WO2017177383A1 - 一种远程管理方法及设备 - Google Patents

一种远程管理方法及设备 Download PDF

Info

Publication number
WO2017177383A1
WO2017177383A1 PCT/CN2016/079097 CN2016079097W WO2017177383A1 WO 2017177383 A1 WO2017177383 A1 WO 2017177383A1 CN 2016079097 W CN2016079097 W CN 2016079097W WO 2017177383 A1 WO2017177383 A1 WO 2017177383A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
euicc
identifier
remote
digital signature
Prior art date
Application number
PCT/CN2016/079097
Other languages
English (en)
French (fr)
Inventor
程紫尧
龙水平
衣强
高林毅
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20194072.3A priority Critical patent/EP3800909B1/en
Priority to EP16898202.3A priority patent/EP3429243B1/en
Priority to CN201680044510.6A priority patent/CN107925868B/zh
Priority to US16/092,990 priority patent/US11076295B2/en
Priority to PCT/CN2016/079097 priority patent/WO2017177383A1/zh
Priority to EP23175240.3A priority patent/EP4304222A1/en
Publication of WO2017177383A1 publication Critical patent/WO2017177383A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a remote management method and device.
  • the embedded Universal Integrated Circuit Card can also be called an embedded Subscriber Identity Module (eSIM).
  • eUICC can be inserted into the user terminal through plug-in or soldering. (such as mobile phones, tablets, etc.).
  • the eUICC can access the communication carrier network (such as 2G/3G/4G network, etc.) after installing the profile provided by the communication carrier.
  • the communication carrier also remotely manages the configuration file in the eUICC, for example, activating a configuration file in the eUICC, deactivating a configuration file in the eUICC, deleting a configuration file in the eUICC, or reviewing the status of the eUICC.
  • FIG. 1 is a schematic flowchart of an existing remote management process. As shown in FIG. 1 , a process in which a communication carrier performs remote management on a configuration file in an eUICC may include the following steps:
  • the communication carrier sends at least a remote profile management command (emonet profile management command) and an eUICC identifier (eUICC-) for remotely managing the configuration file.
  • ID EID
  • SM-DP+ Subscription Manager-Data Preparation server of the Subscription Manager-Discovery Service
  • the SM-DP+ server After receiving the remote configuration file management command and the address of the SM-DS server, the SM-DP+ server generates an event identifier corresponding to the remote configuration file management command.
  • the event identifier is used to identify a remote configuration file management event, and the event identifier may also be called For the notification identifier or notification identifier, and at least establish and store the correspondence between the event identifier, the remote profile management command, the eUICC identifier, the SM-DP+ server address, and the address of the SM-DS server.
  • the SM-DP+ server is built according to the address of the SM-DS server and the SM-DS server. Stand up.
  • the SM-DP+ server After the SM-DP+ server establishes a connection with the SM-DS server, at least the event identifier, the address of the SM-DP+ server, and the eUICC identifier are registered in the SM-DS server.
  • the local profile assistant (LPA) in the user terminal establishes a connection with the SM-DS server by using the address of the SM-DS server provided by the eUICC.
  • the SM-DS server After the LPA establishes a connection with the SM-DS server, the SM-DS server sends at least the event identifier, the eUICC identifier, and the address of the SM-DP+ server to the LPA.
  • the LPA establishes a connection with the SM-DP+ server according to the address of the SM-DP+ server.
  • the LPA After the LPA establishes a connection with the SM-DP+ server, the LPA sends at least the event identifier to the SM-DP+ server.
  • the SM-DP+ server After the SM-DP+ server receives the event identifier, the SM-DP+ server directly stores the remote configuration file management command corresponding to the event identifier to the eUICC through the LPA.
  • the eUICC executes the remote configuration file management command.
  • the remote configuration file management command can be tampered with by the illegal device, causing the eUICC to execute the falsified remote configuration file management command (such as performing illegal activation). Configuration files, illegal deactivation of configuration files, or illegal deletion of configuration files). Therefore, the security of the above remote management is not high.
  • the embodiment of the invention discloses a remote management method and device, which is beneficial to improving the security of remote management.
  • an embodiment of the present invention discloses a remote management method, where the method includes:
  • the subscription management-data preparation SM-DP+ server receives the first identifier sent by the local configuration file assistant LPA; the SM-DP+ server searches for the remote configuration file management command corresponding to the first identifier; the SM-DP+ server is based at least on the first identifier and the remote configuration file.
  • the management command generates a first digital signature and transmits at least a first digital signature and a remote profile management command to the embedded universal integrated circuit card eUICC via the LPA.
  • the eUICC may send the first to the eUICC according to the first digital signature and the LPA.
  • the first digital signature is verified by a public key in the digital certificate of the identifier and the SM-DP+ to determine whether the remote configuration file management command has been tampered with by the illegal device, and is determined only when the remote configuration file management command has not been tampered with by the illegal device.
  • Remote configuration management commands are enforced to increase the security of remote management.
  • the subscription management-data preparation SM-DP+ server may also check whether an event corresponding to the first identifier is stored; if the first identifier is stored The corresponding event is identified, and when the event corresponding to the first identifier is a remote profile management event, the SM-DP+ server does not generate an interaction identifier; the SM-DP+ server searches for a remote profile management command corresponding to the first identifier, including: When an event corresponding to the identifier is a remote profile management event, the SM-DP+ server searches for a remote profile management command corresponding to the first identifier.
  • the interaction identifier is used to identify the interaction. When the event corresponding to the first identifier is a remote profile management event, the interaction identifier is not generated, so that the existing first identifier can be used instead of the interaction identifier, which is beneficial to reduce The number of parameters.
  • the SM-DP+ server may further receive a second digital signature sent by the eUICC through the LPA and a digital certificate of the eUICC and a digital certificate of the eUICC manufacturer EUM, the second digital signature being eUICC at least according to the first The identifier is generated; the SM-DP+ server verifies the EUM digital certificate and the eUICC digital certificate, and verifies the second digital signature using at least the first identifier and the public key in the eUICC digital certificate; if the EUM digital certificate, eUICC After the digital certificate and the second digital signature are both verified, the step of the SM-DP+ server searching for the remote profile management command corresponding to the first identifier is performed.
  • the subscription management-discovery service SM-DS server sends a second message, where the second message includes at least an address of the SM-DP+ server, an eUICC identifier, and a first identifier, and the second message is used by the SM-DS server to delete at least the SM-DP+ server.
  • the sent SM-DP+ address, the eUICC identifier, and the first identifier, the first message includes at least a first identifier and a digital signature generated by the eUICC according to the first identifier.
  • the SM-DS server can delete the information of the remote configuration file management command stored therein (including at least the SM-DP+ address, the eUICC identifier, and the first identifier), thereby avoiding duplication. Perform completed remote distribution Set file commands and save storage space.
  • an embodiment of the present invention provides a remote management method, where the method includes: an embedded universal integrated circuit card eUICC receives at least a first identifier sent by a local profile assistant LPA; and the eUICC receives at least a first digital signature sent by the LPA And a remote configuration file management command, the first digital signature is a subscription management-data preparation SM-DP+ server generated according to at least the first identifier and the remote configuration file management command; the eUICC is configured according to at least the first identifier and the remote configuration file management command A digital signature is verified; if the first digital signature is verified, the eUICC executes a remote configuration file management command.
  • the verification is passed (indicating that the remote configuration file management command has not been tampered with by the illegal device), the eUICC executes the remote configuration file management command. It can be seen that the security of remote management is improved.
  • the second digital signature may also be generated according to at least the first identifier; the eUICC sends at least the second digital signature through the LPA.
  • eUICC digital certificate and digital certificate of eUICC manufacturer EUM to SM-DP+ server.
  • the eUICC generates a second digital signature according to the interaction identifier, so that the first identifier is used instead of the interaction identifier, which reduces the number of parameters and makes the parameters more succinct.
  • the eUICC may also send the first message to the LPA, the first A message is used to request user confirmation; after receiving the confirmation execution message returned by the LPA, the eUICC executes a remote configuration file management command.
  • the target command may include, but is not limited to, a command to activate a configuration file, a command to deactivate a configuration file, or a command to delete a configuration file.
  • the remote configuration file management result of the remote configuration file management command may be generated, where the remote configuration file management result includes at least the first identifier and generated according to the at least first identifier. a third digital signature; the eUICC sends a remote profile management result containing at least the first identity and the third digital signature to the LPA.
  • the remote configuration file management result is fed back to the LPA, so that the LPA can notify the SM-DP+ server, so that the SM-DP+ server can promptly notify the SM-DS server to delete the stored remote configuration file management in time.
  • the information of the command (including at least the SM-DP+ server address, the eUICC identifier, and the first identifier), thereby avoiding repeated execution of the completed remote configuration file command and saving storage space of the SM-DS server.
  • an embodiment of the present invention provides a remote management method, where the method includes: a subscription management-discovery service SM-DS server receives a first message sent by a subscription management-data preparation SM-DP+ server, where the first message is at least The embedded universal integrated circuit card eUICC identifier and the first identifier are included; after the SM-DS server passes the identity authentication of the eUICC, the SM-DS server generates a token, and the token is based at least on the first identifier, the eUICC identifier, and the SM- The digital signature generated by the address of the DS server; the SM-DS server sends a second message to the local profile assistant LPA, the second message including at least the eUICC identifier, the first identifier, the token, the address of the SM-DP+ server, and the SM- The address of the DS server and the digital certificate of the SM-DS server.
  • a subscription management-discovery service SM-DS server receives a
  • an embodiment of the present invention provides a remote management method, where the method includes: a subscription management-data preparation SM-DP+ server receives a first message sent by a local configuration file assistant LPA, and the first message includes at least an embedded universal The integrated circuit card eUICC identifier, the first identifier, the token, the digital certificate of the SM-DS server, and the address of the SM-DS server, the token being at least the first identifier of the SM-DS server, according to the eUICC identifier and the SM-DS server
  • the digital signature generated by the address; the SM-DP+ server verifies the token; if the verification passes, the SM-DP+ server verifies whether the address of the SM-DS server matches the address of the SM-DS server corresponding to the first identifier, and verifies Whether the eUICC identifier matches the eUICC identifier corresponding to the first identifier; if the address of the SM-DS server matches the address of the SM
  • the first message further includes a random number generated by the eUICC, and after the SM-DP+ server determines that the identity of the eUICC is passed, when the event corresponding to the first identifier is a remote profile management event, at least Generating a first digital signature according to the remote number and the remote profile management command corresponding to the first identifier; the SM-DP+ server sends at least the first digital signature through the LPA, far Program configuration file management commands and digital certificates of the SM-DP+ server to eUICC.
  • the SM-DP+ server generates the first digital signature by using at least the remote profile management command and the random number generated by the eUICC, and the eUICC only needs to verify the first digital signature successfully, and can determine the identity authentication of the SM-DP+ server, and the remote Profile management commands have not been tampered with by illegal devices, simplifying the process. And by determining that the remote configuration file management command has not been tampered with by the illegal device, the eUICC executes the remote configuration file management command and also improves the security of the remote configuration file management.
  • the SM-DP+ server may also send a third message to the subscription management-discovery service SM-DS server, where the third message includes at least the SM-DP+ server.
  • the address, the eUICC identifier, and the first identifier the third message is used by the SM-DS server to delete at least the SM-DP+ server address, the eUICC identifier, and the first identifier sent by the SM-DP+ server, where the second message includes at least a result code and At least a digital signature generated from the result code.
  • the SM-DS server can delete the information of the remote configuration file management command stored therein (including at least the SM-DP+ address, the eUICC identifier, and the first identifier), thereby avoiding duplication. Execute the completed remote profile command and save its storage space.
  • an embodiment of the present invention provides a remote management method, including: an embedded universal integrated circuit card eUICC receiving a subscription management-data preparation SM-DP+ server sends at least a first number through a local configuration file assistant LPA a message of a signature, a remote profile management command, and a digital certificate of the SM-DP+ server, the first digital signature being generated by the SM-DP+ server according to at least a random number and a remote profile management command generated by the eUICC; eUICC verification The digital certificate of the SM-DP+ server, and verifying the first digital signature using at least the random number, the public key in the digital certificate of the SM-DP+ server, and the remote configuration file management command; if the digital certificate and the first digital signature are verified , execute the remote configuration file management command.
  • the eUICC only needs to verify the success of the first digital signature, and can determine the authentication of the SM-DP+ server, and the remote configuration file management command is not falsified by the illegal device, thereby simplifying the operation process. And by determining that the remote configuration file management command has not been tampered with by the illegal device, the eUICC executes the remote configuration file management command and also improves the security of the remote configuration file management.
  • the eUICC may also send the first message to the LPA, The first message is used to request user confirmation; After receiving the confirmation execution message returned by the LPA, the eUICC executes the remote configuration file management command.
  • the target command may include, but is not limited to, a command to activate a configuration file, a command to deactivate a configuration file, or a command to delete a configuration file.
  • the eUICC may also generate a remote profile management result of the remote profile management command, the remote profile management result including at least the result code and at least generated according to the result code.
  • Digital signature the eUICC sends a remote profile management result containing at least the result code and at least a digital signature generated from the result code to the LPA.
  • the remote configuration file management result is fed back to the LPA, so that the LPA can notify the SM-DP+ server, so that the SM-DP+ server can promptly notify the SM-DS server to delete the stored remotely in time.
  • the information of the configuration file management command (including at least the SM-DP+ server address, the eUICC identifier, and the first identifier) prevents the repeated execution of the completed remote configuration file command and saves the storage space of the SM-DS server.
  • an embodiment of the present invention provides a subscription management-data preparation SM-DP+ server, and the SM-DP+ server has a function of implementing SM-DP+ server behavior in the first aspect and the second aspect design.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above. This module can be software and/or hardware.
  • the structure of the SM-DP+ server includes a processor and a transceiver configured to support the SM-DP+ server to perform the corresponding functions in the above methods.
  • the transceiver is used to support communication between the SM-DP+ server and other network elements.
  • the SM-DP+ server may also include a memory for coupling with the processor that holds the necessary program instructions and data for the SM-DP+ server.
  • an embodiment of the present invention provides an embedded universal integrated circuit card eUICC, which has the function of implementing the eUICC behavior in the first aspect and the second aspect design.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above. This module can be software and/or hardware.
  • the structure of the eUICC includes a processor and a transceiver configured to support the eUICC to perform the corresponding functions in the above methods.
  • the transceiver is used to support communication between the eUICC and other network elements.
  • the eUICC may also include a memory for coupling with the processor that holds the necessary program instructions and data for the eUICC.
  • an embodiment of the present invention provides a subscription management-discovery service SM-DS server, which has the function of implementing the behavior of the SM-DS server in the foregoing third, fourth, and fifth aspects.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above. This module can be software and/or hardware.
  • the structure of the SM-DS server includes a processor and a transceiver configured to support the SM-DS server to perform the corresponding functions in the above methods.
  • the transceiver is used to support communication between the SM-DS server and other network elements.
  • the SM-DS server may also include a memory for coupling with the processor that holds the necessary program instructions and data for the SM-DS server.
  • an embodiment of the present invention provides a subscription management-data preparation SM-DP+ server, and the SM-DP+ server has a function of implementing SM-DP+ server behavior in the foregoing third, fourth, and fifth aspects.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above. This module can be software and/or hardware.
  • the structure of the SM-DP+ server includes a processor and a transceiver configured to support the SM-DP+ server to perform the corresponding functions in the above methods.
  • the transceiver is used to support communication between the SM-DP+ server and other network elements.
  • the SM-DP+ server may also include a memory for coupling with the processor that holds the necessary program instructions and data for the SM-DP+ server.
  • an embodiment of the present invention provides an embedded universal integrated circuit card eUICC, which has the function of implementing the eUICC behavior in the fourth aspect and the fifth aspect design.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above. This module can be software and/or hardware.
  • the structure of the eUICC includes a processor and a transceiver, and the processor is Configured to support eUICC to perform the corresponding functions in the above methods.
  • the transceiver is used to support communication between the eUICC and other network elements.
  • the eUICC may also include a memory for coupling with the processor that holds the necessary program instructions and data for the eUICC.
  • an embodiment of the present invention provides a computer storage medium for storing computer software instructions used by the SM-DP+ server in the sixth aspect, which includes a program designed to perform the above aspects.
  • the embodiment of the present invention provides a computer storage medium for storing computer software instructions used by the eUICC in the seventh aspect, which includes a program designed to execute the above aspects.
  • the embodiment of the present invention provides a computer storage medium for storing computer software instructions used by the SM-DS server in the eighth aspect, which includes a program designed to execute the above aspects.
  • the embodiment of the present invention provides a computer storage medium for storing computer software instructions used by the SM-DP+ server in the ninth aspect, which includes a program designed to execute the above aspects.
  • the embodiment of the present invention provides a computer storage medium for storing computer software instructions used by the eUICC in the above tenth aspect, which includes a program designed to execute the above aspects.
  • the SM-DP+ server after receiving the first identifier sent by the LPA, the SM-DP+ server will find the remote configuration file management command corresponding to the first identifier; the SM-DP+ server is managed according to at least the remote configuration file.
