WO2018129723A1 - 一种签约数据集的管理方法、终端及服务器 - Google Patents

一种签约数据集的管理方法、终端及服务器 Download PDF

Info

Publication number
WO2018129723A1
WO2018129723A1 PCT/CN2017/071184 CN2017071184W WO2018129723A1 WO 2018129723 A1 WO2018129723 A1 WO 2018129723A1 CN 2017071184 W CN2017071184 W CN 2017071184W WO 2018129723 A1 WO2018129723 A1 WO 2018129723A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
management
data set
party application
euicc
Prior art date
Application number
PCT/CN2017/071184
Other languages
English (en)
French (fr)
Inventor
高林毅
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201780032616.9A priority Critical patent/CN109196891B/zh
Priority to PCT/CN2017/071184 priority patent/WO2018129723A1/zh
Publication of WO2018129723A1 publication Critical patent/WO2018129723A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • the present invention relates to the field of communications, and in particular, to a method, a terminal, and a server for managing a contracted data set.
  • the terminal user purchases a SIM (Subscriber Identification Module) card or a UICC (Universal Integrated Circuit Card) from the operator, and inserts the SIM card or UICC into the terminal (device) to write according to the card.
  • SIM Subscriber Identification Module
  • UICC Universal Integrated Circuit Card
  • the data set is connected to the operator's network.
  • the eUICC refers to a UICC that supports secure remote management of a subscription data profile and/or a UICC that supports a local management profile.
  • the eUICC Since the eUICC is generally integrated in the terminal by the terminal manufacturer, it is generally not purchased and manufactured by the operator. Therefore, after the terminal is shipped from the factory, the eUICC may not include data that can be connected to the carrier network.
  • the terminal needs to use the remote management technology to connect to the SM-DP+ (Subscription Management Data Preparation+), receive the profile delivered by the SM-DP+, and download the profile to the eUICC. Then the eUICC can use the profile to connect. Enter the carrier's network. When the profile is active, the eUICC functions the same as the traditional UICC and can be used to access the network of the corresponding mobile network operator.
  • the terminal also includes an LPA (Local Profile Assistant) for managing the profile in the eUICC, such as downloading other new profiles, activating the downloaded profile, activating the profile, and deleting the profile.
  • LPA Local Profile Assistant
  • the terminal can manage the profile in the eUICC through the LPA.
  • the user cannot use the third-party application (Application), such as the application client of the operator to manage the profile in the eUICC.
  • Application such as the application client of the operator to manage the profile in the eUICC.
  • An embodiment of the present invention provides a method for managing a subscription data set, a terminal, and a server.
  • the third-party application on the terminal performs access management on the profile in the eUICC by using the system architecture and the access control mechanism of the current eUICC.
  • a method for managing a subscription data set is disclosed, the method being performed by a terminal, where the terminal comprises an integrated circuit card eUICC, an LPA (Local Profile Assistant), and a third party application, the method include:
  • the terminal obtains a subscription data set from the subscription management server, where the subscription data set includes authentication information of the third-party application;
  • the contract data set performs management operations
  • the terminal performs the management operation on the subscription data set.
  • the current eUICC system architecture of the current terminal is used to manage the subscription data set in the eUICC through the third-party application, and the subscription data set in the eUICC is added, without adding additional application modules. Manage the entrance.
  • the method before the receiving, by the terminal, the first request sent by the third-party application server, the method further includes:
  • the third-party application of the terminal sends a first management operation request to the third-party application server, where the first management operation request includes a management operation performed by the third-party application to perform the subscription data set in the eUICC.
  • the method before the receiving, by the terminal, the first request sent by the third-party application server, the method further includes:
  • the third party application server generates a management operation performed on the contract data set in the eUICC.
  • the terminal acquires the identifier according to the identifier ICCID of the subscription data set Before the authentication information of the third-party application included in the contract data set in the eUICC, the method further includes:
  • the terminal determines that the identifier EID of the eUICC returned by the third-party application server is the same as the identifier EID of the eUICC of the terminal, the terminal acquires the subscription data set in the eUICC according to the identifier ICCID of the subscription data set. Contains authentication information for third-party applications.
  • the terminal is configured according to the third party application in the subscription data set And the authentication information, and the certificate information of the third-party application, determining whether the third-party application has the right to trigger a management operation on the subscription data set, including:
  • the LPA of the terminal determines, according to the authentication information of the third-party application in the subscription data set, and the certificate information of the third-party application, whether the third-party application has the right to trigger a management operation on the subscription data set;
  • the eUICC of the terminal determines, according to the authentication information of the third-party application in the subscription data set, and the certificate information of the third-party application, whether the third-party application has the right to trigger a management operation on the subscription data set.
  • the terminal performs the management operation on the subscription data set ,include:
  • the LPA of the terminal sends a management instruction acquisition request to the subscription management server according to the first request;
  • the LPA of the terminal receives the management instruction returned by the subscription management server according to the management instruction acquisition request;
  • the LPA of the terminal performs a management operation in the first management operation request on the subscription data set in the eUICC according to the management instruction.
  • the method further includes:
  • the first request includes an indication indicating a management operation
  • the terminal performs the management operation on the subscription data set, including:
  • the LPA of the terminal performs a management operation indicated in the first request on the subscription data set in the eUICC according to the first request.
  • a method for managing a contracted data set is disclosed, the method being performed by a contract management server, wherein the method comprises:
  • the subscription management server receives a second management operation request sent by the third-party application server, where the second management operation request includes a management operation performed on the subscription data in the terminal, an identifier ICCID of the subscription data set in the terminal, An identifier EID of the terminal eUICC and authentication information of a third-party application in the terminal;
  • the subscription management server sends a management request response to the third-party application server, where the management request response includes an identifier ICCID of the subscription data set in the terminal and an identifier EID of the terminal eUICC;
  • the third-party application server sends the identifier ICCID of the subscription data set in the terminal to the terminal.
  • the subscription management server acquires a management instruction acquisition request sent by the terminal, where the management instruction acquisition request carries the identifier EID of the terminal eUICC and the certificate information of the third-party application stored in the terminal;
  • the subscription management server determines, according to the management instruction acquisition request and the second management operation request, whether the third-party application in the terminal has the right to trigger a management operation on the subscription data set in the terminal eUICC;
  • the subscription management server verifies that the third-party application in the terminal has the right to trigger a management operation on the subscription data set in the terminal eUICC
  • the subscription management server returns a management instruction to the terminal, so that the terminal can
  • the management data indicates the subscription data set in the terminal eUICC Perform management operations.
  • the current eUICC system architecture of the current terminal is used to manage the subscription data set in the eUICC through the third-party application, and the subscription data set in the eUICC is added, without adding additional application modules.
  • the authorization of the MNO APP is placed on the network side for verification, which further simplifies the complexity of the method flow and simplifies the authentication operation on the terminal side.
  • the subscription management server is configured to verify, according to the management instruction acquisition request and the second management operation request, whether the third-party application in the terminal is Have permission to trigger management operations on the subscription data set in the terminal eUICC, including:
  • the subscription management server acquires an identifier EID of the terminal eUICC in the request according to the management instruction, and searches for a second management operation request associated with the identifier EID of the terminal eUICC;
  • the contract management server determines whether the certificate information of the third-party application carried in the management instruction acquisition request is the same as the authentication information of the third-party application in the second management operation request;
  • the contracted data set performs management operations.
  • the management request response sent by the subscription management server further includes a registration event identifier event ID
  • the registration event identifier event ID is used to identify a management operation event that the subscription management server requests to register according to the second management operation request;
  • the registration management server obtains the registration event identifier event ID in the management instruction acquisition request sent by the terminal;
  • the subscription management server according to the management instruction acquisition request and the second management operation request, verifying whether the third-party application in the terminal has the right to trigger a management operation on the subscription data set in the eUICC, including:
  • the subscription management server acquires a registration event identifier event ID in the request according to the management instruction, and searches for a second management operation request associated with the registration event identifier event ID;
  • the contract management server determines whether the certificate information of the third-party application carried in the management instruction acquisition request is the same as the authentication information of the third-party application in the second management operation request;
  • the third-party application in the terminal has authority to the terminal eUICC.
  • the contracted data set performs management operations.
  • a terminal comprising a transceiver, an integrated circuit card eUICC for storing a subscription data set, a memory, and one or more programs for executing the one stored in the memory
  • eUICC integrated circuit card
  • a memory for storing a subscription data set
  • one or more programs for executing the one stored in the memory
  • the one or more processors are used to:
  • the contract data set performs management operations
  • the current eUICC system architecture of the current terminal is used to manage the subscription data set in the eUICC through the third-party application, and the subscription data set in the eUICC is added, without adding additional application modules. Manage the entrance.
  • the processor is further configured to:
  • the third-party application server in conjunction with the third aspect, in a second possible implementation of the third aspect, the third-party application server generates a management operation performed on the subscription data set in the eUICC.
  • the processor is further configured to:
  • the identifier EID of the eUICC returned by the third-party application server is the same as the identifier EID of the eUICC of the terminal, acquiring the third-party application included in the subscription data set in the eUICC according to the identifier ICCID of the subscription data set. Certification Information.
  • the processor is further configured to:
  • determining that the eUICC of the terminal determines, according to the authentication information of the third-party application in the subscription data set, and the certificate information of the third-party application, whether the third-party application has the right to trigger a management operation on the subscription data set. .
  • the processor is further configured to:
  • the first request includes a management command indicating a management operation
  • the processor is further configured to:
  • a fourth aspect is a subscription management server, characterized in that the terminal comprises a transceiver, a memory, and one or more processors for executing one or more programs stored in the memory,
  • the one or more processors are used to:
  • the second management operation request includes a management operation performed on the subscription data in the terminal, and an identifier of the subscription data set in the terminal.
  • the management request response includes an identifier ICCID of the subscription data set in the terminal and an identifier of the terminal eUICC EID, for the third-party application server to send an identifier ICCID of the subscription data set in the terminal and an identifier EID of the terminal eUICC to the terminal;
  • the transceiver And receiving, by the transceiver, a management instruction acquisition request sent by the terminal, where the management instruction acquisition request carries an identifier EID of the terminal eUICC and certificate information of a third-party application stored in the terminal;
  • the subscription management server verifies that the third-party application in the terminal has the right to trigger a management operation on the subscription data set in the terminal eUICC, then controlling the transceiver to return a management instruction to the terminal, so that the terminal can The management instruction performs a management operation on the contract data set in the terminal eUICC.
  • the current eUICC system architecture of the current terminal is used to manage the subscription data set in the eUICC through the third-party application without adding additional application modules.
  • the authorization of the MNO APP is placed on the network side for verification, which further simplifies the complexity of the method flow and simplifies the authentication operation on the terminal side.
  • the one or more processors are further configured to:
  • the contracted data set performs management operations.
  • the management request response further includes a registration event identifier event ID, the registration event The identifier event ID is used to identify a management operation event that is registered by the subscription management server according to the second management operation request;
  • the management instruction acquisition request further carries the registration event identifier event ID
  • the one or more processors are also used to:
  • the contracted data set performs management operations.
  • FIG. 1A is an application scenario diagram of managing a profile in a terminal eUICC by using a third-party application
  • FIG. 1B is an architectural diagram of a remote management system of eUICC
  • FIG. 2 is a schematic flowchart of a method for managing a contracted data set according to an embodiment of the present invention
  • FIG. 3 is a signaling interaction diagram of a method for managing a subscription data set according to an embodiment of the present disclosure
  • FIG. 4 is a signaling interaction diagram of another method for managing a contracted data set according to an embodiment of the present disclosure
  • FIG. 5 is a signaling interaction diagram of another method for managing a contracted data set according to an embodiment of the present invention.
  • FIG. 6 is a signaling interaction diagram of another method for managing a contracted data set according to an embodiment of the present invention.
  • FIG. 7 is a schematic flowchart of still another method for managing a contracted data set according to an embodiment of the present invention.
  • FIG. 8 is a signaling interaction diagram of still another method for managing a contracted data set according to an embodiment of the present disclosure.
  • FIG. 9 is a signaling interaction diagram of still another method for managing a contracted data set according to an embodiment of the present invention.
  • FIG. 10 is a structural block diagram of a terminal according to an embodiment of the present invention.
  • FIG. 11 is a structural block diagram of a subscription management server according to an embodiment of the present invention.
  • the existing SIM card or UICC card is generally ordered by the MNO (mobile network operator) to the card merchant, so the network access application and data required for accessing the carrier network are already in place before the card leaves the factory. Downloaded to the card, such as: USIM (Universal Subscriber Identity Module), IMSI (International Mobile Subscriber Identity), KI (Key Identity, Personal Identity Authentication Key), and so on. In this way, the user can access the operator's network by inserting a SIM card or a UICC card and inserting the device.
  • MNO mobile network operator
  • eUICC Unlike UICC cards, eUICC generally embeds a UICC card in a terminal. For eUICC, it is not necessarily purchased by the operator from the card vendor, or it may be integrated by the terminal manufacturer and integrated into the terminal. Therefore, the eUICC may not include data that can be connected to the carrier network after being shipped from the factory. The data needs to be downloaded remotely, such as a subscription data set (profile, that is, a set of data and applications configured to provide services to the eUICC). Then, you can access the carrier network based on these data. After the profile is downloaded to the eUICC, the user can activate, deactivate, delete, and download a new profile for the profile. Currently, the profile in the eUICC can only be managed through the LPA in the terminal. The management portal is single, and the user expects to be able to manage the profile in the eUICC through more entries.
  • profile that is, a set of data and applications configured to provide services to the eUICC
  • FIG. 1A is an application scenario diagram of managing a profile in a terminal eUICC by using a third-party application, as shown in FIG. 1A:
  • the user activates the carrier application (MNO APP) on the desktop of the terminal, and the user inputs the username and password to log in to the carrier application server.
  • the operator application displays the download operation and management operation of the subscription data set that the user can trigger through the operator application according to the subscription information of the user.
  • the operator application displays the type of management operation that the user can trigger. Since multiple profiles may have been downloaded in the terminal, the carrier application displays the type of management operations that can be triggered for one or more profile users. For example, if the user selects "activate profile X", it means that the user wants to activate "profile X" in the terminal. When "profile X" is activated successfully, the operator application displays a UI interface that is successfully activated.
  • the carrier application is only used as an example.
  • the third-party application is not limited to the operator application.
  • the profile in the eUICC is managed by a third-party application, such as an application of the operator, according to the current eUICC system without adding additional applications.
  • a third-party application such as an application of the operator
  • the management authority information for the third-party application to manage the profile in the eUICC is preset in the profile of the SM-DP+. After the terminal downloads the profile containing the third-party application management rights information from the SM-DP+, the terminal learns the management rights of the third-party application to manage the profile in the eUICC.
  • the management authority of the third-party application A to manage the profile in the eUICC is activation and deactivation, and the application A may not perform the deletion operation on the profile in the eUICC.
  • the third-party application B only allows a part of the application programming interface (API) of the LPA in the terminal to be called, and may not call other APIs of the LPA.
  • API application programming interface
  • the eUICC or LPA of the terminal can verify whether the third-party application has the right to manage the profile in the eUICC. If the verification is passed, the third-party application is allowed to activate, deactivate, delete, download a new profile, and the like in the eUICC profile.
  • the server of the third-party application sends the management operation and the certificate information of the third-party application to the SM-DP+.
  • the server system such as SM-DP+ or SM-DS (Subscription Manager-Discovery Server) verifies whether the third-party application has the right to manage the profile in the eUICC. If the verification is passed, the third-party application is allowed to activate, deactivate, delete, download a new profile, and the like in the eUICC profile.
  • an embodiment of the present invention provides an architecture diagram of a remote management system of an eUICC.
  • the system includes an SM-DP+ (Subscription Manager Data Preparation+) server, an SM-DS (Subscription Manager-Discovery Server), an operator (Operator), and a card vendor ( EUM), Certificate Issue Center (CI), Terminal (Terminal), User (End User).
  • SM-DP+ Subscribescription Manager Data Preparation+
  • SM-DS Subscribescription Manager-Discovery Server
  • EUM card vendor
  • Certificate Issue Center CI
  • Terminal Terminal
  • User End User
  • ES6 is the interface between the eUICC and the operator
  • ES2+ is the interface between the operator and the SM-DP+
  • the ES8+ is the interface between the eUICC and the SM-DP+
  • It is the interface between the LDS (Local Discovery Service) and the SM-DS of the terminal
  • the ES12 is the interface between the SM-DS and the SM-DP+
  • the ES10a is the interface between the LDS and the eUICC
  • ES10c is the LUI ( Local user interface (local user interface) and eUICC
  • ESci is the interface between EUM and CI, or the interface between CI and SM-DP+
  • ESeum is the interface between EUM and eUICC
  • ESop is the user (End User) and Interface for carrier interaction
  • ESeu is the interface between End User and LUI
  • ES9+ is the interface between SM-DP+ and LPD (local profile download), and
  • the functions of SM-DP+ include the generation of subscription data sets, the protection of contracted data sets (eg encryption), the subscription data set storage, and the binding of data sets (eg, the profile and event IDs are tied). Set), contract data set transmission or download, remote contract data set management, SM-DS event registration, etc.
  • the SM-DS is mainly responsible for accepting the event registration sent by the SM-DP+ and sending the event to the terminal. Events include contracted dataset download events or contracted dataset management events. End The terminal downloads the subscription data set from the SM-DP+ according to the subscription data set download event; or the terminal acquires the subscription data set management command from the SM-DP+ according to the contract data set management event.
  • the LDS of the terminal queries the SM-DS for the event, and the LPD is responsible for downloading the subscription data set, that is, the LPD downloads the profile from the SM-DP+ to the LPD through the HTTPS (Hypertext Transfer Protocol Secure) secure link, and then passes The local APDU command sends the downloaded subscription data set to the eUICC.
  • the contracted data set here refers to a collection of file structures, data, applications, etc., and may include one or more network access applications and corresponding network access credentials.
  • the subscription data set is a general term, including a subscription data set installed on the eUICC of the terminal and a profile package stored in the SM-DP+.
  • the LUI of the terminal provides interaction logic and interface with the user, and the user can complete the management of the profile through the LUI, such as downloading a new profile, activating a profile, activating a profile, and deleting a profile.
  • the LPA can communicate with the eUICC, and other third-party application APPs need to call the LPA open application program interface (API) to implement communication with the eUICC.
  • API application program interface
  • An embodiment of the present invention provides a method for managing a subscription data set. As shown in FIG. 2, the method includes the following steps:
  • the terminal subscription management server obtains a subscription data set, where the subscription data set includes authentication information of a third-party application.
  • the terminal automatically downloads or downloads the subscription data set from the subscription management server to the eUICC of the terminal according to the download instruction input by the user.
  • the authentication information of the third-party application may be carried in the metadata of the subscription data set, and specifically, may be added to the data field of the StoreMetadata command.
  • the metadata of the subscription data set can be stored in the Security Domain Space (Issuer Security Domain-Profile, ISD-P) created by the eUICC for the subscription data set.
  • the authentication information of the third-party application may include a hash value of the third-party application certificate.
  • the subscription management server may be an SM-DP+ (Subscription Manager Data Preparation+) server. It can also be an SM-DP+ server and an SM-DS (Subscription Manager-Discovery Server). This is not specifically limited.
  • SM-DP+ Subscribescription Manager Data Preparation+
  • SM-DS Subscribescription Manager-Discovery Server
  • the authentication information of the third-party application may further include a hash algorithm of the third-party application certificate, a package name, an API of the LPA that allows the third-party application to access, and the like.
  • the authentication information of the third party application does not include an API of the LPA that allows access by the third party application, it represents all open APIs that allow the third party application to access the LPA.
  • the authentication information of the third-party application may further include a management operation type that allows the third-party application to perform the contracted data set in the eUICC.
  • the authentication information of the third-party application may be preset by the mobile network operator (MNO) in the SM-DP+ through the MNO portal server, or may be provided to the SM-DP+ by the MNO when ordering the profile to the SM-DP+.
  • MNO mobile network operator
  • the third-party application of the terminal sends a first management operation request to a third-party application server.
  • the first management operation request includes a management operation performed by the third-party application to perform a subscription data set in the eUICC.
  • the terminal After the terminal starts the third-party application, log in to the third-party application server.
  • the user inputs a management operation of managing the contract data set in the eUICC through the user interface of the third party application.
  • the third-party application sends a request message carrying a management operation to the contracted data set in the eUICC to the third-party application server.
  • the third-party application server belongs to a server in an operator in the architecture shown in FIG. 1B. Or the third-party application server communicates through the operator and the contract management server.
  • step 102 may not be performed.
  • the third-party application server may also trigger the generation of management operations performed on the contracted data set in the eUICC according to other events. No third-party application is required to send and send the first management operation request to the third-party application server.
  • the terminal receives a first request sent by a third-party application server, where the first request carries an identifier ICCID of the subscription data set.
  • the first request is used to trigger a management operation on a subscription data set in the eUICC.
  • the third-party application server receives the first management operation request sent by the third-party application of the terminal, or after the third-party application server automatically generates a management operation performed on the subscription data set in the eUICC, the third-party application server
  • the management operation in the first management operation request may be sent to the subscription management server, and the subscription management server returns the identifier ICCID of the subscription data set, and then generates a first request to be sent to the terminal, or may be directly generated by the third-party application server. Requesting, sending a first request carrying the identification ICCID of the subscription data set to the terminal. This is not specifically limited.
  • the identifier EID of the eUICC may also be carried in the first request.
  • the first request may further carry a management operation that is performed by the third-party application to perform the subscription data set in the eUICC.
  • the first request itself is a management command of a third party application to perform a management operation on the contract data set in the eUICC.
  • the first request is an enable profile command.
