Unlock instant, AI-driven research and patent intelligence for your innovation.

Data privacy method and device based on embedded universal integrated circuit card

A general-purpose integrated circuit and data security technology, applied in the field of communication, can solve problems such as signing information and user data without providing a security protection mechanism

Active Publication Date: 2014-04-16
HUAWEI DEVICE CO LTD
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no security protection mechanism for the subscription information and user data on the eUICC

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data privacy method and device based on embedded universal integrated circuit card
  • Data privacy method and device based on embedded universal integrated circuit card
  • Data privacy method and device based on embedded universal integrated circuit card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0115] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0116] figure 1 A schematic diagram of a system architecture for an eUICC provided by an embodiment of the present invention. Such as figure 1 As shown, the system architecture includes: MNO equipment, subscription management unit (Subscription Manager, referred to as SM) and inter-machine communication service provider (Machine to Machine-Servi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data privacy method and device based on an embedded universal integrated circuit card. The method includes the steps that it is determined that a terminal device is not held by a legal user; an eUICC on the terminal device is set to be in a down state; the eUICC is instructed to perform privacy processing on data on the eUICC through the terminal device. By the adoption of the technical scheme, privacy can be performed on the data embedded into the eUICC of the terminal device after the terminal device is lost.

Description

technical field [0001] The present invention relates to communication technology, in particular to a data security method and device based on an embedded Universal Integrated Circuit Card (eUICC for short). Background technique [0002] The traditional Universal Integrated Circuit Card (UICC) is customized by the mobile operator, and contains the relevant information of the mobile operator when it leaves the factory. Once it leaves the factory, the operator information cannot be changed. The eUICC is a UICC embedded in a terminal device, allowing its remote management, such as downloading / deleting mobile operator data, switching mobile operator networks, etc. [0003] For eUICC, after the terminal device is lost, the user can contact the mobile network operator (Mobile Network Operator, referred to as MNO) customer service or go to the business hall to report the loss. After receiving the loss reporting service request, the mobile operator only needs to update the subscript...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W68/00H04W4/70
CPCH04W88/02H04L63/107H04L63/1433H04W4/70H04W12/63H04W12/082H04W12/126H04W12/30G06F21/62G06F21/71G06F21/88H04W12/12
Inventor 王涛薛国栋金辉衣强
Owner HUAWEI DEVICE CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More