  • the command and the first identifier generate a first digital signature, and send at least the first digital signature and the remote profile management command to the eUICC through the LPA. Therefore, after receiving the first digital signature and the remote configuration file management command, the eUICC may verify the first digital signature according to at least the first identifier sent by the LPA to the eUICC and the public key in the digital certificate of the SM-DP+.
  • the eUICC executes the remote configuration file management command. It can be seen that, by using the embodiment of the present invention, the eUICC can determine whether the remote configuration file management command is falsified by the illegal device, and execute the remote configuration file management command when determining that the remote configuration file management command has not been tampered with by the illegal device, thereby improving the remote management. Rational security.
  • the SM-DS server may generate a token according to at least the eUICC identifier and the address of the SM-DS server, and send at least the token to the LPA; thus, the LPA may send the token to SM-DP+ server; after receiving the token sent by the LPA, the SM-DP+ server verifies the token.
  • SM-DP+ server determines that the identity authentication for the eUICC is passed. It can be seen that, by implementing the embodiment of the present invention, the interaction process in the process of authenticating the eUICC by the SM-DP+ server is simplified, and the whole operation process is more streamlined.
  • FIG. 1 is a schematic flowchart of a conventional remote management according to an embodiment of the present invention.
  • FIG. 2 is a schematic structural diagram of a system disclosed in an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of a remote management method according to an embodiment of the present invention.
  • FIG. 4 is a schematic flowchart diagram of another remote management method according to an embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of still another remote management method according to an embodiment of the present invention.
  • 6A is a schematic structural diagram of an SM-DP+ server according to an embodiment of the present invention.
  • 6B is a schematic structural diagram of another SM-DP+ server according to an embodiment of the present invention.
  • FIG. 7A is a schematic structural diagram of an eUICC according to an embodiment of the present invention.
  • FIG. 7B is a schematic structural diagram of another eUICC according to an embodiment of the present invention.
  • 8A is a schematic structural diagram of an SM-DS server according to an embodiment of the present invention.
  • FIG. 8B is a schematic structural diagram of another SM-DS server according to an embodiment of the present invention.
  • the remote configuration file management command can be tampered with by the illegal device, thereby causing the eUICC to execute the falsified remote configuration file management command (such as illegal execution). Activate the configuration file, illegally deactivate the configuration file, or illegally delete the configuration file). Therefore, the security of existing remote management is not high.
  • the embodiment of the invention discloses a remote management method and device.
  • the method and the device are based on the same inventive concept. Since the principles of the method and the device for solving the problem are similar, the implementation of the device and the method can be referred to each other, and the repeated description is not repeated.
  • FIG. 2 is a schematic structural diagram of a system disclosed in an embodiment of the present invention.
  • the system architecture includes: a user terminal, an SM-DP+ server, and an SM-DS server.
  • the user terminal may include a mobile phone, a tablet, a personal digital assistant (PDA), a television, an in-vehicle device, a Machine to Machine (M2M), and a Mobile Internet Device (MID). , smart wearable devices (such as smart watches, smart bracelets) and other electronic devices.
  • PDA personal digital assistant
  • the user terminal is provided with an eUICC and an LPA, wherein the LPA can be deployed in the eUICC or can be deployed independently from the eUICC.
  • the LPA may include a Local Profile Download (LPD) module, a Local User Interface (LUI) module, and a Local Discovery Service (LDS) module.
  • LPD Local Profile Download
  • LPI Local User Interface
  • LDS Local Discovery Service
  • the LPA bears the user terminal inside the user terminal.
  • the interaction between the eUICCs, the LPD module is mainly responsible for signing file downloads, the LDS module is mainly responsible for service discovery, and the LUI module provides a UI interface for users.
  • the user can manage the configuration file downloaded to the eUICC through the LPA, such as activation, deactivation, and deletion of the configuration file.
  • the SM-DP+ server can send remote configuration file management commands to the eUICC through the LPA, enabling the eUICC to execute remote configuration file management commands, thereby implementing remote management.
  • the remote configuration file management includes activating the configuration file, Activate the configuration file, delete the configuration file, and review the eUICC status.
  • the main function of the SM-DS server is to provide a mechanism for the SM-DP+ server to contact the LPA.
  • the LPA can obtain the address of the SM-DP+ server from the SM-DS server, and the LPA can contact the SM-DP+ server.
  • the SM-DS server in this document may be a specific SM-DS server or a general term of a multi-level SM-DS server.
  • the communication carrier when the communication operator needs to remotely operate the configuration file (such as downloading the configuration file to the eUICC or remotely managing the configuration file in the eUICC), the communication carrier sends an operation command (such as configuration).
  • the file download command or remote configuration file management command ), the eUICC identifier (for identifying the eUICC), and the address of the SM-DS server corresponding to the configuration file to the SM-DP+ server.
  • the SM-DP+ server After receiving the operation command, the eUICC identifier, and the address of the SM-DS server, the SM-DP+ server generates an event identifier corresponding to the operation command, and the identifier may also be referred to as a notification identifier or a notification identifier, where the event identifier is used to identify an event, where Events include profile download events and remote profile management events. For example, if the event is a profile download event, an event identifier of the configuration file download is generated; if the event is a remote profile management event, an identifier of the remote profile management is generated.
  • the SM-DP+ server establishes at least a correspondence between an operation command, an event identifier, an eUICC identifier, an address of the SM-DP+ server, and an address of the SM-DS server, and stores the correspondence.
  • the SM-DP+ server After the SM-DP+ server generates an event identifier corresponding to the operation command, at least the event identifier, the eUICC identifier, and the address of the SM-DP+ server are sent to the SM- according to the address of the SM-DS server.
  • the DS server is registered.
  • the address of the SM-DS server is stored in the eUICC, and the LPA is connected to the SM-DS server according to the address of the SM-DS server provided in the eUICC.
  • the SM-DS server and the eUICC can perform mutual authentication through the LPA (ie, the eUICC authenticates the identity of the SM-DS server, and the SM-DS server authenticates the identity of the eUICC).
  • the SM-DS server sends at least the event identifier of the SM-DP+ server registration, the eUICC identifier, and the address of the SM-DP+ server to the LPA.
  • FIG. 3 is a schematic flowchart diagram of a remote management method according to an embodiment of the present invention. As shown in FIG. 3, the remote management method may include parts 301 to 307.
  • the LPA sends at least a first identifier to the SM-DP+ server.
  • the first identifier is an event identifier.
  • the first identifier is registered in the SM-DS server by the SM-DP+ server.
  • the first identity is sent by the SM-DS server to the LPA.
  • the SM-DS server and eUICC mutual authentication the SM-DS server will also send the address of the SM-DP+ server to the LPA.
  • the LPA After receiving the address and the first identifier of the SM-DP+ server, the LPA connects to the SM-DP+ server according to the address of the SM-DP+ server, and sends at least the first to the SM-DP+ server after establishing the connection with the SM-DP+ server.
  • logo the address and the first identifier of the SM-DP+ server
  • the LPA sends the first identifier to the eUICC.
  • the LPA after the LPA sends at least the first identifier to the SM-DP+ server, the LPA sends the first identifier to the eUICC.
  • the execution order of the 302 part and the 303 part is in no particular order, and the 302 part may be executed first, or the 303 part may be executed first.
  • the SM-DP+ server searches for a remote configuration file management command corresponding to the first identifier.
  • the SM-DP+ server after the SM-DP+ server receives the first identifier, if the first identifier is an event identifier corresponding to the remote profile management event, the SM-DP+ server acquires a remote profile management command corresponding to the first identifier. .
  • the SM-DP+ server generates the at least according to the first identifier and the remote configuration file management command. Into the first digital signature.
  • the specific implementation manner of the SM-DP+ server generating the first digital signature according to the first identifier and the remote configuration file management command may be: the SM-DP+ server is based at least on the first identifier and the remote configuration file.
  • the management command generates a data structure, and then uses the private key of the SM-DP+ server to calculate the first digital signature according to the data structure.
  • the SM-DP+ server may perform a hash operation on the first identifier and the remote configuration file management command to obtain a message digest, and then encrypt the information digest with the private key of the SM-DP+ server to obtain the first digital signature.
  • the SM-DP+ server sends the first digital signature and the remote configuration file management command to the eUICC through the LPA.
  • the SM-DP+ server after the SM-DP+ server generates the first digital signature, at least the first digital signature and the remote configuration file management command are sent to the LPA, and at least the first digital signature and the remote configuration file are sent by the LPA.
  • Manage commands to eUICC At least the first digital signature and the remote configuration file management command are sent to the LPA, and at least the first digital signature and the remote configuration file are sent by the LPA.
  • the eUICC verifies the first digital signature according to the first identifier and the remote configuration file management command.
  • the eUICC after receiving the first identifier, the remote configuration file management command, and the first digital signature sent by the LPA, the eUICC will use the first identifier and the remote configuration file management command to sign the first digital identifier. authenticating.
  • the specific implementation manner of the eUICC verifying the first digital signature by using the first identifier and the remote configuration file management command may be: the eUICC uses the public key pair of the digital certificate of the previously received SM-DP+ server. Decrypting the first digital signature to obtain a message digest; and hashing the first identifier and the remote configuration file management command to obtain a new information digest; the eUICC compares the decrypted information digest with the new information digest, If the decrypted message digest is consistent with the new message digest, the eUICC determines to pass the first digital signature verification, that is, the remote profile management command has not been tampered with.
  • the eUICC executes the remote configuration file management command.
  • the eUICC determines that the first digital signature verification is passed, the eUICC executes the remote configuration file management command.
  • the SM-DP+ server after receiving the first identifier sent by the LPA, acquires a remote profile management command corresponding to the first identifier; the SM-DP+ server is based at least on the remote The profile management command and the first identifier generate a first digital signature, and send at least the first digital signature and the remote profile management command to the eUICC through the LPA. Therefore, after receiving the first digital signature and the remote configuration file management command, the eUICC may verify the first digital signature according to at least the first identifier sent by the LPA to the eUICC and the public key in the digital certificate of the SM-DP+.
  • the eUICC executes the remote configuration file management command. It can be seen that, by implementing the embodiment described in FIG. 3, the eUICC can determine whether the remote configuration file management command is falsified by the illegal device, and execute the remote configuration file management command when determining that the remote configuration file management command has not been tampered with by the illegal device, thereby improving The security of remote management.
  • FIG. 4 is a schematic flowchart diagram of another remote management method according to an embodiment of the present invention. As shown in FIG. 4, the remote management method may include portions 401 to 422.
  • the LPA sends at least the first identifier and the first random number to the SM-DP+ server.
  • the first random number is sent by the eUICC to the LPA.
  • the LPA receives the address, the first identifier, and the eUICC identifier of the SM-DP+ server sent by the SM-DS server
  • the eUICC is triggered to generate the first random number.
  • the first random number is sent to the LPA.
  • the LPA After receiving the first random number, the LPA sends at least the first random number and the first identifier to the SM-DP+ server according to the address of the SM-DP+ server.
  • the eUICC stores the first random number after generating the first random number.
  • the SM-DP+ server checks whether an event corresponding to the first identifier is stored.
  • the event includes a remote profile management event and a profile download event. If the SM-DP+ server detects that an event corresponding to the first identifier is stored, then part 403 is performed.
  • the SM-DP+ server does not generate an interaction identifier when the event corresponding to the first identifier is a remote profile management event.
  • the interaction identifier is used to identify the interaction.
  • the interaction identifier is not generated, so that the existing event identifier can be used instead of the interaction. Identification helps reduce the number of parameters.
  • the SM-DP+ server generates a second random number, and generates a first digital signature according to at least the second random number and the first random number.
  • the SM-DP+ server after the SM-DP+ server detects that the event corresponding to the first identifier is stored, the SM-DP+ server generates a second random number, and generates a first number according to at least the second random number and the first random number. signature. After the SM-DP+ server generates the second random number, the second random number is stored.
  • the specific implementation manner of the SM-DP+ server generating the first digital signature according to the second random number and the first random number may be: generating a data structure according to the second random number and the first random number, and then The first digital signature is calculated from the data structure using the private key of the SM-DP+ server.
  • the specific implementation manner of the SM-DP+ server generating the first digital signature according to the at least the second random number and the first random number may be: the SM-DP+ server performs the hash operation on the at least the second random number and the first random number. Obtain a message digest and encrypt the message digest using the private key of the SM-DP+ server to obtain the first digital signature.
  • the SM-DP+ server sends at least a second random number, a first digital signature, and a digital certificate of the SM-DP+ server to the LPA.
  • the LPA sends the first identifier, the second random number, the first digital signature, and the digital certificate of the SM-DP+ server to the eUICC.
  • the eUICC verifies the digital certificate of the SM-DP+ server, and verifies the first digital signature.
  • the eUICC after receiving the first identifier, the second random number, the first digital signature, and the digital certificate of the SM-DP+ server, uses the public key of the certificate issuer (Ceritificate Issuer) to the number of the SM-DP+ server. The certificate is verified. After the digital certificate verification of the SM-DP+ server is successful, the eUICC obtains the public key of the SM-DP+ server in the digital certificate of the SM-DP+ server, and uses at least the public key of the SM-DP+ server, the second random number, and the first stored by itself. A random number verifies the first digital signature.
  • the certificate issuer Certificate Issuer
  • the specific implementation manner that the eUICC verifies the first digital signature by using the public key, the first random number, and the second random number of the SM-DP+ server may be: the eUICC uses the public key pair of the SM-DP+ server. Decrypting the digital signature to obtain a message digest; and then performing a hash operation based on at least the second random number and the first random number stored by the eUICC, to obtain a new information digest, and digesting the decrypted information digest with the new one The information summary is compared, and if they are consistent, it is determined that the first digital signature verification is passed. If it is determined that the first digital signature verification is passed, then the portion 408 is performed.
  • the eUICC generates a second digital signature according to the first identifier and the second random number.
  • the eUICC may generate the second digital signature according to the first identifier and the second random number.
  • the specific implementation manner may be: generating a data structure according to the first identifier and the second random number, and using the eUICC The private key calculates a second digital signature based on the data structure.
  • the eUICC performs a hash operation on the first identifier and the second random number to obtain a message digest, and then encrypts the information digest with the private key of the eUICC to obtain the second digital signature.
  • the eUICC sends at least a second digital signature, a digital certificate of the eUICC, and a digital certificate of the eUICC manufacturer EUM to the SM-DP+ server through the LPA.
  • the at least second digital signature, the digital certificate of the eUICC, and the digital certificate of the EUM are sent to the SM-DP+ server through the LPA.
  • the SM-DP+ server verifies the digital certificate of the eUICC and the digital certificate of the EUM, and verifies the second digital signature by using at least the first identifier, the second random number, and the public key in the digital certificate of the eUICC.
  • the public key of the certificate issuer (Ceritificate Issuer) verifies the digital certificate of the EUM, and if the verification is successful, determines the number of the EUM. The certificate is verified; the SM-DP+ server uses the public key in the EUM digital certificate to verify the digital certificate of the eUICC.
  • the SM-DP+ server verifies the second digital signature using at least the second random number, the public key in the digital certificate of the eUICC, and the first identifier.
  • the specific implementation manner that the SM-DP+ server uses at least the second random number, the public key in the eUICC digital certificate, and the first identifier to verify the second digital signature may be: the SM-DP+ server uses the eUICC digital certificate.
  • the public key in the medium decrypts the second digital signature to obtain a message digest; and at least according to the first identifier and the second random number generated by the SM-DP+ server, the hash is calculated to obtain a new information digest;
  • the DP+ server compares the decrypted message digest with the new message digest. If they are consistent, the SM-DP+ server determines to pass the second digital signature verification. Section 411 is performed after the verification of the second digital signature is passed.
  • the eUICC In an actual application, the eUICC generates a second digital signature according to the interaction identifier. Accordingly, the SM-DP+ server also verifies the second digital signature according to the interaction identifier. By executing 408-410 The eUICC uses the existing first identifier to generate the second digital signature instead of the interaction identifier, and accordingly the SM-DP+ server verifies the second digital signature according to the first identifier stored by itself, so that the first identifier is used instead of the interactive identifier. The effect is to reduce the number of parameters and make the parameters more concise.
  • the SM-DP+ server searches for a remote configuration file management command corresponding to the first identifier.
  • the SM-DP+ server generates a third digital signature according to at least the first identifier and the remote profile management command.
  • the third digital signature is the first digital signature in the embodiment shown in FIG. 3.
  • the portion 412 is similar to the portion 304 in FIG. 3, and reference may be made to the description of section 304 in FIG. 3, and details are not described herein.
  • the SM-DP+ server sends at least a third digital signature and a remote configuration file management command to the eUICC through the LPA.
  • part 413 is similar to part 305 in FIG. 3, and reference may be made to the description of part 305 in FIG. 3, and details are not described herein.
  • the eUICC verifies the third digital signature according to the first identifier and the remote configuration file management command.
  • part 414 is similar to part 306 in FIG. 3, and reference may be made to the description of part 306 in FIG. 3, and details are not described herein.
  • the eUICC sends the first message to the LPA.
  • the eUICC determines that the third digital signature verification is passed, and the remote configuration file management command is a target command, the eUICC sends a first message for requesting user confirmation to the LPA. After the LPA receives the first message, the user confirmation can be presented through the LUI module.
  • the target command may include, but is not limited to, a command to activate a configuration file, a command to deactivate a configuration file, or a command to delete a configuration file.
  • the LPA returns a confirmation execution message to the eUICC.
  • the LPA when the LPA receives an instruction input by the user for confirming execution of the remote profile management command, the LPA returns a confirmation execution message to the eUICC.
