Techniques for dynamically supporting different authentication algorithms

An authentication algorithm and dynamic technology, applied in machine-to-machine/machine-type communication services, electrical components, safety devices, etc., can solve problems such as unrealistic and limited flexibility of authentication algorithms

Active Publication Date: 2016-08-31
APPLE INC
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A drawback of this design is that the flexibility of the authentication algorithm is severely limited because the content stored on the SIM card is not designed to be modified after manufacture
Therefore, the adoption of new authentication algorithms by MNOs would require widespread distribution of replacement SIM cards designed to take advantage of the new authentication algorithms, which is largely unrealistic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Techniques for dynamically supporting different authentication algorithms
  • Techniques for dynamically supporting different authentication algorithms
  • Techniques for dynamically supporting different authentication algorithms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Representative applications of apparatus and methods according to the presently described embodiments are provided in this section. These examples are provided merely to add context and to aid in understanding the described embodiments. It will therefore be apparent to those skilled in the art that the presently described embodiments may be practiced without some or all of these specific details. In other instances, well known process steps have not been described in detail in order to avoid unnecessarily obscuring the presently described embodiments. Other applications are possible such that the following examples should not be considered limiting.

[0019] Embodiments described herein illustrate two different techniques for enabling a mobile device to dynamically support different authentication algorithms. The different authentication algorithms described herein relate to the algorithms used by the mobile device for establishing a secure connection with the MNO so ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed herein are different techniques for enabling a mobile device to dynamically support different authentication algorithms. A first technique involves configuring an eUICC included in the mobile device to implement various authentication algorithms that are utilized by MNOs (e.g., MNOs with which the mobile device can interact). Specifically, this technique involves the eUICC storing executable code for each of the various authentication algorithms. According to this technique, the eUICC is configured to manage at least one eSIM, where the eSIM includes (i) an identifier that corresponds to one of the various authentication algorithms implemented by the eUICC, and (ii) authentication parameters that are compatible with the authentication algorithm. A second technique involves configuring the eUICC to interface with an eSIM to extract (i) executable code for an authentication algorithm used by an MNO that corresponds to the eSIM, and (ii) authentication parameters that are compatible with the authentication algorithm.

Description

technical field [0001] The embodiments illustrate techniques for enabling mobile devices to dynamically support different authentication algorithms when authenticating with a Mobile Network Operator (MNO). Background technique [0002] Most mobile devices are configured to operate with a removable universal integrated circuit card (UICC) that enables the mobile device to access services provided by the MNO. Typically, the UICC takes the form of a small removable card, commonly referred to as a Subscriber Identity Module (SIM) card, that is configured to be inserted into a UICC receiving bay included in the mobile device. In the current embodiment, the UICC corresponds to a specific MNO and includes at least a microprocessor and a read-only memory (ROM) that stores (i) an MNO profile, and (ii) is configured to The code of the operating system (OS) that executes on the microprocessor. When the OS is activated, the OS connects to the MNO (eg, via a baseband component included...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W4/60H04W4/70
CPCH04W12/06H04L63/08H04L63/102H04W12/04H04W12/08H04W8/205H04W4/60H04W4/70H04W12/35
Inventor 李莉J·V·豪克A·G·马赛厄斯
Owner APPLE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products