摘要:
Methods and apparatus for managing processing of electronic Subscriber Identity Modules (eSIM) data at a mobile device are disclosed. An eSIM management entity of an embedded Universal Integrated Circuit Card (eUICC) in the mobile device obtains an encrypted eSIM package, decrypts the eSIM package to obtain eSIM contents formatted generically and not specifically tailored to requirements of the eUICC. In some embodiments, the eSIM contents are formatted based on an abstract syntax notation (ASN) distinguished encoding rules (DER) format. The eSIM management entity parses the formatted eSIM contents to retrieve individual eSIM components and installs each eSIM component for the eSIM in an eSIM security domain on the eUICC. In some embodiments, the eSIM management entity acts as a local, personalization server to provide local Trusted Service Manager (TSM) server functionality for eSIM installation that transforms “generically formatted” eSIM contents into eSIM components that match specific requirements of the eUICC.
摘要:
A private network service providing method and system for breaking dependency on a terminal and providing a private network service is provided. The private network service system according to the present exemplary embodiments include: a service linkage server for, when access to a private network is requested by a mobile communication terminal connected to a public network or access of the mobile communication terminal to the private network is requested by a third server, identifying identification information of the mobile communication terminal and requesting an access point name-operator identifier (APN-OI) change to a home subscriber server; the home subscriber server for authenticating whether the mobile communication terminal is subscribed to a private network service when the APN-OI change is requested by the service linkage server, and identifying an access point name (APN) included in a subscriber profile of the mobile communication terminal and changing a public APN-OI recorded in the APN to a private APN-OI when the authenticating is successful; and a mobility management entity for receiving the subscriber profile of the mobile communication terminal from the home subscriber server when there is an attempt of access from the mobile communication terminal, and inducing the mobile communication terminal to connect to a public gateway or a private gateway, using an IP address of the public gateway or IP address of the private gateway corresponding to the APN included in the subscriber profile.
摘要:
In accordance with a first aspect of the present disclosure, an NFC device is provided, comprising an application processor and a plurality of execution environments, wherein the application processor is configured to generate a mapping between application identifiers and said execution environments, and wherein, in said mapping, the application identifiers are associated with specific ones of said execution environments. In accordance with a second aspect of the present disclosure, a corresponding method of initializing an NFC device is conceived. In accordance with a third aspect of the present disclosure, a corresponding computer program is provided.
摘要:
A method for performing user experience (UX) functions on an air-gapped endpoint is provided. The method includes monitoring a plurality of security zones, instantiated on the air-gapped endpoint, to detect at least one UX command executed in a first security zone; determining if the detected UX command triggers a UX function effecting a second security zone; determining if the UX function to be triggered maintains compliance with a security policy of the first and second security zones; and executing the UX function across the first and second security zones.
摘要:
A method for operating a security element, preferably in the form of a chip card, having a processor, and a memory. stores an operating system comprising an operating-system kernel and at least one additional operating-system module for supplying optional operating-system functionalities, and at least one access permission associated with the operating-system module and determining whether the operating-system module can be accessed during operation of the security element. The method comprises the step of changing the access permission for the operating-system module for supplying optional operating-system functionalities in reaction to the receiving of a message from a server. The message from the server may be an OTA message sent from the server to the security element via a mobile radio network.
摘要:
Techniques for obtaining compartmentalized authenticated access to a feature on an electronic mobile device comprising a camera are presented. The techniques may include obtaining data representing a printable authentication pattern, wherein the printable authentication pattern encodes access information, storing in electronic persistent memory the access information in association with data representing the feature, receiving, at the mobile telephone, a user request to access the feature, capturing, using a camera of the mobile device, an image of an input pattern printed on to a substrate, decoding the input pattern to obtain captured information, determining, by retrieving the access information, that the captured information matches the access information, and providing access to the feature on the mobile device as a consequence of at least the determining.
摘要:
Some embodiments are directed to a method for peering between first and second modules each installed in a different device, the device of the first module includes a human-machine interface, and the two devices can be linked by an unsecure communication channel. The method can include: receiving via the human-machine interface a command setting the device of the first module in operating mode so the first module takes control of a part of the communication means of the first device in order to set them in a secure operating mode and takes control of the human-machine interface; establishing a temporarily secure communication between first and second modules; displaying on the human-machine interface a status signaling the set-up of the secure communication; receiving via the human-machine interface a peering acceptance command; and exchanging of keys/secrets between the modules through the temporarily secure communication channel to perform the peering.
摘要:
Examples of the present disclosure provide an electronic device and method for performing a geo-fencing based service. Access information is received from a beacon message and a communication network is used to access a geographical network.
摘要:
A method of enabling the federation of unrelated applications is described herein. The method can include the step of installing a candidate application for inclusion in a secure workspace. A first previously-installed application may have a certificate signed by a first entity, and a second previously-installed application may have a certificate signed by a second entity such that the first and second previously-installed applications have different certificates. The method can also include the steps of generating a federation value for the candidate application for inclusion in the secure workspace and determining the result of a federation check of the candidate application based on the generated federation value. If the federation check for the candidate application is satisfied, the candidate application may be permitted to be part of the secure workspace.
摘要:
Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.