  • the eUICC executes a remote configuration file management command.
  • the eUICC after receiving the confirmation execution message, executes a remote configuration file management command.
  • the eUICC generates a remote configuration file management result of the remote configuration file management command.
  • the eUICC after executing the remote configuration file management command, the eUICC generates a remote configuration file management result of the remote configuration file management command.
  • the remote profile management result includes at least a first identifier and a fourth digital signature generated according to the first identifier.
  • the remote profile management result may further include a result code, an address of the SM-DP+ server.
  • the fourth digital signature may be generated according to the first identifier, the result code, and the address of the SM-DP+ server.
  • the eUICC sends a remote profile management result including at least the first identifier and the fourth digital signature to the LPA.
  • the eUICC after generating the remote configuration file management result, the eUICC sends the remote configuration file management result including at least the first identifier and the fourth digital signature to the LPA.
  • the remote profile management result further includes the result code and the address of the SM-DP+ server
  • the eUICC may also send the result code and the address of the SM-DP+ server to the LPA.
  • the LPA sends a second message including at least the first identifier and the fourth digital signature to the SM-DP+ server.
  • the LPA after receiving the remote configuration file management result, the LPA sends a second message to the SM-DP+ server, where the second message includes at least the first identifier and the fourth digital signature in the remote configuration file management result.
  • the second message may further include a result code and an address of the SM-DP+ server.
  • the SM-DP+ server sends a third message to the SM-DS server.
  • the SM-DS server after receiving the second message, sends the third message to the SM-DS server.
  • the third message includes at least an address of the SM-DP+ server, an eUICC identifier, and a first identifier, where the third message is used by the SM-DS server to delete at least the address of the SM-DP+ server sent by the SM-DP+ server, the eUICC identifier, and the third message.
  • a logo is used by the SM-DS server to delete at least the address of the SM-DP+ server sent by the SM-DP+ server, the eUICC identifier, and the third message.
  • the SM-DS server deletes at least the SM-DP+ address, the eUICC identifier, and the first identifier sent by the SM-DP+ server.
  • the SM-DS server after receiving the third message, deletes at least the SM-DP+ address, the eUICC identifier, and the first identifier sent by the SM-DP+ server.
  • the SM-DS server can delete at least its stored SM-DP+ address, eUICC identifier, and first identifier in time, thereby saving storage space.
  • the SM-DP+ server after receiving the first identifier sent by the LPA, the SM-DP+ server searches for a remote profile management command corresponding to the first identifier; the SM-DP+ server at least according to the remote profile management command and the first An identifier generates a third digital signature and transmits the third digital signature and the remote configuration file management command to the eUICC through the LPA. Therefore, after receiving the third digital signature and the remote configuration file management command, the eUICC may verify the third digital signature according to at least the first identifier sent by the LPA to the eUICC and the public key in the digital certificate of the SM-DP+. If the verification is passed (indicating that the remote configuration file management command has not been tampered with by the illegal device), the eUICC executes the remote configuration file management command. It can be seen that by implementing the method described in FIG. 4, the security of remote management is improved.
  • FIG. 5 is a schematic flowchart diagram of still another remote management method according to an embodiment of the present invention.
  • the remote management method may include sections 501 to 511.
  • the SM-DS server receives the first message sent by the SM-DP+ server.
  • the first message includes at least an eUICC identifier and a first identifier.
  • the first message may further include an address of the SM-DP+ server and eUICC information 1 (eUICCinfo1).
  • the SM-DS server After the identity authentication of the eUICC is passed by the SM-DS server, the SM-DS server generates a token.
  • the token is a digital signature generated by the SM-DS server according to at least the first identifier, the eUICC identifier, and the address of the SM-DS server.
  • the specific implementation manner of the SM-DS server generating the digital signature according to the first identifier, the eUICC identifier, and the address of the SM-DS server may be: the SM-DS server is based at least on the first identifier, the eUICC identifier, and The address of the SM-DS server generates a data structure, and the private signature of the SM-DP+ server is used to calculate a digital signature based on the data structure.
  • the specific implementation manner of the SM-DS server generating the token according to the first identifier, the eUICC identifier, and the address of the SM-DS server may be: the SM-DS server at least the first identifier, the eUICC identifier, and the SM- The address of the DS server is hashed to get a message digest.
  • the private key of the SM-DS server encrypts the message digest to obtain the token.
  • the SM-DS server sends a second message to the LPA.
  • the second message includes at least an eUICC identifier, a first identifier, a token, an address of the SM-DP+ server, an address of the SM-DS server, and a digital certificate of the SM-DS server.
  • the LPA sends a third message to the SM-DP+ server.
  • the LPA after receiving the second message, the LPA sends a third message to the SM-DP+ server.
  • the third message includes at least an eUICC identifier, a first identifier, a token, a digital certificate of the SM-DS server, and an address of the SM-DS server in the second message.
  • the LPA may also trigger the eUICC to generate a random number.
  • the eUICC After the eUICC generates the random number, the eUICC returns a random number to the LPA, and the third message may further include the random number generated by the eUICC.
  • the SM-DP+ server after receiving the third message, verifies the token according to at least the eUICC identifier, the digital certificate of the SM-DS server, and the address of the SM-DS server.
  • the implementation manner of the SM-DP+ server authentication token may be: the SM-DP+ server verifies the digital certificate of the SM-DS server, and after the verification succeeds, obtains the SM-DS from the digital certificate of the SM-DS server.
  • a new message digest; the SM-DP+ server compares the decrypted message digest with the new message digest, and if the decrypted message digest is consistent with the new message digest, the SM-DP+ server determines to pass the token verification.
  • the 506 portion is performed.
  • the SM-DP+ server verifies whether the address of the SM-DS server matches the address of the SM-DS server corresponding to the first identifier, and checks whether the eUICC identifier matches the eUICC identifier corresponding to the first identifier.
  • the SM-DP+ server verifies whether the address of the SM-DS server in the third message matches the address of the SM-DS server sent by the communication carrier corresponding to the first identifier, and checks the third message. Whether the eUICC identifier in the match matches the eUICC identifier sent by the communication carrier corresponding to the first identifier.
  • the address of the SM-DS server in the third message matches the address of the SM-DS server sent by the communication carrier corresponding to the first identifier, and the eUICC identifier in the third message is operated by the communication corresponding to the first identifier If the eUICC identifier sent by the quotient matches, then the 507 part is executed.
  • the SM-DP+ server determines that the identity authentication of the eUICC is passed.
  • the SM-DP+ server when the SM-DP+ server verifies the identity of the eUICC, the SM-DP+ server needs to generate a random number and send a random number to the eUICC through the LPA; the eUICC generates a digital signature according to the random number, and sends the eUICC through the LPA.
  • the digital certificate and the digital signature are verified to the SM-DP+ server; if the SM-DP+ server verifies the digital signature according to the public key in the digital certificate of the eUICC, the SM-DP+ server determines that the authentication of the eUICC is passed.
  • the SM-DP+ server generates a first digital signature according to at least the random number and the remote configuration file management command corresponding to the first identifier.
  • the SM-DP+ server determines that the identity authentication of the eUICC is passed, the SM-DP+ server selects at least the random according to the third message.
  • the remote configuration file management command corresponding to the first identifier generates a first digital signature.
  • the SM-DP+ server may generate the first digital signature according to the random number included in the third message and the remote configuration file management command corresponding to the first identifier.
  • the SM-DP+ server may be at least according to the third.
  • the random number included in the message and the remote profile management command corresponding to the first identifier generate a data structure, and the first digital signature is calculated according to the data structure by using the private key of the SM-DP+ server.
  • the specific implementation manner of the SM-DP+ server generating the first digital signature according to the random number included in the third message and the remote configuration file management command corresponding to the first identifier may be: the SM-DP+ server includes at least the third message.
  • the random number and the remote profile management command corresponding to the first identifier are hashed to obtain a message digest, and the information is extracted by the private key of the SM-DP+ server. Encryption is performed to get the first digital signature.
  • the SM-DP+ server sends at least the first digital signature, the remote configuration file management command, and the digital certificate of the SM-DP+ server to the eUICC through the LPA.
  • the eUICC verifies the digital certificate of the SM-DP+ server, and verifies the first digital signature by using at least the random number, the public key in the digital certificate of the SM-DP+ server, and the remote configuration file management command.
  • the public key in the digital certificate of the SM-DP+ server is extracted, and at least the public key in the digital certificate of the random number and the SM-DP+ server is used.
  • the remote profile management command verifies the first digital signature.
  • the specific implementation manner that the eUICC verifies the first digital signature by using at least the random number, the public key in the digital certificate of the SM-DP+ server, and the remote configuration file management command may be: the number of the eUICC using the SM-DP+ server
  • the public key in the certificate decrypts the first digital signature to obtain a message digest; and at least the hash number and the remote configuration file management command are hashed to obtain a new information digest; the eUICC decrypts the obtained information digest and the The new message digest is compared. If the decrypted message digest is consistent with the new message digest, the eUICC determines to pass the first digital signature verification.
  • the eUICC determines that the first digital signature verification is passed, then the 511 portion is performed.
  • the eUICC executes a remote configuration file management command.
  • the SM-DP+ server By implementing the portions 508-511 described in FIG. 5, the SM-DP+ server generates the first digital signature according to at least the remote profile management command corresponding to the first identifier and the random number generated by the eUICC. And sending at least the first digital signature, the remote profile management command, and the digital certificate of the SM-DP+ server to the eUICC through the LPA.
  • the eUICC verifies the first digital signature. After the verification is passed, the eUICC determines that the authentication of the SM-DP+ server is passed, and since the first digital signature is generated according to at least the remote configuration file management command, when the first digital signature is generated After the verification is passed, eUICC can also determine that the remote configuration file management command has not been tampered with by the illegal device.
  • the eUICC by generating the first digital signature according to at least the remote profile management command and the random number generated by the eUICC, the eUICC only needs to verify the first digital signature successfully, and can determine the authentication pass to the SM-DP+ server, and the remote configuration file Management commands are not tampered with by illegal devices, simplifying the process. And by determining that the remote configuration file management command has not been tampered with by the illegal device, the eUICC executes the remote configuration file management command and also improves the security of the remote configuration file management.
  • the eUICC may perform the following steps before the eUICC executes the remote configuration file management command:
  • the eUICC sends a fourth message to the LPA, the fourth message is used to request the user to confirm;
  • the eUICC After receiving the confirmation execution message returned by the LPA, the eUICC executes the remote configuration file management command.
  • the user confirmation can be presented through the LUI module.
  • the target command may be a command to activate a configuration file, a command to deactivate a configuration file, or a command to delete a configuration file.
  • the security of the configuration file information in the eUICC can be effectively improved, and the user can grasp the operation of the remote device on the configuration file.
  • the eUICC may also perform the following steps:
  • the eUICC generates a remote profile management result of the remote profile management command, the remote profile management result including at least a result code and a digital signature generated according to at least the result code;
  • the eUICC sends a remote profile management result containing at least the result code and at least the digital signature generated from the result code to the LPA.
  • the LPA after receiving the remote profile management result sent by the eUICC and including at least the digital signature generated according to the result code, the LPA sends a fifth message including at least the result code and at least the digital signature generated according to the result code. Message to the SM-DP+ server.
  • the SM-DP+ server can also perform the following steps:
  • the SM-DP+ server sends a sixth message to the SM-DS server.
  • the SM-DS server deletes at least the SM-DP+ address, the eUICC identifier, and the first identifier sent by the SM-DP.
  • the SM-DS server can delete the stored SM-DP+ address, the eUICC identifier, and the first identifier in time, thereby saving storage space.
  • each network element such as an SM-DP+ server, an SM-DS server, an LPA, an eUICC, etc.
  • each network element such as an SM-DP+ server, an SM-DS server, an LPA, an eUICC, etc.
  • each network element such as an SM-DP+ server, an SM-DS server, an LPA, an eUICC, etc.
  • the present invention can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods for implementing the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present invention.
  • the embodiments of the present invention may perform functional unit division on the SM-DP+ server, the SM-DS server, the eUICC, and the like according to the foregoing method example.
  • each functional unit may be divided according to each function, or two or more functions may be used.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present invention is schematic, and is only a logical function division, and the actual implementation may have another division manner.
  • FIG. 6A shows a possible structural diagram of the SM-DP+ server involved in the above embodiment.
  • the SM-DP+ server 600 includes a processing unit 602 and a communication unit 603.
  • the processing unit 602 is configured to perform control management on the actions of the SM-DP+ server.
  • the processing unit 602 is configured to support the SM-DP+ server to perform the processes 303, 304, and 305 in FIG. 3, and the processes 402-405 and 410 in FIG. ⁇ 413 and 421, and/or other processes for the techniques described herein; or, processing unit 602 is configured to support SM-DP+ server to perform processes 505-509 of FIG. 5, and/or for use in the description herein Other processes of technology.
  • Communication unit 603 is used to support communication between the SM-DP+ server and other network entities, such as with the functional modules or network entities shown in FIG. 2.
  • the SM-DP+ server may further include a storage unit 601 for storing program codes and data of the SM-DP+ server.
  • the processing unit 602 can be a processor or a controller, and can be, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application-specific integrated circuit (Application-Specific). Integrated Circuit, ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
  • the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
  • the communication unit 603 can be a transceiver, a transceiver circuit, a communication interface, or the like.
  • the storage unit 601 can be a memory.
  • the SM-DP+ server may be the SM-DP+ server shown in FIG. 6B.
  • the SM-DP+ server 610 includes a processor 612, a transceiver 613, a memory 611, and a bus 614.
  • the transceiver 613, the processor 612, and the memory 611 are connected to each other through a bus 614.
  • the bus 614 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA). ) Bus, etc.
  • the bus 614 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 6B, but it does not mean that there is only one bus or one type of bus.
  • FIG. 7A shows a possible structural diagram of the eUICC involved in the above embodiment.
  • the eUICC 700 includes a processing unit 702 and a communication unit 703.
  • the processing unit 702 is configured to perform control management on the actions of the eUICC.
  • the processing unit 702 is configured to support the eUICC to perform the processes 306 and 307 in FIG. 3, the processes 414, 415, 417-419 in FIG. 4, and/or Other processes of the techniques described herein; alternatively, processing unit 702 is configured to support eUICC to perform processes 510 and 511 in FIG. 5, and/or other processes for the techniques described herein.
  • Communication unit 703 is used to support communication between the eUICC and other network entities, such as with the functional modules or network entities shown in FIG. 2.
  • the eUICC may further include a storage unit 701 for storing program codes and data of the eUICC.
  • the processing unit 702 can be a processor or a controller, and can be, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application-specific integrated circuit (Application-Specific). Integrated Circuit, ASIC), Field Programmable Gate Array (FPGA) or other programmable Logic device, transistor logic device, hardware component, or any combination thereof. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
  • the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
  • the communication unit 703 can be a transceiver, a transceiver circuit, a communication interface, or the like.
  • the storage unit 701 can be a memory.
  • the processing unit 702 is a processor
  • the communication unit 703 is a transceiver
  • the storage unit 701 is a memory
  • the eUICC involved in the embodiment of the present invention may be the eUICC shown in FIG. 7B.
  • the eUICC 710 includes a processor 712, a transceiver 713, a memory 711, and a bus 714.
  • the transceiver 713, the processor 712, and the memory 711 are connected to each other through a bus 714.
  • the bus 714 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA). ) Bus, etc.
  • the bus 714 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 7B, but it does not mean that there is only one bus or one type of bus.
  • FIG. 8A shows a possible structural diagram of the SM-DS server involved in the above embodiment.
  • the SM-DS server 800 includes a processing unit 802 and a communication unit 803.
  • the processing unit 802 is configured to control and manage the actions of the SM-DS server, for example, the processing unit 802 is configured to support the SM-DS server to perform the processes 501-503 in FIG. 5, and/or other techniques for the techniques described herein. process.
  • Communication unit 803 is used to support communication between the SM-DS server and other network entities, such as with the functional modules or network entities shown in FIG. 2.
  • the SM-DS server may further include a storage unit 801 for storing program codes and data of the SM-DS server.
  • the processing unit 802 can be a processor or a controller, and can be, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application-specific integrated circuit (Application-Specific). Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
  • the processor may also be a combination of computing functions, for example comprising one or more microprocessor combinations, DSP and micro Combination of processors and more.
  • the communication unit 803 can be a transceiver, a transceiver circuit, a communication interface, or the like.
  • the storage unit 801 can be a memory.
  • the processing unit 802 is a processor
  • the communication unit 803 is a transceiver
  • the storage unit 801 is a memory
  • the SM-DS server according to the embodiment of the present invention may be the SM-DS server shown in FIG. 8B.
  • the SM-DS server 810 includes a processor 812, a transceiver 813, a memory 811, and a bus 814.
  • the transceiver 813, the processor 812, and the memory 811 are connected to each other through a bus 814.
  • the bus 814 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA). ) Bus, etc.
  • the bus 814 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 8B, but it does not mean that there is only one bus or one type of bus.
  • the modules in the terminal in the embodiment of the present invention may be combined, divided, and deleted according to actual needs.
  • the module in the embodiment of the present invention may be implemented by a general-purpose integrated circuit, such as a CPU (Central Processing Unit) or an ASIC (Application Specific Integrated Circuit).
  • a general-purpose integrated circuit such as a CPU (Central Processing Unit) or an ASIC (Application Specific Integrated Circuit).
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明实施例公开了一种远程管理方法及设备,其中方法包括:签约管理-数据准备SM-DP+服务器接收本地配置文件助手LPA发送的第一标识;所述SM-DP+服务器查找所述第一标识对应的远程配置文件管理命令;所述SM-DP+服务器至少根据所述第一标识和所述远程配置文件管理命令生成第一数字签名,并通过所述LPA至少发送所述第一数字签名和所述远程配置文件管理命令至嵌入式通用集成电路卡eUICC。可见,通过实施本发明实施例,SM-DP+服务器可至少发送第一数字签名和远程配置文件管理命令至eUICC,从而可使eUICC确定远程配置文件管理命令是否被非法设备篡改,并在确定远程配置文件管理命令未被非法设备篡改时才执行远程配置文件管理命令,从而提高了远程管理的安全性。

