实施例进行了描述。然而,本领域技术人员将认识到,可以在不脱离本披露的范围的情况下进行各种修正和改变。因此,对于本披露的考虑将是说明性的而非限制性的意义上的,并且所有这些修改都将被包含在其范围内。同样,有关于各种实施例的优点、其他优点和问题的解决方案已如上所述。然而,益处、优点、问题的解决方案以及任何能产生这些的要素,或使其变得更明确的解决方案都不应被解释为关键的、必需的或必要的。本文中所用的术语“包括”和其任何其他变体,皆属于非排他性包含,这样包括要素列表的过程、方法、文章或设备不仅包括这些要素,还包括未明确列出的或不属于该过程、方法、系统、文章或设备的其他要素。此外,本文中所使用的术语“耦合”和其任何其他变体都是指物理连接、电连接、磁连接、光连接、通信连接、功能连接和/或任何其他连接。
具有本领域技术的人将认识到,在不脱离本发明的基本原理的情况下,可以对上述实施例的细节进行许多改变。因此,本发明的范围应仅由权利要求确定。
Claims (14)
- 一种Profile数据的安全传输方法,其特征在于,包括:密钥管理系统发起密钥典礼,为运营商创建一对密钥对;所述密钥管理系统将密钥对保存至硬件安全模块;订阅管理数据准备服务器根据运营商的标识向密钥管理系统发送请求密钥的消息;密钥管理系统向硬件安全模块发起请求相应密钥的消息;硬件安全模块向密钥管理系统返回密钥对中的公钥及对应的密钥ID;密钥管理系统向订阅管理数据准备服务器返回所接收到的公钥及对应的密钥ID,密钥典礼完成;运营商向订阅管理数据准备服务器发送请求公钥的消息,所述公钥用于加密Profile数据;订阅管理数据准备服务器根据运营商标识,选择相应的公钥并向运营商返回;运营商生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理,然后将加密后的Profile数据和加密后的对称密钥发送给订阅管理数据准备服务器;订阅管理数据准备服务器向运营商返回Profile数据添加成功的消息;订阅管理数据准备服务器将Profile数据中的非敏感的部分传输至密钥管理系统,以及将Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID传输至密钥管理系统;密钥管理系统根据密钥ID从硬件安全模块中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密;订阅管理数据准备服务器向密钥管理系统发出将Profile数据进行拼接的命令;响应于将Profile数据进行拼接的命令,密钥管理系统将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包;订阅管理数据准备服务器向密钥管理系统发出使用随机密钥将Profile数据包进行加密的命令;响应于使用随机密钥将Profile数据包进行加密的命令,密钥管理系统使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块;密钥管理系统将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器;终端向订阅管理数据准备服务器发起InitiateAuthentication请求;订阅管理数据准备服务器向终端返回InitiateAuthOk;终端向订阅管理数据准备服务器发起AuthenticateClient请求;订阅管理数据准备服务器向终端返回AuthClientOk;终端向订阅管理数据准备服务器请求GetBoundProfilePackage;订阅管理数据准备服务器将其与终端交互过程获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统;密钥管理系统根据随机密钥ID从硬件安全模块中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密;密钥管理系统使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密;密钥管理系统将加密并绑定的Profile数据包传输至订阅管理数据准备服务器;订阅管理数据准备服务器向终端返回GetBppOk。
- 一种Profile数据的安全传输方法,其特征在于,包括:订阅管理数据准备服务器根据运营商的标识向密钥管理系统发送请求密钥的消息,以使得:密钥管理系统向硬件安全模块发起请求相应密钥的消息,并接收到由硬件安全模块向密钥管理系统返回密钥对中的公钥及对应的密钥ID;其中运营商的密钥是由密钥管理系统发起密钥典礼时为运营商所创建并被保存至硬件安全模块;订阅管理数据准备服务器接收密钥管理系统返回的公钥及对应的密钥ID;订阅管理数据准备服务器接收由运营商发送的请求公钥的消息,该公钥用于加密Profile数据;订阅管理数据准备服务器根据运营商标识,选择相应的公钥并向运营商返回,以使得运营商生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理;订阅管理数据准备服务器接收由运营商传输的加密后的Profile数据和加密后的对称密钥;订阅管理数据准备服务器将Profile数据中的非敏感的部分传输至密钥管理系统,以及将Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID传输至密钥管理系统,以使得:密钥管理系统根据密钥ID从硬件安全模块中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密,并将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包;订阅管理数据准备服务器向密钥管理系统发出使用随机密钥将Profile数据包进行加密的命令,以使得:密钥管理系统使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块;订阅管理数据准备服务器接收由密钥管理系统传输过来的加密后的Profile数据包和随机密钥ID。
- 如权利要求2所述的安全传输方法,其特征在于,还包括:订阅管理数据准备服务器接收由终端发起的InitiateAuthentication请求;订阅管理数据准备服务器向终端返回InitiateAuthOk;订阅管理数据准备服务器接收由终端发起的AuthenticateClient请求;订阅管理数据准备服务器向终端返回AuthClientOk;订阅管理数据准备服务器接收由终端发起的请求GetBoundProfilePackage;订阅管理数据准备服务器将其与终端交互过程获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统,以使得:密钥管理系统根据随机密钥ID从硬件安全模块中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密,再使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密;订阅管理数据准备服务器接收密钥管理系统传输过来的加密并绑定的Profile数据包;订阅管理数据准备服务器向终端返回GetBppOk。