  • the terminal acquires the authentication information of the third-party application included in the contract data set in the eUICC according to the identifier ICCID of the subscription data set.
  • the terminal acquires information about the subscription data set corresponding to the identifier ICCID in the eUICC according to the identifier ICCID of the subscription data set returned by the third-party application server. Since the eUICC of the terminal may include multiple subscription data sets, according to the identifier ICCID returned by the subscription management server, the subscription data set that the third-party application needs to trigger the management operation may be acquired.
  • the terminal After obtaining the subscription data set in the eUICC, the terminal further obtains the authentication information of the third-party application stored in the subscription data set. Specifically, obtaining the number in the metadata of the contract data set The authentication information of the three parties.
  • the authentication information of the third party application may include a hash value of the third party application certificate.
  • the authentication information of the third-party application may further include a hash algorithm of the third-party application certificate, a package name, an API of the LPA that allows the third-party application to access, and the like.
  • step 104 is performed.
  • the terminal acquires certificate information of the third-party application stored in the terminal.
  • the certificate information of the third-party application is stored in the terminal.
  • the certificate information may include a certificate of a third-party application, a package name of the third-party application, and the like.
  • the terminal acquires the certificate of the third-party application from the operating system, and calculates the hash algorithm in the authentication information of the third-party application.
  • the hash value is used by the terminal to calculate the hash value by using the default hash algorithm, or the terminal obtains the hash value of the third-party certificate from the operating system according to the hash algorithm in the authentication information of the third-party application or the default hash algorithm.
  • the authentication information of the third-party application stored in the eUICC in step 104 further includes the package name of the third-party application
  • the terminal acquires the package name of the third-party application from the operating system.
  • the terminal determines, according to the authentication information of the third-party application in the subscription data set, and the certificate information of the third-party application, whether the third-party application has the right to trigger a management operation on the subscription data set.
  • the terminal determines whether the third-party application has permission to trigger a management operation on the subscription data set according to the authentication information of the third-party application in the subscription data set obtained in step 104 and the certificate information of the third-party application obtained in step 105.
  • the execution body of step 106 may be the LPA of the terminal or the eUICC of the terminal.
  • the terminal performs the management operation on the subscription data set.
  • step 106 If the result of the determination in step 106 is consistent, the third-party application has the right to trigger a management operation on the subscription data set. If the result of the determination in step 106 is inconsistent, the third-party application does not have permission to perform a management operation on the subscription data set, and the process terminates, and the third-party application is not allowed to perform a management operation on the subscription data set in the eUICC.
  • the LPA of the terminal sends a management instruction acquisition request to the subscription management server according to the first request.
  • the LPA of the terminal performs a management operation in the first management operation request on the subscription data set in the eUICC according to the management instruction.
  • the LPA of the terminal performs a management operation indicated in the first request on the subscription data set in the eUICC according to the first request.
  • the first request sent by the terminal to the third-party application server includes an indication indicating a management operation.
  • the authentication information of the third-party application is preset in the subscription data set.
  • the terminal downloads the subscription data set from the subscription management server to the eUICC, the terminal obtains the authentication information of the third-party application.
  • the subscription data set stored by the terminal is searched according to the subscription data set identifier returned by the third-party application server.
  • the terminal verifies whether the third-party application has the right to trigger a management operation on the subscription data set in the eUICC according to the authentication information of the third-party application stored in the contract data.
  • the current eUICC system architecture of the current terminal is used to manage the subscription data set in the eUICC through the third-party application, and the subscription data set in the eUICC is added, without adding additional application modules. Manage the entrance.
  • the execution body of step 106 may be an LPA in the terminal, or may be an eUICC in the terminal.
  • MNO APP operator-installed operator application
  • the network element body involved in the second embodiment includes a terminal, a mobile network operator's portal server (MNO portal), and a subscription management server.
  • the terminal includes an eUICC, an LPA, and an operator application (MNO APP) installed in the terminal.
  • the contract management server includes an SM-DP+ server and an SM-DS server. It is determined by the LPA in the terminal whether the operator application (MNO APP) in the terminal has authority to perform a management operation on the contracted data set in the terminal.
  • the specific signaling interaction process is as follows:
  • the Mobile Network Operator has developed a Carrier Application (MNO APP) for installation on the terminal.
  • MNO APP Carrier Application
  • the terminal stores the certificate information of the operator application, such as a certificate, a package name, and the like.
  • the mobile network operator stores the authentication information of the application in the subscription when the subscription data set is customized in the SM-DP+ through the MNO portal server. In the metadata of the dataset.
  • the authentication information of the operator application includes a hash value of the certificate applied by the operator.
  • the authentication information of the operator application may further include a hash algorithm of the certificate of the operator application, a package name, an API of an LPA that allows access by the operator application, and the like.
  • the authentication information of the application developed by the operator is also downloaded to the terminal along with the subscription data set.
  • the authentication information of the operator application may be stored in the metadata of the subscription data set. Download the description After signing the data set to the eUICC of the terminal, the metadata of the contracted data set may be stored in the secure domain space (ISD-P) created by the eUICC for the subscription data set.
  • ISD-P secure domain space
  • the subscription data set download record of the terminal is stored in the mobile network operator's MNO portal server.
  • the subscription data set download record may include an identifier ICCID of the downloaded subscription data set, an identifier EID of the eUICC of the downloaded subscription data set, and the like.
  • the user opens the carrier application (MNO APP) client on the terminal and logs in to the MNO portal.
  • MNO APP carrier application
  • the management operation of managing the contract data set in the eUICC is input through the client user interface of the operator application (MNO APP).
  • the client of the operator application (MNO APP) sends a first management operation request (PRM/ReM) carrying a request to perform a management operation on the contract data set in the eUICC to the MNO portal.
  • the management operation may be to activate the subscription data set, deactivate the subscription data set, delete the subscription data set, query the eUICC information, download another new subscription data set, and the like.
  • PRM/ReM first management operation request
  • the operator application (MNO APP) client obtains the subscription information of the user when registering the operator from the MNO portal, according to the subscription information.
  • the client user interface of the application inputs management operations for managing the contracted data set in the eUICC.
  • the MNO portal After receiving the first management operation request sent by the application client of the operator, the MNO portal searches for the identifier ICCID of the corresponding subscription data set according to the user subscription information (in the second to fifth embodiments, the target profile identifier ICCID). And the identifier EID of the eUICC in which the contract data set is installed (in the second to fifth embodiments, the "target eUICC identifier EID").
  • the MNO portal sends a second management operation request to the subscription management server.
  • the second management operation request includes a management operation performed by the third-party application to perform a subscription data set in the eUICC, and carries a target profile identifier ICCID and a target eUICC identifier EID.
  • the MNO portal sends a second management operation request to the SM-DP+.
  • the MNO portal also sends the address of the SM-DS to the SM-DP+.
  • the SM-DP+ registers a management operation event for the management operation in the SM-DS, and generates a registration event identifier eventID.
  • Step 6 is an optional step. If the MNO portal also sends the address of the SM-DS to the SM-DP+, the SM-DP+ registers an administrative operation event for the management application performed by the eUICC for the operator application in the SM-DS, and generates a registration event. Identifies the eventID.
  • the SM-DP+ server After receiving the second management operation request sent by the MNO portal, the SM-DP+ server stores the parameter information in the second management operation request.
  • the SM-DP+ returns a request response message to the MNO portal, where the request response message carries a target profile identifier ICCID and a target eUICC identifier EID. If the SM-DP+ is registered in the SM-DS in step 6, a management operation event is registered for the management operation of the eUICC, and a registration event identifier eventID is generated, the SM-DP+return request response message may further carry the registration. The event identifies the eventID.
  • the MNO portal After the MNO portal receives the request response message returned by the SM-DP+, the MNO portal generates and transmits The first request with the target profile identifier ICCID is sent to the carrier application (MNO APP) in the terminal. Specifically, the MNO portal may send the target profile identifier ICCID to the carrier application (MNO APP) in the terminal by using a polling trigger message. Optionally, the target eUICC identifier EID may also be carried in the polling trigger message. If the SM-DP+ registers the management operation performed by the operator application request on the subscription data set in the eUICC to the SM-DS, the polling trigger message may also carry the SM-DP+ in the SM-DS for the management. The registration event identifier eventID that is registered for operation.
  • the operator application (MNO APP) forwards the first request to the LPA of the terminal.
  • Step 10 is an optional step. If in step 9, the LPA receives the target eUICC identifier EID from the trigger request message sent by the operator application (MNO APP), the LPA obtains the EID identifier of the terminal eUICC from the eUICC.
  • MNO APP the operator application
  • Step 11 is an optional step.
  • the identifier EID of the eUICC carried in the trigger request message is determined to be the same as the EID identifier of the terminal eUICC. If they are the same, go to step 12.
  • the LPA requests the eUICC to obtain the authentication information of the third-party application included in the subscription data set corresponding to the target profile identifier ICCID. Specifically, the LPA sends a GetProfileInfo message to the eUICC, where the GetProfileInfo message carries the target profile identifier ICCID.
  • the eUICC identifies the ICCID according to the target profile, searches for a subscription data set corresponding to the target profile identifier ICCID, and sends the authentication information of the third-party application in the subscription data set to the LPA. Specifically, the eUICC obtains the metadata of the subscription data set corresponding to the target profile identifier ICCID according to the target profile identifier ICCID. Returning the authentication information of the carrier application (MNO APP) stored in the metadata to the LPA. Or return the metadata to the LPA.
  • MNO APP carrier application
  • the LPA After receiving the subscription data set information returned by the eUICC, the LPA obtains the certificate information generated by the operator application during the terminal installation, such as a certificate and a package name, from the operating system (OS) of the terminal.
  • OS operating system
  • the LPA obtains the certificate of the operator application from the operating system of the terminal. Calculating a hash value of the certificate of the operator application by using a hash algorithm in the contract data set. If the certificate information generated by the operator application during terminal installation includes a certificate hash value, the certificate hash value in the certificate information is obtained (the operating system of the default terminal has been operated according to a hash algorithm in the authentication information). The certificate applied by the merchant has been hashed to produce a hash value). If the LPA receives the package name in the metadata of the subscription data set returned by the eUICC, the LPA obtains the package name of the carrier application from the operating system of the terminal.
  • the LPA determines whether the authentication information of the operator application in the contract data set returned by the eUICC is consistent with the certificate information of the operator application obtained by the LPA from the operating system of the terminal.
  • the LPA sends a message to the eUICC to obtain the address of the subscription management server stored in the subscription data set corresponding to the target profile identifier ICCID, that is, the polling address. Specifically, the LPA sends a Get polling address message to the eUICC, where the Get polling address message carries the target profile identifier ICCID.
  • the eUICC returns the address of the SM-DP+ server to the LPA according to the request of the LPA.
  • the eUICC can also return the address of the SM-DS server to the LPA.
  • step 17 the address returned by the eUICC is the address of the SM-DS server, the LPA and the SM-DS perform mutual authentication, and steps 18a and 18b are performed.
  • the LPA sends a management command acquisition (retrieve RPM/ReM) request to the SM-DS, where the management command acquisition (retrieve RPM/ReM) request carries the target eUICC identifier EID.
  • the management instruction acquisition request may be an authentication client (AuthenticateClient) request.
  • the management instruction acquisition (retrieve RPM/ReM) request may also carry the SM-DP+ in the SM- The registration event identifier eventID that DS registers for this management operation.
  • the SM-DS returns an event record corresponding to the registration event after searching for a corresponding registration event according to the target eUICC identifier EID or the registration event identifier eventID.
  • the registration event record carries the address of eventID and SM-DP+.
  • the registration event information corresponding to the registration event identifier may be directly obtained according to the registration event identifier eventID.
  • the LPA sends a management command acquisition (retrieve RPM/ReM) request to the SM-DP+.
  • the management instruction acquisition (retrieve RPM/ReM) request carries the target eUICC identifier EID.
  • the registration event identifier (event ID) further carries the registration event identifier eventID.
  • the management instruction acquisition request may be an authentication client (AuthenticateClient) request.
  • the SM-DP+ returns a management instruction to the LPA for the LPA to perform a management operation on the contract data set in the eUICC according to the management instruction.
  • the user can directly manage the subscribed data set of the downloaded mobile network operator by using the MNO APP, thereby improving the consistency of the user experience.
  • the MNO APP accesses the LPA API and the MNO APP management profile to perform access control management to ensure the security of the MNO APP for profile management.
  • the network element body involved in the third embodiment includes a terminal, a mobile network operator's portal server (MNO portal), and a subscription management server.
  • the terminal includes an eUICC, an LPA, and an operator application (MNO APP) installed in the terminal.
  • the contract management server includes an SM-DP+ server and an SM-DS server. It is determined by the eUICC in the terminal whether the operator application (MNO APP) in the terminal has authority to perform a management operation on the contract data set in the terminal.
  • Steps 1-11 in the third embodiment are similar to steps 1-11 in the second embodiment, in order to describe Concise, no longer repeat here.
  • the LPA obtains certificate information, such as a certificate and a package name, generated by the operator application when the terminal is installed, from an operating system (OS) of the terminal.
  • OS operating system
  • the LPA sends the certificate information of the operator application and the target profile identifier ICCID to the eUICC.
  • the LPA sends a request for authenticating the MNO App (authenticateApp) to the eUICC, where the request carries the certificate of the target profile identifier ICCID and the MNO App.
  • the request further carries a package name, and certificate information such as an LPA API that the MNO APP requests to access.
  • the eUICC identifies the ICCID according to the target profile, and searches for the authentication information of the operator application in the subscription data set corresponding to the target profile identifier ICCID. Specifically, the eUICC obtains metadata of the subscription data set corresponding to the target profile identifier ICCID according to the target profile identifier ICCID.
  • the eUICC calculates a hash value (Cert) of the certificate applied by the operator according to the hash algorithm. If the MNO APP certificate sent by the LPA to the eUICC is a hashed certificate hash value, the eUICC directly utilizes the hash value hash (Cert).
  • the eUICC determines whether the authentication information of the operator application in the subscription data set is consistent with the certificate information of the operator application obtained by the LPA from the operating system of the terminal.
  • the certificate hash value of the operator application in the contract data set is consistent with the certificate hash value of the operator application in the operating system.
  • the package name exists in the authentication information and the certificate information, it is further determined whether the package name of the operator application in the subscription data set returned by the eUICC and the package name of the operator application in the operating system are consistent.
  • the eUICC After the step 15 is verified, the eUICC returns a response message to the LPA, where the response message carries the address of the subscription management server stored in the subscription data set corresponding to the target profile identifier ICCID, that is, the polling address. .
  • the eUICC if the subscription data set corresponding to the target profile identifier ICCID is stored in the SM-DP+ server, the eUICC returns the address of the SM-DP+ server.
  • the eUICC may also return the eUICC to return the address of the SM-DS server to the LPA.
  • step 16 the address returned by the eUICC is the address of the SM-DS server, the LPA and the SM-DS perform mutual authentication, and steps 17a and 17b are performed.
  • the LPA sends a management instruction acquisition (retrieve RPM/ReM) request to the SM-DS, where the management instruction acquisition (retrieve RPM/ReM) request carries the target eUICC identifier EID. Specifically, it may be an authentication client (AuthenticateClient) request.
  • the management instruction acquisition (retrieve RPM/ReM) request may also carry the SM-DP+ in the SM- The registration event identifier eventID that DS registers for this management operation.
  • the SM-DS returns a registration event record corresponding to the registration event after searching for a corresponding registration event according to the target eUICC identifier EID or the registration event identifier event ID (event) Record).
  • the registration event record carries the address of eventID and SM-DP+.
  • the registration event information corresponding to the registration event identifier may be directly obtained according to the registration event identifier eventID.
  • the LPA sends a management command acquisition (retrieve RPM/ReM) request to the SM-DP+.
  • the management instruction acquisition (retrieve RPM/ReM) request carries the target eUICC identifier EID.
  • the registration event identifier (event ID) further carries the registration event identifier eventID.
  • the SM-DP+ returns a management command to the LPA for the LPA to perform a management operation on the contract data set in the eUICC according to the management instruction.
  • the user can directly manage the subscribed data set of the downloaded mobile network operator by using the MNO APP, thereby improving the consistency of the user experience.
  • the MNO APP accesses the LPA API and the MNO APP management profile to perform access control management to ensure the security of the MNO APP for profile management.
  • the eUICC verifies the permissions of the APP, and the system security is higher.
  • the user can directly manage the subscribed data set of the downloaded mobile network operator by using the MNO APP, thereby improving the consistency of the user experience.
  • the MNO APP accesses the LPA API and the MNO APP management profile to perform access control management to ensure the security of the MNO APP for profile management.
  • the eUICC access control management of the MNO APP access LPA API and the MNO APP management profile further improves security.
  • the terminal performs the management operation on the subscription data set, and includes a plurality of specific implementation methods.
  • the terminal may directly send the management instruction to the MNO portal to Terminal LPA. This application does not specifically limit the implementation of step 107.
  • the flow of the method for directly issuing the management command to the terminal LPA by the MNO portal is specifically described in the fourth embodiment and the fifth embodiment.
  • the network element body involved in Embodiment 4 includes a terminal, a mobile network operator's portal server (MNO portal), and a subscription management server.
  • the terminal includes an eUICC, an LPA, and an operator application (MNO APP) installed in the terminal.
  • the contract management server includes an SM-DP+ server. It is determined by the LPA in the terminal whether the operator application (MNO APP) in the terminal has authority to perform a management operation on the contracted data set in the terminal.
  • the specific signaling interaction process is as follows:
  • the subscription data set preset in the SM-DP+ stores the certificate hash of the operator application, and also stores the management operation that allows the operator to perform the application.
  • the MNO portal verifies whether the management operation request sent by the operator application belongs to a management operation that allows the operator application to perform. If the management operation request sent by the operator application belongs to a management operation that allows the operator to perform the application, the management operation is directly returned to the terminal for the LPA to perform the management operation.
  • the LPA does not need to send a message request to obtain a management command after the verification is passed.
  • the LPA of the terminal it is determined by the LPA of the terminal whether the operator application (MNO APP) in the terminal has authority to perform a management operation on the contract data set in the terminal.
  • MNO APP operator application
  • the specific signaling interaction process is as follows:
  • the Mobile Network Operator has developed a Carrier Application (MNO APP) for installation on the terminal.
  • MNO APP Carrier Application
  • the terminal stores the certificate information of the operator application, such as a certificate, a package name, and the like.
  • the mobile network operator stores the authentication information of the application in the subscription when the subscription data set is customized in the SM-DP+ through the MNO portal server. In the metadata of the dataset.
  • the authentication information of the operator application includes a hash value of the certificate of the operator application and a management operation that allows the operator application to perform.
  • the authentication information of the operator application may further include a hash algorithm, a package name, and the like of the certificate of the operator application.
  • the authentication information of the application developed by the operator is also downloaded to the terminal along with the subscription data set.
  • the authentication information of the operator application may be stored in the metadata of the subscription data set.
  • the metadata of the subscription data set may be stored in a secure domain space (ISD-P) created by the eUICC for the subscription data set.
  • the subscription data set download record of the terminal is stored in the mobile network operator's MNO portal server.
  • the subscription data set download record may include an identifier ICCID of the downloaded subscription data set, an identifier EID of the eUICC of the downloaded subscription data set, and the like.
  • the user opens the carrier application (MNO APP) client on the terminal and logs in to the MNO portal.
  • MNO APP carrier application
  • the management operation of managing the contract data set in the eUICC is input through the client user interface of the operator application (MNO APP).
  • the client of the operator application (MNO APP) sends a first management operation request (PRM/ReM) carrying a request to perform a management operation on the contract data set in the eUICC to the MNO portal.
  • the management operation may be to activate the subscription data set, deactivate the subscription data set, delete the subscription data set, query the eUICC information, download another new subscription data set, and the like.
  • PRM/ReM first management operation request
  • the operator application (MNO APP) client obtains the subscription information of the user when registering the operator from the MNO portal, according to the subscription information.
  • the client user interface of the application inputs management operations for managing the contracted data set in the eUICC.
  • the MNO portal After the MNO portal receives the first management operation request sent by the client of the operator application, it determines whether the management operation carried in the request message is a management operation that is allowed to be performed by the operator application.
  • the MNO portal searches for the identifier ICCID (referred to as “target profile identifier ICCID”) of the corresponding subscription data set according to the user subscription information, and returns the first request to the terminal.
  • identifier ICCID referred to as “target profile identifier ICCID”
  • the first request carries the target profile identifier ICCID, and the management operation of the allowed MNO APP request or the management operation generated by the allowed MNO portal.
  • the first request further carries a target eUICC identifier EID.
  • the MNO portal signs the above information sent to the MNO App.
  • the first request further carries the signature of the MNO portal and the certificate of the portal to the operator application in the terminal.
  • the MNO App invokes the LPA API and sends the first request received in step 5 to the LPA.
  • Step 7 is an optional step. If in step 6, the LPA receives the target eUICC identifier EID in the first request forwarded by the MNO APP, the LPA obtains the EID identifier of the terminal eUICC from the eUICC.
  • Step 8 is an optional step. If the LPA receives the identifier EID of the eUICC forwarded by the MNO APP in step 10, and the LPA obtains the EID identifier of the terminal eUICC from the eUICC, it is determined whether the target eUICC identifier EID and the EID identifier of the terminal eUICC are the same. If they are the same, go to step 9.
  • Step 9 is an optional step. If, in step 6, the LPA receives the first request forwarded by the MNO APP, including the MNO portal to sign the above information sent to the MNO App, the LPA verifies that the signature is correct. If the signature is correct, go to step 10.
  • the UI interface of the LPA is further prompted to prompt the user whether to allow the LPA to perform a management operation on the eUICC. If the user confirms that the LPA is allowed to perform a management operation on the eUICC, step 10 is performed.
  • the LPA sends the target profile identifier ICCID to the eUICC of the terminal to obtain the authentication information of the third-party application included in the subscription data set corresponding to the ICCID. Specifically, the LPA sends a GetProfileInfo message to the eUICC, where the GetProfileInfo message carries the target profile identifier ICCID.
  • the eUICC identifies the ICCID according to the target profile, searches for a subscription data set corresponding to the target profile identifier ICCID, and sends the authentication information of the third-party application in the subscription data set to the LPA.
  • the target profile identifier of the eUICC identifies the ICCID, and acquires metadata of the subscription data set corresponding to the target profile identifier ICCID.
