摘要:
A chip card needs to be allocated in a secured manner to a network operator via a personalization center in order to determine a final authentication key which is attributed to a subscriber of the operator without its being transmitted via a network. The following is loaded into a card by a module: an algorithm and an allocation key; an algorithm for determination of the authentication key and at least one intermediate authentication key. A module transmits an allocation message which includes a final identity number, a random number and an allocation signature from the center to the card. The card authenticates the message by means of the allocation algorithm as a function of the allocation key and the allocation signature, and determines the final authentication key as a function of the intermediate key and the random number.
摘要:
A chip card needs to be allocated in a secured manner to a network operator via a personalization center in order to determine a final authentication key which is attributed to a subscriber of the operator without its being transmitted via a network. The following is loaded into a card by a module: an algorithm and an allocation key; an algorithm for determination of the authentication key and at least one intermediate authentication key. A module transmits an allocation message which includes a final identity number, a random number and an allocation signature from the center to the card. The card authenticates the message by means of the allocation algorithm as a function of the allocation key and the allocation signature, and determines the final authentication key as a function of the intermediate key and the random number.
摘要:
System and method for allowing a mobile telecom device to use multiple profiles. The system and method includes operating a security function to perform a cryptographic operation on a profile using a cryptography key of the security function thereby producing a cryptographically protected profile, storing the cryptographically protected profile, and activating the cryptographically protected profile by operating the security function to verify that the cryptographically protected profile has been cryptographically protected using the cryptography key of the security function, and upon verifying that the cryptographically protected profile has been protected using the cryptography key of the security function, activating the cryptographically protected profile.
摘要:
The present invention provides a method for unlocking a secure device (1), said secure device (10) being adapted to be associated with a first device (11) and being adapted to be locked when it is associated to a second device (12) different from the first device (11), said first device (11) being the paired device, the method comprising a step of unlocking the secure device (1) over-the-air when the secure device (1) is connected to the second device (12).
摘要:
The invention provides a method for activating the subscription of an UICC, said UICC comprising an activation application, said method comprising the step of activating the subscription of the holder of the UICC by sending a message to an activation server, said message being sent by the activation application to the activation server by using an IP based communication.
摘要:
A device external to a terminal transmits a specific application identifier and an encrypted first key and number to a first chip card in service in the terminal. In the first card, if the decrypted first number satisfies a first condition, the specific application is called up, application data are read, the data are encrypted using the decrypted first key to transmit them to the external device, and the application is made inoperable. Following replacement of the first card by a second card, the external device transmits the identifier and an encrypted second key and number to the second card. In the latter, if the decrypted second number satisfies a second condition, the encrypted data are transmitted to the second card so that the latter calls up the application, decrypts the encrypted data using the decrypted second key and installs said data.
摘要:
The invention relates to a method for loading a list of preferred networks into a secure element contained in a mobile terminal. The loading is accomplished when the secure element detects that it is in a roaming condition within a telecommunication network. The method consists of: i) asking (12) for an IP channel to be opened between the telecommunication network and the secure element, the request for opening originating with the secure element; ii) requesting (13) the loading of the list of preferred networks; iii) uploading (14) via the IP channel the list of preferred networks into the secure element; and iv) transmitting (16) a request by the secure element to the mobile terminal to use one of said preferred networks in said list.
摘要:
The invention provides a method for activating the subscription of an UICC, said UICC comprising an activation application, said method comprising the step of activating the subscription of the holder of the UICC by sending a message to an activation server, said message being sent by the activation application to the activation server by using an IP based communication.
摘要:
A method for transmitting a SIM application of a first terminal to a second terminal, the SIM application being stored in a secure element included in the first terminal, with access to the SIM application being locked by a PIN code. The method includes exporting the SIM application from the first terminal to a distant site, by including the PIN code as well as a remote loading code. A user of the second terminal is asked to enter the remote loading code in the second terminal. In the event the remote loading code entered by the user matches the remote loading code that has been exported, the installation of the SIM application in a secure element of the second terminal is authorized. Otherwise, the SIM application is not installed in the secure element of the second terminal.
摘要:
A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the signed export request by comparing the signature and the identity of the UICC. The server sends a signed export certificate to the UICC via the terminal. An export package containing the data is prepared, signed and encrypted by the UICC, and sent to the terminal. The terminal transmits the export package to the server. The server signs an acknowledgment message and transmits it to the UICC via the terminal. In the UICC, the data that have been exported is destroyed, and a signed acknowledge message is sent to the server via the terminal. The server makes the data available for a further transfer to a new terminal or UICC.