Description

一种远程管理方法及设备 技术领域
本发明实施例通信技术领域,具体涉及一种远程管理方法及设备。
背景技术
嵌入式通用集成电路卡(embedded Universal Integrated Circuit Card,eUICC),也可称为嵌入式用户身份识别卡(embedded Subscriber Identity Module,eSIM),eUICC可以通过插拔式或焊接式等放入到用户终端(如移动手机、平板电脑等)中。
在实际应用中,eUICC安装通信运营商所提供的配置文件(profile)之后,就可接入通信运营商网络(如2G/3G/4G网络等)。通常通信运营商也会对eUICC中的配置文件进行远程管理,例如,激活eUICC中的配置文件、去激活eUICC中的配置文件、删除eUICC中的配置文件或审查eUICC的状态。
图1是一种现有的远程管理的流程示意图,如图1所示,通常通信运营商对eUICC中的配置文件进行远程管理的流程可包括以下步骤:
101、在通信运营商需要对eUICC中的配置文件进行远程管理时,通信运营商至少发送用于对该配置文件进行远程管理的远程配置文件管理命令(Remote profile Management Command)、eUICC标识(eUICC-ID,EID)、以及与该配置文件对应的签约管理-发现服务(Subscription Manager-Discovery Service,SM-DS)服务器的地址至签约管理-数据准备(Subscription Manager-Data Preparation,SM-DP+)服务器。
102、SM-DP+服务器接收远程配置文件管理命令和SM-DS服务器的地址之后,生成远程配置文件管理命令对应的事件标识(该事件标识用于标识远程配置文件管理事件,该事件标识也可称为通知标识或告知标识),并至少建立和储存该事件标识、远程配置文件管理命令、eUICC标识、SM-DP+服务器地址以及SM-DS服务器的地址之间的对应关系。
103、SM-DP+服务器根据该SM-DS服务器的地址与该SM-DS服务器建 立连接。
104、SM-DP+服务器与该SM-DS服务器建立连接之后,至少将该事件标识、SM-DP+服务器的地址和eUICC标识注册在该SM-DS服务器中。
105、用户终端中的本地配置文件助手(Local Profile Assistant,LPA)利用eUICC提供的该SM-DS服务器的地址与该SM-DS服务器建立连接。
106、在LPA与SM-DS服务器建立连接之后,SM-DS服务器至少将事件标识、eUICC标识和SM-DP+服务器的地址发送给LPA。
107、LPA根据SM-DP+服务器的地址与SM-DP+服务器建立连接。
108、在LPA与SM-DP+服务器建立连接之后,LPA至少将事件标识发送至SM-DP+服务器。
109、SM-DP+服务器接收事件标识之后,SM-DP+服务器将存储的与该事件标识对应的远程配置文件管理命令直接通过LPA发送至eUICC。
110、eUICC接收该远程管理命令后,执行该远程配置文件管理命令。
然而在实践中发现,SM-DP+服务器发送远程配置文件管理命令至eUICC的过程中,则远程配置文件管理命令可被非法设备篡改,使eUICC执行被篡改的远程配置文件管理命令(如执行非法激活配置文件、非法去激活配置文件或非法删除配置文件等操作)。因此,上述远程管理的安全性不高。
发明内容
本发明实施例公开了一种远程管理方法及设备,有利于提高远程管理的安全性。
第一方面,本发明实施例公开了一种远程管理方法,该方法包括:
签约管理-数据准备SM-DP+服务器接收本地配置文件助手LPA发送的第一标识;SM-DP+服务器查找第一标识对应的远程配置文件管理命令;SM-DP+服务器至少根据第一标识和远程配置文件管理命令生成第一数字签名,并通过LPA发送至少第一数字签名和远程配置文件管理命令至嵌入式通用集成电路卡eUICC。这样SM-DP+服务器至少发送第一数字签名和远程配置文件管理命令至eUICC之后,eUICC可至少根据第一数字签名和LPA发送给eUICC的该第 一标识和SM-DP+的数字证书中的公钥对该第一数字签名进行验证,以确定远程配置文件管理命令是否被非法设备篡改,并在确定远程配置文件管理命令未被非法设备篡改时才执行远程配置文件管理命令,从而提高了远程管理的安全性。
在一种可能的设计中,签约管理-数据准备SM-DP+服务器接收本地配置文件助手LPA发送的第一标识之后,还可检查是否存储有与第一标识对应的事件;若存储有与第一标识对应的事件,则当第一标识对应的事件为远程配置文件管理事件时,SM-DP+服务器不生成交互标识;SM-DP+服务器查找第一标识对应的远程配置文件管理命令,包括:当第一标识对应的事件为远程配置文件管理事件时,SM-DP+服务器查找第一标识对应的远程配置文件管理命令。交互标识即用于对交互进行标识的信息,通过在第一标识对应的事件为远程配置文件管理事件时,不生成交互标识,从而可使用已有的第一标识来替代交互标识,有利于减少参数的数量。
在一种可能的设计中,SM-DP+服务器还可接收eUICC通过LPA至少发送的第二数字签名和eUICC的数字证书和eUICC制造商EUM的数字证书,该第二数字签名是eUICC至少根据第一标识生成的;SM-DP+服务器验证EUM的数字证书及eUICC的数字证书,并至少使用第一标识和eUICC的数字证书中的公钥对第二数字签名进行验证;若对EUM的数字证书、eUICC的数字证书和第二数字签名均验证通过,则执行SM-DP+服务器查找第一标识对应的远程配置文件管理命令的步骤。
在一种可能的设计中,SM-DP+服务器通过LPA发送至少第一数字签名和远程配置文件管理命令至嵌入式通用集成电路卡eUICC之后,还可在接收到LPA发送的第一消息后,向签约管理-发现服务SM-DS服务器发送第二消息,该第二消息中至少包含SM-DP+服务器的地址、eUICC标识和第一标识,第二消息用于SM-DS服务器至少删除SM-DP+服务器发送的SM-DP+地址、eUICC标识和第一标识,该第一消息至少包括第一标识和eUICC根据第一标识生成的数字签名。这样在eUICC执行完远程配置文件管理命令之后,SM-DS服务器能够及时地删除其存储的该远程配置文件管理命令的信息(至少包括SM-DP+地址、eUICC标识和第一标识),从而避免重复执行已完成的远程配 置文件命令,并节省其存储空间。
第二方面,本发明实施例提供了一种远程管理方法,该方法包括:嵌入式通用集成电路卡eUICC接收本地配置文件助手LPA发送的至少第一标识;eUICC接收LPA发送的至少第一数字签名和远程配置文件管理命令,该第一数字签名为签约管理-数据准备SM-DP+服务器至少根据第一标识和远程配置文件管理命令生成的;eUICC至少根据第一标识和远程配置文件管理命令对第一数字签名进行验证;若对第一数字签名验证通过,则eUICC执行远程配置文件管理命令。这样若验证通过(说明该远程配置文件管理命令未被非法设备篡改),eUICC才执行该远程配置文件管理命令。可见,提高了远程管理的安全性。
在一种可能的设计中,嵌入式通用集成电路卡eUICC接收本地配置文件助手LPA发送的第一标识之后,还可至少根据第一标识生成第二数字签名;eUICC通过LPA至少发送第二数字签名、eUICC的数字证书和eUICC制造商EUM的数字证书至SM-DP+服务器。在实际应用中eUICC是根据交互标识来生成第二数字签名,这样用第一标识来替代交互标识的作用,减少了参数的数量,使参数变得更简洁化。
在一种可能的设计中,eUICC对第一数字签名验证通过之后,在执行远程配置文件管理命令之前,若远程配置文件管理命令为目标命令,则eUICC还可发送第一消息至LPA,该第一消息用于请求用户确认;在接收到LPA返回的确认执行消息之后,eUICC执行远程配置文件管理命令。其中,该目标命令可包括但不限于激活配置文件的命令、去激活配置文件的命令或删除配置文件的命令。这样当需要对配置文件进行激活、去激活或删除时,向用户进行确认,能够有效地提高eUICC中配置文件信息的安全性,且能够使用户掌握远程设备对配置文件的操作情况。另外,对配置文件进行审查(Audit)时,无需用户确认。
在一种可能的设计中,eUICC执行远程配置文件管理命令之后,还可生成远程配置文件管理命令的远程配置文件管理结果,该远程配置文件管理结果至少包括第一标识以及根据至少第一标识生成的第三数字签名;eUICC发送至少包含第一标识和第三数字签名的远程配置文件管理结果至LPA。这样在eUICC 执行完远程配置文件管理命令之后,向LPA反馈远程配置文件管理结果,可使LPA告知SM-DP+服务器,以便SM-DP+服务器能够及时通知SM-DS服务器及时地删除其存储的该远程配置文件管理命令的信息(至少包括SM-DP+服务器地址、eUICC标识和第一标识),从而避免重复执行已完成的远程配置文件命令,并节省SM-DS服务器的存储空间。
第三方面,本发明实施例提供了一种远程管理方法,该方法包括:签约管理-发现服务SM-DS服务器接收签约管理-数据准备SM-DP+服务器发送的第一消息,该第一消息至少包括嵌入式通用集成电路卡eUICC标识和第一标识;SM-DS服务器对eUICC的身份认证通过后,SM-DS服务器生成令牌,该令牌为至少根据该第一标识、eUICC标识和SM-DS服务器的地址生成的数字签名;SM-DS服务器发送第二消息至本地配置文件助手LPA,该第二消息至少包括eUICC标识、第一标识、该令牌、SM-DP+服务器的地址、SM-DS服务器的地址和SM-DS服务器的数字证书。这样有利于简化SM-DP+服务器对eUICC进行身份验证过程中的交互流程,使整个操作流程更为精简。
第四方面,本发明实施例提供了一种远程管理方法,该方法包括:签约管理-数据准备SM-DP+服务器接收本地配置文件助手LPA发送的第一消息,该第一消息至少包括嵌入式通用集成电路卡eUICC标识、第一标识、令牌、SM-DS服务器的数字证书、SM-DS服务器的地址,该令牌为SM-DS服务器至少该第一标识、根据eUICC标识和SM-DS服务器的地址生成的数字签名;SM-DP+服务器验证该令牌;若验证通过,则SM-DP+服务器检验SM-DS服务器的地址是否与第一标识对应的SM-DS服务器的地址相匹配,并且检验eUICC标识是否与第一标识对应的eUICC标识相匹配;若SM-DS服务器的地址与第一标识对应的SM-DS服务器的地址相匹配,且eUICC标识与第一标识对应的eUICC标识相匹配,则SM-DP+服务器确定对eUICC的身份认证通过。这样有利于简化SM-DP+服务器对eUICC进行身份验证过程中的交互流程,使整个操作流程更为精简。
在一种可能的设计中,第一消息还包括eUICC生成的随机数,SM-DP+服务器确定对eUICC的身份认证通过之后,当第一标识对应的事件为远程配置文件管理事件时,还可至少根据随机数和第一标识对应的远程配置文件管理命令生成第一数字签名;SM-DP+服务器通过LPA至少发送第一数字签名、远 程配置文件管理命令和SM-DP+服务器的数字证书至eUICC。SM-DP+服务器通过至少根据远程配置文件管理命令和eUICC生成的随机数生成第一数字签名,eUICC只需对第一数字签名验证成功,就能确定对SM-DP+服务器的身份认证通过,且远程配置文件管理命令并未被非法设备篡改,从而简化了操作流程。且通过在确定远程配置文件管理命令并未被非法设备篡改之后,eUICC才执行远程配置文件管理命令也提高了远程配置文件管理的安全性。
在一种可能的设计中,SM-DP+服务器接收到LPA发送的第二消息后,还可向签约管理-发现服务SM-DS服务器发送第三消息,该第三消息中至少包含SM-DP+服务器的地址、eUICC标识和第一标识,该第三消息用于SM-DS服务器至少删除SM-DP+服务器发送的SM-DP+服务器地址、eUICC标识和第一标识,该第二消息至少包括结果代码以及至少根据所述结果代码生成的数字签名。这样在eUICC执行完远程配置文件管理命令之后,SM-DS服务器能够及时地删除其存储的该远程配置文件管理命令的信息(至少包括SM-DP+地址、eUICC标识和第一标识),从而免重复执行已完成的远程配置文件命令,并节省其存储空间。
第五方面,本发明实施例提供了一种远程管理方法,该方法包括:嵌入式通用集成电路卡eUICC接收签约管理-数据准备SM-DP+服务器通过本地配置文件助手LPA发送的至少包括第一数字签名、远程配置文件管理命令和SM-DP+服务器的数字证书的消息,该第一数字签名为SM-DP+服务器至少根据随机数和远程配置文件管理命令生成,该随机数为eUICC生成的;eUICC验证SM-DP+服务器的数字证书,并至少使用随机数、SM-DP+服务器的数字证书中的公钥和远程配置文件管理命令对第一数字签名进行验证;若对数字证书及第一数字签名验证通过,则执行远程配置文件管理命令。这样eUICC只需对第一数字签名验证成功,就能确定对SM-DP+服务器的身份验证通过,且远程配置文件管理命令并未被非法设备篡改,从而简化了操作流程。且通过在确定远程配置文件管理命令并未被非法设备篡改之后,eUICC才执行远程配置文件管理命令也提高了远程配置文件管理的安全性。
在一种可能的设计中,eUICC对数字证书及数字签名验证通过之后,eUICC执行远程配置文件管理命令之前,若远程配置文件管理命令为目标命令,则eUICC还可发送第一消息至LPA,该第一消息用于请求用户确认;在 接收到LPA返回的确认执行消息之后,eUICC执行远程配置文件管理命令。其中,该目标命令可包括但不限于激活配置文件的命令、去激活配置文件的命令或删除配置文件的命令。这样当需要对配置文件进行激活、去激活或删除时,向用户进行确认,能够有效地提高eUICC中配置文件信息的安全性,且能够使用户掌握远程设备对配置文件的操作情况。另外,对配置文件进行审查(Audit)时,无需用户确认。
在一种可能的设计中,eUICC执行远程配置文件管理命令之后,还可生成远程配置文件管理命令的远程配置文件管理结果,该远程配置文件管理结果至少包括结果代码以及至少根据该结果代码生成的数字签名;eUICC发送至少包含该结果代码以及至少根据该结果代码生成的数字签名的远程配置文件管理结果至LPA。这样在eUICC执行完远程配置文件管理命令之后,向LPA反馈远程配置文件管理结果,可使LPA告知SM-DP+服务器,以便SM-DP+服务器能够及时通知SM-DS服务器及时地删除其存储的该远程配置文件管理命令的信息(至少包括SM-DP+服务器地址、eUICC标识和第一标识),从而免重复执行已完成的远程配置文件命令,并节省SM-DS服务器的存储空间。
第六方面,本发明实施例提供了一种签约管理-数据准备SM-DP+服务器,该SM-DP+服务器具有实现上述第一方面和第二方面设计中SM-DP+服务器行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。该模块可以是软件和/或硬件。
在一种可能的设计中,SM-DP+服务器的结构中包括处理器和收发器,该处理器被配置为支持SM-DP+服务器执行上述方法中相应的功能。该收发器用于支持SM-DP+服务器与其他网元之间的通信。SM-DP+服务器还可以包括存储器,该存储器用于与处理器耦合,其保存SM-DP+服务器必要的程序指令和数据。
第七方面,本发明实施例提供了一种嵌入式通用集成电路卡eUICC,该eUICC具有实现上述第一方面和第二方面设计中eUICC行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。该模块可以是软件和/或硬件。
在一种可能的设计中,eUICC的结构中包括处理器和收发器,该处理器被配置为支持eUICC执行上述方法中相应的功能。该收发器用于支持eUICC与其他网元之间的通信。eUICC还可以包括存储器,该存储器用于与处理器耦合,其保存eUICC必要的程序指令和数据。
第八方面,本发明实施例提供了一种签约管理-发现服务SM-DS服务器,该SM-DS服务器具有实现上述第三方面、第四方面和第五方面设计中SM-DS服务器行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。该模块可以是软件和/或硬件。
在一种可能的设计中,SM-DS服务器的结构中包括处理器和收发器,该处理器被配置为支持SM-DS服务器执行上述方法中相应的功能。该收发器用于支持SM-DS服务器与其他网元之间的通信。SM-DS服务器还可以包括存储器,该存储器用于与处理器耦合,其保存SM-DS服务器必要的程序指令和数据。
第九方面,本发明实施例提供了一种签约管理-数据准备SM-DP+服务器,该SM-DP+服务器具有实现上述第三方面、第四方面和第五方面设计中SM-DP+服务器行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。该模块可以是软件和/或硬件。
在一种可能的设计中,SM-DP+服务器的结构中包括处理器和收发器,该处理器被配置为支持SM-DP+服务器执行上述方法中相应的功能。该收发器用于支持SM-DP+服务器与其他网元之间的通信。SM-DP+服务器还可以包括存储器,该存储器用于与处理器耦合,其保存SM-DP+服务器必要的程序指令和数据。
第十方面,本发明实施例提供了一种嵌入式通用集成电路卡eUICC,该eUICC具有实现上述第四方面和第五方面设计中eUICC行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。该模块可以是软件和/或硬件。
在一种可能的设计中,eUICC的结构中包括处理器和收发器,该处理器被 配置为支持eUICC执行上述方法中相应的功能。该收发器用于支持eUICC与其他网元之间的通信。eUICC还可以包括存储器,该存储器用于与处理器耦合,其保存eUICC必要的程序指令和数据。
第十一方面,本发明实施例提供了一种计算机存储介质,用于储存为上述第六方面中SM-DP+服务器所用的计算机软件指令,其包含用于执行上述方面所设计的程序。
第十二方面,本发明实施例提供了一种计算机存储介质,用于储存为上述第七方面中eUICC所用的计算机软件指令,其包含用于执行上述方面所设计的程序。
第十三方面,本发明实施例提供了一种计算机存储介质,用于储存为上述第八方面中SM-DS服务器所用的计算机软件指令,其包含用于执行上述方面所设计的程序。
第十四方面,本发明实施例提供了一种计算机存储介质,用于储存为上述第九方面中SM-DP+服务器所用的计算机软件指令,其包含用于执行上述方面所设计的程序。
第十五方面,本发明实施例提供了一种计算机存储介质,用于储存为上述第十方面中eUICC所用的计算机软件指令,其包含用于执行上述方面所设计的程序。
相较于现有技术,本发明实施例中,SM-DP+服务器接收LPA发送的第一标识之后,将找到该第一标识对应的远程配置文件管理命令;SM-DP+服务器至少根据远程配置文件管理命令以及该第一标识生成第一数字签名,并通过LPA发送至少该第一数字签名和该远程配置文件管理命令至eUICC。从而eUICC在接收该第一数字签名和该远程配置文件管理命令之后,可至少根据LPA发送给eUICC的该第一标识和SM-DP+的数字证书中的公钥对该第一数字签名进行验证。若验证通过(说明该远程配置文件管理命令未被非法设备篡改),eUICC才执行该远程配置文件管理命令。可见,通过本发明实施例,eUICC可确定远程配置文件管理命令是否被非法设备篡改,并在确定远程配置文件管理命令未被非法设备篡改时才执行远程配置文件管理命令,从而提高了远程管 理的安全性。
