Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for updating firmware of a security module

Active Publication Date: 2017-09-19
捷德移动安全有限责任公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Currently, a complete swap of the firmware of the security modules is not foreseen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for updating firmware of a security module
  • Method and system for updating firmware of a security module
  • Method and system for updating firmware of a security module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] figure 1 A data structure of a security module such as a UICC or an embedded UICC (eUICC) is illustrated. The security module 16 includes a secure boot loader 20, which may be used within a secure environment such as an eUICC provider, or within a device such as a mobile phone. The secure bootloader 20 enables replacement of the actual firmware 22 of the secure module 16 . However, replacement with the vendor's firmware of the security module 16 is only possible via the trusted subscription manager.

[0058] Firmware 22 of the security module provides basic functionality for applications 28 within the security module 16 . These applications may include program libraries, encryption and hashing algorithms, file and memory management, and applications provided by third parties. Furthermore, the firmware provides functionality for the device integrating the security module. Such functionality may be authentication of the device within the network. The applications are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention describes a method for updating the firmware of a security module (16) in a device (E) comprising a device (14) and a security module (16) arranged as Data is enabled to be exchanged between the security module (16) and the device (14). Said method of the invention comprises the steps of: receiving by said security module (16) a first message, wherein said first message indicates the availability of a firmware update provided by a provider (P), and wherein said first message contains A transaction number unique to said security module (16). transmitting a second message from said device (E) to said provider (P), by means of which second message requests said firmware update from said provider (P), wherein said second message contains a unique transaction number to enable the provider (P) to identify the security module (16). Furthermore, said firmware update is transmitted from said provider (P) to said device (E) based on the evaluation of said unique transaction number. Thereafter, the firmware update is stored in a memory of the device (14). Finally, the firmware is decompressed by the security module (16) or the bootloader of the device (E).

Description

technical field [0001] The present invention relates generally to mobile communications, and in particular to a method and system for updating the firmware of a security module. Background technique [0002] A security module includes system resources, in particular data interfaces for data input and output data, one or more central processing units CPU, volatile memory as RAM, and non-volatile storage in particular ROM, EEPROM or FLASH unit. Applications and files on the security module require access to those system resources during their execution. These system resources are managed by firmware. Firmware is thus the interface between the security module's applications and the security module's system resources. [0003] If errors are found in the firmware, or certain functionality (eg, functions, methods, or program code libraries) in the firmware is determined not to be included, those portions of the firmware are loaded after release and installed in the field. This...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F9/445
CPCG06F8/654G06F21/572H04W12/35G06F8/65G06F21/64
Inventor D.韦斯K.维德M.迈耶M.塔格谢勒J.鲁道夫U.迪茨J.尼霍姆T.拉森J.赫尔特
Owner 捷德移动安全有限责任公司