  • MNO APP carrier application
  • the LPA After receiving the subscription data set information returned by the eUICC, the LPA obtains the certificate information generated by the operator application during the terminal installation, such as a certificate and a package name, from the operating system (OS) of the terminal.
  • OS operating system
  • the LPA obtains the certificate of the operator application from the operating system of the terminal. Calculating a hash value of the certificate of the operator application by using a hash algorithm in the contract data set. If the certificate information generated by the operator application during terminal installation includes a certificate hash value, the certificate hash value in the certificate information is obtained. (The operating system of the default terminal has hashed the certificate applied by the operator according to the hash algorithm in the authentication information, and generates a hash value.) If the LPA receives the metadata of the signed data set returned by the eUICC, the package includes the package. Name, the LPA obtains the package name of the carrier application from the operating system of the terminal.
  • the LPA determines whether the authentication information of the operator application in the subscription data set returned by the eUICC is consistent with the certificate information of the operator application obtained by the LPA from the operating system of the terminal.
  • the certificate hash value of the operator application in the contract data set returned by the eUICC and the certificate hash value of the operator application in the operating system are consistent.
  • the operator is also obtained
  • the package name determines whether the package name of the operator application in the contract data set returned by the eUICC is consistent with the package name of the operator application in the operating system.
  • the LPA sends the first request to the eUICC.
  • the first request carries the management operation in step 6 and the target profile identifier ICCID.
  • the eUICC returns the execution result of the management operation.
  • the returned result includes related information of the eUICC, such as available storage space and the like.
  • the LPA returns the execution result of the management operation to the MNO APP.
  • the MNO App returns the execution result of the management operation to the MNO portal.
  • the operator can directly manage the profile by using the MNO APP, and does not need to go through SM-DP+ and SM-DS, thereby shortening the entire process and improving the user experience.
  • the network element body involved in Embodiment 5 includes a terminal, a mobile network operator's portal server (MNO portal), and a subscription management server.
  • the terminal includes an eUICC, an LPA, and an operator application (MNO APP) installed in the terminal.
  • the contract management server includes an SM-DP+ server. It is determined by the LPA in the terminal whether the operator application (MNO APP) in the terminal has authority to perform a management operation on the contracted data set in the terminal.
  • the eUICC of the terminal determines whether the operator application (MNO APP) in the terminal has the authority to perform a management operation on the contract data set in the terminal.
  • the specific signaling interaction process is as follows:
  • the method flow of the steps 1-8 in the embodiment is similar to the method flow of the steps 1-8 in the fourth embodiment. For the sake of brevity, the details are not described herein.
  • Step 9 is an optional step.
  • the UI interface of the LPA prompts the user whether to allow the LPA to perform management operations on the eUICC. If the user confirms that the LPA is allowed to perform a management operation on the eUICC, step 10 is performed.
  • the LPA sends a first request to the eUICC.
  • the first request carries the management operation in step 6, the certificate information of the operator application, and the target profile identifier ICCID.
  • the eUICC obtains the subscription data set metadata corresponding to the ICCID according to the target profile identifier ICCID.
  • the target profile identifier of the eUICC identifies the ICCID, and acquires metadata of the subscription data set corresponding to the target profile identifier ICCID.
  • the eUICC calculates a hash value of the certificate of the operator application by using a hash algorithm in the contract data set. If the certificate information of the operator application forwarded by the LPA includes the certificate hash value, the certificate hash value in the certificate information is directly obtained.
  • the eUICC verifies whether the signature is correct. If the signature is correct, the ICCID is obtained according to the target profile. The contract data set corresponding to the ICCID.
  • the eUICC determines whether the authentication information of the operator application in the contracted data set is consistent with the certificate information of the operator application sent by the LPA.
  • the certificate hash value of the operator application in the contracted data set is consistent with the certificate hash value of the operator application.
  • the carrier name of the operator is also obtained, it is determined whether the package name of the operator application in the contracted data set is consistent with the package name of the operator application.
  • the eUICC performs the management operation in step 10.
  • the eUICC performs the management operation in step 10.
  • the eUICC returns the execution result of the management operation.
  • the returned result includes related information of the eUICC, such as available storage space and the like.
  • the LPA returns the execution result of the management operation to the MNO APP.
  • the MNO App returns the execution result of the management operation to the MNO portal.
  • the operator can directly manage the profile by using the MNO APP, and does not need to go through SM-DP+ and SM-DS, thereby shortening the entire process and improving the user experience.
  • the eUICC access control management of the MNO APP access LPA API and the MNO APP management profile further improves security.
  • the subject that authenticates the authority of the MNO APP management profile is the terminal.
  • the subject that authenticates the rights of the MNO APP management profile may also be a subscription management server.
  • the embodiment of the present invention provides a method for managing a contracted data set. As shown in FIG. 7, the subscription data set is pre-downloaded in the eUICC of the terminal, and the access authority of the LPA application interface is pre-configured in the terminal.
  • the method includes the following steps:
  • the third-party application of the terminal sends the first management operation request to the third-party application server.
  • the first management operation request includes a management operation that the third-party application requests to perform the subscription data in the eUICC.
  • the third-party application server sends a second management operation request to the subscription management server, where the second management operation request includes a management operation performed by the third-party application requesting the subscription data, an identifier ICCID of the subscription data set, and a terminal eUICC identifier EID. Authentication information for third-party applications.
  • step 201 may also be performed without performing step 202.
  • the third-party application server automatically generates a second management operation request and sends the request to the subscription management server, so that the third-party application in the terminal does not need to send the first management operation request.
  • the third-party application server receives a management request response returned by the subscription management server, where the management request response includes an identifier ICCID of the subscription data set and a terminal eUICC identifier EID.
  • the third-party application server sends the identifier ICCID of the subscription data set in the terminal to the terminal.
  • the third-party application server may further send the terminal eUICC identifier EID to the terminal.
  • the terminal acquires the certificate information of the third-party application pre-stored in the terminal, and determines, according to the certificate information of the third-party application, whether the third-party application has the right to invoke the LPA application interface of the terminal. If the third party application has the right to invoke the terminal LPA application interface, step 205 is performed.
  • the terminal sends a management instruction acquisition request to the subscription management server, where the management instruction acquisition request carries the terminal eUICC identifier EID and the certificate information of the third-party application pre-stored in the terminal.
  • the subscription management server verifies whether the third-party application in the terminal has the right to perform a management operation on the subscription data set in the terminal eUICC. If the verification is passed, step 207 is performed.
  • the terminal receives a management instruction returned by the subscription management server, and performs a management operation on the subscription data set in the terminal eUICC according to the management instruction.
  • the current eUICC system architecture of the current terminal is used to manage the subscription data set in the eUICC through the third-party application, and the subscription data set in the eUICC is added, without adding additional application modules.
  • the authorization of the MNO APP is placed on the network side for verification, which further simplifies the complexity of the method flow and simplifies the authentication operation on the terminal side.
  • MNO APP operator-installed operator application
  • the network element body involved in Embodiment 7 includes a terminal, a mobile network operator's portal server (MNO portal), and a subscription management server.
  • the terminal includes an eUICC, an LPA, and an operator application (MNO APP) installed in the terminal.
  • the eUICC in the terminal has previously downloaded the subscription data set.
  • the contract management server includes an SM-DP+ server and an SM-DS server. It is determined by the contract management server whether the operator application (MNO APP) in the terminal has authority to perform a management operation on the contract data set in the terminal.
  • the specific signaling interaction process is as follows:
  • the access permission of the third-party application to invoke the LPA application interface may also be configured in the eUICC of the terminal, and the LPA obtains the access permission of the third-party application to invoke the LPA application interface from the eUICC.
  • the Mobile Network Operator has developed a Carrier Application (MNO APP) for installation on the terminal.
  • MNO APP Carrier Application
  • the terminal stores the certificate information of the operator application, such as a certificate, a package name, and the like.
  • the user opens the carrier application (MNO APP) client on the terminal and logs in to the MNO portal.
  • MNO APP carrier application
  • the management operation of managing the contract data set in the eUICC is input through the client user interface of the operator application (MNO APP).
  • the carrier application (MNO APP) client sends a carry request pair
  • the subscription data set in the eUICC performs a request message for managing the operation request (ie, the first management operation request) to the MNO portal.
  • the management operation may be to activate the subscription data set, deactivate the subscription data set, delete the subscription data set, query the eUICC information, download another new subscription data set, and the like.
  • the user After the user logs in to the operator application (MNO APP) client on the terminal, the user obtains the subscription information when the user registers with the operator, and inputs the subscription data in the eUICC according to the subscription information in the client user interface of the application.
  • MNO APP operator application
  • the MNO portal After receiving the first management operation request, the MNO portal searches for the identifier ICCID of the subscription data set that the terminal has downloaded, the identifier EID of the eUICC that the terminal downloads the subscription data set, and the authentication information of the operator application.
  • a second management operation request is generated and sent to the SM-DP+ server.
  • the second management operation request carries the identifier ICCID of the subscription data set, the identifier EID of the terminal eUICC, the authentication information of the operator application, and the management operation performed by the operator application request on the subscription data set in the eUICC.
  • the authentication information of the operator application includes the certificate hash value.
  • the authentication information of the operator application may further include a package name, a hash algorithm, and the like of the operator application.
  • Step 4 is an optional step.
  • the SM-DP+ transmits the identifier EID of the terminal eUICC and the authentication information of the operator application to the SM-DS.
  • the SM-DP+ registers an administrative operation event for the management application performed by the eUICC for the operator application to generate a registration event identifier eventID in the SM-DS. . After the SM-DS generates the registration event identifier eventID, the registration event identifier eventID is sent to SM-DP+.
  • the SM-DP+ server After receiving the second management operation request sent by the MNO portal, the SM-DP+ server stores the message carried in the second management operation request.
  • the SM-DP+ returns a request response message to the MNO portal, where the request response message carries the identifier ICCID of the subscription data set and the identifier EID of the terminal eUICC.
  • the request response message returned by the SM-DP+ may further include a registration event identifier eventID. .
  • the MNO portal After receiving the request response message returned by the SM-DP+, the MNO portal sends a trigger request message to the MNO APP in the terminal.
  • the polling trigger message carries the identifier ICCID of the subscription data set.
  • the polling trigger message may further carry one or more of the following parameters: an identifier EID of the terminal eUICC, a registration event identifier eventID, and a hash algorithm.
  • the operator application After receiving the trigger request message sent by the MNO portal, the operator application (MNO APP) forwards the trigger request message to the LPA of the terminal.
  • the LPA obtains the certificate of the MNO APP from the operating system, and confirms whether the MNO APP has the access right to invoke the LPA application interface. For example, it is confirmed whether the root certificate of the certificate of the MNO APP is a certificate of the GSMA CI, and if so, the MNO APP is allowed to call the application interface of the LPA.
  • Step 9 is an optional step. If in step 7, the LPA receives the identifier EID of the terminal eUICC from the trigger request message sent by the operator application (MNO APP), the LPA obtains from the eUICC. The EID identifier of the terminal eUICC.
  • Step 10 is an optional step. It is determined whether the terminal eUICC identifier EID in the trigger request message and the EID identifier of the eUICC obtained by the LPA from the eUICC are the same. If they are the same, go to step 11.
  • the LPA sends a message carrying the identifier ICCID of the subscription data set to the eUICC, and requests to obtain the address of the subscription management server stored in the subscription data set corresponding to the identifier ICCID of the subscription data set.
  • the eUICC If the subscription data set corresponding to the identifier ICCID of the subscription data set is stored in the SM-DP+ server, the eUICC returns the address of the SM-DP+ server. If the subscription data set corresponding to the identifier ICCID of the subscription data set is stored in the SM-DS server, the eUICC returns the address of the SM-DS server.
  • step 12 If in step 12, the address returned by the eUICC is the address of the SM-DS server, perform steps 13 and 14. If the address returned by the eUICC is the address of the SM-DP+ server, go directly to step 16.
  • the LPA sends a request message for obtaining a registration event to the SM-DS to the SM-DS, and requests to find a registration event corresponding to the EUICC identifier EID of the terminal.
  • the request message of the registration event carries the certificate information of the terminal eUICC identifier EID and the MNO APP.
  • the request message for obtaining a registration event may further carry a registration event identifier eventID.
  • the request message for obtaining a registration event may further carry a package name of the MNO APP.
  • the certificate information of the MNO APP may be a certificate of the MNO APP, or may be a hash value obtained by the terminal hashing the certificate of the MNO APP according to the hash algorithm carried in the trigger request message in the seventh step.
  • the SM-DS After receiving the request message for obtaining a registration event, the SM-DS searches for a corresponding event record according to the terminal eUICC identifier EID or the registration event identifier eventID.
  • the SM-DS needs to hash the certificate before calculating, and calculate the hash value and then perform the hash value of the registration event record. Comparison.
  • the package name of the MNO APP may also be carried in the request message for obtaining a registration event. Then, it is determined whether the package name carried in the request message of the registration event is the same as the package name of the registration event record.
  • the SM-DS returns the eventID corresponding to the registration event record, and the SM-DP+ address to the LPA of the terminal.
  • the terminal sends a management instruction acquisition (retrieve RPM/ReM) request request acquisition management instruction to the corresponding SM-DP+ server according to the SM-DP+ address returned in step 14 or the SM-DP+ address sent by the eUICC in step 12.
  • a management instruction acquisition (retrieve RPM/ReM) request request acquisition management instruction to the corresponding SM-DP+ server according to the SM-DP+ address returned in step 14 or the SM-DP+ address sent by the eUICC in step 12.
  • the management instruction acquisition (retrieve RPM/ReM) request carries the certificate of the terminal eUICC identifier EID and the MNO APP.
  • the management event acquisition (retrieve RPM/ReM) request may further carry a registration event identifier eventID.
  • the management command acquisition (retrieve RPM/ReM) request may also carry the package name of the MNO APP.
  • the SM-DP+ After the SM-DP+ receives the request for obtaining a management RPM (ReM), the SM-DP+ searches for a corresponding management request according to the terminal eUICC identifier EID or the registration event identifier eventID.
  • the management request is the second management operation request received by SM-DP+ in step 3.
  • the SM-DP+ needs to hash the certificate before calculating, and the hash value is calculated and carried in the second management operation request. The hash values are compared.
  • the management instruction acquisition (retrieve RPM/ReM) request can also carry the package name of the MNO APP. Then, it is determined whether the package name carried in the management instruction acquisition (retrieve RPM/ReM) request is the same as the package name in the second management operation request.
  • the SM-DP+ returns a management instruction corresponding to the second management operation request to the LPA, so that the LPA performs a management operation on the contract data set in the eUICC according to the management instruction.
  • the authorization information of the MNO APP is not preset in the profile, and the application range is expanded.
  • the authorization of the MNO APP is placed on the network side for verification, which further simplifies the complexity of the method flow and simplifies the authentication operation on the terminal side.
  • the network element body involved in Embodiment 8 includes a terminal, a mobile network operator's portal server (MNO portal), and a subscription management server.
  • the terminal includes an eUICC, an LPA, and an operator application (MNO APP) installed in the terminal.
  • the eUICC in the terminal has previously downloaded the subscription data set.
  • the contract management server includes an SM-DP+ server and an SM-DS server. It is determined by the contract management server whether the operator application (MNO APP) in the terminal has authority to perform a management operation on the contract data set in the terminal.
  • the difference between the eighth embodiment and the seventh embodiment is that when the terminal verifies that the third-party application invokes the access permission of the LPA application interface, the execution entity is the eUICC of the terminal.
  • the specific signaling interaction process is as follows:
  • the steps 8-14 of the eighth embodiment are different from the seventh embodiment.
  • the details are not described herein.
  • the LPA obtains the certificate of the MNO APP from the operating system.
  • the LPA can also obtain the package name of the MNO APP from the operating system.
  • Step 9 is an optional step. If in step 7, the LPA receives the carrier application (MNO APP)
  • the triggered trigger request message includes the identifier EID of the terminal eUICC, and the LPA obtains the EID identifier of the terminal eUICC from the eUICC.
  • Step 10 is an optional step. It is determined whether the terminal eUICC identifier EID in the trigger request message and the EID identifier of the eUICC obtained by the LPA from the eUICC are the same. If they are the same, go to step 11.
  • the LPA sends a certificate of the MNO APP to the eUICC, requesting eUICC verification.
  • the eUICC confirms whether the MNO APP has access rights to invoke the LPA application interface. For example, it is confirmed whether the root certificate of the certificate of the MNO APP is a certificate of the GSMA CI, and if so, the MNO APP is allowed to call the application interface of the LPA. If the verification is passed, go to step 13.
  • the eUICC sends a message of the verification of step 12 to the LPA.
  • the LPA sends a message carrying the identifier ICCID of the subscription data set according to the message, and requests to obtain the address of the subscription management server stored in the subscription data set corresponding to the identifier ICCID of the subscription data set.
  • the eUICC verifies whether the third-party application has the access permission for calling the LPA application interface, and the security is higher.
  • the embodiment of the present invention provides a terminal, which is used to execute the steps performed by the terminal in the foregoing management method of the contracted data set.
  • the terminal provided by the embodiment of the present application may include a module corresponding to the corresponding step.
  • the embodiment of the present application may divide the function module into the terminal according to the foregoing method example.
  • each function module may be divided according to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the division of modules in the embodiments of the present application is schematic, and is only a logical function division, and may be further divided in actual implementation.
  • FIG. 10 shows a possible structural diagram of the terminal involved in the above embodiment.
  • the terminal includes a processor 701, a memory 702, an integrated circuit card eUICC 703, and a system bus 704 and a transceiver 705.
  • the processor 701 is configured to perform the method steps shown in FIG. 2-6;
  • the eUICC 703 is configured to store the subscription data set downloaded to the terminal.
  • the terminal interacts with other devices through the transceiver 705, such as a subscription management server and a third-party application server.
  • the memory 702 may include a volatile memory, such as NVRAM (Nonvolatile Random Access Memory), PRAM (Phase Change RAM), MRAM. (Magnetic Random Access Memory) or the like; the memory 702 may further include a nonvolatile memory such as at least one disk storage device, EEPROM (Electrically Erasable Programmable Read-Only Memory) Read-only memory), flash memory devices such as NOR flash memory or NAND flash memory.
  • the non-volatile memory stores the operating system and applications executed by the processor.
  • the processor 701 loads the running program and data from the non-volatile memory into the memory and stores the data content in a large number of storage devices.
  • One or more processors 701 are the control centers of the terminals.
  • the processor 701 utilizes various interfaces and The lines connect the various parts of the entire terminal, and by executing or executing software programs and/or application modules stored in the memory 172, and calling data stored in the memory 702, performing various functions and processing data of the terminal, thereby performing the terminal Overall monitoring.
  • the processor 701 may include only a CPU, or may be a combination of a CPU, a GPU (Graphic Processing Unit), a DSP, and a control chip (for example, a baseband chip) in the communication unit.
  • the CPU may be a single operation core, and may also include a multi-operation core.
  • the system bus 704 may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, or an EISA (Extended Industry Standard Architecture) bus.
  • the system bus 704 can be divided into an address bus, a data bus, a control bus, and the like. For the sake of clarity in the embodiments of the present application, various buses are illustrated as system bus 704 in FIG.
  • processors 701 are used to perform the following steps.
  • the transceiver is controlled to obtain a subscription data set from a subscription management server, where the subscription data set includes authentication information of a third-party application.
  • the contracted data set performs management operations.
  • the processor 701 is further configured to: control the transceiver to send a first management operation request to a third-party application server, where the first management operation request includes the third-party application request for signing in the eUICC Management operations performed by the data set.
  • the third party application server generates a management operation performed on the contracted data set in the eUICC.
  • processor 701 is further configured to:
  • the identifier EID of the eUICC returned by the third-party application server is the same as the identifier EID of the eUICC of the terminal, acquiring the third-party application included in the subscription data set in the eUICC according to the identifier ICCID of the subscription data set. Certification Information.
  • processor 701 is further configured to:
  • determining that the eUICC of the terminal determines, according to the authentication information of the third-party application in the subscription data set, and the certificate information of the third-party application, whether the third-party application has the right to trigger a management operation on the subscription data set. .
  • processor 701 is further configured to:
  • the first request includes a management command indicating a management operation.
  • the processor 701 is further configured to instruct the LPA of the terminal to perform a management operation indicated in the first request on the subscription data set in the eUICC according to the first request.
  • FIG. 11 is a schematic diagram showing a possible structure of the subscription management server involved in the above embodiment.
  • the subscription management server includes a processor 801, a memory 802, a system bus 803, and a transceiver 804.
  • the processor 801 is configured to perform the method steps shown in FIG. 7-9.
  • the subscription management server interacts with other devices through the communication interface 804, such as a terminal and a third-party application server.
  • processors 801 are used to perform the following steps.
  • the second management operation request includes a management operation performed on the subscription data in the terminal, and an identifier of the subscription data set in the terminal.
  • the management request response includes an identifier ICCID of the subscription data set in the terminal and an identifier of the terminal eUICC And an EID, configured to send, by the third-party application server, an identifier ICCID of the subscription data set in the terminal and an identifier EID of the terminal eUICC to the terminal.
  • the transceiver And receiving, by the transceiver, a management instruction acquisition request sent by the terminal, where the management instruction acquisition request carries an identifier EID of the terminal eUICC and certificate information of a third-party application stored in the terminal.
  • the terminal is configured to perform, by the terminal, a management operation on the subscription data set in the terminal eUICC according to the management instruction.
  • the one or more processors are further configured to:
  • the contracted data set performs management operations.
  • the management request response further includes a registration event identifier event ID, where the registration event identifier is used to identify a management operation event that the subscription management server requests to register according to the second management operation.
  • the registration instruction identifier is also carried in the management instruction acquisition request.
  • the one or more processors are also used to:
  • the contracted data set performs management operations.
  • the disclosed system, mobile device and method may be implemented in other manners.
  • the mobile device embodiments described above are merely illustrative.
  • the division of the modules or units is only one logical function division.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, mobile device or unit, and may be in electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) or a processor to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk (Universal Serial Bus flash disk), a mobile hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, and the like, which can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例一种签约数据集的管理方法、终端及服务器。该方法中,当终端从签约管理服务器中下载签约数据集至eUICC时,终端即获知第三方应用的认证信息。当第三方应用请求对eUICC中的签约数据集执行管理操作时,根据第三方应用服务器返回的签约数据集标识查找终端已存储的签约数据集。终端根据签约数据集中存储的第三方应用的认证信息验证该第三方应用是否具有对eUICC中的签约数据集触发管理操作的权限。通过当前终端现有的eUICC***架构,在不增加额外应用模块的情况下,实现了通过第三方应用管理对eUICC中的签约数据集,增加了eUICC中的签约数据集的管理入口。

