Abstract:
A method that may be performed by a profile management server for managing the profiles of a secure entity, such as an embedded universal integrated circuit card. The method may include sending a message to the secure entity in order to modify the active profile of the entity; initializing and starting a timer; and in the event that the server does not receive a message indicating which profile is active in the secure entity before the expiry of a predetermined duration after the starting of the timer, then starting an audit procedure for determining which profile is actually active in the secure entity.
Abstract:
A method for modifying the profile in a device (D) including a communication module for communicating on a communication network, the device (D) being provided with a microcircuit storing connection data used by the communication module and associated with a profile, the method including the following steps: reception, by the microcircuit and via the communication module, of a request to deactivate (E6) the profile; transmission, by the microcircuit, of a first message (E10) to the device; transmission, by the device and to the microcircuit, of a response (E14) indicative of the existence of a critical situation; following the receipt of the response (E14) by the microcircuit, implementation of a time delay mechanism (E18); upon expiry of the time delay (E18), transmission, by the microcircuit and to the device, of a second message (E22) resulting in the deactivation of the profile. An associated device and microcircuit are also described.
Abstract:
Notification devices and methods for configuring a secure element incorporated into a terminal connected to a network are disclosed. The devices and methods may perform steps implemented by an application of the secure element, such as obtaining at least one item of information that can be used to configure the secure element stored in a memory of the terminal outside the secure element, sending the item of information and an identifier of the secure element to a configuration system, and obtaining configuration data originating from the configuration system, the configuration data being supplied to the secure element depending on the item of information.
Abstract:
A method and system for managing an embedded secure element (50) accessible as a slave of the resident applications (Appl-3) of a host device of the eSE. The eSE includes an issuer security domain (51), ISD, with which cryptographic keys are associated. The method includes, in an application agent embedded in an OS of the host device: sending (420) the ISD a random value; receiving (435) a cryptogram corresponding to the random value encrypted using a key associated with the ISD; sending (440, 450) the random value and the cryptogram to a first extern entity entered in the application agent. The method includes: sending (455, 4555) the random value and the cryptogram from the first entity to a second external entity; verifying (4556) that the second entity possesses keys associated with the ISD from the cryptogram and the random value.