- 一种Profile数据的安全传输方法,其特征在于,包括:运营商向订阅管理数据准备服务器发送请求公钥的消息,所述公钥用于加密Profile数据;其中运营商在由密钥管理系统发起的密钥典礼中被创建密钥对,具体地,该密钥对被创建后被密钥管理系统保存至硬件安全模块,订阅管理数据准备服务器根据运营商的标识向密钥管理系统发送请求密钥的消息,密钥管理系统向硬件安全模块发起请求相应密钥的消息;硬件安全模块向密钥管理系统返回密钥对中的公钥及对应的密钥ID,密钥管理系统向订阅管理数据准备服务器返回所接收到的公钥及对应的密钥ID,密钥典礼完成;运营商接收由订阅管理数据准备服务器返回的根据运营商标识所选择的相应的公钥;运营商生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理,然后将加密后的Profile数据和加密后的对称密钥发送给订阅管理数据准备服务器,以使得:订阅管理数据准备服务器将Profile数据中的非敏感的部分传输至密钥管理系统,以及将Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID传输至密钥管理系统,密钥管理系统根据密钥ID从硬件安全模块中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密,再将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包,再使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块,以及将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器。
- 如权利要求4所述的安全传输方法,其特征在于,加密后的Profile数据包发送至订阅管理数据准备服务器后,能够使得:订阅管理数据准备服务器接收由终端发起的InitiateAuthentication请求;订阅管理数据准备服务器向终端返回InitiateAuthOk;订阅管理数据准备服务器接收由终端发起的AuthenticateClient请求;订阅管理数据准备服务器向终端返回AuthClientOk;订阅管理数据准备服务器接收由终端发起的请求GetBoundProfilePackage;订阅管理数据准备服务器将其与终端交互过程获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统,以使得:密钥管理系统根据随机密钥ID从硬件安全模块中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密,再使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密;订阅管理数据准备服务器接收密钥管理系统传输过来的加密并绑定的Profile数据包;订阅管理数据准备服务器向终端返回GetBppOk。
- 一种Profile数据的安全传输方法,其特征在于,包括:密钥管理系统发起密钥典礼,为运营商创建一对密钥对;所述密钥管理系统将密钥对保存至硬件安全模块;密钥管理系统接收订阅管理数据准备服务器根据运营商的标识所发送的请求密钥的消息;密钥管理系统向硬件安全模块发起请求相应密钥的消息;密钥管理系统接收硬件安全模块返回的密钥对中的公钥及对应的密钥ID;密钥管理系统向订阅管理数据准备服务器返回所接收到的公钥及对应的密钥ID,密钥典礼完成;密钥管理系统接收由订阅管理数据准备服务器传输过来的Profile数据中的非敏感的部分、Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID;其中所述Profile数据中的非敏感的部分、Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID,是由订阅管理数据准备服务器从运营商处接收得到,具体地:运营商向订阅管理数据准备服务器发送请求公钥的消息,所述公钥用于加密Profile数据;订阅管理数据准备服务器根据运营商标识,选择相应的公钥并向运营商返回;运营商生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理,然后将加密后的Profile数据和加密后的对称密钥发送给订阅管理数据准备服务器;密钥管理系统根据密钥ID从硬件安全模块中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密;密钥管理系统将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包;密钥管理系统接收由订阅管理数据准备服务器发出的使用随机密钥将Profile数据包进行加密的命令;密钥管理系统使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块;密钥管理系统将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器。
- 如权利要求6所述的安全传输方法,其特征在于,密钥管理系统将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器,能够使得:订阅管理数据准备服务器接收由终端发起的InitiateAuthentication请求;订阅管理数据准备服务器向终端返回InitiateAuthOk;订阅管理数据准备服务器接收由终端发起的AuthenticateClient请求;订阅管理数据准备服务器向终端返回AuthClientOk;订阅管理数据准备服务器接收由终端发起的请求GetBoundProfilePackage;订阅管理数据准备服务器将其与终端交互过程获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统,以使得:密钥管理系统根据随机密钥ID从硬件安全模块中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密,再使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密;订阅管理数据准备服务器接收密钥管理系统传输过来的加密并绑定的Profile数据包;订阅管理数据准备服务器向终端返回GetBppOk。