Description

一种签约数据集的管理方法、终端及服务器 技术领域
本发明涉及通信领域,尤其涉及一种签约数据集的管理方法、终端及服务器。
背景技术
目前,终端用户向运营商购买SIM(Subscriber Identification Module,客户识别模块)卡或UICC(Universal Integrated Circuit Card,通用集成电路卡),将SIM卡或UICC***终端(device)即可以根据卡中写入的数据集接入运营商的网络。eUICC是指支持安全地远程管理签约数据集(profile)的UICC和/或支持本地管理profile的UICC。
由于eUICC一般是由终端制造商集成在终端中,一般并不是由运营商采购制造,因此终端出厂后,eUICC中可能并不包含可以接入运营商网络的数据。终端需要使用远程管理技术连接SM-DP+(Subscription Manager Data Preparation+,签约管理-数据准备实体),接收SM-DP+下发的profile,并将profile下载到eUICC中,之后eUICC就可以利用该profile来接入运营商的网络。当Profile处于激活状态时,eUICC的功能和传统的UICC相同,可用于接入相应的移动网络运营商的网络。终端中还包括LPA(Local Profile Assistant,本地文件助手),用于对eUICC中的profile进行管理,例如下载其他新的profile,激活已下载profile,去激活profile,删除profile等。
目前终端只能通过LPA对eUICC中的profile进行管理,用户不能通过第三方应用(Application),如运营商的应用客户端对eUICC中的profile进行管理。
发明内容
本发明的实施例提供一种签约数据集的管理方法、终端及服务器,利用当前eUICC的***架构和访问控制机制,使终端上的第三方应用对eUICC中的profile进行访问管理。
为达到上述目的,本发明的实施例采用如下技术方案:
第一方面,公开了一种签约数据集的管理方法,所述方法由终端执行,所述终端包括集成电路卡eUICC、LPA(Local Profile Assistant,本地文件助手)、以及第三方应用,所述方法包括:
终端从签约管理服务器中获取签约数据集,所述签约数据集中包括第三方应用的认证信息;
所述终端接收所述第三方应用服务器发送的第一请求,所述第一请求中携带所述签约数据集的标识ICCID,所述第一请求用于触发对所述eUICC中 的签约数据集执行管理操作;
所述终端根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息;
所述终端获取所述终端中存储的所述第三方应用的证书信息;
所述终端根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作;
如果所述第三方应用有权限对所述签约数据集触发管理操作,则所述终端对所述签约数据集执行所述管理操作。
本发明实施例中,利用当前终端现有的eUICC***架构,在不增加额外应用模块的情况下,实现了通过第三方应用管理对eUICC中的签约数据集,增加了eUICC中的签约数据集的管理入口。
结合第一方面,在第一方面的第一种可能的实现方式中,所述所述终端接收所述第三方应用服务器发送的第一请求之前,所述方法还包括:
所述终端的第三方应用发送第一管理操作请求至第三方应用服务器,所述第一管理操作请求中包括所述第三方应用请求对所述eUICC中的签约数据集执行的管理操作。
结合第一方面,在第一方面的第二种可能的实现方式中,所述所述终端接收所述第三方应用服务器发送的第一请求之前,所述方法还包括:
所述第三方应用服务器生成对所述eUICC中的签约数据集执行的管理操作。
结合第一方面,以及第一方面的第一种和第二种可能的实现方式,在第一方面的第三种可能的实现方式中,所述终端根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息之前,所述方法还包括:
所述终端接收所述第三方应用服务器返回的eUICC的标识EID;
所述终端确定所述第三方应用服务器返回的eUICC的标识EID与所述终端的eUICC的标识EID是否相同;
如果所述终端确定所述第三方应用服务器返回的eUICC的标识EID与所述终端的eUICC的标识EID相同,则所述终端根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息。
结合第一方面,以及第一方面的第一种至第三种可能的实现方式,在第一方面的第四种可能的实现方式中,所述终端根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作,包括:
所述终端的LPA根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作;
或者,所述终端的eUICC根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作。
结合第一方面,以及第一方面的第一种至第四种可能的实现方式,在第一方面的第五种可能的实现方式中,所述终端对所述签约数据集执行所述管理操作,包括:
所述终端的LPA根据所述第一请求发送管理指令获取请求至所述签约管理服务器;
所述终端的LPA接收所述签约管理服务器根据所述管理指令获取请求返回的管理指令;
所述终端的LPA根据所述管理指令,对所述eUICC中的签约数据集执行所述第一管理操作请求中的管理操作。
结合第一方面,以及第一方面的第一种至第四种可能的实现方式,在第一方面的第六种可能的实现方式中,所述方法还包括:
所述第一请求中包括指示管理操作的指示;
所述终端对所述签约数据集执行所述管理操作,包括:
所述终端的LPA根据所述第一请求,对所述eUICC中的签约数据集执行所述第一请求中指示的管理操作。
第二方面,公开了一种签约数据集的管理方法,所述方法由签约管理服务器执行,其特征在于,所述方法包括:
所述签约管理服务器接收第三方应用服务器发送的第二管理操作请求,所述第二管理操作请求中包括对终端中的签约数据执行的管理操作、所述终端中的签约数据集的标识ICCID、所述终端eUICC的标识EID以及所述终端中的第三方应用的认证信息;
所述签约管理服务器发送管理请求响应至所述第三方应用服务器,所述管理请求响应中包括所述终端中的签约数据集的标识ICCID和所述终端eUICC的标识EID;
具体地,签约管理服务器发送管理请求响应至所述第三方应用服务器后,第三方应用服务器发送所述终端中的签约数据集的标识ICCID至所述终端.
所述签约管理服务器获取所述终端发送的管理指令获取请求,所述管理指令获取请求中携带所述终端eUICC的标识EID和所述终端中存储的第三方应用的证书信息;
所述签约管理服务器根据所述管理指令获取请求和所述第二管理操作请求,验证所述终端中的第三方应用是否有权限对终端eUICC中的签约数据集触发管理操作;
如果所述签约管理服务器验证所述终端中的第三方应用有权限对终端eUICC中的签约数据集触发管理操作,则所述签约管理服务器返回管理指令至所述终端,以供所述终端根据所述管理指令对终端eUICC中的签约数据集 执行管理操作。
本发明实施例中,利用当前终端现有的eUICC***架构,在不增加额外应用模块的情况下,实现了通过第三方应用管理对eUICC中的签约数据集,增加了eUICC中的签约数据集的管理入口。将对MNO APP的授权放到网络侧进行验证,进一步简化了方法流程的复杂度,简化了终端侧的认证操作。
结合第二方面,在第二方面的第一种可能的实现方式中,所述签约管理服务器根据所述管理指令获取请求和所述第二管理操作请求,验证所述终端中的第三方应用是否有权限对终端eUICC中的签约数据集触发管理操作,包括:
所述签约管理服务器根据所述管理指令获取请求中的所述终端eUICC的标识EID,查找与所述终端eUICC的标识EID相关联的第二管理操作请求;
所述签约管理服务器确定所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息是否相同;
如果所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息相同,则确定所述终端中的第三方应用有权限对终端eUICC中的签约数据集执行管理操作。
结合第二方面,以及第二方面的第一种可能的实现方式,在第二方面的第二种可能的实现方式中,所述签约管理服务器发送的管理请求响应中还包括注册事件标识event ID,所述注册事件标识event ID用于标识所述签约管理服务器根据所述第二管理操作请求注册的管理操作事件;
所述签约管理服务器获取所述终端发送的管理指令获取请求中还携带所述注册事件标识event ID;
所述签约管理服务器根据所述管理指令获取请求和所述第二管理操作请求,验证所述终端中的第三方应用是否有权限对终端eUICC中的签约数据集触发管理操作,包括:
所述签约管理服务器根据所述管理指令获取请求中的注册事件标识event ID,查找与所述注册事件标识event ID相关联的第二管理操作请求;
所述签约管理服务器确定所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息是否相同;
如果所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息相同,则所述终端中的第三方应用有权限对终端eUICC中的签约数据集执行管理操作。
第三方面,公开了一种终端,其特征在于,所述终端包括收发器、用于存储签约数据集的集成电路卡eUICC、存储器、以及用于执行保存在存储器中的一个或多个程序的一个或多个处理器,
所述一个或多个处理器用于:
控制所述收发器从签约管理服务器中获取签约数据集,所述签约数据集 中包括第三方应用的认证信息;
接收所述收发器收到的所述第三方应用服务器发送的第一请求,所述第一请求中携带所述签约数据集的标识ICCID,所述第一请求用于触发对所述eUICC中的签约数据集执行管理操作;
根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息;
获取所述终端中存储的所述第三方应用的证书信息;
根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作;
如果所述第三方应用有权限对所述签约数据集触发管理操作,则对所述签约数据集执行所述管理操作。
本发明实施例中,利用当前终端现有的eUICC***架构,在不增加额外应用模块的情况下,实现了通过第三方应用管理对eUICC中的签约数据集,增加了eUICC中的签约数据集的管理入口。
结合第三方面,在第三方面的第一种可能的实现方式中,所述处理器还用于:
控制所述收发器发送第一管理操作请求至第三方应用服务器,所述第一管理操作请求中包括所述第三方应用请求对所述eUICC中的签约数据集执行的管理操作。
结合第三方面,在第三方面的第二种可能的实现方式中,所述第三方应用服务器生成对所述eUICC中的签约数据集执行的管理操作。
结合第三方面,以及第三方面的第一种和第二种可能的实现方式,在第三方面的第三种可能的实现方式中,所述处理器还用于:
接收所述收发器收到的所述第三方应用服务器返回的eUICC的标识EID;
确定所述第三方应用服务器返回的eUICC的标识EID与所述终端的eUICC的标识EID是否相同;
如果确定所述第三方应用服务器返回的eUICC的标识EID与所述终端的eUICC的标识EID相同,则根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息。
结合第三方面,以及第三方面的第一种至第三种可能的实现方式,在第三方面的第四种可能的实现方式中,所述处理器还用于:
指示所述终端的LPA根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作;
或者,指示所述终端的eUICC根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作。
结合第三方面,以及第三方面的第一种至第四种可能的实现方式,在第三方面的第五种可能的实现方式中,所述处理器还用于:
指示所述终端的LPA根据所述第一请求发送管理指令获取请求至所述签约管理服务器;
接收所述收发器收到的所述签约管理服务器根据所述管理指令获取请求返回的管理指令;
指示所述终端的LPA根据所述管理指令,对所述eUICC中的签约数据集执行所述第一管理操作请求中的管理操作。
结合第三方面,以及第三方面的第一种至第四种可能的实现方式,在第三方面的第六种可能的实现方式中,所述第一请求中包括指示管理操作的管理命令;
所述处理器还用于:
指示所述终端的LPA根据所述第一请求,对所述eUICC中的签约数据集执行所述第一请求中指示的管理操作。
第四方面,一种签约管理服务器,其特征在于,所述终端包括收发器、存储器、以及用于执行保存在存储器中的一个或多个程序的一个或多个处理器,
所述一个或多个处理器用于:
接收所述收发器收到的第三方应用服务器发送的第二管理操作请求,所述第二管理操作请求中包括对终端中的签约数据执行的管理操作、所述终端中的签约数据集的标识ICCID、所述终端eUICC的标识EID以及所述终端中的第三方应用的认证信息;
生成管理请求响应,并控制所述收发器发送所述管理请求响应至所述第三方应用服务器,所述管理请求响应中包括所述终端中的签约数据集的标识ICCID和所述终端eUICC的标识EID,以供所述第三方应用服务器发送所述终端中的签约数据集的标识ICCID和所述终端eUICC的标识EID至所述终端;
接收所述收发器收到的所述终端发送的管理指令获取请求,所述管理指令获取请求中携带所述终端eUICC的标识EID和所述终端中存储的第三方应用的证书信息;
根据所述管理指令获取请求和所述第二管理操作请求,验证所述终端中的第三方应用是否有权限对终端eUICC中的签约数据集触发管理操作;
如果所述签约管理服务器验证所述终端中的第三方应用有权限对终端eUICC中的签约数据集触发管理操作,则控制所述收发器返回管理指令至所述终端,以供所述终端根据所述管理指令对终端eUICC中的签约数据集执行管理操作。
本发明实施例中,利用当前终端现有的eUICC***架构,在不增加额外应用模块的情况下,实现了通过第三方应用管理对eUICC中的签约数据集, 增加了eUICC中的签约数据集的管理入口。将对MNO APP的授权放到网络侧进行验证,进一步简化了方法流程的复杂度,简化了终端侧的认证操作。
结合第四方面,在第四方面的第一种可能的实现方式中,所述一个或多个处理器还用于:
根据所述管理指令获取请求中的所述终端eUICC的标识EID,查找与所述终端eUICC的标识EID相关联的第二管理操作请求;
确定所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息是否相同;
如果所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息相同,则确定所述终端中的第三方应用有权限对终端eUICC中的签约数据集执行管理操作。
结合第四方面,以及第四方面的第一种可能的实现方式,在第四方面的第二种可能的实现方式中,所述管理请求响应中还包括注册事件标识event ID,所述注册事件标识event ID用于标识所述签约管理服务器根据所述第二管理操作请求注册的管理操作事件;
所述管理指令获取请求中还携带所述注册事件标识event ID;
所述一个或多个处理器还用于:
根据所述管理指令获取请求中的注册事件标识event ID,查找与所述注册事件标识event ID相关联的第二管理操作请求;
确定所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息是否相同;
如果所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息相同,则确定所述终端中的第三方应用有权限对终端eUICC中的签约数据集执行管理操作。
附图说明
图1A为通过第三方应用对终端eUICC中的profile进行管理的应用场景图;
图1B为eUICC的远程管理***的架构图;
图2为本发明实施例提供的一种签约数据集的管理方法的流程示意图;
图3为本发明实施例提供的一种签约数据集的管理方法的信令交互图;
图4为本发明实施例提供的另一种签约数据集的管理方法的信令交互图;
图5为本发明实施例提供的另一种签约数据集的管理方法的信令交互图;
图6为本发明实施例提供的另一种签约数据集的管理方法的信令交互图;
图7为本发明实施例提供的又一种签约数据集的管理方法的流程示意图;
图8为本发明实施例提供的又一种签约数据集的管理方法的信令交互图;
图9为本发明实施例提供的又一种签约数据集的管理方法的信令交互图;
图10为本发明实施例提供的终端的结构框图;
图11为本发明实施例提供的签约管理服务器的结构框图。
具体实施方式
现有的SIM卡或UICC卡一般是由MNO(mobile network operator,移动网络运营商)集中向卡商订购,所以在卡出厂前就已经将接入运营商网络所需的网络接入应用及数据下载到卡中,如:USIM(Universal Subscriber Identity Module,通用用户识别模块)、IMSI(International Mobile Subscriber Identity,国际移动用户识别码)、KI(Key Identity,个人身份鉴权键)等。这样,用户购买SIM卡或UICC卡后***终端(device)即可接入运营商的网络。
不同于UICC卡,eUICC一般是将UICC卡嵌入在终端中。对于eUICC,并不一定是由运营商向卡商采购,也可能是由终端制造商采购后集成在终端。所以eUICC在出厂后可能并不包含有可以接入运营商网络的数据,需要远程下载这些数据,如:签约数据集(profile,即配置到eUICC中用来提供服务的数据和应用程序的集合),之后才能根据这些数据接入运营商网络。当profile下载到eUICC中后,用户可以对该profile进行激活、去激活、删除、下载新profile等管理操作。目前,只能通过终端中的LPA对eUICC中的profile进行管理操作。管理入口单一,用户期望能够通过更多的入口对eUICC中的profile进行管理。
本申请实施例提供一种应用场景,通过第三方应用,对终端eUICC中的profile进行管理。图1A为通过第三方应用对终端eUICC中的profile进行管理的应用场景图,如图1A所示:
用户启动终端桌面上的运营商应用(MNO APP),用户输入用户名和密码登录运营商应用服务器。运营商应用根据用户的签约信息,显示用户可以通过运营商应用触发的签约数据集的下载操作和管理操作。用户选择“管理profile”后,运营商应用显示用户可以触发的管理操作类型。由于终端中可能已下载多个profile,因此运营商应用显示对一个或多个profile用户可以触发的管理操作类型。例如用户选择“激活profile X”,即表示用户希望激活终端中的“profile X”。当“profile X”被激活成功后,运营商应用显示激活成功的UI界面。
其中运营商应用仅是用于举例,本申请实施例中,并不限于运营商应用这一种第三方应用。
为了实现上述应用场景,通过第三方应用,如运营商的应用对eUICC中的profile进行管理,在不增加额外应用程序的情况下,根据当前eUICC的系 统架构和访问控制机制,本发明实施例提出了如下两种技术方案。
一、将第三方应用对eUICC中profile进行管理操作的管理权限信息预先设置于SM-DP+的profile中。终端从SM-DP+中下载了包含第三方应用管理权限信息的profile后,终端中即获知了第三方应用对eUICC中profile进行管理操作的管理权限。例如,第三方应用A对eUICC中profile进行管理操作的管理权限为激活和去激活,应用A不得对eUICC中的profile执行删除操作。或者第三方应用B仅允许调用终端中LPA的一部分应用程序接口(Application Programming Interface,API),不得调用LPA的其他API。
当第三方应用发起对eUICC中profile的管理操作时,终端的eUICC或LPA即可验证该第三方应用是否具有对eUICC中profile进行管理的权限。如果验证通过,则允许第三方应用对eUICC中profile进行激活、去激活、删除、下载新profile等管理操作。
二、当第三方应用发起对eUICC中profile的管理操作时,第三方应用的服务器发送该管理操作以及第三方应用的证书信息至SM-DP+。由SM-DP+或SM-DS(Subscription Manager-Discovery Server,签约管理-发现服务器)等服务器***验证第三方应用是否具有对eUICC中profile进行管理的权限。如果验证通过,则允许第三方应用对eUICC中profile进行激活、去激活、删除、下载新profile等管理操作。
首先,对本发明实施例涉及的***、术语等作以下介绍:
一、如图1B所示,是本发明实施例提供一种eUICC的远程管理***的架构图。参考图1B,该***包括SM-DP+(Subscription Manager Data Preparation+,签约管理-数据准备)服务器、SM-DS(Subscription Manager-Discovery Server,签约管理-发现服务器)、运营商(Operator),卡商(EUM),证书发布中心CI(Certificate Issuer),终端(Terminal),用户(End User)。
另外,对各个实体之间的接口作以介绍:ES6是eUICC与运营商之间的接口;ES2+是运营商与SM-DP+之间的接口;ES8+是eUICC与SM-DP+之间的接口;ES11是终端的LDS(Local Discovery Service,本地发现服务)与SM-DS之间的接口;ES12是SM-DS与SM-DP+之间的接口;ES10a是LDS与eUICC之间的接口;ES10c是LUI(local user interface,本地用户接口)与eUICC;ESci是EUM与CI之间的接口,或CI与SM-DP+之间的接口;ESeum是EUM与eUICC之间的接口;ESop是用户(End User)与运营商交互的接口;ESeu为End User与LUI之间的接口;ES9+为SM-DP+与LPD(local profile download,本地文件下载)之间的接口、ES10b为LPD与eUICC之间的接口。
其中,SM-DP+的功能包括签约数据集(profile)的生成、签约数据集的保护(如:加密)、签约数据集存储,签约数据集绑定(如:将profile与Event(事件)ID绑定)、签约数据集发送或下载,远程签约数据集管理,SM-DS事件注册等。SM-DS主要负责接受SM-DP+发送的事件(Event)注册,并将事件发送给终端。事件包括签约数据集下载事件或签约数据集管理事件。终 端根据签约数据集下载事件从SM-DP+中下载签约数据集;或者,终端根据签约数据集管理事件从SM-DP+获取签约数据集管理命令。
进一步地,参考图1B,终端中有LPA和eUICC,LPA中包括LDS,LPD和LUI。具体实现中,终端的LDS向SM-DS查询事件,LPD负责下载签约数据集,即LPD通过HTTPS(Hypertext Transfer Protocol Secure,超文本传输协议)安全链接从SM-DP+下载profile到LPD中,然后通过本地APDU命令将下载下来的签约数据集再发送到eUICC中。这里的签约数据集是指文件结构、数据和应用程序等的集合,可以包括一个或多个网络接入应用及相应的网络接入信任状。需要说明的是,本发明实施例中,签约数据集是一个统称,包括安装到终端的eUICC上的签约数据集以及在SM-DP+存储的profile package。
另外,终端的LUI提供和用户的交互逻辑和界面,用户可以通过LUI来完成对profile的管理,如下载新的profile,激活profile,去激活profile,删除profile等。
根据当前终端的eUICC***架构,LPA可以和eUICC进行通信,其他第三方应用APP需要调用LPA开放的应用程序接口(API)来实现和eUICC的通信。为了保证对LPA的API调用的安全性,需要验证第三方应用App是否有权限调用LPA的API,对eUICC中相应的profile进行管理操作。
实施例一
本发明实施例提供一种签约数据集的管理方法,如图2所示,所述方法包括以下步骤:
101、终端签约管理服务器中获取签约数据集,所述签约数据集中包括第三方应用的认证信息。
终端自动下载或根据用户输入的下载指令从签约管理服务器下载签约数据集至终端的eUICC中。所述第三方应用的认证信息可携带于所述签约数据集的元数据(metadata)中,具体的,可以添加到StoreMetadata命令的data字段。签约数据集下载到eUICC中后,签约数据集的元数据可以存储在eUICC为签约数据集所创建的安全域空间(Issuer Security Domain-Profile,ISD-P)中。其中,第三方应用的认证信息可以包括第三方应用证书的哈希值。
所述签约管理服务器可以是SM-DP+(Subscription Manager Data Preparation+,签约管理-数据准备)服务器。也可以是SM-DP+服务器和SM-DS(Subscription Manager-Discovery Server,签约管理-发现服务器)。在此不作具体限定。
可选地,第三方应用的认证信息还可以包括第三方应用证书的哈希算法、包名(package name)、允许该第三方应用访问的LPA的API等。可选地,如果第三方应用的认证信息不包含允许该第三方应用访问的LPA的API,则代表允许该第三方应用访问LPA的所有开放的API。
可选地,第三方应用的认证信息还可以包括允许所述第三方应用对eUICC中的签约数据集执行的管理操作类型。
第三方应用的认证信息可以是由移动网络运营商(MNO)通过MNO portal服务器预先设置在SM-DP+中的,也可以是MNO在向SM-DP+订购profile时,提供给SM-DP+的。
102、所述终端的第三方应用发送第一管理操作请求至第三方应用服务器。
所述第一管理操作请求中包括所述第三方应用请求对所述eUICC中的签约数据集执行的管理操作。
终端启动第三方应用后,登录第三方应用服务器。用户通过该第三方应用的用户界面输入管理eUICC中的签约数据集的管理操作。第三方应用发送携带对eUICC中的签约数据集执行管理操作的请求消息至第三方应用服务器。
具体地,第三方应用服务器属于图1B所示架构中运营商(Operator)中的服务器。或者第三方应用服务器通过运营商(Operator)和签约管理服务器进行通信。
在另一实施例中,步骤102可以不执行。第三方应用服务器也可以根据其他事件触发生成对所述eUICC中的签约数据集执行的管理操作。无需第三方应用发送发送第一管理操作请求至第三方应用服务器。
103、终端接收第三方应用服务器发送的第一请求,其中第一请求中携带签约数据集的标识ICCID。
所述第一请求用于触发对所述eUICC中的签约数据集执行管理操作。