相较于现有技术,本发明实施例中,SM-DS服务器可至少根据eUICC标识和SM-DS服务器的地址生成令牌,并至少发送令牌至LPA;这样LPA就可发送该令牌至SM-DP+服务器;SM-DP+服务器接收LPA发送的该令牌之后,对令牌进行验证。在验证成功之后,若SM-DP+服务器验证SM-DS服务器的地址与第一标识对应的SM-DS服务器的地址相匹配,且eUICC标识与第一标识对应的eUICC标识相匹配,则SM-DP+服务器确定对eUICC的身份认证通过。可见,通过实施本发明实施例,简化了SM-DP+服务器对eUICC进行身份验证过程中的交互流程,使整个操作流程更为精简。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例公开的现有的远程管理的流程示意图;
图2是本发明实施例公开的一种可能的***架构图;
图3是本发明实施例公开的一种远程管理方法的流程示意图;
图4是本发明实施例公开的另一种远程管理方法的流程示意图;
图5是本发明实施例公开的又一种远程管理方法的流程示意图;
图6A是本发明实施例公开的一种SM-DP+服务器的结构示意图;
图6B是本发明实施例公开的另一种SM-DP+服务器的结构示意图;
图7A是本发明实施例公开的一种eUICC的的结构示意图;
图7B是本发明实施例公开的另一种eUICC的结构示意图;
图8A是本发明实施例公开的一种SM-DS服务器的结构示意图;
图8B是本发明实施例公开的另一种SM-DS服务器的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清 楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明的说明书和权利要求书及上述附图中的术语“第一”和“第二”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、***、产品或设备,没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
在现有的远程管理过程中,SM-DP+服务器发送远程配置文件管理命令至eUICC时,远程配置文件管理命令可被非法设备篡改,进而使eUICC执行被篡改的远程配置文件管理命令(如执行非法激活配置文件、非法去激活配置文件或非法删除配置文件等操作)。因此,现有远程管理的安全性不高。
为提高远程管理的安全性,本发明实施例公开了一种远程管理方法及设备。其中,方法和设备是基于同一发明构思的,由于方法及设备解决问题的原理相似,因此设备与方法的实施可以相互参见,重复之处不再赘述。
为了清楚的描述本发明实施例的方案,下面结合附图2,对本发明实施例可能应用的业务场景和***架构进行说明。
请参见图2,图2是本发明实施例公开的一种可能的***架构图。如图2所示,该***架构包括:用户终端、SM-DP+服务器和SM-DS服务器。
其中,用户终端可以包括移动手机、平板电脑、个人数字助理(Personal Digital Assistant,PDA)、电视、车载设备、机器到机器设备(Machine to Machine,M2M)、移动互联网设备(Mobile Internet Device,MID)、智能穿戴设备(如智能手表、智能手环)等各类电子设备。用户终端内设置有eUICC和LPA,其中,LPA可部署于eUICC中,或也可与eUICC独立部署。
可选的,LPA可包括本地签约下载(Local Profile Download,LPD)模块、本地用户接口(Local User Interface,LUI)模块以及本地发现服务(Local Discovery Service,LDS)模块。通常,LPA在用户终端内部承担用户终端与 eUICC之间交互的作用,LPD模块主要负责签约文件下载,LDS模块主要负责业务发现,LUI模块为用户提供UI界面。用户通过LPA可以管理下载到eUICC上的配置文件,如对配置文件进行激活、去激活、删除等操作。
在图2所示的***架构中,SM-DP+服务器可以通过LPA向eUICC发送远程配置文件管理命令,使eUICC执行远程配置文件管理命令,从而实现远程管理,远程配置文件管理包括激活配置文件、去激活配置文件、删除配置文件以及审查eUICC状态等。
SM-DS服务器的主要作用是提供一种机制让SM-DP+服务器与LPA联系,LPA可以从SM-DS服务器中获取SM-DP+服务器的地址,进而LPA就可以和SM-DP+服务器联系。其中,本文中的SM-DS服务器可以是具体的某一个SM-DS服务器,也可以是多级SM-DS服务器的统称。
在图2所示的***架构中,当通信运营商需要对配置文件进行远程操作(如下载配置文件至eUICC或对eUICC中的配置文件进行远程管理)时,通信运营商发送操作命令(如配置文件下载命令或远程配置文件管理命令)、eUICC标识(用于标识eUICC)以及与该配置文件对应的SM-DS服务器的地址至SM-DP+服务器。SM-DP+服务器接收操作命令、eUICC标识和SM-DS服务器的地址之后,生成与操作命令对应的事件标识,该标识也可称为通知标识或告知标识,该事件标识用于标识事件,其中,事件包括配置文件下载事件和远程配置文件管理事件。例如,若事件为配置文件下载事件,则生成配置文件下载的事件标识;若事件为远程配置文件管理事件,则生成远程配置文件管理的标识。SM-DP+服务器至少建立操作命令、事件标识、eUICC标识、SM-DP+服务器的地址和SM-DS服务器的地址之间的对应关系,并存储该对应关系。
在图2所示的***架构中,SM-DP+服务器生成与操作命令对应的事件标识之后,将根据SM-DS服务器的地址,至少发送事件标识、eUICC标识和SM-DP+服务器的地址至SM-DS服务器进行注册。
在图2所示的***架构中,eUICC中存储有SM-DS服务器的地址,LPA根据eUICC中提供的该SM-DS服务器的地址与SM-DS服务器进行连接。可选的, LPA与SM-DS服务器建立连接之后,SM-DS服务器和eUICC可通过LPA进行双向认证(即eUICC对SM-DS服务器的身份进行认证,SM-DS服务器对eUICC的身份进行认证)。在双向认证通过之后,SM-DS服务器至少发送SM-DP+服务器注册的事件标识、eUICC标识和SM-DP+服务器的地址至LPA。
可以理解的是,本发明实施例描述的***架构以及业务场景是为了更加清楚的说明本发明实施例的技术方案,并不构成对于本发明实施例提供的技术方案的限定,本领域普通技术人员可知,随着***架构的演变和新业务场景的出现,本发明实施例提供的技术方案对于类似的技术问题,同样适用。
下面将基于上面所述的本发明实施例涉及的共性方面,对本发明实施例进一步详细说明。
请参见图3,图3是本发明实施例公开的一种远程管理方法的流程示意图。如图3所示,该远程管理方法可以包括301~307部分。
301、LPA向SM-DP+服务器至少发送第一标识。
本发明实施例中,该第一标识为事件标识。该第一标识为SM-DP+服务器注册在SM-DS服务器中的。在SM-DS服务器和eUICC双向认证之后,该第一标识被SM-DS服务器发送至LPA。在SM-DS服务器和eUICC双向认证之后,SM-DS服务器还将发送SM-DP+服务器的地址至LPA。LPA接收至少SM-DP+服务器的地址和第一标识之后,根据SM-DP+服务器的地址与SM-DP+服务器进行连接,并在建立与SM-DP+服务器的连接之后向SM-DP+服务器至少发送第一标识。
302、LPA向eUICC至少发送该第一标识。
本发明实施例中,LPA至少发送第一标识至SM-DP+服务器之后,LPA至少发送该第一标识至eUICC。可选的,302部分与303部分的执行顺序不分先后,可先执行302部分,也可先执行303部分。
303、SM-DP+服务器查找该第一标识对应的远程配置文件管理命令。
本发明实施例中,SM-DP+服务器接收第一标识之后,若该第一标识为远程配置文件管理事件对应的事件标识,则SM-DP+服务器获取与该第一标识对应的远程配置文件管理命令。
304、SM-DP+服务器至少根据该第一标识和该远程配置文件管理命令生 成第一数字签名。
本发明实施例中,SM-DP+服务器至少根据该第一标识和该远程配置文件管理命令生成第一数字签名的具体实施方式可以为:SM-DP+服务器至少根据该第一标识和该远程配置文件管理命令生成数据结构,再利用SM-DP+服务器的私钥根据该数据结构计算出第一数字签名。
可选的,SM-DP+服务器可对第一标识和该远程配置文件管理命令进行哈希运算,得到一个信息摘要,再用SM-DP+服务器的私钥对该信息摘要进行加密以得到该第一数字签名。
305、SM-DP+服务器通过LPA至少发送该第一数字签名和该远程配置文件管理命令至eUICC。
本发明实施例中,SM-DP+服务器生成第一数字签名之后,将发送至少该第一数字签名和该远程配置文件管理命令至LPA,并由LPA发送至少该第一数字签名和该远程配置文件管理命令至eUICC。
306、eUICC至少根据该第一标识和该远程配置文件管理命令对该第一数字签名进行验证。
本发明实施例中,eUICC接收LPA发送的该第一标识、该远程配置文件管理命令和该第一数字签名之后,将至少使用该第一标识和该远程配置文件管理命令对该第一数字签名进行验证。
可选的,eUICC至少使用该第一标识和该远程配置文件管理命令对该第一数字签名进行验证的具体实施方式可以为:eUICC利用之前接收到的SM-DP+服务器的数字证书的公钥对第一数字签名进行解密,得到信息摘要;再将第一标识和该远程配置文件管理命令进行哈希运算得到一个新的信息摘要;eUICC将解密得到的信息摘要和该新的信息摘要进行比较,若解密得到的信息摘要和该新的信息摘要一致,eUICC就确定对该第一数字签名验证通过,即该远程配置文件管理命令没有被篡改。
307、eUICC执行该远程配置文件管理命令。
本发明实施例中,若eUICC就确定对该第一数字签名验证通过,则eUICC执行该远程配置文件管理命令。
在图3所描述的方法中,SM-DP+服务器接收LPA发送的第一标识之后,将获取该第一标识对应的远程配置文件管理命令;SM-DP+服务器至少根据远程 配置文件管理命令以及该第一标识生成第一数字签名,并通过LPA发送至少该第一数字签名和该远程配置文件管理命令至eUICC。从而eUICC在接收该第一数字签名和该远程配置文件管理命令之后,可至少根据LPA发送给eUICC的该第一标识和SM-DP+的数字证书中的公钥对该第一数字签名进行验证。若验证通过(说明该远程配置文件管理命令未被非法设备篡改),eUICC才执行该远程配置文件管理命令。可见,通过实施图3所描述的实施例,eUICC可确定远程配置文件管理命令是否被非法设备篡改,并在确定远程配置文件管理命令未被非法设备篡改时才执行远程配置文件管理命令,从而提高了远程管理的安全性。
请参见图4,图4是本发明实施例公开的另一种远程管理方法的流程示意图。如图4所示,该远程管理方法可以包括部分401~422部分。
401、LPA向SM-DP+服务器至少发送第一标识和第一随机数。
本发明实施例中,该第一随机数是eUICC发送给LPA的。在LPA接收到SM-DS服务器发送的SM-DP+服务器的地址、第一标识和eUICC标识之后,触发eUICC生成第一随机数。eUICC生成第一随机数之后发送第一随机数至LPA,LPA接收第一随机数之后,根据SM-DP+服务器的地址至少发送第一随机数和第一标识至SM-DP+服务器。其中,eUICC生成第一随机数之后会存储第一随机数。
402、SM-DP+服务器检查是否存储有与第一标识对应的事件。
本发明实施例中,该事件包括远程配置文件管理事件和配置文件下载事件。若SM-DP+服务器检查到存储有与第一标识对应的事件,则执行403部分。
403、当第一标识对应的事件为远程配置文件管理事件时,SM-DP+服务器不生成交互标识。
本发明实施例中,交互标识即用于对交互进行标识的信息,通过在第一标识对应的事件为远程配置文件管理事件时,不生成交互标识,从而可使用已有的事件标识来替代交互标识,有利于减少参数的数量。
404、SM-DP+服务器生成第二随机数,并至少根据第二随机数和第一随机数生成第一数字签名。
本发明实施例中,当SM-DP+服务器检查到存储有与第一标识对应的事件后,SM-DP+服务器生成第二随机数,并至少根据第二随机数和第一随机数生成第一数字签名。其中,SM-DP+服务器生成第二随机数之后,将存储第二随机数。
本发明实施例中,SM-DP+服务器至少根据第二随机数和第一随机数生成第一数字签名的具体实施方式可以为:至少根据该第二随机数和第一随机数生成数据结构,再利用SM-DP+服务器的私钥根据该数据结构计算出第一数字签名。
可选的,SM-DP+服务器根据至少第二随机数和第一随机数生成第一数字签名的具体实施方式可以为:SM-DP+服务器对至少第二随机数和第一随机数进行哈希运算,得到信息摘要,并使用SM-DP+服务器的私钥对该信息摘要进行加密,以得到第一数字签名。
405、SM-DP+服务器至少发送第二随机数、第一数字签名和SM-DP+服务器的数字证书至LPA。
406、LPA向eUICC至少发送该第一标识、第二随机数、第一数字签名和SM-DP+服务器的数字证书。
407、eUICC对SM-DP+服务器的数字证书进行验证,并对第一数字签名进行验证。
本发明实施例中,eUICC接收该第一标识、第二随机数、第一数字签名和SM-DP+服务器的数字证书之后,使用证书发布者(Ceritificate Issuer)的公钥对SM-DP+服务器的数字证书进行验证。对SM-DP+服务器的数字证书验证成功之后,eUICC获取SM-DP+服务器的数字证书中SM-DP+服务器的公钥,并至少使用SM-DP+服务器的公钥、第二随机数和自身存储的第一随机数对第一数字签名进行验证。
可选的,eUICC至少使用SM-DP+服务器的公钥、第一随机数、第二随机数对第一数字签名进行验证的具体实施方式可以为:eUICC使用SM-DP+服务器的公钥对第一数字签名进行解密,以得到信息摘要;再至少根据第二随机数和eUICC存储的其之前生成的第一随机数进行哈希运算,得到一个新的信息摘要,将解密的信息摘要与该新的信息摘要进行对比,若一致,则确定第一数字签名验证通过。若确定第一数字签名验证通过,则执行408部分。
408、eUICC至少根据该第一标识和该第二随机数生成第二数字签名。
本发明实施例中,eUICC至少根据该第一标识和该第二随机数生成第二数字签名的具体实施方式可以为:至少根据该第一标识和该第二随机数生成数据结构,再利用eUICC的私钥根据该数据结构计算出第二数字签名。
本发明实施例中,可选的,eUICC将第一标识和第二随机数进行哈希运算,得到一个信息摘要,再用eUICC的私钥对该信息摘要进行加密以得到该第二数字签名。
409、eUICC通过LPA发送至少第二数字签名、eUICC的数字证书和eUICC制造商EUM的数字证书至SM-DP+服务器。
本发明实施例中,eUICC生成第二数字签名之后,通过LPA发送至少第二数字签名、eUICC的数字证书和EUM的数字证书至SM-DP+服务器。
410、SM-DP+服务器验证eUICC的数字证书和EUM的数字证书,并至少使用第一标识、第二随机数和eUICC的数字证书中的公钥对第二数字签名进行验证。
本发明实施例中,SM-DP+服务器接收第二数字签名和eUICC的数字证书之后,证书发布者(Ceritificate Issuer)的公钥对EUM的数字证书进行验证,若验证成功,则确定对EUM的数字证书验证通过;SM-DP+服务器再利用EUM的数字证书中的公钥对eUICC的数字证书进行验证,若验证成功,则确定对eUICC的数字证书验证通过;在确定eUICC的数字证书验证通过之后,SM-DP+服务器至少使用第二随机数、eUICC的数字证书中的公钥以及第一标识对第二数字签名进行验证。
可选的,SM-DP+服务器至少使用第二随机数、eUICC的数字证书中的公钥以及第一标识对第二数字签名进行验证的具体实施方式可以为:SM-DP+服务器使用eUICC的数字证书中的公钥对第二数字签名进行解密,得到信息摘要;再至少根据第一标识与SM-DP+服务器存储的其之前生成的第二随机数进行哈希运算,得到一个新的信息摘要;SM-DP+服务器将解密得到的信息摘要与该新的信息摘要进行对比,若一致,则SM-DP+服务器确定对第二数字签名验证通过。在对第二数字签名验证通过之后执行411部分。
在实际应用中eUICC是根据交互标识来生成第二数字签名,相应地,SM-DP+服务器也根据该交互标识来验证第二数字签名。通过执行408~410部 分,eUICC使用已存在的第一标识来代替交互标识生成第二数字签名,相应地SM-DP+服务器根据自身存储的第一标识来验证第二数字签名,这样用第一标识来替代交互标识的作用,减少了参数的数量,使参数变得更简洁化。
411、SM-DP+服务器查找第一标识对应的远程配置文件管理命令。
412、SM-DP+服务器至少根据第一标识和远程配置文件管理命令生成第三数字签名。
本发明实施例中,该第三数字签名即为图3所示的实施例中的第一数字签名。412部分与图3中的304部分相似,可参考图3中的304部分的描述,此处不作赘述。
413、SM-DP+服务器通过LPA至少发送第三数字签名和远程配置文件管理命令至eUICC。
本发明实施例中,413部分与图3中的305部分相似,可参考图3中的305部分的描述,此处不作赘述。
414、eUICC至少根据该第一标识和该远程配置文件管理命令对该第三数字签名进行验证。
本发明实施例中,414部分与图3中的306部分相似,可参考图3中的306部分的描述,此处不作赘述。
415、eUICC发送第一消息至LPA。
本发明实施例中,若eUICC确定对该第三数字签名验证通过,且远程配置文件管理命令为目标命令,则eUICC发送用于请求用户确认的第一消息至LPA。LPA接收第一消息之后,可通过LUI模块呈现用户确认。可选的,该目标命令可包括但不限于激活配置文件的命令、去激活配置文件的命令或删除配置文件的命令。
416、LPA返回确认执行消息至eUICC。
本发明实施例中,当LPA接收到用户输入的用于确认执行远程配置文件管理命令的指令时,LPA返回确认执行消息至eUICC。
417、eUICC执行远程配置文件管理命令。
本发明实施例中,eUICC接收到该确认执行消息之后,执行远程配置文件管理命令。
通过执行415~417部分,当需要对配置文件进行激活、去激活或删除时, 向用户进行确认,能够有效地提高eUICC中配置文件信息的安全性,且能够使用户掌握远程设备对配置文件的操作情况。
418、eUICC生成远程配置文件管理命令的远程配置文件管理结果。
本发明实施例中,eUICC执行完远程配置文件管理命令之后,生成远程配置文件管理命令的远程配置文件管理结果。该远程配置文件管理结果至少包括第一标识以及根据第一标识生成的第四数字签名。可选的,该远程配置文件管理结果还可包括结果代码、SM-DP+服务器的地址。可选的,该第四数字签名可以是根据第一标识、结果代码和SM-DP+服务器的地址生成的。
419、eUICC发送至少包含第一标识和第四数字签名的远程配置文件管理结果至LPA。
本发明实施例中,eUICC生成远程配置文件管理结果之后,发送至少包含第一标识和第四数字签名的远程配置文件管理结果至LPA。可选的,若远程配置文件管理结果还包括结果代码和SM-DP+服务器的地址,eUICC还可发送结果代码和SM-DP+服务器的地址至LPA。
420、LPA发送至少包括第一标识和第四数字签名的第二消息至SM-DP+服务器。
本发明实施例中,LPA接收远程配置文件管理结果之后,发送第二消息至SM-DP+服务器,该第二消息至少包括远程配置文件管理结果中的第一标识和第四数字签名。
可选的,若远程配置文件管理结果还包括结果代码和SM-DP+服务器的地址,第二消息还可包括结果代码和SM-DP+服务器的地址。
421、SM-DP+服务器向SM-DS服务器发送第三消息。
本发明实施例中,SM-DP+服务器接收到第二消息之后,SM-DS服务器发送第三消息至SM-DS服务器。该第三消息中至少包含SM-DP+服务器的地址、eUICC标识和第一标识,第三消息用于SM-DS服务器至少删除由SM-DP+服务器发送的SM-DP+服务器的地址、eUICC标识和第一标识。
