Method of managing the connections between a secure element and a server
A security element and server technology, applied in connection management, electrical components, security devices, etc., can solve the problem of the master device not having to modify the access interval, non-compliance, and regardless of the security element's request to modify the value, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0098] figure 1 A collection of master devices 10 is shown, each master device comprising a secure element 20 .
[0099] Of course, each master device 10 may comprise a different number of secure elements 20 .
[0100] The master device 10 is eg a cellular phone, a digital tablet or any other electronic device such as an electronic counter, vehicle, coffee machine or the like.
[0101] This set of master devices may comprise different types of secure elements, that is to say it may comprise eg a subset of cellular phones, a subset of tablets, and other subsets of other electronic devices.
[0102] The secure element 20 is, for example, a universal integrated circuit card UICC, or an embedded universal integrated circuit card eUICC, or an eSE-type secure element.
[0103] The set of secure elements 20 may communicate with a communication network 300 comprising a set of devices of an operator allowing connection and connectivity of its subscribers.
[0104] In particular, the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