具体地,第三方应用服务器收到终端的第三方应用发送的第一管理操作请求后,或在第三方应用服务器自动生成对所述eUICC中的签约数据集执行的管理操作后,第三方应用服务器可以将第一管理操作请求中的管理操作发送至签约管理服务器,接收签约管理服务器返回签约数据集的标识ICCID,然后生成第一请求发送至终端,也可以是由第三方应用服务器直接生成第一请求,发送携带签约数据集的标识ICCID的第一请求至终端。在此不作具体限定。
可选地,第一请求中还可以携带eUICC的标识EID。
可选地,第一请求中还可以携带指示第三方应用对eUICC中的签约数据集执行的管理操作。或者第一请求本身即为第三方应用对eUICC中的签约数据集执行的管理操作的管理命令。例如,第一请求为enable profile命令。
104、终端根据所述签约数据集的标识ICCID获取eUICC中签约数据集包含的第三方应用的认证信息。
终端根据第三方应用服务器返回的签约数据集的标识ICCID,获取eUICC中该标识ICCID对应的签约数据集的信息。由于终端的eUICC中可能包括多个签约数据集,因此根据签约管理服务器返回的标识ICCID,可以获取到第三方应用所需要触发管理操作的签约数据集。
终端获取到eUICC中的签约数据集后,进一步获取签约数据集中存储的所述第三方应用的认证信息。具体的,在签约数据集的元数据中获取所述第 三方应用的认证信息。第三方应用的认证信息可以包括第三方应用证书的哈希值。可选地,第三方应用的认证信息还可以包括第三方应用证书的哈希算法、包名(package name)、允许该第三方应用访问的LPA的API等。
可选地,如果签约管理服务器同时还返回了终端eUICC的标识EID,则进一步确定签约管理服务器返回的eUICC的标识EID和终端中的eUICC的标识EID是否一致。如果两个EID标识一致,才执行步骤104。
105、终端获取所述终端中存储的所述第三方应用的证书信息。
当第三方应用安装于终端时,终端中将存储所述第三方应用的证书信息。具体地,证书信息可以包括第三方应用的证书、所述第三方应用的包名等信息。
具体地,如果步骤104中eUICC中存储的第三方应用的认证信息包括哈希算法,则终端从操作***中获取第三方应用的证书,并且利用第三方应用的认证信息中的哈希算法计算哈希值,或者终端利用默认的哈希算法计算哈希值,或者终端根据第三方应用的认证信息中的哈希算法或默认的哈希算法从操作***获取第三方证书的哈希值。如果步骤104中eUICC中存储的第三方应用的认证信息还包括第三方应用的包名,则终端从操作***中获取所述第三方应用的包名。
106、终端根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作。
终端根据步骤104中获取的签约数据集中的第三方应用的认证信息,和步骤105中获取的第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作。
例如,判断第三方应用的认证信息中所述第三方应用的哈希值,与第三方应用的证书的哈希值是否一致。判断第三方应用的认证信息中所述第三方应用的包名和第三方应用的证书信息中的包名是否一致。
步骤106的执行主体可以是终端的LPA,也可以是终端的eUICC。
107、如果所述第三方应用有权限对所述签约数据集触发管理操作,则所述终端对所述签约数据集执行所述管理操作。
如果步骤106中的判断结果为一致,则说明所述第三方应用有权限对所述签约数据集触发管理操作。如果步骤106中的判断结果为不一致,则说明所述第三方应用没有权限对所述签约数据集执行管理操作,流程终止,不允许所述第三方应用对eUICC中的签约数据集进行管理操作。
步骤107中终端对签约数据集执行管理操作的方法有多种,在此不作具体限定。下面举例说明:
示例一:
所述终端的LPA根据所述第一请求发送管理指令获取请求至所述签约管理服务器。
所述终端的LPA接收所述签约管理服务器根据所述管理指令获取请求返 回的管理指令。
所述终端的LPA根据所述管理指令,对所述eUICC中的签约数据集执行所述第一管理操作请求中的管理操作。
示例二:
所述终端的LPA根据所述第一请求,对所述eUICC中的签约数据集执行所述第一请求中指示的管理操作。其中,终端接收所述第三方应用服务器发送的第一请求中包括指示管理操作的指示。
在签约数据集中预设第三方应用的认证信息,当终端从签约管理服务器中下载签约数据集至eUICC时,终端即获知第三方应用的认证信息。当第三方应用请求对eUICC中的签约数据集执行管理操作时,根据第三方应用服务器返回的签约数据集标识查找终端已存储的签约数据集。终端根据签约数据集中存储的第三方应用的认证信息验证该第三方应用是否具有对eUICC中的签约数据集触发管理操作的权限。本发明实施例中,利用当前终端现有的eUICC***架构,在不增加额外应用模块的情况下,实现了通过第三方应用管理对eUICC中的签约数据集,增加了eUICC中的签约数据集的管理入口。
具体地,步骤106的执行主体可以是终端中的LPA,还可以是终端中的eUICC。
下面分别以两个具体实施例进行详细阐述。假设第三方应用为运营商开发的安装于终端中的运营商应用(MNO APP)。
实施例二
如图3所示,实施例二中涉及的网元主体包括终端、移动网络运营商的portal服务器(MNO portal)、以及签约管理服务器。具体地,终端包括eUICC、LPA、安装于终端中的运营商应用(MNO APP)。签约管理服务器包括SM-DP+服务器和SM-DS服务器。由终端中的LPA确定终端中的运营商应用(MNO APP)是否有权限对终端中的签约数据集执行管理操作。具体信令交互流程如下:
1、移动网络运营商(MNO)开发了一款用于安装在终端上的运营商应用(MNO APP)。运营商应用安装在终端上时,终端将存储所述运营商应用的证书信息,例如证书、包名等。为了使用户能够直接通过该运营商应用管理终端中eUICC的profile,移动网络运营商(MNO)通过MNO portal服务器预先在SM-DP+中定制签约数据集时,将该应用的认证信息存储在该签约数据集的元数据中。
该运营商应用的认证信息包括所述运营商应用的证书的哈希值。可选地,该运营商应用的认证信息还可以包括所述运营商应用的证书的哈希算法、包名(package name)、允许所述运营商应用访问的LPA的API等。
2、当终端从SM-DP+中下载了该移动网络运营商的签约数据集后,该运营商所开发的应用的认证信息也随着该签约数据集下载到终端中。具体地,该运营商应用的认证信息可以存储于所述签约数据集的元数据中。下载所述 签约数据集到终端的eUICC中后,所述签约数据集的元数据可以存储在eUICC为签约数据集所创建的安全域空间(ISD-P)中。
当终端下载完毕移动网络运营商的签约数据集,移动网络运营商的MNO portal服务器中会存储终端的签约数据集下载记录。具体地,签约数据集下载记录可以包括已下载签约数据集的标识ICCID,已下载签约数据集的eUICC的标识EID等。
3、用户打开终端上的运营商应用(MNO APP)客户端,登录MNO portal。
4、通过运营商应用(MNO APP)的客户端用户界面输入管理eUICC中的签约数据集的管理操作。运营商应用(MNO APP)的客户端发送携带请求对eUICC中的签约数据集执行管理操作的第一管理操作请求(PRM/ReM)至MNO portal。管理操作可以是激活签约数据集、去激活签约数据集、删除签约数据集、查询eUICC信息、下载另一个新的签约数据集等。具体可参见图1A中所示的应用场景。
具体地,用户登录终端上的运营商应用(MNO APP)客户端后,运营商应用(MNO APP)客户端从MNO portal中获取该用户在运营商注册时的签约信息,根据该签约信息在该应用的客户端用户界面输入管理eUICC中的签约数据集的管理操作。
5、MNO portal接收运营商的应用客户端发送的第一管理操作请求后,根据用户签约信息查找对应的签约数据集的标识ICCID(在实施例二至五中,简称“目标profile标识ICCID”),以及安装了该签约数据集的eUICC的标识EID(在实施例二至五中,简称“目标eUICC标识EID”)。MNO portal发送第二管理操作请求至签约管理服务器。其中第二管理操作请求中包括所述第三方应用请求对所述eUICC中的签约数据集执行的管理操作,并携带目标profile标识ICCID和目标eUICC标识EID。
具体地,MNO portal发送第二管理操作请求至SM-DP+。可选地,如果需要把运营商应用的客户端请求对eUICC中的签约数据集执行的管理操作注册到SM-DS,MNO portal还发送SM-DS的地址至SM-DP+。SM-DP+在SM-DS对该管理操作进行注册一个管理操作事件,生成一个注册事件标识eventID。
6、第6步为可选步骤。如果MNO portal还发送了SM-DS的地址至SM-DP+,则SM-DP+在SM-DS中,为运营商应用请求对所述eUICC执行的管理操作注册一个管理操作事件,并生成一个注册事件标识eventID。
7、SM-DP+服务器收到MNO portal发送的第二管理操作请求后,则将第二管理操作请求中的参数信息进行存储。
SM-DP+返回请求响应消息至MNO portal,所述请求响应消息中携带目标profile标识ICCID、以及目标eUICC标识EID。如果在第6步中SM-DP+在SM-DS中,为所述eUICC的管理操作注册一个管理操作事件,生成一个注册事件标识eventID,则SM-DP+返回请求响应消息中还可以携带所述注册事件标识eventID。
8、MNO portal收到SM-DP+返回的请求响应消息后,MNO portal生成携 带目标profile标识ICCID的第一请求,发送至终端中的运营商应用(MNO APP)。具体地,MNO portal可以通过触发请求(polling trigger)消息携带所述目标profile标识ICCID,发送至终端中的运营商应用(MNO APP)。可选地,所述触发请求(polling trigger)消息中还可以携带所述目标eUICC标识EID。如果SM-DP+将运营商应用请求对eUICC中的签约数据集执行的管理操作注册到SM-DS,则所述触发请求(polling trigger)消息中还可以携带SM-DP+在SM-DS对该管理操作进行注册的注册事件标识eventID。
9、运营商应用(MNO APP)收到MNO portal下发的第一请求后,转发该第一请求至终端的LPA。
10、第10步为可选步骤。如果在第9步中,LPA收到运营商应用(MNO APP)发送的触发请求消息中包括所述目标eUICC标识EID,则LPA从eUICC中获取终端eUICC的EID标识。
11、第11步为可选步骤。确定触发请求消息中携带的eUICC的标识EID,和所述终端eUICC的EID标识是否相同。如果相同则执行步骤12。
12、LPA向eUICC请求获取与目标profile标识ICCID对应的签约数据集包含的第三方应用的认证信息。具体地,LPA向eUICC发送GetProfileInfo消息,所述GetProfileInfo消息携带目标profile标识ICCID。
13、eUICC根据目标profile标识ICCID,查找与所述目标profile标识ICCID相对应的签约数据集,并发送该签约数据集中的第三方应用的认证信息至LPA。具体地,eUICC根据目标profile标识ICCID,获取所述目标profile标识ICCID对应的签约数据集的元数据。返回所述元数据中存储的运营商应用(MNO APP)的认证信息至LPA。或返回所述元数据至LPA。
14、LPA收到eUICC返回的签约数据集信息后,从终端的操作***(Operating System,OS)中获取所述运营商应用在终端安装时所产生的证书信息,例如证书、包名等。
具体地,如果LPA收到eUICC返回的签约数据集的元数据中包括哈希算法,则LPA从终端的操作***中获取所述运营商应用的证书。利用所述签约数据集中的哈希算法计算所述运营商应用的证书的哈希值。如果运营商应用在终端安装时所产生的证书信息中包括证书哈希值,则获取所述证书信息中的证书哈希值(默认终端的操作***已经根据认证信息中的哈希算法,对运营商应用的证书进行了哈希运算产生了哈希值)。如果LPA收到eUICC返回的签约数据集的元数据中还包括包名,则LPA从终端的操作***中获取所述运营商应用的包名。
15、LPA判断eUICC返回的签约数据集中运营商应用的认证信息,与LPA从终端的操作***中获取所述运营商应用的证书信息是否一致。
具体地,判断eUICC返回的签约数据集中运营商应用的证书哈希值和操作***中运营商应用的证书哈希值是否一致。可选地,如果还获取到运营商的包名,则判断eUICC返回的签约数据集中运营商应用的包名和操作***中运营商应用的包名是否一致。可选地,进一步判断是否允许运营商应用调用 LPA的API。
16、第15步验证通过后,LPA向eUICC发送消息请求获取所述目标profile标识ICCID对应的签约数据集中存储的签约管理服务器侧的地址,即轮询地址(Polling address)。具体地,LPA发送Get polling address消息至eUICC,其中Get polling address消息中携带目标profile标识ICCID。
17、eUICC根据LPA的请求,返回SM-DP+服务器的地址至LPA。可选的,eUICC也可以返回SM-DS服务器的地址至LPA。
18、如果在第17步中,eUICC返回的地址为SM-DS服务器的地址,LPA和SM-DS执行双向认证,执行步骤18a和18b。
18a:LPA向SM-DS发送管理指令获取(retrieve RPM/ReM)请求,其中管理指令获取(retrieve RPM/ReM)请求中携带目标eUICC标识EID。具体地,管理指令获取请求可以是认证客户端(AuthenticateClient)请求。
可选地,如果SM-DP+将运营商应用请求对eUICC中的签约数据集执行的管理操作注册到SM-DS,则管理指令获取(retrieve RPM/ReM)请求还可以携带SM-DP+在SM-DS对该管理操作进行注册的注册事件标识eventID。
18b:SM-DS根据所述目标eUICC标识EID或注册事件标识eventID,查找对应的注册事件后,返回所述注册事件对应的注册事件记录(event record)。其中,注册事件记录中携带了eventID和SM-DP+的地址。
当SM-DS服务器中所述目标eUICC标识EID对应多个注册事件时,根据注册事件标识eventID可以直接获取该注册事件标识对应的注册事件信息。
19、LPA向SM-DP+发送管理指令获取(retrieve RPM/ReM)请求。其中,管理指令获取(retrieve RPM/ReM)请求中携带所述目标eUICC标识EID。可选地,管理指令获取(retrieve RPM/ReM)请求中还携带所述注册事件标识eventID。具体地,管理指令获取请求可以是认证客户端(AuthenticateClient)请求。
20、SM-DP+向LPA返回管理指令,以供LPA根据所述管理指令对eUICC中的签约数据集执行管理操作。
在本实施例的技术方案中,用户可以利用MNO APP直接对已下载的该移动网络运营商的签约数据集进行管理,提高了用户体验的一致性。同时通过profile metadata来对MNO APP访问LPA的API以及MNO APP管理Profile进行接入控制管理,保证的MNO APP对profile管理的安全性。
实施例三
如图4所示,实施例三中涉及的网元主体包括终端、移动网络运营商的portal服务器(MNO portal)、以及签约管理服务器。具体地,终端包括eUICC、LPA、安装于终端中的运营商应用(MNO APP)。签约管理服务器包括SM-DP+服务器和SM-DS服务器。由终端中的eUICC确定终端中的运营商应用(MNO APP)是否有权限对终端中的签约数据集执行管理操作。
其中实施例三中的步骤1-11与实施例二中的步骤1-11类似,为了叙述 简洁,在此不再赘述。
12、LPA从终端的操作***(Operating System,OS)中获取所述运营商应用在终端安装时所产生的证书信息,例如证书、包名等。
13、LPA发送所述运营商应用的证书信息和目标profile标识ICCID至eUICC。
具体地,LPA向eUICC发送认证MNO App的请求(authenticateApp),该请求中携带目标profile标识ICCID、MNO App的证书。可选地,该请求中还携带包名,以及MNO APP请求访问的LPA API等证书信息。
14、eUICC根据目标profile标识ICCID,查找与所述目标profile标识ICCID相对应的签约数据集中的运营商应用的认证信息。具体地,eUICC根据目标profile标识ICCID,获取所述目标profile标识ICCID对应的签约数据集的元数据(metadata)。
若metadata中包括hash算法并且LPA发送的证书信息中包括运营商应用的证书,则eUICC根据hash算法计算运营商应用的证书的哈希值hash(Cert)。若LPA发送给eUICC的MNO APP证书为经过哈希运算的证书哈希值,则eUICC直接利用该哈希值hash(Cert)。
15、eUICC判断签约数据集中的运营商应用的认证信息,与LPA从终端的操作***中获取所述运营商应用的证书信息是否一致。
具体地,判断签约数据集中运营商应用的证书哈希值和操作***中运营商应用的证书哈希值是否一致。可选地,如果认证信息和证书信息中存在包名,则进一步判断eUICC返回的签约数据集中运营商应用的包名和操作***中运营商应用的包名是否一致。可选地,进一步判断是否允许运营商应用调用LPA的API。
16、第15步验证通过后,eUICC向LPA返回响应消息,所述响应消息中携带所述目标profile标识ICCID对应的签约数据集中存储的签约管理服务器侧的地址,即轮询地址(Polling address)。
具体地,如果目标profile标识ICCID对应的签约数据集存储在SM-DP+服务器中,则eUICC返回SM-DP+服务器的地址。可选的,eUICC也可以返回eUICC返回SM-DS服务器的地址至LPA。
17、如果在第16步中,eUICC返回的地址为SM-DS服务器的地址,LPA和SM-DS执行双向认证,执行步骤17a和17b。
17a:LPA向SM-DS发送管理指令获取(retrieve RPM/ReM)请求,其中管理指令获取(retrieve RPM/ReM)请求中携带目标eUICC标识EID。具体地,可以是认证客户端(AuthenticateClient)请求。
可选地,如果SM-DP+将运营商应用请求对eUICC中的签约数据集执行的管理操作注册到SM-DS,则管理指令获取(retrieve RPM/ReM)请求还可以携带SM-DP+在SM-DS对该管理操作进行注册的注册事件标识eventID。
17b:SM-DS根据所述目标eUICC标识EID或注册事件标识eventID,查找对应的注册事件后,返回所述注册事件对应的注册事件记录(event  record)。其中,注册事件记录中携带了eventID和SM-DP+的地址。
当SM-DS服务器中所述目标eUICC标识EID对应多个注册事件时,根据注册事件标识eventID可以直接获取该注册事件标识对应的注册事件信息。
18、LPA向SM-DP+发送管理指令获取(retrieve RPM/ReM)请求。其中,管理指令获取(retrieve RPM/ReM)请求中携带所述目标eUICC标识EID。可选地,管理指令获取(retrieve RPM/ReM)请求中还携带所述注册事件标识eventID。
19、SM-DP+向LPA返回管理指令,以供LPA根据所述管理指令对eUICC中的签约数据集执行管理操作。
在本实施例的技术方案中,用户可以利用MNO APP直接对已下载的该移动网络运营商的签约数据集进行管理,提高了用户体验的一致性。同时通过profile metadata来对MNO APP访问LPA的API以及MNO APP管理Profile进行接入控制管理,保证的MNO APP对profile管理的安全性。由eUICC验证APP的权限,***安全性更高。
在本实施例的技术方案中,用户可以利用MNO APP直接对已下载的该移动网络运营商的签约数据集进行管理,提高了用户体验的一致性。同时通过profile metadata来对MNO APP访问LPA的API以及MNO APP管理Profile进行接入控制管理,保证的MNO APP对profile管理的安全性。通过eUICC对MNO APP访问LPA的API以及MNO APP管理Profile进行接入控制管理,进一步提高了安全性。
实施例一中步骤107终端对签约数据集执行管理操作包括多种具体实施方法,除了实施例二、三中向SM-DP+服务器请求管理指令外,还可以包括由MNO portal直接下发管理指令至终端LPA。本申请对步骤107的实现方式不作具体限制。下面通过实施例四和实施例五具体阐述由MNO portal直接下发管理指令至终端LPA的方法流程。
实施例四
如图5所示,实施例四中涉及的网元主体包括终端、移动网络运营商的portal服务器(MNO portal)、以及签约管理服务器。具体地,终端包括eUICC、LPA、安装于终端中的运营商应用(MNO APP)。签约管理服务器包括SM-DP+服务器。由终端中的LPA确定终端中的运营商应用(MNO APP)是否有权限对终端中的签约数据集执行管理操作。具体信令交互流程如下:
实施例四与实施例二的区别之处在于,MNO portal预置在SM-DP+中的签约数据集中除了存储了运营商应用的证书哈希值,还存储了允许运营商应用执行的管理操作。当运营商应用发送管理请求至MNO portal时,MNO portal验证运营商应用发送的管理操作请求是否属于允许运营商应用执行的管理操作。如果运营商应用发送的管理操作请求属于允许运营商应用执行的管理操作,则直接返回所述管理操作至终端,以供LPA执行该管理操作。LPA无需在验证通过后再次发送消息请求获取管理指令。
在本实施例中,由终端的LPA确定终端中的运营商应用(MNO APP)是否有权限对终端中的签约数据集执行管理操作。
具体信令交互流程如下:
1、移动网络运营商(MNO)开发了一款用于安装在终端上的运营商应用(MNO APP)。运营商应用安装在终端上时,终端将存储所述运营商应用的证书信息,例如证书、包名等。为了使用户能够直接通过该运营商应用管理终端中eUICC的profile,移动网络运营商(MNO)通过MNO portal服务器预先在SM-DP+中定制签约数据集时,将该应用的认证信息存储在该签约数据集的元数据中。
该运营商应用的认证信息包括所述运营商应用的证书的哈希值和允许所述运营商应用执行的管理操作。可选地,该运营商应用的认证信息还可以包括所述运营商应用的证书的哈希算法、包名(package name)等。
2、当终端从SM-DP+中下载了该移动网络运营商的签约数据集后,该运营商所开发的应用的认证信息也随着该签约数据集下载到终端中。具体地,该运营商应用的认证信息可以存储于所述签约数据集的元数据中。下载所述签约数据集到终端的eUICC中后,所述签约数据集的元数据可以存储在eUICC为签约数据集所创建的安全域空间(ISD-P)中。
当终端下载完毕移动网络运营商的签约数据集,移动网络运营商的MNO portal服务器中会存储终端的签约数据集下载记录。具体地,签约数据集下载记录可以包括已下载签约数据集的标识ICCID,已下载签约数据集的eUICC的标识EID等。
3、用户打开终端上的运营商应用(MNO APP)客户端,登录MNO portal。
4、通过运营商应用(MNO APP)的客户端用户界面输入管理eUICC中的签约数据集的管理操作。运营商应用(MNO APP)的客户端发送携带请求对eUICC中的签约数据集执行管理操作的第一管理操作请求(PRM/ReM)至MNO portal。管理操作可以是激活签约数据集、去激活签约数据集、删除签约数据集、查询eUICC信息、下载另一个新的签约数据集等。具体可参见图1A中所示的应用场景。具体地,用户登录终端上的运营商应用(MNO APP)客户端后,运营商应用(MNO APP)客户端从MNO portal中获取该用户在运营商注册时的签约信息,根据该签约信息在该应用的客户端用户界面输入管理eUICC中的签约数据集的管理操作。
5、MNO portal接收运营商应用的客户端发送的第一管理操作请求后,确定所述请求消息中携带的管理操作是否为允许运营商应用执行的管理操作。
如果是,则MNO portal根据用户签约信息查找对应的签约数据集的标识ICCID(简称“目标profile标识ICCID”),并返回第一请求至终端。
其中,第一请求中携带目标profile标识ICCID、以及被允许的MNO APP请求的管理操作或被允许的MNO portal生成的管理操作。
可选地,所述第一请求中还携带目标eUICC标识EID。
可选地,MNO portal对上述发送至MNO App的信息进行签名。所述第一请求中还携带MNO portal的签名和portal的证书至终端中的运营商应用。
6、MNO App调用LPA的API,将第5步中收到的第一请求发送至LPA。
7、第7步为可选步骤。如果在第6步中,LPA收到MNO APP转发的第一请求中包括目标eUICC标识EID,则LPA从eUICC中获取终端eUICC的EID标识。
8、第8步为可选步骤。如果第10步中LPA收到MNO APP转发的eUICC的标识EID,且LPA从eUICC中获取到所述终端eUICC的EID标识,则确定所述目标eUICC标识EID和终端eUICC的EID标识是否相同。如果相同则执行步骤9。
9、第9步为可选步骤。如果在第6步中,LPA收到MNO APP转发的第一请求中包括MNO portal对上述发送至MNO App的信息进行签名,则LPA验证所述签名是否正确。如果签名正确,则执行步骤10。
可选地,如果签名正确,则进一步通过LPA的UI界面提示用户是否允许LPA对eUICC执行管理操作。如果用户确认允许LPA对eUICC执行管理操作,则执行步骤10。
10、LPA发送目标profile标识ICCID至终端的eUICC,以获取与该ICCID对应的签约数据集包含的第三方应用的认证信息。具体地,LPA向eUICC发送GetProfileInfo消息,所述GetProfileInfo消息携带目标profile标识ICCID。
11、eUICC根据所述目标profile标识ICCID,查找与所述目标profile标识ICCID相对应的签约数据集,并发送该签约数据集中的第三方应用的认证信息至LPA。具体地,eUICC所述目标profile标识ICCID,获取所述目标profile标识ICCID对应的签约数据集的元数据。返回所述元数据中存储的运营商应用(MNO APP)的认证信息至LPA。或返回所述元数据至LPA。
12、LPA收到eUICC返回的签约数据集信息后,从终端的操作***(Operating System,OS)中获取所述运营商应用在终端安装时所产生的证书信息,例如证书、包名等。