422、SM-DS服务器至少删除SM-DP+服务器发送的SM-DP+地址、eUICC标识和第一标识。
本发明实施例中,SM-DS服务器接收第三消息之后,至少删除SM-DP+服务器发送的SM-DP+地址、eUICC标识和第一标识。
通过执行418和422部分,在eUICC执行完远程配置文件管理命令之后,SM-DS服务器能够及时地删除其存储的至少SM-DP+地址、eUICC标识和第一标识,从而能够节省其存储空间。
在图4所描述的方法中,SM-DP+服务器接收LPA发送的第一标识之后,将查找该第一标识对应的远程配置文件管理命令;SM-DP+服务器至少根据远程配置文件管理命令以及该第一标识生成第三数字签名,并通过LPA至少发送该第三数字签名和该远程配置文件管理命令至eUICC。从而eUICC在接收该第三数字签名和该远程配置文件管理命令之后,可至少根据LPA发送给eUICC的该第一标识和SM-DP+的数字证书中的公钥对该第三数字签名进行验证。若验证通过(说明该远程配置文件管理命令未被非法设备篡改),eUICC才执行该远程配置文件管理命令。可见,通过实施图4所描述的方法,提高了远程管理的安全性。
请参见图5,图5是本发明实施例公开的又一种远程管理方法的流程示意图。如图5所示,该远程管理方法可以包括501~511部分。
501、SM-DS服务器接收SM-DP+服务器发送的第一消息。
本发明实施例中,该第一消息至少包括eUICC标识和第一标识,可选的,该第一消息还可包括SM-DP+服务器的地址、eUICC信息1(eUICCinfo1)。
502、SM-DS服务器对eUICC的身份认证通过后,SM-DS服务器生成令牌。
本发明实施例中,该令牌为SM-DS服务器至少根据该第一标识、eUICC标识和SM-DS服务器的地址生成的数字签名。
本发明实施例中,SM-DS服务器至少根据该第一标识、eUICC标识和SM-DS服务器的地址生成数字签名的具体实施方式可以为:SM-DS服务器至少根据该第一标识、eUICC标识和SM-DS服务器的地址生成数据结构,再利用SM-DP+服务器的私钥根据该数据结构计算出数字签名。
可选的,SM-DS服务器至少根据该第一标识、eUICC标识和SM-DS服务器的地址生成令牌的具体实施方式可以为:SM-DS服务器至少对该第一标识、eUICC标识和SM-DS服务器的地址进行哈希运算,得到一个信息摘要,再用 SM-DS服务器的私钥对该信息摘要进行加密以得到该令牌。
503、SM-DS服务器发送第二消息至LPA。
本发明实施例中,该第二消息至少包括eUICC标识、第一标识、令牌、SM-DP+服务器的地址、SM-DS服务器的地址和SM-DS服务器的数字证书。
504、LPA发送第三消息至SM-DP+服务器。
本发明实施例中,LPA接收到第二消息之后,会发送第三消息至SM-DP+服务器。
其中,该第三消息至少包括第二消息中的eUICC标识、第一标识、令牌、SM-DS服务器的数字证书和SM-DS服务器的地址。
可选的,LPA接收到第二消息之后,还会触发eUICC生成随机数,eUICC生成随机数之后,返回随机数至LPA,该第三消息还可包括eUICC生成的该随机数。
505、SM-DP+服务器验证令牌。
本发明实施例中,SM-DP+服务器接收第三消息之后,至少根据eUICC标识、SM-DS服务器的数字证书和SM-DS服务器的地址对令牌进行验证。
可选的,SM-DP+服务器验证令牌的具体实施方式可以为:SM-DP+服务器对SM-DS服务器的数字证书进行验证,验证成功之后,从SM-DS服务器的数字证书中得到SM-DS服务器的公钥;SM-DP+服务器使用SM-DS服务器的公钥对令牌进行解密,得到信息摘要;再将至少第三消息中的eUICC标识和SM-DS服务器的地址进行哈希运算得到一个新的信息摘要;SM-DP+服务器将解密得到的信息摘要和该新的信息摘要进行比较,若解密得到的信息摘要和该新的信息摘要一致,SM-DP+服务器就确定对令牌验证通过。
SM-DP+服务器确定对令牌验证通过之后,执行506部分。
506、SM-DP+服务器检验SM-DS服务器的地址是否与第一标识对应的SM-DS服务器的地址相匹配,并且检验eUICC标识是否与第一标识对应的eUICC标识相匹配。
本发明实施例中,SM-DP+服务器会检验第三消息中的SM-DS服务器的地址是否与第一标识对应的由通信运营商发送的SM-DS服务器的地址相匹配,并且检验第三消息中的eUICC标识是否与第一标识对应的由通信运营商发送的eUICC标识相匹配。
若第三消息中的SM-DS服务器的地址与第一标识对应的由通信运营商发送的SM-DS服务器的地址相匹配,并且第三消息中的eUICC标识与第一标识对应的由通信运营商发送的eUICC标识相匹配,则执行507部分。
507、SM-DP+服务器确定对eUICC的身份认证通过。
在现有技术中,SM-DP+服务器对eUICC的身份进行验证时,SM-DP+服务器需要生成随机数,并通过LPA发送随机数至eUICC;eUICC根据该随机数生成数字签名,并通过LPA发送eUICC的数字证书和该数字签名至SM-DP+服务器进行验证;若SM-DP+服务器根据eUICC的数字证书中的公钥对该数字签名验证通过,则SM-DP+服务器确定对eUICC的身份验证通过。可见,在现有技术中,SM-DP+服务器对eUICC的身份进行验证时,SM-DP+服务器、LPA与eUICC之间会有很多信息交互,且交互流程非常繁琐。通过实施图5所示的501~507部分,SM-DS服务器生成令牌之后,通过LPA发送令牌至SM-DP+服务器,SM-DP+服务器根据令牌就可准确地对eUICC进行身份验证。可见,通过实施图5所示的501~507部分,简化了SM-DP+服务器对eUICC进行身份验证过程中的交互流程,使整个操作流程更为精简。
508、SM-DP+服务器至少根据随机数和第一标识对应的远程配置文件管理命令生成第一数字签名。
本发明实施例中,当第一标识对应的事件为远程本地配置文件配置文件管理事件时,在SM-DP+服务器确定对eUICC的身份认证通过之后,SM-DP+服务器至少根据第三消息包括的随机数和第一标识对应的远程配置文件管理命令生成第一数字签名。
本发明实施例中,SM-DP+服务器至少根据第三消息包括的随机数和第一标识对应的远程配置文件管理命令生成第一数字签名的具体实施方式可以为:SM-DP+服务器至少根据第三消息包括的随机数和第一标识对应的远程配置文件管理命令生成数据结构,再利用SM-DP+服务器的私钥根据该数据结构计算出第一数字签名。
可选的,SM-DP+服务器至少根据第三消息包括的随机数和第一标识对应的远程配置文件管理命令生成第一数字签名的具体实施方式可以为:SM-DP+服务器至少对第三消息包括的随机数和第一标识对应的远程配置文件管理命令进行哈希运算,得到一个信息摘要,再用SM-DP+服务器的私钥对该信息摘 要进行加密以得到该第一数字签名。
509、SM-DP+服务器通过LPA至少发送第一数字签名、远程配置文件管理命令和SM-DP+服务器的数字证书至eUICC。
510、eUICC验证SM-DP+服务器的数字证书,并至少使用该随机数、SM-DP+服务器的数字证书中的公钥和远程配置文件管理命令对第一数字签名进行验证。
本发明实施例中,eUICC对SM-DP+服务器的数字证书验证通过之后,提取SM-DP+服务器的数字证书中的公钥,并至少使用该随机数、SM-DP+服务器的数字证书中的公钥和远程配置文件管理命令对第一数字签名进行验证。
可选的,eUICC至少使用该随机数、SM-DP+服务器的数字证书中的公钥和远程配置文件管理命令对第一数字签名进行验证的具体实施方式可以为:eUICC使用SM-DP+服务器的数字证书中的公钥对第一数字签名进行解密,得到信息摘要;再至少将该随机数和该远程配置文件管理命令进行哈希运算得到一个新的信息摘要;eUICC将解密得到的信息摘要和该新的信息摘要进行比较,若解密得到的信息摘要和该新的信息摘要一致,eUICC就确定对该第一数字签名验证通过。
若eUICC确定对该第一数字签名验证通过,则执行511部分。
511、eUICC执行远程配置文件管理命令。
通过实施图5所描述的508~511部分,SM-DP+服务器至少根据第一标识对应的远程配置文件管理命令和eUICC生成的随机数生成第一数字签名。并通过LPA发送至少第一数字签名、远程配置文件管理命令和SM-DP+服务器的数字证书至eUICC。eUICC对第一数字签名进行验证,验证通过后,eUICC确定对SM-DP+服务器的身份验证通过,且由于第一数字签名是至少根据远程配置文件管理命令生成的,因此,当对第一数字签名验证通过后,eUICC也可确定远程配置文件管理命令并未被非法设备篡改。因此,通过至少根据远程配置文件管理命令和eUICC生成的随机数生成第一数字签名,eUICC只需对第一数字签名验证成功,就能确定对SM-DP+服务器的身份验证通过,且远程配置文件管理命令并未被非法设备篡改,从而简化了操作流程。且通过在确定远程配置文件管理命令并未被非法设备篡改之后,eUICC才执行远程配置文件管理命令也提高了远程配置文件管理的安全性。
作为一种可选的实施方式,eUICC对数字证书及数字签名验证通过之后,eUICC执行远程配置文件管理命令之前,eUICC还可执行以下步骤:
11)若远程配置文件管理命令为目标命令,则eUICC发送第四消息至LPA,该第四消息用于请求用户确认;
12)在接收到LPA返回的确认执行消息之后,eUICC执行远程配置文件管理命令。
在该实施方式中,LPA接收第四消息之后,可通过LUI模块呈现用户确认。可选的,该目标命令可以为激活配置文件的命令、去激活配置文件的命令或删除配置文件的命令。
通过实施该实施方式,当需要对配置文件进行激活、去激活或删除时,向用户进行确认,能够有效地提高eUICC中配置文件信息的安全性,且能够使用户掌握远程设备对配置文件的操作情况。
作为一种可选的实施方式,eUICC执行远程配置文件管理命令之后,eUICC还可执行以下步骤:
23)eUICC生成远程配置文件管理命令的远程配置文件管理结果,该远程配置文件管理结果至少包括结果代码以及至少根据该结果代码生成的数字签名;
24)eUICC发送至少包含结果代码以及至少根据该结果代码生成的数字签名的远程配置文件管理结果至LPA。
那么相应地,LPA接收eUICC发送的至少包含结果代码以及至少根据该结果代码生成的数字签名的远程配置文件管理结果之后,会发送至少包括结果代码以及至少根据该结果代码生成的数字签名的第五消息至SM-DP+服务器。
那么相应地,SM-DP+服务器接收第五消息之后,SM-DP+服务器还可执行以下步骤:
25)SM-DP+服务器向SM-DS服务器发送第六消息。
26)SM-DS服务器至少删除SM-DP发送的SM-DP+地址、eUICC标识和第一标识。
通过实施该实施方式,在eUICC执行完远程配置文件管理命令之后,SM-DS服务器能够及时地删除其存储的SM-DP+地址、eUICC标识和第一标识,从而能够节省其存储空间。
上述主要从各个网元之间交互的角度对本发明实施例提供的方案进行了介绍。可以理解的是,各个网元,例如SM-DP+服务器、SM-DS服务器、LPA、eUICC等为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本发明能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
本发明实施例可以根据上述方法示例对SM-DP+服务器、SM-DS服务器和eUICC等进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。需要说明的是,本发明实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
在采用集成的单元的情况下,图6A示出了上述实施例中所涉及的SM-DP+服务器的一种可能的结构示意图。SM-DP+服务器600包括:处理单元602和通信单元603。处理单元602用于对SM-DP+服务器的动作进行控制管理,例如,处理单元602用于支持SM-DP+服务器执行图3中的过程303、304和305,图4中的过程402~405、410~413和421,和/或用于本文所描述的技术的其它过程;或者,处理单元602用于支持SM-DP+服务器执行图5中的过程505~509,和/或用于本文所描述的技术的其它过程。通信单元603用于支持SM-DP+服务器与其他网络实体的通信,例如与图2中示出的功能模块或网络实体之间的通信。SM-DP+服务器还可以包括存储单元601,用于存储SM-DP+服务器的程序代码和数据。
其中,处理单元602可以是处理器或控制器,例如可以是中央处理器(Central Processing Unit,CPU),通用处理器,数字信号处理器(Digital Signal Processor,DSP),专用集成电路(Application-Specific Integrated Circuit,ASIC), 现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本发明公开内容所描述的各种示例性的逻辑方框,模块和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。通信单元603可以是收发器、收发电路或通信接口等。存储单元601可以是存储器。
当处理单元602为处理器,通信单元603为收发器,存储单元601为存储器时,本发明实施例所涉及的SM-DP+服务器可以为图6B所示的SM-DP+服务器。
参阅图6B所示,该SM-DP+服务器610包括:处理器612、收发器613、存储器611以及总线614。其中,收发器613、处理器612以及存储器611通过总线614相互连接;总线614可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。所述总线614可以分为地址总线、数据总线、控制总线等。为便于表示,图6B中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
在采用集成的单元的情况下,图7A示出了上述实施例中所涉及的eUICC的一种可能的结构示意图。eUICC700包括:处理单元702和通信单元703。处理单元702用于对eUICC的动作进行控制管理,例如,处理单元702用于支持eUICC执行图3中的过程306和307,图4中的过程414、415、417~419,和/或用于本文所描述的技术的其它过程;或者,处理单元702用于支持eUICC执行图5中的过程510和511,和/或用于本文所描述的技术的其它过程。通信单元703用于支持eUICC与其他网络实体的通信,例如与图2中示出的功能模块或网络实体之间的通信。eUICC还可以包括存储单元701,用于存储eUICC的程序代码和数据。
其中,处理单元702可以是处理器或控制器,例如可以是中央处理器(Central Processing Unit,CPU),通用处理器,数字信号处理器(Digital Signal Processor,DSP),专用集成电路(Application-Specific Integrated Circuit,ASIC),现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程 逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本发明公开内容所描述的各种示例性的逻辑方框,模块和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。通信单元703可以是收发器、收发电路或通信接口等。存储单元701可以是存储器。
当处理单元702为处理器,通信单元703为收发器,存储单元701为存储器时,本发明实施例所涉及的eUICC可以为图7B所示的eUICC。
参阅图7B所示,该eUICC710包括:处理器712、收发器713、存储器711以及总线714。其中,收发器713、处理器712以及存储器711通过总线714相互连接;总线714可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。所述总线714可以分为地址总线、数据总线、控制总线等。为便于表示,图7B中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
在采用集成的单元的情况下,图8A示出了上述实施例中所涉及的SM-DS服务器的一种可能的结构示意图。SM-DS服务器800包括:处理单元802和通信单元803。处理单元802用于对SM-DS服务器的动作进行控制管理,例如,处理单元802用于支持SM-DS服务器执行图5中的过程501~503,和/或用于本文所描述的技术的其它过程。通信单元803用于支持SM-DS服务器与其他网络实体的通信,例如与图2中示出的功能模块或网络实体之间的通信。SM-DS服务器还可以包括存储单元801,用于存储SM-DS服务器的程序代码和数据。
其中,处理单元802可以是处理器或控制器,例如可以是中央处理器(Central Processing Unit,CPU),通用处理器,数字信号处理器(Digital Signal Processor,DSP),专用集成电路(Application-Specific Integrated Circuit,ASIC),现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本发明公开内容所描述的各种示例性的逻辑方框,模块和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微 处理器的组合等等。通信单元803可以是收发器、收发电路或通信接口等。存储单元801可以是存储器。
当处理单元802为处理器,通信单元803为收发器,存储单元801为存储器时,本发明实施例所涉及的SM-DS服务器可以为图8B所示的SM-DS服务器。
参阅图8B所示,该SM-DS服务器810包括:处理器812、收发器813、存储器811以及总线814。其中,收发器813、处理器812以及存储器811通过总线814相互连接;总线814可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。所述总线814可以分为地址总线、数据总线、控制总线等。为便于表示,图8B中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
需要说明的是,在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详细描述的部分,可以参见其他实施例的相关描述。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。
本发明实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。
本发明实施例终端中的模块可以根据实际需要进行合并、划分和删减。
本发明实施例中所述模块,可以通过通用集成电路,例如CPU(Central Processing Unit,中央处理器),或通过ASIC(Application Specific Integrated Circuit,专用集成电路)来实现。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
总之,以上所述仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (31)

