Method and system for updating firmware of a security module
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] figure 1 A data structure of a security module such as a UICC or an embedded UICC (eUICC) is illustrated. The security module 16 includes a secure boot loader 20, which may be used within a secure environment such as an eUICC provider, or within a device such as a mobile phone. The secure bootloader 20 enables replacement of the actual firmware 22 of the secure module 16 . However, replacement with the vendor's firmware of the security module 16 is only possible via the trusted subscription manager.
[0058] Firmware 22 of the security module provides basic functionality for applications 28 within the security module 16 . These applications may include program libraries, encryption and hashing algorithms, file and memory management, and applications provided by third parties. Furthermore, the firmware provides functionality for the device integrating the security module. Such functionality may be authentication of the device within the network. The applications are...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