具体地,如果LPA收到eUICC返回的签约数据集的元数据中包括哈希算法,则LPA从终端的操作***中获取所述运营商应用的证书。利用所述签约数据集中的哈希算法计算所述运营商应用的证书的哈希值。如果运营商应用在终端安装时所产生的证书信息中包括证书哈希值,则获取所述证书信息中的证书哈希值。(默认终端的操作***已经根据认证信息中的哈希算法,对运营商应用的证书进行了哈希运算产生了哈希值)如果LPA收到eUICC返回的签约数据集的元数据中还包括包名,则LPA从终端的操作***中获取所述运营商应用的包名。
13、LPA判断eUICC返回的签约数据集中运营商应用的认证信息,与LPA从终端的操作***中获取所述运营商应用的证书信息是否一致。
具体地,判断eUICC返回的签约数据集中运营商应用的证书哈希值和操作***中运营商应用的证书哈希值是否一致。可选地,如果还获取到运营商 的包名,则判断eUICC返回的签约数据集中运营商应用的包名和操作***中运营商应用的包名是否一致。可选地,进一步判断是否允许运营商应用执行第6步中的管理操作。
14、如果第13步验证通过,则LPA发送第一请求至eUICC。第一请求中携带第6步中的管理操作和目标profile标识ICCID。
15、eUICC返回管理操作的执行结果。
具体地,如果管理操作命令是编辑eUICC,则返回的结果包括eUICC的相关信息,例如可用存储空间等。
16、LPA将管理操作的执行结果返回给MNO APP。
17、MNO App将管理操作的执行结果返回给MNO portal。
通过本实施例,运营商可以直接利用MNO APP对profile进行管理,不需要经过SM-DP+和SM-DS,缩短了整个流程,提高了用户体验。
实施例五
如图6所示,实施例五中涉及的网元主体包括终端、移动网络运营商的portal服务器(MNO portal)、以及签约管理服务器。具体地,终端包括eUICC、LPA、安装于终端中的运营商应用(MNO APP)。签约管理服务器包括SM-DP+服务器。由终端中的LPA确定终端中的运营商应用(MNO APP)是否有权限对终端中的签约数据集执行管理操作。
本实施例与实施例四的区别之处在于,由终端的eUICC确定终端中的运营商应用(MNO APP)是否有权限对终端中的签约数据集执行管理操作。
具体信令交互流程如下:
本实施例中步骤1-8的方法流程与实施例四中步骤1-8的方法流程类似,为了叙述简洁,在此不作赘述。
9、第9步为可选步骤。LPA的UI界面提示用户是否允许LPA对eUICC执行管理操作。如果用户确认允许LPA对eUICC执行管理操作,则执行步骤10。
10、LPA发送发送第一请求至eUICC。第一请求中携带第6步中的管理操作、运营商应用的证书信息、以及目标profile标识ICCID。
11、eUICC根据目标profile标识ICCID获取与该ICCID对应的签约数据集metadata。
具体地,eUICC所述目标profile标识ICCID,获取所述目标profile标识ICCID对应的签约数据集的元数据。
具体地,如果签约数据集的元数据中包括哈希算法,则eUICC利用所述签约数据集中的哈希算法计算所述运营商应用的证书的哈希值。如果LPA转发的运营商应用的证书信息中包括证书哈希值,则直接获取所述证书信息中的证书哈希值。
可选地,如果eUICC收到的第一请求中包括MNO portal的签名,则eUICC验证该签名是否正确。如果签名正确,才根据目标profile标识ICCID获取与 该ICCID对应的签约数据集。
12、eUICC确定签约数据集中运营商应用的认证信息和LPA发送的运营商应用的证书信息是否一致。
具体地,判断签约数据集中运营商应用的证书哈希值和运营商应用的证书哈希值是否一致。可选地,如果还获取到运营商的包名,则判断签约数据集中运营商应用的包名和运营商应用的包名是否一致。
如果验证签约数据集中运营商应用的认证信息和LPA发送的运营商应用的证书信息一致,则eUICC执行第10步中的管理操作。
可选地,在验证签约数据集中运营商应用的认证信息和LPA发送的运营商应用的证书信息是否一致之后,进一步判断是否允许运营商应用执行第10步中的管理操作。如果验证通过,且允许运营商应用执行第10步中的管理操作,则eUICC执行第10步中的管理操作。
13、eUICC返回管理操作的执行结果。
具体地,如果管理操作命令是编辑eUICC,则返回的结果包括eUICC的相关信息,例如可用存储空间等。
14、LPA将管理操作的执行结果返回给MNO APP。
15、MNO App将管理操作的执行结果返回给MNO portal。
通过本实施例,运营商可以直接利用MNO APP对profile进行管理,不需要经过SM-DP+和SM-DS,缩短了整个流程,提高了用户体验。通过eUICC对MNO APP访问LPA的API以及MNO APP管理Profile进行接入控制管理,进一步提高了安全性。
上述实施例中,对MNO APP管理profile的权限进行认证的主体为终端。在另一实施例中,对MNO APP管理profile的权限进行认证的主体也可以是签约管理服务器。
实施例六
本发明实施例提供又一种签约数据集的管理方法,如图7所示,所述终端的eUICC中预先下载了签约数据集,且所述终端中预先配置了LPA应用接口的访问权限。所述方法包括以下步骤:
201、终端的第三方应用发送第一管理操作请求至第三方应用服务器。
其中,所述第一管理操作请求中包括第三方应用请求对eUICC中的签约数据执行的管理操作。
202、第三方应用服务器发送第二管理操作请求至签约管理服务器,所述第二管理操作请求中包括第三方应用请求对签约数据执行的管理操作、签约数据集的标识ICCID、终端eUICC标识EID以及第三方应用的认证信息。
在另一实施例中,步骤201也可以不执行,而直接执行步骤202.
即第三方应用服务器自动生成第二管理操作请求,发送至签约管理服务器,无需终端中的第三方应用发送第一管理操作请求。
203、第三方应用服务器接收签约管理服务器返回的管理请求响应,所述管理请求响应中包括签约数据集的标识ICCID和终端eUICC标识EID。
第三方应用服务器发送所述终端中的签约数据集的标识ICCID至终端.
可选地,第三方应用服务器还可以发送终端eUICC标识EID至终端
204、终端获取终端中预存储的第三方应用的证书信息,根据所述第三方应用的证书信息确定所述第三方应用是否有调用终端LPA应用接口的权限。如果所述第三方应用具有调用终端LPA应用接口的权限,则执行步骤205。
205、终端发送管理指令获取请求至签约管理服务器,所述管理指令获取请求中携带终端eUICC标识EID和终端中预存储的第三方应用的证书信息。
206、签约管理服务器验证所述终端中的第三方应用是否有权限对终端eUICC中的签约数据集执行管理操作。如果验证通过,则执行步骤207.
207、终端接收签约管理服务器返回的管理指令,根据所述管理指令对终端eUICC中的签约数据集执行管理操作。
本发明实施例中,利用当前终端现有的eUICC***架构,在不增加额外应用模块的情况下,实现了通过第三方应用管理对eUICC中的签约数据集,增加了eUICC中的签约数据集的管理入口。将对MNO APP的授权放到网络侧进行验证,进一步简化了方法流程的复杂度,简化了终端侧的认证操作。
下面分别以两个具体实施例进行详细阐述。假设第三方应用为运营商开发的安装于终端中的运营商应用(MNO APP)。
实施例七
如图8所示,实施例七中涉及的网元主体包括终端、移动网络运营商的portal服务器(MNO portal)、以及签约管理服务器。具体地,终端包括eUICC、LPA、安装于终端中的运营商应用(MNO APP)。终端中的eUICC已预先下载了签约数据集。签约管理服务器包括SM-DP+服务器和SM-DS服务器。由签约管理服务器确定终端中的运营商应用(MNO APP)是否有权限对终端中的签约数据集执行管理操作。具体信令交互流程如下:
0、在终端的LPA中配置第三方应用调用LPA应用接口的访问权限。例如,当第三方应用的证书的根证书为GSMA CI的证书时,允许该第三方应用调用LPA的应用接口。
可选地,第三方应用调用LPA应用接口的访问权限也可以配置于终端的eUICC中,LPA再从eUICC中获取第三方应用调用LPA应用接口的访问权限。
1、移动网络运营商(MNO)开发了一款用于安装在终端上的运营商应用(MNO APP)。运营商应用安装在终端上时,终端将存储所述运营商应用的证书信息,例如证书、包名等。
用户打开终端上的运营商应用(MNO APP)客户端,登录MNO portal。
2、通过运营商应用(MNO APP)的客户端用户界面输入管理eUICC中的签约数据集的管理操作。运营商应用(MNO APP)客户端发送携带请求对 eUICC中的签约数据集执行管理操作请求的请求消息(即第一管理操作请求)至MNO portal。管理操作可以是激活签约数据集、去激活签约数据集、删除签约数据集、查询eUICC信息、下载另一个新的签约数据集等。
具体地,用户登录终端上的运营商应用(MNO APP)客户端后,获取该用户在运营商注册时的签约信息,根据该签约信息在该应用的客户端用户界面输入管理eUICC中的签约数据集的管理操作。
3、MNO portal收到第一管理操作请求后,查找该终端已下载的签约数据集的标识ICCID、该终端下载了签约数据集的eUICC的标识EID、以及运营商应用的认证信息。生成第二管理操作请求发送至SM-DP+服务器。其中,第二管理操作请求携带签约数据集的标识ICCID、终端eUICC的标识EID、运营商应用的认证信息以及运营商应用请求对eUICC中的签约数据集执行的管理操作。
运营商应用的认证信息包括证书哈希值。可选地,运营商应用的认证信息还可以包括运营商应用的包名、哈希算法等。
4、第4步为可选步骤。SM-DP+发送终端eUICC的标识EID以及运营商应用的认证信息至SM-DS。
如果MNO portal还发送SM-DS的地址至SM-DP+,则SM-DP+在SM-DS中,为运营商应用请求对所述eUICC执行的管理操作注册一个管理操作事件,生成一个注册事件标识eventID。SM-DS生成注册事件标识eventID后,发送所述注册事件标识eventID至SM-DP+。
5、SM-DP+服务器收到MNO portal发送的第二管理操作请求后,将第二管理操作请求中携带的消息进行存储。
SM-DP+返回请求响应消息至MNO portal,所述请求响应消息中携带签约数据集的标识ICCID和终端eUICC的标识EID。
可选地,如果SM-DP+在SM-DS中,为运营商应用请求对所述eUICC执行的管理操作注册一个管理操作事件,则SM-DP+返回的请求响应消息中还可以包括注册事件标识eventID。
6、MNO portal收到SM-DP+返回的请求响应消息后,发送触发请求消息至终端中的MNO APP。其中触发请求(polling trigger)消息中携带签约数据集的标识ICCID。
可选地,触发请求(polling trigger)消息中还可以携带下述参数中的一个或多个:终端eUICC的标识EID、注册事件标识eventID、以及哈希算法。
7、运营商应用(MNO APP)收到MNO portal下发的触发请求消息后,转发该触发请求消息至终端的LPA。
8、LPA从操作***中获取MNO APP的证书,确认该MNO APP是否有调用LPA应用接口的访问权限。例如,确认MNO APP的证书的根证书是否是GSMA CI的证书,如果是则允许该MNO APP调用LPA的应用接口。
9、第9步为可选步骤。如果在第7步中,LPA收到运营商应用(MNO APP)发送的触发请求消息中包括终端eUICC的标识EID,则LPA从eUICC中获取 终端eUICC的EID标识。
10、第10步为可选步骤。确定触发请求消息中的终端eUICC标识EID和LPA从eUICC中获取的eUICC的EID标识是否相同。如果相同则执行步骤11。
11、LPA向eUICC发送携带签约数据集的标识ICCID的消息,请求获取签约数据集的标识ICCID对应的签约数据集中存储的签约管理服务器的地址。
12、如果签约数据集的标识ICCID对应的签约数据集存储在SM-DP+服务器中,则eUICC返回SM-DP+服务器的地址。如果签约数据集的标识ICCID对应的签约数据集存储在SM-DS服务器中,则eUICC返回SM-DS服务器的地址。
13、如果在第12步中,eUICC返回的地址为SM-DS服务器的地址,执行步骤13和14。如果eUICC返回的地址为SM-DP+服务器的地址,则直接执行步骤16.
LPA向SM-DS发送获取注册事件(retrieve event)的请求消息至SM-DS,请求查找终端eUICC标识EID对应的注册事件。其中注册事件(retrieve event)的请求消息中携带终端eUICC标识EID和MNO APP的证书信息。
可选地,获取注册事件(retrieve event)的请求消息中还可以携带注册事件标识eventID。
可选地,获取注册事件(retrieve event)的请求消息中还可以携带MNO APP的包名(package name)。
可选地,MNO APP的证书信息可以是MNO APP的证书,也可以是终端根据第7步中触发请求消息中携带的哈希算法对MNO APP的证书进行哈希运算后得到的哈希值。
14、SM-DS收到获取注册事件(retrieve event)的请求消息后,根据终端eUICC标识EID或注册事件标识eventID查找对应的注册事件记录(event record)。
然后确定获取注册事件(retrieve event)的请求消息中携带的证书的哈希值是否与注册事件中记录的哈希值相同。如果获取注册事件(retrieve event)的请求消息中携带的是证书,那么在进行比较之前,SM-DS需要先对证书进行哈希运算,计算出哈希值再与注册事件记录的哈希值进行比较。
可选地,如果获取注册事件(retrieve event)的请求消息中还可以携带MNO APP的包名(package name)。则确定注册事件(retrieve event)的请求消息中携带的包名与注册事件记录的包名是否相同。
15、如果第14步的验证结果为相同,则SM-DS返回注册事件记录对应的eventID、SM-DP+地址至终端的LPA。
16、终端根据14步返回的SM-DP+地址或第12步eUICC发送的SM-DP+地址,向对应的SM-DP+服务器发送管理指令获取(retrieve RPM/ReM)请求请求获取管理指令。
其中,管理指令获取(retrieve RPM/ReM)请求中携带终端eUICC标识EID和MNO APP的证书。
可选地,管理指令获取(retrieve RPM/ReM)请求中还可以携带注册事件标识eventID。
可选地,管理指令获取(retrieve RPM/ReM)请求中还可以携带MNO APP的包名(package name)。
17、SM-DP+收到获取管理指令获取(retrieve RPM/ReM)请求后,根据终端eUICC标识EID或注册事件标识eventID查找对应的管理请求。该管理请求为第3步中SM-DP+收到的第二管理操作请求。
然后确定获取管理指令获取(retrieve RPM/ReM)请求中携带的证书的哈希值是否与第二管理操作请求中携带的证书哈希值相同。如果获取管理指令获取(retrieve RPM/ReM)请求中携带的是证书,那么在进行比较之前,SM-DP+需要先对证书进行哈希运算,计算出哈希值再与第二管理操作请求中携带的哈希值进行比较。
可选地,如果管理指令获取(retrieve RPM/ReM)请求中还可以携带MNO APP的包名(package name)。则确定管理指令获取(retrieve RPM/ReM)请求中携带的包名与第二管理操作请求中的包名是否相同。
18、如果第17步的验证结果均为相同,则SM-DP+向LPA返回第二管理操作请求对应的管理指令,以供LPA根据所述管理指令对eUICC中的签约数据集执行管理操作。
本实施例的技术方案中,不需要事先在profile预置对MNO APP的授权信息,扩大了应用范围。同时将对MNO APP的授权放到网络侧进行验证,进一步简化了方法流程的复杂度,简化了终端侧的认证操作。
实施例八
如图9所示,实施例八中涉及的网元主体包括终端、移动网络运营商的portal服务器(MNO portal)、以及签约管理服务器。具体地,终端包括eUICC、LPA、安装于终端中的运营商应用(MNO APP)。终端中的eUICC已预先下载了签约数据集。签约管理服务器包括SM-DP+服务器和SM-DS服务器。由签约管理服务器确定终端中的运营商应用(MNO APP)是否有权限对终端中的签约数据集执行管理操作。
实施例八与实施例七的区别在于,终端验证第三方应用调用LPA应用接口的访问权限时,执行主体为终端的eUICC。
具体信令交互流程如下:
如图9所示,实施例八的步骤8-14与实施例七不同,其余步骤可参考实施例七中类似步骤的具体说明,为了叙述简洁,在此不再赘述。
8、LPA从操作***中获取MNO APP的证书。可选地,LPA还可以从操作***中获取MNO APP的包名。
9、第9步为可选步骤。如果在第7步中,LPA收到运营商应用(MNO APP) 发送的触发请求消息中包括终端eUICC的标识EID,则LPA从eUICC中获取终端eUICC的EID标识。
10、第10步为可选步骤。确定触发请求消息中的终端eUICC标识EID和LPA从eUICC中获取的eUICC的EID标识是否相同。如果相同则执行步骤11。
11、LPA向eUICC发送MNO APP的证书,请求eUICC验证。
12、eUICC确认该MNO APP是否有调用LPA应用接口的访问权限。例如,确认MNO APP的证书的根证书是否是GSMA CI的证书,如果是则允许该MNO APP调用LPA的应用接口。如果验证通过,则执行步骤13.
13、eUICC向LPA发送第12步的验证通过的消息。以供LPA根据该消息发送携带签约数据集的标识ICCID的消息,请求获取签约数据集的标识ICCID对应的签约数据集中存储的签约管理服务器的地址。
本实施例的技术方案中,由eUICC验证第三方应用是否有调用LPA应用接口的访问权限,安全性更高。
另外,本发明实施例提供一种终端,该终端用于执行以上签约数据集的管理方法中的终端所执行的步骤。本申请实施例提供的终端可以包括相应步骤所对应的模块。
本申请实施例可以根据上述方法示例对终端进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
在采用集成的单元的情况下,图10示出了上述实施例中所涉及的终端的一种可能的结构示意图。如图10所示,终端包括处理器701、存储器702、集成电路卡eUICC703以及***总线704、收发器705。其中,处理器701用于执行图2-图6所示的方法步骤;eUICC703用于存储下载到终端中的签约数据集。终端通过收发器705与其他设备进行交互,如:签约管理服务器、第三方应用服务器。
在本申请具体实施方式中,存储器702可以包括易失性存储器,例如NVRAM(Nonvolatile Random Access Memory,非挥发性动态随机存取内存)、PRAM(Phase Change RAM,相变化随机存取内存)、MRAM(Magnetic Random Access Memory,磁阻式随机存取内存)等;存储器702还可以包括非易失性存储器,例如至少一个磁盘存储器件、EEPROM(Electrically Erasable Programmable Read-Only Memory,电子可擦除可编程只读存储器)、闪存器件,例如反或闪存(NOR flash memory)或是反及闪存(NAND flash memory)。非易失存储器储存处理器所执行的操作***及应用程序。处理器701从非易失存储器加载运行程序与数据到内存并将数据内容储存于大量储存装置中。
一个或多个处理器701是终端的控制中心。处理器701利用各种接口和 线路连接整个终端的各个部分,通过运行或执行存储在存储器172内的软件程序和/或应用模块,以及调用存储在存储器702内的数据,执行终端的各种功能和处理数据,从而对终端进行整体监控。
处理器701可以仅包括CPU,也可以是CPU、GPU(Graphic Processing Unit,图像处理器)、DSP以及通信单元中的控制芯片(例如基带芯片)的组合。在本申请实施方式中,CPU可以是单运算核心,也可以包括多运算核心。
***总线704可以是ISA(Industry Standard Architecture,工业标准体系结构)总线、PCI(Peripheral Component Interconnect,外部设备互连)总线或EISA(Extended Industry Standard Architecture,扩展工业标准体系结构)总线等。该***总线704可以分为地址总线、数据总线、控制总线等。本申请实施例中为了清楚说明,在图10中将各种总线都示意为***总线704。
如图10所示,一个或多个处理器701用于执行以下步骤。
控制所述收发器从签约管理服务器中获取签约数据集,所述签约数据集中包括第三方应用的认证信息。
接收所述收发器收到的所述第三方应用服务器发送的第一请求,所述第一请求中携带所述签约数据集的标识ICCID,所述第一请求用于触发对所述eUICC中的签约数据集执行管理操作。
根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息。
获取所述终端中存储的所述第三方应用的证书信息。
根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作。
如果所述第三方应用有权限对所述签约数据集触发管理操作,则对所述签约数据集执行所述管理操作。
可选地,处理器701还用于:控制所述收发器发送第一管理操作请求至第三方应用服务器,所述第一管理操作请求中包括所述第三方应用请求对所述eUICC中的签约数据集执行的管理操作。
在另一实施例中,所述第三方应用服务器生成对所述eUICC中的签约数据集执行的管理操作。
可选地,处理器701还用于:
接收所述收发器收到的所述第三方应用服务器返回的eUICC的标识EID。
确定所述第三方应用服务器返回的eUICC的标识EID与所述终端的eUICC的标识EID是否相同。
如果确定所述第三方应用服务器返回的eUICC的标识EID与所述终端的eUICC的标识EID相同,则根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息。
可选地,处理器701还用于:
指示所述终端的LPA根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作。
或者,指示所述终端的eUICC根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作。
可选地,处理器701还用于:
指示所述终端的LPA根据所述第一请求发送管理指令获取请求至所述签约管理服务器。
接收所述收发器收到的所述签约管理服务器根据所述管理指令获取请求返回的管理指令。
指示所述终端的LPA根据所述管理指令,对所述eUICC中的签约数据集执行所述第一管理操作请求中的管理操作。
可选地,所述第一请求中包括指示管理操作的管理命令。处理器701还用于指示所述终端的LPA根据所述第一请求,对所述eUICC中的签约数据集执行所述第一请求中指示的管理操作。
图11示出了上述实施例中所涉及的签约管理服务器的一种可能的结构示意图。如图11所示,签约管理服务器包括处理器801、存储器802以及***总线803、收发器804。其中,处理器801用于执行图7-图9所示的方法步骤。签约管理服务器通过通信接口804与其他设备进行交互,如:终端、第三方应用服务器。
如图11所示,一个或多个处理器801用于执行以下步骤。
接收所述收发器收到的第三方应用服务器发送的第二管理操作请求,所述第二管理操作请求中包括对终端中的签约数据执行的管理操作、所述终端中的签约数据集的标识ICCID、所述终端eUICC的标识EID以及所述终端中的第三方应用的认证信息。
生成管理请求响应,并控制所述收发器发送所述管理请求响应至所述第三方应用服务器,所述管理请求响应中包括所述终端中的签约数据集的标识ICCID和所述终端eUICC的标识EID,以供所述第三方应用服务器发送所述终端中的签约数据集的标识ICCID和所述终端eUICC的标识EID至所述终端。
接收所述收发器收到的所述终端发送的管理指令获取请求,所述管理指令获取请求中携带所述终端eUICC的标识EID和所述终端中存储的第三方应用的证书信息。
根据所述管理指令获取请求和所述第二管理操作请求,验证所述终端中的第三方应用是否有权限对终端eUICC中的签约数据集触发管理操作。
如果所述签约管理服务器验证所述终端中的第三方应用有权限对终端eUICC中的签约数据集触发管理操作,则控制所述收发器返回管理指令至所 述终端,以供所述终端根据所述管理指令对终端eUICC中的签约数据集执行管理操作。
可选地,所述一个或多个处理器还用于:
根据所述管理指令获取请求中的所述终端eUICC的标识EID,查找与所述终端eUICC的标识EID相关联的第二管理操作请求;
确定所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息是否相同;
如果所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息相同,则确定所述终端中的第三方应用有权限对终端eUICC中的签约数据集执行管理操作。
可选地,所述管理请求响应中还包括注册事件标识event ID,所述注册事件标识event ID用于标识所述签约管理服务器根据所述第二管理操作请求注册的管理操作事件。
所述管理指令获取请求中还携带所述注册事件标识event ID。
所述一个或多个处理器还用于:
根据所述管理指令获取请求中的注册事件标识event ID,查找与所述注册事件标识event ID相关联的第二管理操作请求;
确定所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息是否相同;
如果所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息相同,则确定所述终端中的第三方应用有权限对终端eUICC中的签约数据集执行管理操作。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将移动设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。上述描述的***,移动设备和单元的具体工作过程和技术效果,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的***,移动设备和方法,可以通过其它的方式实现。例如,以上所描述的移动设备实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个***,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,移动设备或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘(Universal Serial Bus flash disk,通用串行总线闪存盘)、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (20)

