Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of managing the connections between a secure element and a server

A security element and server technology, applied in connection management, electrical components, security devices, etc., can solve the problem of the master device not having to modify the access interval, non-compliance, and regardless of the security element's request to modify the value, etc.

Active Publication Date: 2018-09-04
アイデミアフランス
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] However, some masters do not have the functionality to allow themselves to modify the access interval, or do not consider requests from the secure element to modify this value, or do not respect the value required by the secure element and do not impose it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of managing the connections between a secure element and a server
  • Method of managing the connections between a secure element and a server
  • Method of managing the connections between a secure element and a server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] figure 1 A collection of master devices 10 is shown, each master device comprising a secure element 20 .

[0099] Of course, each master device 10 may comprise a different number of secure elements 20 .

[0100] The master device 10 is eg a cellular phone, a digital tablet or any other electronic device such as an electronic counter, vehicle, coffee machine or the like.

[0101] This set of master devices may comprise different types of secure elements, that is to say it may comprise eg a subset of cellular phones, a subset of tablets, and other subsets of other electronic devices.

[0102] The secure element 20 is, for example, a universal integrated circuit card UICC, or an embedded universal integrated circuit card eUICC, or an eSE-type secure element.

[0103] The set of secure elements 20 may communicate with a communication network 300 comprising a set of devices of an operator allowing connection and connectivity of its subscribers.

[0104] In particular, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for managing the connections between a secure element and a server (30) of a communication network, said secure element (20) being incorporated in a host device (10). The method comprises thefollowing steps: - determination (E300) of a theoretical time period between two consecutive instants of connection, - determination (E400) of a real time period between two consecutive instants of connection between said secure element and said server, - comparison (E500) of said determined theoretical time period with the determined real time period, and if the determined theoretical time period is different from the determined real time period: - determination of a new theoretical time period.

Description

technical field [0001] The invention relates to a method of managing a connection between a server and a secure element of a communication network. [0002] The invention relates in particular to a method of managing connections known as over the air connections or OTA connections. Background technique [0003] A secure element, such as a chip card, is included in the host device. The master device is for example a cellular phone, a digital tablet, or any other electronic device such as an electronic counter, vehicle, coffee machine or the like. [0004] The secure element may for example be a card of the UICC (Universal Integrated Circuit Card) type described in the ETSI TS 102 221 standard, combined with a traditional SIM (or USIM, Universal Subscriber Identity Module) card type chip card and also a security token Or a card of eUICC (Embedded Universal Integrated Circuit Card) type such as described in ETSI TS103 383 . [0005] The secure element may also be an embedded...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/00H04L29/06H04W4/50H04W4/60H04W76/10
CPCH04L63/0853H04W4/60H04W76/10H04W12/06H04W4/50H04W12/37H04L67/62H04L43/103H04L69/28H04W12/08
Inventor J-F·德布朗D·赛加楼E·爱尔翟
Owner アイデミアフランス