Unlock instant, AI-driven research and patent intelligence for your innovation.

Security Controls for Profile Policy Rules

A configuration file, policy technology, applied in security devices, computer security devices, electrical components, etc., can solve problems such as fraud

Active Publication Date: 2020-12-08
APPLE INC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is vulnerable to fraud because either party can provide a matching MNO identification number

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Controls for Profile Policy Rules
  • Security Controls for Profile Policy Rules
  • Security Controls for Profile Policy Rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Representative applications of devices, systems and methods according to embodiments described herein are provided in this section. These examples are provided only to add context and facilitate understanding of the described embodiments. It will thus be apparent to those skilled in the art that the described embodiments of the invention may be practiced without some or all of these specific details. In other instances, well known process steps have not been described in detail in order to avoid unnecessarily obscuring the described embodiments of the invention. Other applications are also possible, such that the following examples should not be considered limiting.

[0028] profile policy

[0029] As mentioned above, in some cases the MNO establishes policies for determining the actions to be taken on the profile in response to the occurrence of a particular event. Policy principles are reflected in a set of rules governing the behavior of the SE (eg eUICC) and / or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is entitled "Security Control of Profile Policy Rules". The present invention discloses that a secure element (SE) in a device processes profile policy rule (PPR) update information received in a message. The SE uses a Rule Authorization Table (RAT) when processing the message to control whether the PPR on-off status will be adjusted. PPR information identification configuration file. For example, a Mobile Network Operator (MNO) controlling a profile may specify a policy that instructs a profile to be deleted when disabled. The SE queries the RAT to determine validation rules for the identified policies. In some embodiments, a public key infrastructure technique for authenticating signatures is used to verify that the MNO has signed the message. If the signature verification fails, no change of the PPR on-off state is performed.

Description

technical field [0001] Embodiments described herein relate to security enhancements for profile (electronic subscriber identity module (eSIM)) policy rule settings. Background technique [0002] An eSIM or profile includes software and authentication features associated with a Mobile Network Operator (MNO). The configuration file may reside on a secure element (SE) within the wireless device receiving service from the MNO. The MNO may have policies for actions to be taken on the profile upon eg a profile management event. An example of a profile management event is disabling a profile. The on / off status of policy enforcement should be under the control of the MNO. [0003] Universal Integrated Circuit Card (UICC) and Embedded UICC (eUICC) are SEs for hosting configuration files. A profile is a combination of operator data and applications provisioned on an SE in a device for the purpose of providing a service by an operator, such as an MNO. A Universal Subscriber Identi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08
CPCH04L67/30H04L63/126H04L63/20H04W12/08H04W12/10H04W12/35G06F21/6218H04L63/0807H04L63/102H04W12/06H04W48/02
Inventor 杨翔英
Owner APPLE INC