  1. 一种签约数据集的管理方法,其特征在于,所述方法由终端执行,所述终端包括集成电路卡eUICC、LPA(Local Profile Assistant,本地文件助手)、以及第三方应用,所述方法包括:
    终端从签约管理服务器中获取签约数据集,所述签约数据集中包括第三方应用的认证信息;
    所述终端接收所述第三方应用服务器发送的第一请求,所述第一请求中携带所述签约数据集的标识ICCID,所述第一请求用于触发对所述eUICC中的签约数据集执行管理操作;
    所述终端根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息;
    所述终端获取所述终端中存储的所述第三方应用的证书信息;
    所述终端根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作;
    如果所述第三方应用有权限对所述签约数据集触发管理操作,则所述终端对所述签约数据集执行所述管理操作。
  2. 根据权利要求1所述的管理方法,其特征在于,所述所述终端接收所述第三方应用服务器发送的第一请求之前,所述方法还包括:
    所述终端的第三方应用发送第一管理操作请求至第三方应用服务器,所述第一管理操作请求中包括所述第三方应用请求对所述eUICC中的签约数据集执行的管理操作。
  3. 根据权利要求1所述的管理方法,其特征在于,所述所述终端接收所述第三方应用服务器发送的第一请求之前,所述方法还包括:
    所述第三方应用服务器生成对所述eUICC中的签约数据集执行的管理操作。
  4. 根据权利要求1至3任一所述的管理方法,其特征在于,所述终端根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息之前,所述方法还包括:
    所述终端接收所述第三方应用服务器返回的eUICC的标识EID;
    所述终端确定所述第三方应用服务器返回的eUICC的标识EID与所述终端的eUICC的标识EID是否相同;
    如果所述终端确定所述第三方应用服务器返回的eUICC的标识EID与所述终端的eUICC的标识EID相同,则所述终端根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息。
  5. 根据权利要求1至4任一所述的管理方法,其特征在于,所述终端根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作,包括:
    所述终端的LPA根据所述签约数据集中的第三方应用的认证信息,和所述 第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作;
    或者,所述终端的eUICC根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作。
  6. 根据权利要求1至5任一所述的管理方法,其特征在于,所述终端对所述签约数据集执行所述管理操作,包括:
    所述终端的LPA根据所述第一请求发送管理指令获取请求至所述签约管理服务器;
    所述终端的LPA接收所述签约管理服务器根据所述管理指令获取请求返回的管理指令;
    所述终端的LPA根据所述管理指令,对所述eUICC中的签约数据集执行所述第一管理操作请求中的管理操作。
  7. 根据权利要求1至5任一所述的管理方法,其特征在于,所述方法还包括:
    所述第一请求中包括指示管理操作的指示;
    所述终端对所述签约数据集执行所述管理操作,包括:
    所述终端的LPA根据所述第一请求,对所述eUICC中的签约数据集执行所述第一请求中指示的管理操作。
  8. 一种签约数据集的管理方法,其特征在于,所述方法由签约管理服务器执行,其特征在于,所述方法包括:
    所述签约管理服务器接收第三方应用服务器发送的第二管理操作请求,所述第二管理操作请求中包括对终端中的签约数据执行的管理操作、所述终端中的签约数据集的标识ICCID、所述终端eUICC的标识EID以及所述终端中的第三方应用的认证信息;
    所述签约管理服务器发送管理请求响应至所述第三方应用服务器,所述管理请求响应中包括所述终端中的签约数据集的标识ICCID和所述终端eUICC的标识EID;
    所述签约管理服务器获取所述终端发送的管理指令获取请求,所述管理指令获取请求中携带所述终端eUICC的标识EID和所述终端中存储的第三方应用的证书信息;
    所述签约管理服务器根据所述管理指令获取请求和所述第二管理操作请求,验证所述终端中的第三方应用是否有权限对终端eUICC中的签约数据集触发管理操作;
    如果所述签约管理服务器验证所述终端中的第三方应用有权限对终端eUICC中的签约数据集触发管理操作,则所述签约管理服务器返回管理指令至所述终端,以供所述终端根据所述管理指令对终端eUICC中的签约数据集执行管理操作。
  9. 根据权利要求8所述的管理方法,其特征在于,所述签约管理服务器根据所述管理指令获取请求和所述第二管理操作请求,验证所述终端中的第三方应用是否有权限对终端eUICC中的签约数据集触发管理操作,包括:
    所述签约管理服务器根据所述管理指令获取请求中的所述终端eUICC的标识EID,查找与所述终端eUICC的标识EID相关联的第二管理操作请求;
    所述签约管理服务器确定所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息是否相同;
    如果所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息相同,则确定所述终端中的第三方应用有权限对终端eUICC中的签约数据集执行管理操作。
  10. 根据权利要求7或8所述的管理方法,其特征在于,所述签约管理服务器发送的管理请求响应中还包括注册事件标识event ID,所述注册事件标识event ID用于标识所述签约管理服务器根据所述第二管理操作请求注册的管理操作事件;
    所述签约管理服务器获取所述终端发送的管理指令获取请求中还携带所述注册事件标识event ID;
    所述签约管理服务器根据所述管理指令获取请求和所述第二管理操作请求,验证所述终端中的第三方应用是否有权限对终端eUICC中的签约数据集触发管理操作,包括:
    所述签约管理服务器根据所述管理指令获取请求中的注册事件标识event ID,查找与所述注册事件标识event ID相关联的第二管理操作请求;
    所述签约管理服务器确定所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息是否相同;
    如果所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息相同,则所述终端中的第三方应用有权限对终端eUICC中的签约数据集执行管理操作。
  11. 一种终端,其特征在于,所述终端包括收发器、用于存储签约数据集的集成电路卡eUICC、存储器、以及用于执行保存在存储器中的一个或多个程序的一个或多个处理器,
    所述一个或多个处理器用于:
    控制所述收发器从签约管理服务器中获取签约数据集,所述签约数据集中包括第三方应用的认证信息;
    接收所述收发器收到的所述第三方应用服务器发送的第一请求,所述第一请求中携带所述签约数据集的标识ICCID,所述第一请求用于触发对所述eUICC中的签约数据集执行管理操作;
    根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息;
    获取所述终端中存储的所述第三方应用的证书信息;
    根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作;
    如果所述第三方应用有权限对所述签约数据集触发管理操作,则对所述签约数据集执行所述管理操作。
  12. 根据权利要求11所述的终端,其特征在于,所述处理器还用于:
    控制所述收发器发送第一管理操作请求至第三方应用服务器,所述第一管理操作请求中包括所述第三方应用请求对所述eUICC中的签约数据集执行的管理操作。
  13. 根据权利要求11所述的终端,其特征在于,
    所述第三方应用服务器生成对所述eUICC中的签约数据集执行的管理操作。
  14. 根据权利要求11至13任一所述的终端,其特征在于,所述处理器还用于:
    接收所述收发器收到的所述第三方应用服务器返回的eUICC的标识EID;
    确定所述第三方应用服务器返回的eUICC的标识EID与所述终端的eUICC的标识EID是否相同;
    如果确定所述第三方应用服务器返回的eUICC的标识EID与所述终端的eUICC的标识EID相同,则根据所述签约数据集的标识ICCID获取所述eUICC中的签约数据集包含的第三方应用的认证信息。
  15. 根据权利要求11至14任一所述的终端,其特征在于,所述处理器还用于:
    指示所述终端的LPA根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作;
    或者,指示所述终端的eUICC根据所述签约数据集中的第三方应用的认证信息,和所述第三方应用的证书信息,确定所述第三方应用是否有权限对所述签约数据集触发管理操作。
  16. 根据权利要求11至15任一所述的终端,其特征在于,所述处理器还用于:
    指示所述终端的LPA根据所述第一请求发送管理指令获取请求至所述签约管理服务器;
    接收所述收发器收到的所述签约管理服务器根据所述管理指令获取请求返回的管理指令;
    指示所述终端的LPA根据所述管理指令,对所述eUICC中的签约数据集执行所述第一管理操作请求中的管理操作。
  17. 根据权利要求11至15任一所述的终端,其特征在于,所述第一请求中包括指示管理操作的管理命令;
    所述处理器还用于:
    指示所述终端的LPA根据所述第一请求,对所述eUICC中的签约数据集 执行所述第一请求中指示的管理操作。
  18. 一种签约管理服务器,其特征在于,所述终端包括收发器、存储器、以及用于执行保存在存储器中的一个或多个程序的一个或多个处理器,
    所述一个或多个处理器用于:
    接收所述收发器收到的第三方应用服务器发送的第二管理操作请求,所述第二管理操作请求中包括对终端中的签约数据执行的管理操作、所述终端中的签约数据集的标识ICCID、所述终端eUICC的标识EID以及所述终端中的第三方应用的认证信息;
    生成管理请求响应,并控制所述收发器发送所述管理请求响应至所述第三方应用服务器,所述管理请求响应中包括所述终端中的签约数据集的标识ICCID和所述终端eUICC的标识EID,以供所述第三方应用服务器发送所述终端中的签约数据集的标识ICCID和所述终端eUICC的标识EID至所述终端;
    接收所述收发器收到的所述终端发送的管理指令获取请求,所述管理指令获取请求中携带所述终端eUICC的标识EID和所述终端中存储的第三方应用的证书信息;
    根据所述管理指令获取请求和所述第二管理操作请求,验证所述终端中的第三方应用是否有权限对终端eUICC中的签约数据集触发管理操作;
    如果所述签约管理服务器验证所述终端中的第三方应用有权限对终端eUICC中的签约数据集触发管理操作,则控制所述收发器返回管理指令至所述终端,以供所述终端根据所述管理指令对终端eUICC中的签约数据集执行管理操作。
  19. 根据权利要求18所述的服务器,其特征在于,所述一个或多个处理器还用于:
    根据所述管理指令获取请求中的所述终端eUICC的标识EID,查找与所述终端eUICC的标识EID相关联的第二管理操作请求;
    确定所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息是否相同;
    如果所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息相同,则确定所述终端中的第三方应用有权限对终端eUICC中的签约数据集执行管理操作。
  20. 根据权利要求17或18所述的服务器,其特征在于,所述管理请求响应中还包括注册事件标识event ID,所述注册事件标识event ID用于标识所述签约管理服务器根据所述第二管理操作请求注册的管理操作事件;
    所述管理指令获取请求中还携带所述注册事件标识event ID;
    所述一个或多个处理器还用于:
    根据所述管理指令获取请求中的注册事件标识event ID,查找与所述注册事件标识event ID相关联的第二管理操作请求;
    确定所述管理指令获取请求中携带的第三方应用的证书信息与所述第二 管理操作请求中的第三方应用的认证信息是否相同;
    如果所述管理指令获取请求中携带的第三方应用的证书信息与所述第二管理操作请求中的第三方应用的认证信息相同,则确定所述终端中的第三方应用有权限对终端eUICC中的签约数据集执行管理操作。
PCT/CN2017/071184 2017-01-13 2017-01-13 一种签约数据集的管理方法、终端及服务器 WO2018129723A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201780032616.9A CN109196891B (zh) 2017-01-13 2017-01-13 一种签约数据集的管理方法、终端及服务器
PCT/CN2017/071184 WO2018129723A1 (zh) 2017-01-13 2017-01-13 一种签约数据集的管理方法、终端及服务器