  1. 一种远程管理方法,其特征在于,所述方法包括:
    签约管理-数据准备SM-DP+服务器接收本地配置文件助手LPA发送的至少第一标识;
    所述SM-DP+服务器查找所述第一标识对应的远程配置文件管理命令;
    所述SM-DP+服务器至少根据所述第一标识和所述远程配置文件管理命令生成第一数字签名,并通过所述LPA至少发送所述第一数字签名和所述远程配置文件管理命令至嵌入式通用集成电路卡eUICC。
  2. 根据权利要求1所述的方法,其特征在于,所述签约管理-数据准备SM-DP+服务器接收本地配置文件助手LPA发送的第一标识之后,所述方法还包括:
    所述SM-DP+服务器检查是否存储有与所述第一标识对应的事件;
    若存储有与所述第一标识对应的事件,则当所述第一标识对应的事件为远程配置文件管理事件时,所述SM-DP+服务器不生成交互标识;
    所述SM-DP+服务器查找所述第一标识对应的远程配置文件管理命令,包括:
    当所述第一标识对应的事件为远程配置文件管理事件时,所述SM-DP+服务器查找所述第一标识对应的远程配置文件管理命令。
  3. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    所述SM-DP+服务器接收所述eUICC通过所述LPA至少发送的第二数字签名和所述eUICC的数字证书和eUICC制造商EUM的数字证书,所述第二数字签名是所述eUICC至少根据所述第一标识生成的;
    所述SM-DP+服务器验证所述EUM的数字证书和所述eUICC的数字证书,并至少使用所述第一标识和所述eUICC的数字证书中的公钥对所述第二数字签名进行验证;
    若对所述eUICC的数字证书、所述EUM的数字证书和所述第二数字签名均验证通过,则执行所述SM-DP+服务器查找所述第一标识对应的远程配置文件管理命令的步骤。
  4. 根据权利要求1~3任意一项所述的方法,其特征在于,所述SM-DP+服务器通过所述LPA至少发送所述第一数字签名和所述远程配置文件管理命令至嵌入式通用集成电路卡eUICC之后,所述方法还包括:
    所述SM-DP+服务器接收到所述LPA发送的第一消息后,所述SM-DP+服务器向签约管理-发现服务SM-DS服务器发送第二消息,所述第二消息中至少包含所述SM-DP+服务器的地址、所述eUICC标识和所述第一标识,所述第二消息用于所述SM-DS服务器至少删除所述SM-DP+服务器发送的所述SM-DP+地址、所述eUICC标识和所述第一标识,所述第一消息至少包括所述第一标识和所述eUICC至少根据所述第一标识生成的数字签名。
  5. 一种远程管理方法,其特征在于,所述方法包括:
    嵌入式通用集成电路卡eUICC接收本地配置文件助手LPA发送的至少第一标识;
    所述eUICC接收所述LPA发送的至少第一数字签名和远程配置文件管理命令,所述第一数字签名为签约管理-数据准备SM-DP+服务器根据所述第一标识和所述远程配置文件管理命令生成的;
    所述eUICC至少根据所述第一标识和所述远程配置文件管理命令对所述第一数字签名进行验证;
    若对所述第一数字签名验证通过,则所述eUICC执行所述远程配置文件管理命令。
  6. 根据权利要求5所述的方法,其特征在于,所述嵌入式通用集成电路卡eUICC至少接收本地配置文件助手LPA发送的第一标识之后,所述方法还包括:
    所述eUICC至少根据所述第一标识生成第二数字签名;
    所述eUICC通过所述LPA至少发送所述第二数字签名、所述eUICC的数字证书和eUICC制造商EUM的数字证书至所述SM-DP+服务器。
  7. 根据权利要求5所述的方法,其特征在于,所述eUICC对所述第一数 字签名验证通过之后,所述eUICC执行所述远程配置文件管理命令之前,所述方法还包括:
    若所述远程配置文件管理命令为目标命令,则所述eUICC发送第一消息至所述LPA,所述第一消息用于请求用户确认;
    在接收到所述LPA返回的确认执行消息之后,所述eUICC执行所述远程配置文件管理命令。
  8. 根据权利要求5~7任意一项所述的方法,其特征在于,所述eUICC执行所述远程配置文件管理命令之后,所述方法还包括:
    所述eUICC生成所述远程配置文件管理命令的远程配置文件管理结果,所述远程配置文件管理结果至少包括所述第一标识以及至少根据所述第一标识生成的第三数字签名;
    所述eUICC发送至少包含所述第一标识和所述第三数字签名的所述远程配置文件管理结果至所述LPA。
  9. 一种远程管理方法,其特征在于,所述方法包括:
    签约管理-发现服务SM-DS服务器接收签约管理-数据准备SM-DP+服务器发送的第一消息,所述第一消息至少包括嵌入式通用集成电路卡eUICC标识和第一标识;
    所述SM-DS服务器对所述eUICC的身份认证通过后,所述SM-DS服务器生成令牌,所述令牌为至少根据所述第一标识、所述eUICC标识和所述SM-DS服务器的地址生成的数字签名;
    所述SM-DS服务器发送第二消息至本地配置文件助手LPA,所述第二消息至少包括所述eUICC标识、所述第一标识、所述令牌、所述SM-DP+服务器的地址、所述SM-DS服务器的地址和所述SM-DS服务器的数字证书。
  10. 一种远程管理方法,其特征在于,所述方法包括:
    签约管理-数据准备SM-DP+服务器接收本地配置文件助手LPA发送的第一消息,所述第一消息至少包括嵌入式通用集成电路卡eUICC标识、第一标识、令牌、SM-DS服务器的数字证书、所述SM-DS服务器的地址,所述令牌 为所述SM-DS服务器至少根据所述第一标识、所述eUICC标识和所述SM-DS服务器的地址生成的数字签名;
    所述SM-DP+服务器验证所述令牌;
    若验证通过,则所述SM-DP+服务器检验所述SM-DS服务器的地址是否与所述第一标识对应的SM-DS服务器的地址相匹配,并且检验所述eUICC标识是否与所述第一标识对应的eUICC标识相匹配;
    若所述SM-DS服务器的地址与所述第一标识对应的SM-DS服务器的地址相匹配,且所述eUICC标识与所述第一标识对应的eUICC标识相匹配,则所述SM-DP+服务器确定对所述eUICC的身份认证通过。
  11. 根据权利要求10所述的方法,其特征在于,所述第一消息还包括所述eUICC生成的随机数,所述SM-DP+服务器确定对所述eUICC的身份认证通过之后,所述方法还包括:
    当所述第一标识对应的事件为远程配置文件管理事件时,所述SM-DP+服务器至少根据所述随机数和所述第一标识对应的远程配置文件管理命令生成第一数字签名;
    所述SM-DP+服务器通过所述LPA至少发送所述第一数字签名、所述远程配置文件管理命令和所述SM-DP+服务器的数字证书至所述eUICC。
  12. 根据权利要求10或11所述的方法,其特征在于,所述方法还包括:
    所述SM-DP+服务器接收到所述LPA发送的第二消息后,所述SM-DP+服务器向签约管理-发现服务SM-DS服务器发送第三消息,所述第三消息中至少包含所述SM-DP+服务器的地址、所述eUICC标识和所述第一标识,所述第三消息用于所述SM-DS服务器至少删除所述SM-DP+服务器发送的所述SM-DP+服务器地址、所述eUICC标识和所述第一标识,所述第二消息至少包括结果代码以及至少根据所述结果代码生成的数字签名。
  13. 一种远程管理方法,其特征在于,所述方法包括:
    嵌入式通用集成电路卡eUICC接收签约管理-数据准备SM-DP+服务器通过本地配置文件助手LPA发送的至少第一数字签名、远程配置文件管理命令 和所述SM-DP+服务器的数字证书,所述第一数字签名为所述SM-DP+服务器至少根据随机数和所述远程配置文件管理命令生成,所述随机数为所述eUICC生成的;
    所述eUICC验证所述SM-DP+服务器的数字证书,并至少使用所述随机数、所述SM-DP+服务器的数字证书中的公钥和所述远程配置文件管理命令对所述第一数字签名进行验证;
    若对所述数字证书及第一数字签名验证通过,则执行所述远程配置文件管理命令。
  14. 根据权利要求13所述的方法,其特征在于,所述eUICC对所述数字证书及数字签名验证通过之后,所述eUICC执行所述远程配置文件管理命令之前,所述方法还包括:
    若所述远程配置文件管理命令为目标命令,则所述eUICC发送所述第一消息至所述LPA,所述第一消息用于请求用户确认;
    在接收到所述LPA返回的确认执行消息之后,所述eUICC执行所述远程配置文件管理命令。
  15. 根据权利要求13或14所述的方法,其特征在于,所述eUICC执行所述远程配置文件管理命令之后,所述方法还包括:
    所述eUICC生成所述远程配置文件管理命令的远程配置文件管理结果,所述远程配置文件管理结果至少包括结果代码以及至少根据所述结果代码生成的数字签名;
    所述eUICC发送至少包含所述结果代码以及至少根据所述结果代码生成的数字签名的所述远程配置文件管理结果至所述LPA。
  16. 一种签约管理-数据准备SM-DP+服务器,其特征在于,所述SM-DP+服务器包括:处理单元和通信单元,
    所述处理单元,用于通过所述通信单元接收本地配置文件助手LPA发送的至少第一标识;
    所述处理单元,还用于查找所述第一标识对应的远程配置文件管理命令;
    所述处理单元,还用于根据至少所述第一标识和所述远程配置文件管理命令生成第一数字签名,并通过所述通信单元通过所述LPA至少发送所述第一数字签名和所述远程配置文件管理命令至嵌入式通用集成电路卡eUICC。
  17. 根据权利要求16所述的SM-DP+服务器,其特征在于,
    所述处理单元,还用于在通过所述通信单元接收本地配置文件助手LPA发送的第一标识之后,检查是否存储有与所述第一标识对应的事件;若存储有与所述第一标识对应的事件,则当所述第一标识对应的事件为远程配置文件管理事件时,所述处理单元不生成交互标识;
    所述处理单元查找所述第一标识对应的远程配置文件管理命令的方式具体为:
    当所述第一标识对应的事件为远程配置文件管理事件时,查找所述第一标识对应的远程配置文件管理命令。
  18. 根据权利要求16所述的SM-DP+服务器,其特征在于,
    所述处理单元,还用于通过所述通信单元接收所述eUICC通过所述LPA至少发送的第二数字签名和所述eUICC的数字证书和eUICC制造商EUM的数字证书,所述第二数字签名是所述eUICC至少根据所述第一标识生成的;
    所述处理单元,还用于验证所述EUM的数字证书和所述eUICC的数字证书,并至少使用所述第一标识和所述eUICC的数字证书中的公钥对所述第二数字签名进行验证;若对所述eUICC的数字证书、所述EUM的数字证书和所述第二数字签名均验证通过,则触发所述处理单元查找所述第一标识对应的远程配置文件管理命令。
  19. 根据权利要求16~18任意一项所述的SM-DP+服务器,其特征在于,
    所述处理单元,还用于通过所述通信单元接收到所述LPA发送的第一消息后,通过所述通信单元向签约管理-发现服务SM-DS服务器发送第二消息,所述第二消息中至少包含所述SM-DP+服务器的地址、所述eUICC标识和所述第一标识,所述第二消息用于所述SM-DS服务器至少删除所述SM-DP+服务器发送的所述SM-DP+地址、所述eUICC标识和所述第一标识,所述第一 消息至少包括所述第一标识和所述eUICC至少根据所述第一标识生成的数字签名。
  20. 一种嵌入式通用集成电路卡eUICC,其特征在于,所述eUICC包括:处理单元和通信单元,
    所述处理单元,用于通过所述通信单元接收本地配置文件助手LPA发送的至少第一标识;
    所述处理单元,还用于通过所述通信单元接收所述LPA发送的至少第一数字签名和远程配置文件管理命令,所述第一数字签名为签约管理-数据准备SM-DP+服务器根据所述第一标识和所述远程配置文件管理命令生成的;
    所述处理单元,还用于至少根据所述第一标识和所述远程配置文件管理命令对所述第一数字签名进行验证;
    所述处理单元,还用于当对所述第一数字签名验证通过时,执行所述远程配置文件管理命令。
  21. 根据权利要求20所述的eUICC,其特征在于,
    所述处理单元,还用于在通过所述通信单元接收LPA发送的第一标识之后,至少根据所述第一标识生成第二数字签名;
    所述处理单元,还用于通过所述通信单元通过所述LPA至少发送所述第二数字签名、所述eUICC的数字证书和eUICC制造商EUM的数字证书至所述SM-DP+服务器。
  22. 根据权利要求20所述的eUICC,其特征在于,
    所述处理单元,还用于在对所述第一数字签名验证通过之后,在所述远程配置文件管理命令为目标命令时,通过所述通信单元发送第一消息至所述LPA,所述第一消息用于请求用户确认;
    所述处理单元执行所述远程配置文件管理命令的方式具体为:
    在通过所述通信单元接收到所述LPA返回的确认执行消息之后,执行所述远程配置文件管理命令。
  23. 根据权利要求20~22任意一项所述的eUICC,其特征在于,
    所述处理单元,还用于生成所述远程配置文件管理命令的远程配置文件管理结果,所述远程配置文件管理结果至少包括所述第一标识以及至少根据所述第一标识生成的第三数字签名;
    所述处理单元,还用于通过所述通信单元发送至少包含所述第一标识和所述第三数字签名的所述远程配置文件管理结果至所述LPA。
  24. 一种签约管理-发现服务SM-DS服务器,其特征在于,所述SM-DS服务器包括:处理单元和通信单元,
    所述处理单元,用于通过所述通信单元接收签约管理-数据准备SM-DP+服务器发送的第一消息,所述第一消息至少包括嵌入式通用集成电路卡eUICC标识和第一标识;
    所述处理单元,还用于对所述eUICC的身份认证通过后,生成令牌,所述令牌为至少根据所述第一标识、所述eUICC标识和所述SM-DS服务器的地址生成的数字签名;
    所述处理单元,还用于通过所述通信单元发送第二消息至本地配置文件助手LPA,所述第二消息至少包括所述eUICC标识、所述第一标识、所述令牌、所述SM-DP+服务器的地址、所述SM-DS服务器的地址和所述SM-DS服务器的数字证书。
  25. 一种签约管理-数据准备SM-DP+服务器,其特征在于,所述SM-DP+服务器包括:处理单元和通信单元,
    所述处理单元,用于通过所述通信单元接收本地配置文件助手LPA发送的第一消息,所述第一消息至少包括嵌入式通用集成电路卡eUICC标识、第一标识、令牌、SM-DS服务器的数字证书、所述SM-DS服务器的地址,所述令牌为所述SM-DS服务器至少根据所述第一标识、所述eUICC标识和所述SM-DS服务器的地址生成的数字签名;
    所述处理单元,还用于验证所述令牌;
    所述处理单元,还用于在验证通过时,检验所述SM-DS服务器的地址是否与所述第一标识对应的SM-DS服务器的地址相匹配,并且检验所述eUICC 标识是否与所述第一标识对应的eUICC标识相匹配;
    所述处理单元,还用于在检验所述SM-DS服务器的地址与所述第一标识对应的SM-DS服务器的地址相匹配,且所述eUICC标识与所述第一标识对应的eUICC标识相匹配时,确定对所述eUICC的身份认证通过。
  26. 根据权利要求25所述的SM-DP+服务器,其特征在于,所述第一消息还包括所述eUICC生成的随机数,
    所述处理单元,还用于在确定对所述eUICC的身份认证通过之后,当所述第一标识对应的事件为远程配置文件管理事件时,至少根据所述随机数和所述第一标识对应的远程配置文件管理命令生成第一数字签名;
    所述SM-DP+服务器通过所述LPA至少发送所述第一数字签名、所述远程配置文件管理命令和所述SM-DP+服务器的数字证书至所述eUICC。
  27. 根据权利要求25或26所述的SM-DP+服务器,其特征在于,
    所述处理单元,还用于在通过所述通信单元接收到所述LPA发送的第二消息后,通过所述通信单元向签约管理-发现服务SM-DS服务器发送第三消息,所述第三消息中至少包含所述SM-DP+服务器的地址、所述eUICC标识和所述第一标识,所述第三消息用于所述SM-DS服务器至少删除所述SM-DP+服务器发送的所述SM-DP+服务器地址、所述eUICC标识和所述第一标识,所述第二消息至少包括结果代码以及至少根据所述结果代码生成的数字签名。
  28. 一种嵌入式通用集成电路卡eUICC,其特征在于,所述eUICC包括:处理单元和通信单元,
    所述处理单元,用于通过所述通信单元接收签约管理-数据准备SM-DP+服务器通过本地配置文件助手LPA发送的至少第一数字签名、远程配置文件管理命令和所述SM-DP+服务器的数字证书,所述第一数字签名为所述SM-DP+服务器至少根据随机数和所述远程配置文件管理命令生成,所述随机数为所述eUICC生成的;
    所述处理单元,还用于验证所述SM-DP+服务器的数字证书,并至少使用所述随机数、所述SM-DP+服务器的数字证书中的公钥和所述远程配置文件管 理命令对所述第一数字签名进行验证;
    所述处理单元,还用于当对所述数字证书及第一数字签名验证通过时,执行所述远程配置文件管理命令。
  29. 根据权利要求28所述的eUICC,其特征在于,
    所述处理单元,还用于所述数字证书及数字签名验证通过之后,当所述远程配置文件管理命令为目标命令时,通过所述通信单元发送所述第一消息至所述LPA,所述第一消息用于请求用户确认;
    所述处理单元执行所述远程配置文件管理命令的方式具体为:
    在通过所述通信单元接收到所述LPA返回的确认执行消息之后,所述eUICC执行所述远程配置文件管理命令。
  30. 根据权利要求28或29所述的eUICC,其特征在于,
    所述处理单元,还用于在执行所述远程配置文件管理命令之后,生成所述远程配置文件管理命令的远程配置文件管理结果,所述远程配置文件管理结果至少包括结果代码以及至少根据所述结果代码生成的数字签名;
    所述处理单元,还用于通过所述通信单元发送至少包含所述结果代码以及至少根据所述结果代码生成的数字签名的所述远程配置文件管理结果至所述LPA。
  31. 一种远程管理***,其特征在于,包括如权利要求16至19中任一项所述的签约管理-数据准备SM-DP+服务器和如权利要求20至23中任一项所述的嵌入式通用集成电路卡eUICC,或者
    所述远程管理***包括如权利要求24所述的SM-DS服务器、如权利要求25至27中任一项所述的SM-DP+服务器和如权利要求28至30中任一项所述的eUICC。
PCT/CN2016/079097 2016-04-12 2016-04-12 一种远程管理方法及设备 WO2017177383A1 (zh)

