Supercharge Your Innovation With Domain-Expert AI Agents!

Method for transferring subscription information between terminals

A technology for subscribing information and terminals, which is applied in subscription services, wireless communication, security communication devices, etc., and can solve the problem that Sim applications cannot be manually extracted.

Active Publication Date: 2017-11-07
THALES DIS FRANCE SA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this is not possible if this new terminal does not have a slot for inserting a SIM card (i.e. has an embedded UICC) or if the format of the UICC is not suitable for this new terminal
If the old terminal contains an embedded secure element, the same problem occurs: the Sim application cannot be extracted manually

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following description is a use case in which subscription information and user data are transmitted from a first terminal to a second terminal through NFC.

[0029] If for example a user has terminal X (first terminal) and wants to upgrade to terminal Y (second terminal), the flow would be as follows:

[0030] - Device X touches against Device Y. A menu appears on device X which presents the user with a set of options, one of which is "Transfer Subscription".

[0031] - Device Y receives a popup on the UI confirming whether a new subscription should be installed. This must be approved. Device Y returns its IMEI to Device X via NFC.

[0032] - Device X sends its IMSI over the wireless network to the secure repository along with device Y's IMEI. The secure vault stores device Y's subscription installation key, which is encrypted and returned to device X (if authorized).

[0033] - Device X then wraps, encrypts and signs the IMSI, K, Opc plus user data with device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for securely transferring subscription information and user data from a first terminal to a second terminal, the terminals respectively containing a first and a second UICC. According to the invention, the method comprises: i-transmitting the identity of the second terminal to the first terminal; ii-transmitting from the first terminal the identity of the second terminal and the identity of the first UICC to the security repository; iii-transmitting from the security The library transmits the subscription installation public key of the second terminal to the first terminal; iv-in the first UICC, uses the subscription installation public key of the second terminal to package and encrypt the subscription information and user data; v-transmits the package to the second terminal the second UICC; vi‑install the package on the second UICC.

Description

technical field [0001] The invention relates to a method for securely transferring subscription information and user data from a first terminal to a second terminal. Background technique [0002] In the field of telecommunications, user's subscription information and user data are stored in a secure element called UICC (Universal Integrated Circuit Card). The UICC is embedded in the Sim application, and is fixedly or non-fixedly installed in a terminal like, for example, a mobile phone. In some cases, a terminal consists of a machine that communicates with other machines for M2M (machine-to-machine) applications. [0003] The UICC may be in the format of a smart card, or may be in any other format, such as for example but not limited to a packaged chip as described in PCT / SE2008 / 050380, or any other format. For example, UICC can be used for mobile terminals in GSM and UMTS networks. UICC ensures the network authentication, integrity and security of various personal data. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/20G06F21/00H04L29/06G06F8/61G06F9/44H04W4/50H04W4/60H04W4/70
CPCH04B1/3816H04L63/083H04L67/34H04W8/205H04W12/04H04W12/06H04W84/04H04W4/50H04W4/60H04W4/70H04W12/35H04W12/77G06F8/61G06F9/44G06F21/6218H04L9/0825H04L63/0428H04L63/08H04L63/123H04W8/18H04W8/183H04W8/22H04W8/245H04W12/08H04W12/10
Inventor P·布拉德利
Owner THALES DIS FRANCE SA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More