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/071184 WO2018129723A1 (zh) 2017-01-13 2017-01-13 一种签约数据集的管理方法、终端及服务器

Publications (1)

Publication Number Publication Date
WO2018129723A1 true WO2018129723A1 (zh) 2018-07-19

Family

ID=62839215

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/071184 WO2018129723A1 (zh) 2017-01-13 2017-01-13 一种签约数据集的管理方法、终端及服务器

Country Status (2)

Country Link
CN (1) CN109196891B (zh)
WO (1) WO2018129723A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111342998A (zh) * 2020-02-07 2020-06-26 中国联合网络通信集团有限公司 终端应用管理方法及***、超级应用管理端、存储介质
CN112235784A (zh) * 2020-12-18 2021-01-15 深圳杰睿联科技有限公司 基于vSIM的码号管理方法、装置及设备
WO2022220616A1 (en) * 2021-04-14 2022-10-20 Samsung Electronics Co., Ltd. Method and apparatus for managing events in a wireless communication system

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112954694B (zh) * 2019-11-26 2023-05-05 上海华为技术有限公司 一种签约信息的处理方法、装置及设备
CN112672346B (zh) * 2020-12-18 2024-01-23 中国联合网络通信集团有限公司 下载认证应用的方法、装置和***
CN116528217B (zh) * 2023-07-04 2023-10-10 中国电信股份有限公司 对eUICC进行远程管理的方法及相关设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426887A (zh) * 2013-09-04 2015-03-18 华为技术有限公司 业务权限确定方法和装置
US9204300B2 (en) * 2012-05-24 2015-12-01 Kt Corporation Method for providing SIM profile in eUICC environment and devices therefor
CN105357771A (zh) * 2015-10-16 2016-02-24 中国联合网络通信集团有限公司 连接建立方法和用户终端
CN105723760A (zh) * 2013-11-19 2016-06-29 瑞典爱立信有限公司 简档改变管理

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833066B (zh) * 2011-06-15 2017-02-08 中兴通讯股份有限公司 一种三方认证方法、装置及支持双向认证的智能卡
WO2015027485A1 (zh) * 2013-08-30 2015-03-05 华为终端有限公司 远程变更签约方法及其装置
CN103731268A (zh) * 2013-09-23 2014-04-16 中兴通讯股份有限公司 终端、网络侧设备、终端应用控制方法及***
US10666660B2 (en) * 2015-05-07 2020-05-26 Samsung Electronics Co., Ltd. Method and apparatus for providing profile

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9204300B2 (en) * 2012-05-24 2015-12-01 Kt Corporation Method for providing SIM profile in eUICC environment and devices therefor
CN104426887A (zh) * 2013-09-04 2015-03-18 华为技术有限公司 业务权限确定方法和装置
CN105723760A (zh) * 2013-11-19 2016-06-29 瑞典爱立信有限公司 简档改变管理
CN105357771A (zh) * 2015-10-16 2016-02-24 中国联合网络通信集团有限公司 连接建立方法和用户终端

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111342998A (zh) * 2020-02-07 2020-06-26 中国联合网络通信集团有限公司 终端应用管理方法及***、超级应用管理端、存储介质
CN112235784A (zh) * 2020-12-18 2021-01-15 深圳杰睿联科技有限公司 基于vSIM的码号管理方法、装置及设备
CN112235784B (zh) * 2020-12-18 2021-03-05 深圳杰睿联科技有限公司 基于vSIM的码号管理方法、装置及设备
WO2022220616A1 (en) * 2021-04-14 2022-10-20 Samsung Electronics Co., Ltd. Method and apparatus for managing events in a wireless communication system

Also Published As

Publication number Publication date
CN109196891A (zh) 2019-01-11
CN109196891B (zh) 2020-09-08

Similar Documents

Publication Publication Date Title
WO2018129724A1 (zh) 一种签约数据集的下载方法、设备及服务器
US11617073B2 (en) Method enabling migration of a subscription
WO2018129723A1 (zh) 一种签约数据集的管理方法、终端及服务器
US11963260B2 (en) Methods and entities for ending a subscription
US10091127B2 (en) Enrolling a mobile device with an enterprise mobile device management environment
US10349272B2 (en) Virtual SIM card cloud platform
JP6917474B2 (ja) ネットワーク接続のためのクレデンシャル情報の処理方法、装置、及びアプリケーションapp
EP3333744A1 (en) Authorization code flow for in-browser applications
WO2018094581A1 (zh) 一种签约数据集的安装方法、终端及服务器
WO2015024261A1 (zh) 一种互联网账号管理方法、管理器、服务器和***
CN111434087A (zh) 用于提供通信服务的方法和电子设备
JP2014524174A (ja) マルチネットワークシステムにおける識別情報管理の装置および方法
WO2019134493A1 (zh) 用户身份识别模块数据写入方法、设备、平台及存储介质
WO2019214697A1 (zh) 一种数据下载、管理的方法和终端
WO2018129753A1 (zh) 一种签约信息集的下载方法、装置以及相关设备
US10834555B2 (en) System and method for facilitating carrier-specific configuration of a user device based on pre-stored information for multiple carriers
WO2018196153A1 (zh) 一种开放授权方法、装置和终端
WO2024016124A1 (zh) 一种设备配置方法及装置、通信设备
EP3846403A1 (en) Method, ledger and system for establishing a secure connection from a chip to a network and corresponding network
WO2016112506A1 (zh) 配置嵌入式通用集成电路卡的方法及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17891806

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17891806

Country of ref document: EP

Kind code of ref document: A1