Priority Applications (6)

Application Number Priority Date Filing Date Title
EP20194072.3A EP3800909B1 (en) 2016-04-12 2016-04-12 Remote management method, and device
EP16898202.3A EP3429243B1 (en) 2016-04-12 2016-04-12 Remote management method and device
CN201680044510.6A CN107925868B (zh) 2016-04-12 2016-04-12 一种远程管理方法及设备
US16/092,990 US11076295B2 (en) 2016-04-12 2016-04-12 Remote management method, and device
PCT/CN2016/079097 WO2017177383A1 (zh) 2016-04-12 2016-04-12 一种远程管理方法及设备
EP23175240.3A EP4304222A1 (en) 2016-04-12 2016-04-12 Remote management method, and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/079097 WO2017177383A1 (zh) 2016-04-12 2016-04-12 一种远程管理方法及设备

Publications (1)

Publication Number Publication Date
WO2017177383A1 true WO2017177383A1 (zh) 2017-10-19

Family

ID=60041301

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/079097 WO2017177383A1 (zh) 2016-04-12 2016-04-12 一种远程管理方法及设备

Country Status (4)

Country Link
US (1) US11076295B2 (zh)
EP (3) EP3800909B1 (zh)
CN (1) CN107925868B (zh)
WO (1) WO2017177383A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180160294A1 (en) * 2016-12-01 2018-06-07 Samsung Electronics Co., Ltd. APPARATUS AND METHOD FOR INSTALLING AND MANAGING eSIM PROFILES
CN110417808A (zh) * 2019-08-08 2019-11-05 深圳市英博超算科技有限公司 防篡改方法、装置、***以及终端
FR3082646A1 (fr) * 2018-09-18 2019-12-20 Continental Automotive France Procede de gestion des profils d'abonne de carte esim dans un objet partage
CN112219384A (zh) * 2018-06-07 2021-01-12 三星电子株式会社 用于使用消息服务安装和管理配置文件的方法和装置
CN112997517A (zh) * 2020-07-24 2021-06-18 深圳杰睿联科技有限公司 一种基于UICC进行远程Profile管理的方法

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10700856B2 (en) * 2013-11-19 2020-06-30 Network-1 Technologies, Inc. Key derivation for a module using an embedded universal integrated circuit card
MX2018015011A (es) * 2016-06-23 2019-03-06 Ericsson Telefon Ab L M Metodos y entidades para finalizar una suscripcion.
KR102484367B1 (ko) * 2016-09-09 2023-01-04 삼성전자주식회사 UICC와 eUICC의 제어 방법 및 시스템
KR102293683B1 (ko) * 2017-02-13 2021-08-26 삼성전자 주식회사 eSIM 접근 제어 방법 및 장치
US10362475B2 (en) * 2017-07-20 2019-07-23 T-Mobile Usa, Inc. Subscription management service data feeds
US10454690B1 (en) 2017-08-04 2019-10-22 Amazon Technologies, Inc. Digital certificates with distributed usage information
US10523442B2 (en) 2017-08-21 2019-12-31 Citrix Systems, Inc. Secure inter-service communications in a cloud computing system
WO2019107314A1 (ja) * 2017-11-30 2019-06-06 株式会社アドテクニカ 情報処理装置、情報処理方法、情報処理システム及びプログラム
US11516649B2 (en) 2018-10-29 2022-11-29 Apple Inc. Mechanism to activate and manage a standalone device for cellular service
IT201900004809A1 (it) 2019-03-29 2020-09-29 St Microelectronics Srl Procedimento per la gestione di profile in embedded universal integrated circuit cards, corrispondente sistema e prodotto informatico
US11026081B2 (en) 2019-09-13 2021-06-01 T-Mobile Usa, Inc. RSP platform selection for ESIM profile procurement
US10939268B1 (en) * 2019-09-13 2021-03-02 T-Mobile Usa, Inc. Meta RSP interface platform for eSIM profile distribution
US11671265B2 (en) * 2019-10-25 2023-06-06 John A. Nix Secure configuration of a secondary platform bundle within a primary platform
KR20210102063A (ko) * 2020-02-11 2021-08-19 현대자동차주식회사 M2m 시스템에서 확인 기반 동작을 수행하기 위한 방법 및 장치
US11115810B1 (en) 2020-03-17 2021-09-07 Sprint Communications Company L.P. Bootstrap electronic subscriber identity module configuration
US10887741B1 (en) 2020-03-17 2021-01-05 Sprint Communications Company L.P. Activation communication addresses of internet of things devices
US11140543B1 (en) 2020-05-21 2021-10-05 Sprint Communications Company L.P. Embedded subscriber identity module (eSIM) profile adaptation based on context
US11190985B1 (en) 2020-05-28 2021-11-30 Sprint Communications Company L.P. Internet of things (IoT) devices wireless communication service management platform
US11109220B1 (en) * 2020-05-29 2021-08-31 T-Mobile Usa, Inc. Enterprise embedded subscriber identification module solutions
JP2023530878A (ja) 2020-06-16 2023-07-20 グーグル エルエルシー 組込み型加入者識別モジュールルートディスカバリサービスエンドポイントの発見
KR20220028863A (ko) 2020-08-31 2022-03-08 삼성전자주식회사 통신 시스템에서 이벤트를 관리하는 방법 및 장치
US11310654B1 (en) 2020-09-16 2022-04-19 Sprint Communications Company L.P. Electronic subscriber identity module (eSIM) profile delivery and activation system and methods
US11477636B1 (en) 2020-09-16 2022-10-18 Sprint Communications Company L.P. Electronic subscriber identity module (eSIM) profile provisioning
CN114554476B (zh) * 2020-11-10 2023-04-07 荣耀终端有限公司 eSIM卡控制方法、可读介质及电子设备
WO2022220616A1 (en) * 2021-04-14 2022-10-20 Samsung Electronics Co., Ltd. Method and apparatus for managing events in a wireless communication system
US11564081B1 (en) 2021-07-06 2023-01-24 Cisco Technology, Inc. Auto-update and activation of locale-specific eSIM profile for a global enterprise user
CN114048206B (zh) * 2021-10-29 2024-07-09 济南浪潮数据技术有限公司 一种大规模集群的配置一致性校验方法、***及装置
CN115002745A (zh) * 2022-04-21 2022-09-02 武汉天喻信息产业股份有限公司 一种eSIM卡认证方法、终端及eSIM卡
CN116528217B (zh) * 2023-07-04 2023-10-10 中国电信股份有限公司 对eUICC进行远程管理的方法及相关设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101296136A (zh) * 2007-04-29 2008-10-29 华为技术有限公司 一种配置服务器信息下发的方法及***、管理装置
US20140237101A1 (en) * 2011-09-28 2014-08-21 Kt Corporation Profile management method, embedded uicc, and device provided with the embedded uicc
CN104703170A (zh) * 2013-12-05 2015-06-10 华为终端有限公司 下载运营商的文件的方法及设备
CN104852911A (zh) * 2015-04-27 2015-08-19 小米科技有限责任公司 安全验证方法、装置及***

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU770396B2 (en) * 1998-10-27 2004-02-19 Visa International Service Association Delegated management of smart card applications
EP2461613A1 (en) * 2010-12-06 2012-06-06 Gemalto SA Methods and system for handling UICC data
US8887257B2 (en) * 2011-04-26 2014-11-11 David T. Haggerty Electronic access client distribution apparatus and methods
KR102001869B1 (ko) 2011-09-05 2019-07-19 주식회사 케이티 eUICC의 프로파일 관리방법 및 그를 이용한 eUICC, eUICC 탑재 단말과, 프로비저닝 방법 및 MNO 변경 방법
KR101716743B1 (ko) * 2012-02-14 2017-03-15 애플 인크. 복수의 액세스 제어 클라이언트를 지원하는 모바일 장치, 및 대응 방법들
WO2014030893A1 (ko) * 2012-08-20 2014-02-27 주식회사 케이티 단말 장치에 내장되어 설치되는 가입자 인증 모듈의 프로파일 관리 방법 및 이를 이용하는 가입자 인증 장치
US9100175B2 (en) * 2013-11-19 2015-08-04 M2M And Iot Technologies, Llc Embedded universal integrated circuit card supporting two-factor authentication
JP2017500798A (ja) 2013-12-05 2017-01-05 ▲華▼▲為▼▲終▼端有限公司 Euiccのためのセキュリティ制御方法およびeuicc
US9609507B2 (en) * 2014-03-28 2017-03-28 Mediatek Inc. Method of device-assisted enhanced SIM replacement
CN104469737B (zh) 2014-11-17 2018-09-11 中国联合网络通信集团有限公司 一种嵌入式通用集成电路卡及其用户签约信息激活方法
EP3057350A1 (en) * 2015-02-13 2016-08-17 Gemalto Sa Method for remote subscription management of an eUICC, corresponding terminal
KR102333395B1 (ko) * 2015-02-17 2021-12-03 삼성전자 주식회사 이동통신 시스템의 단말에서 프로파일 수신을 위한 방법 및 장치
CN107660346B (zh) * 2015-03-25 2021-04-13 三星电子株式会社 用于在无线通信***中下载简档的方法和设备
US9867037B2 (en) * 2016-03-24 2018-01-09 Verizon Patent And Licensing Inc. Profile deletion codes in subscription management systems

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101296136A (zh) * 2007-04-29 2008-10-29 华为技术有限公司 一种配置服务器信息下发的方法及***、管理装置
US20140237101A1 (en) * 2011-09-28 2014-08-21 Kt Corporation Profile management method, embedded uicc, and device provided with the embedded uicc
CN104703170A (zh) * 2013-12-05 2015-06-10 华为终端有限公司 下载运营商的文件的方法及设备
CN104852911A (zh) * 2015-04-27 2015-08-19 小米科技有限责任公司 安全验证方法、装置及***

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GSMA: "RSP Architecture", OFFICIAL DOCUMENT SGP.21, 23 December 2015 (2015-12-23), XP055429437 *
GSMA: "RSP Technical Specification Version 1.0", OFFICIAL DOCUMENT SGP.22, 13 January 2016 (2016-01-13), pages 29 - 34 , 53 , 59-61 and 85-86, XP055429434 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180160294A1 (en) * 2016-12-01 2018-06-07 Samsung Electronics Co., Ltd. APPARATUS AND METHOD FOR INSTALLING AND MANAGING eSIM PROFILES
US10659955B2 (en) * 2016-12-01 2020-05-19 Samsung Electronics Co., Ltd. Apparatus and method for installing and managing eSIM profiles
CN112219384A (zh) * 2018-06-07 2021-01-12 三星电子株式会社 用于使用消息服务安装和管理配置文件的方法和装置
CN112219384B (zh) * 2018-06-07 2024-04-05 三星电子株式会社 用于使用消息服务安装和管理配置文件的方法和装置
FR3082646A1 (fr) * 2018-09-18 2019-12-20 Continental Automotive France Procede de gestion des profils d'abonne de carte esim dans un objet partage
CN110417808A (zh) * 2019-08-08 2019-11-05 深圳市英博超算科技有限公司 防篡改方法、装置、***以及终端
CN112997517A (zh) * 2020-07-24 2021-06-18 深圳杰睿联科技有限公司 一种基于UICC进行远程Profile管理的方法
WO2022016519A1 (zh) * 2020-07-24 2022-01-27 深圳杰睿联科技有限公司 一种基于UICC进行远程Profile管理的方法

Also Published As

Publication number Publication date
EP3429243B1 (en) 2020-11-18
EP3429243A4 (en) 2019-02-20
EP3800909B1 (en) 2023-06-28
EP3800909A1 (en) 2021-04-07
EP4304222A1 (en) 2024-01-10
US20190140837A1 (en) 2019-05-09
CN107925868A (zh) 2018-04-17
US11076295B2 (en) 2021-07-27
EP3800909C0 (en) 2023-06-28
EP3429243A1 (en) 2019-01-16
CN107925868B (zh) 2019-09-27

Similar Documents

Publication Publication Date Title
WO2017177383A1 (zh) 一种远程管理方法及设备
US11601809B2 (en) Method and system for updating certificate issuer public key, and related device
US11252569B2 (en) Method, system, and device for generating, storing, using, and validating NFC tags and data
US8064598B2 (en) Apparatus, method and computer program product providing enforcement of operator lock
US8495383B2 (en) Method for the secure storing of program state data in an electronic device
CN107743067B (zh) 数字证书的颁发方法、***、终端以及存储介质
CN109792604B (zh) 一种eUICC配置文件管理方法及相关装置
CN110611657A (zh) 一种基于区块链的文件流处理的方法、装置及***
CN112039826B (zh) 应用于小程序端的登录方法和装置,电子设备,可读介质
WO2006108788A1 (en) Updating of data instructions
CN113553572B (zh) 资源信息获取方法、装置、计算机设备和存储介质
WO2019051839A1 (zh) 一种数据处理的方法及装置
CN109863475A (zh) 一种安全元件中的应用的升级方法及相关设备
CN112632573B (zh) 智能合约执行方法、装置、***、存储介质及电子设备
WO2018129753A1 (zh) 一种签约信息集的下载方法、装置以及相关设备
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
WO2016150034A1 (zh) 一种虚拟sim卡的管理方法、装置和***
CN111901287A (zh) 一种为轻应用提供加密信息的方法、装置和智能设备
CN112118229A (zh) 物联网设备和服务器安全认证方法、装置及电子设备
JP4610651B2 (ja) 装置管理におけるブートストラップメッセージ保安送信方法及び装置
EP3410332A1 (en) A system and method for transferring data to an authentication device
EP4206906A1 (en) Processing system and method for updating firmware online
CN106685931B (zh) 智能卡应用管理方法和***、终端和智能卡
WO2021114113A1 (zh) 刷机处理方法及相关装置
CN114915487B (zh) 终端认证方法、***、装置、设备及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2016898202

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2016898202

Country of ref document: EP

Effective date: 20181008

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16898202

Country of ref document: EP

Kind code of ref document: A1