- 一种Profile数据的安全传输方法,其特征在于,包括:终端向订阅管理数据准备服务器发起InitiateAuthentication请求;终端接收由订阅管理数据准备服务器返回的InitiateAuthOk;终端向订阅管理数据准备服务器发起AuthenticateClient请求;终端接收由订阅管理数据准备服务器返回的AuthClientOk;终端向订阅管理数据准备服务器请求GetBoundProfilePackage,以使得:订阅管理数据准备服务器将其与终端交互过程获取到的会话密钥、加密后的Profile数据包和随机密钥ID传输给密钥管理系统,密钥管理系统根据随机密钥ID从硬件安全模块中获取相应的受保护的随机密钥,并使用该随机密钥对加密后的Profile数据包进行解密,以及密钥管理系统使用会话密钥循环对解密后的Profile数据包使用SCP03t算法进行加密,再将加密并绑定的Profile数据包传输至订阅管理数据准备服务器,以使得订阅管理数据准备服务器能够向终端返回GetBppOk;终端接收由订阅管理数据准备服务器返回的GetBppOk。
- 如权利要求6所述的安全传输方法,其特征在于,所述加密后的Profile数据包经过下述步骤得到:密钥管理系统发起密钥典礼,为运营商创建一对密钥对;所述密钥管理系统将密钥对保存至硬件安全模块;订阅管理数据准备服务器根据运营商的标识向密钥管理系统发送请求密钥的消息;密钥管理系统向硬件安全模块发起请求相应密钥的消息;硬件安全模块向密钥管理系统返回密钥对中的公钥及对应的密钥ID;密钥管理系统向订阅管理数据准备服务器返回所接收到的公钥及对应的密钥ID,密钥典礼完成;运营商向订阅管理数据准备服务器发送请求公钥的消息,所述公钥用于加密Profile数据;订阅管理数据准备服务器根据运营商标识,选择相应的公钥并向运营商返回;运营商生成一个基于会话的对称密钥,并使用该对称密钥将Profile数据的敏感部分加密,以及使用所接收到的公钥将对称密钥加密处理,然后将加密后的Profile数据和加密后的对称密钥发送给订阅管理数据准备服务器;订阅管理数据准备服务器向运营商返回Profile数据添加成功的消息;订阅管理数据准备服务器将Profile数据中的非敏感的部分传输至密钥管理系统,以及将Profile数据中被加密的敏感部分和携带着相应公钥的密钥ID传输至密钥管理系统;密钥管理系统根据密钥ID从硬件安全模块中获取相应的受保护的私钥,使用该私钥对加密后的对称密钥进行解密,再使用解密后的对称密钥对Profile数据中被加密的敏感部分进行解密;订阅管理数据准备服务器向密钥管理系统发出将Profile数据进行拼接的命令;响应于将Profile数据进行拼接的命令,密钥管理系统将Profile数据中的非敏感的部分和Profile数据中被解密后的敏感部分合成一个完整的Profile数据包;订阅管理数据准备服务器向密钥管理系统发出使用随机密钥将Profile数据包进行加密的命令;响应于使用随机密钥将Profile数据包进行加密的命令,密钥管理系统使用随机密钥将整个的Profile数据包进行加密,并将随机密钥保存至硬件安全模块;密钥管理系统将加密后的Profile数据包和随机密钥ID发送至订阅管理数据准备服务器。
- 一种订阅管理数据准备服务器,其特征在于,包括:存储器,用于存储程序;处理器,用于通过执行所述存储器存储的程序以实现如权利要求2或3所述的Profile数据的安全传输方法。
- 一种运营商系统,其特征在于,包括:存储器,用于存储程序;处理器,用于通过执行所述存储器存储的程序以实现如权利要求4或5所述的Profile数据的安全传输方法。
- 一种密钥管理系统,其特征在于,包括:存储器,用于存储程序;处理器,用于通过执行所述存储器存储的程序以实现如权利要求6或7所述的Profile数据的安全传输方法。
- 一种物联网终端,其特征在于,包括:存储器,用于存储程序;处理器,用于通过执行所述存储器存储的程序以实现如权利要求8或9所述的Profile数据的安全传输方法。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有程序,所述程序能够被处理器执行以实现如权利要求1至9中任一项所述的Profile数据的安全传输方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202080027008.0A CN113785547B (zh) | 2020-12-30 | 2020-12-30 | 一种Profile数据的安全传输方法和相应装置 |
PCT/CN2020/141257 WO2022141157A1 (zh) | 2020-12-30 | 2020-12-30 | 一种 Profile 数据的安全传输方法和相应装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/141257 WO2022141157A1 (zh) | 2020-12-30 | 2020-12-30 | 一种 Profile 数据的安全传输方法和相应装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022141157A1 true WO2022141157A1 (zh) | 2022-07-07 |
Family
ID=78835366
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/141257 WO2022141157A1 (zh) | 2020-12-30 | 2020-12-30 | 一种 Profile 数据的安全传输方法和相应装置 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN113785547B (zh) |
WO (1) | WO2022141157A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109495874A (zh) * | 2018-12-28 | 2019-03-19 | 恒宝股份有限公司 | Profile下载的方法和装置 |
CN110113741A (zh) * | 2019-04-26 | 2019-08-09 | 深圳杰睿联科技有限公司 | eSIM卡开通方法和系统 |
