Unlock instant, AI-driven research and patent intelligence for your innovation.

ESIM card and working method thereof

A technology of safe work and operator server, applied in eSIM card and its work field, can solve the problem of eSIM card system insecurity and achieve the effect of ensuring security

Active Publication Date: 2020-02-28
HENGBAO
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the data security of eSIM, the existing eSIM card management system uses an encryption key to transmit information between the operator and the eSIM card. This information transmission method can only guarantee the security of the operator's data, and the The security of the entire process of eSIM card issuance and operation is not considered, which makes the entire system of eSIM card in an unsafe state

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ESIM card and working method thereof
  • ESIM card and working method thereof
  • ESIM card and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] This application proposes an eSIM card security service system, which can implement security management for the eSIM card. The eSIM card security service system 201, such as figure 2 As shown, it includes the following components:

[0024] A terminal with an embedded eSIM card, multiple operator management servers, issuing terminals and management servers. These components cooperate with each other to realize the security management of the whole process of eSIM card.

[0025] Multiple operator servers deliver profile files to the eSIM card;

[0026] Issue the terminal, provide the eSIM card, pre-set the certificate for the eSIM card, and pre-set the connection information of the management server, such as the address information of the management server, the key information required for the communication between the eSIM card and the management server, etc.;

[0027] The management server provides eSIM card lifecycle management, profile operator management, storage ...

Embodiment 2

[0053] The structure of the eSIM card security service system has been introduced above, combined with Figure 4 , which describes how eSIM cards work securely. Including the following steps:

[0054] Step S410, in response to the initialization command, reserving a specified number of sub-areas in the trusted security component and setting an auxiliary security component;

[0055] The initialization command may be sent by the mobile device, or by an operator server connected to the mobile device, and the initialization command is used to initialize the eSIM card on the mobile device.

[0056] Once the initialization command is received, a specified number of sub-areas are reserved in the trusted secure component of the eSIM card. The designated quantity may be designated in advance.

[0057] Step S420, using the connection information to establish a secure communication connection with the management server;

[0058] The connection information is pre-set in the trusted se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an eSIM card and a working method thereof. The working method comprises the following steps that in response to an initialization command, a specified number of subareas are reserved in a trusted security component, and an auxiliary security component is set; a secure communication connection with the management server is established by using the connection information; theinitialization command is sent to a management server; operator server communication information issued by the management server is received, wherein the operator server communication information comprises operator server communication public information and operator server communication private information; operator server communication public information is stored in the blank sub-regions; operator server communication private information is stored in the auxiliary security component. According to the invention, the security management of the eSIM card can be realized, the operation of theeSIM card under the security framework is ensured, and meanwhile, the security framework is used for managing all operation data in the eSIM card from publishing, transmission, management and deletion, so that the security of the overall operation of the eSIM card is ensured.

Description

technical field [0001] This application relates to the field of computers, in particular to an eSIM card and its working method. Background technique [0002] With the release of 5G networks, remote operators and the corresponding remote operator services have become the application scenarios for future development, and eSIM (Embedded Subscriber Identification Module, embedded subscriber identification module) technology has been continuously developed and improved. , Devices implemented using eSIM technology are gradually favored by users. The data of multiple mobile operators is stored in the eSIM card. When the user uses the eSIM card, the identity module of the eSIM card allows the user to choose the operator according to his needs, and allows the user to switch at any time. Therefore, the user can choose a mobile operator more flexibly, save more terminal usage costs for the user, and bring convenience and security. [0003] The existing eSIM card and the management s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/53H04W8/18H04W12/00H04W12/37
CPCG06F21/53H04W8/183H04W12/37
Inventor 钱京崔可尤洪松梁宇何碧波底明辉
Owner HENGBAO
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More