Unlock instant, AI-driven research and patent intelligence for your innovation.

Content Management for Mobile Base Stations with Runtime Environments

A mobile base station, environmental technology, applied in the direction of internal/peripheral computer component protection, electrical components, safety devices, etc., can solve a large number of organizational and financial costs and other issues

Active Publication Date: 2017-10-10
捷德移动安全有限责任公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The operation of an additional secure server infrastructure for the management of the content of the secure runtime environment implies significant organizational and financial costs for mobile radio network providers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Content Management for Mobile Base Stations with Runtime Environments
  • Content Management for Mobile Base Stations with Runtime Environments
  • Content Management for Mobile Base Stations with Runtime Environments

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] figure 1 and figure 2A conventional loading of content to a mobile base station is shown, which includes a mobile terminal ME with a secure runtime environment TEE and a security element SE. The content (data, program code, driver, application, update of the content, etc.) CONT for the secure runtime environment TEE is supplied from the TEE content server TEE CONT to the trusted service manager TEE according to the global platform (Global Platform) The TSM is also loaded by the TEE TSM into the secure runtime environment TEE of the terminal device ME. The content (data, program code, drivers, applications, updates of said content, etc.) CONT for the secure element SE is supplied by the SE content server SE CONT to the secure element trusted service manager SE TSM (Security Security Element Sending Server) and loaded into the Security Element by the SE TSM. Such as figure 2 As shown, the content of the security element SE is conveyed in an ETSI-compliant security e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a mobile base station comprising a mobile terminal equipment (ME) having a secure runtime environment (TEE) and comprising a removable or securely implemented security element (SE). Equipped with a Terminal Device Transmit Server (TEE-TSM), the Secure Element (SE) is designed to transmit terminal messages to said Secure Runtime Environment (TEE), said messages being accessible by the Secure Runtime Environment (TEE) received. This terminal device message is sent to the Security Element (SE) by a Trusted Service Manager (SE-TSM) provided to said Security Element (SE), thereby ensuring a higher efficiency of constant security.

Description

technical field [0001] The invention relates to a mobile base station comprising a mobile terminal device with a secure runtime environment and a removable or robustly implemented security element, a management server and a content management system for a secure execution environment. Background technique [0002] Mobile base stations in the GSM and UMTS systems and similar mobile radio systems comprise a mobile terminal device (for example a mobile phone or a smartphone) and a removable or firmly implemented security element. In this security element there are implemented connection data (eg IMSI (International Mobile Subscriber Identity)), keys and algorithms for operating the connection in the mobile radio network. In GSM or UMTS systems SIM or USIM cards (SIM=Subscriber Identity Module, USIM=Universal SIM) are known as removable security elements. The eUICC (Embedded Universal Integrated Circuit Card) is known as a robustly implemented security element, which is a robus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/74H04L29/06
CPCG06F21/53G06F21/74H04L63/0853H04W12/04H04W12/45H04W12/35H04L63/168H04W12/08
Inventor C.迪策G.高尔卡
Owner 捷德移动安全有限责任公司