CN110248358A (zh) * | 2019-07-03 | 2019-09-17 | 深圳杰睿联科技有限公司 | 基于物联网的eSIM管理方法和系统 |
CN111935704A (zh) * | 2020-09-14 | 2020-11-13 | 深圳杰睿联科技有限公司 | Profile下载方法、装置及设备 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3057350A1 (en) * | 2015-02-13 | 2016-08-17 | Gemalto Sa | Method for remote subscription management of an eUICC, corresponding terminal |
FR3062767A1 (fr) * | 2017-02-09 | 2018-08-10 | Orange | Technique d'administration d'une souscription aupres d'un operateur |
CN110505619B (zh) * | 2019-09-12 | 2022-04-01 | 恒宝股份有限公司 | 一种eSIM远程配置中的数据传输方法 |
-
2020
- 2020-12-30 CN CN202080027008.0A patent/CN113785547B/zh active Active
- 2020-12-30 WO PCT/CN2020/141257 patent/WO2022141157A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109495874A (zh) * | 2018-12-28 | 2019-03-19 | 恒宝股份有限公司 | Profile下载的方法和装置 |
CN110113741A (zh) * | 2019-04-26 | 2019-08-09 | 深圳杰睿联科技有限公司 | eSIM卡开通方法和系统 |
CN110248358A (zh) * | 2019-07-03 | 2019-09-17 | 深圳杰睿联科技有限公司 | 基于物联网的eSIM管理方法和系统 |
CN111935704A (zh) * | 2020-09-14 | 2020-11-13 | 深圳杰睿联科技有限公司 | Profile下载方法、装置及设备 |
Also Published As
Publication number | Publication date |
---|---|
CN113785547A (zh) | 2021-12-10 |
CN113785547B (zh) | 2023-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210367795A1 (en) | Identity-Linked Authentication Through A User Certificate System | |
US20220014524A1 (en) | Secure Communication Using Device-Identity Information Linked To Cloud-Based Certificates | |
CN110380852B (zh) | 双向认证方法及通信系统 | |
CN109088889B (zh) | 一种ssl加解密方法、系统及计算机可读存储介质 | |
US20190342079A1 (en) | Key management system and method | |
US20190173873A1 (en) | Identity verification document request handling utilizing a user certificate system and user identity document repository | |
EP2792100B1 (en) | Method and device for secure communications over a network using a hardware security engine | |
CN111431713B (zh) | 一种私钥存储方法、装置和相关设备 | |
WO2016107318A1 (zh) | 一种安全通信系统 | |
US8495383B2 (en) | Method for the secure storing of program state data in an electronic device | |
CN106788989B (zh) | 一种建立安全加密信道的方法及设备 | |
WO2019109852A1 (zh) | 一种数据传输方法及系统 | |
WO2016107322A1 (zh) | 安全浏览器的实现方法和安全浏览器装置 | |
US8397281B2 (en) | Service assisted secret provisioning | |
CN103237305B (zh) | 面向移动终端上的智能卡密码保护方法 | |
WO2015180689A1 (zh) | 验证信息的获取方法及装置 | |
CN103546289A (zh) | 一种基于USBKey的安全传输数据的方法及系统 | |
WO2018024048A1 (zh) | 一种认证方法,服务器,终端以及网关 | |
JP2020533853A (ja) | デジタル証明書を管理するための方法および装置 | |
WO2023151479A1 (zh) | 数据处理方法及设备 | |
CN105591748B (zh) | 一种认证方法和装置 | |
CN114173328A (zh) | 密钥交换方法、装置、电子设备 | |
CN111901335B (zh) | 基于中台的区块链数据传输管理方法及系统 | |
CN112637140A (zh) | 密码传输方法、终端、服务器及可读存储介质 | |
CN113422753B (zh) | 数据处理方法、装置、电子设备及计算机存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20967502 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20967502 Country of ref document: EP Kind code of ref document: A1 |