-
公开(公告)号:US20230403563A1
公开(公告)日:2023-12-14
申请号:US18317323
申请日:2023-05-15
Applicant: Apple Inc.
Inventor: Hyewon LEE , Xiangying YANG
IPC: H04W12/72 , H04W12/106 , H04L9/32
CPC classification number: H04W12/72 , H04W12/106 , H04L9/3228
Abstract: The described embodiments set forth techniques for securely transferring a cellular wireless service subscription associated with an electronic subscriber identity module (eSIM) profile from a source wireless device to a target wireless device via communication with servers of a mobile network operator (MNO). An MNO provisioning server encrypts an activation code, used for transfer of the cellular wireless service subscription, with a session key generated based on a one-time-use eUICC public key and a one-time-use server private key. The encrypted activation code is protected from malicious third parties, as only the eUICC of the source wireless device can perform the decryption required by generating an identical session key to recover the activation code. The eUICC of the source wireless device deletes the eSIM profile from the eUICC before providing the activation code to the target wireless device to protect against eSIM profile cloning.
-
公开(公告)号:US20230164559A1
公开(公告)日:2023-05-25
申请号:US18150771
申请日:2023-01-05
Applicant: Apple Inc.
Inventor: Xiangying YANG , Huarui LIANG , Lijia ZHANG , Shu GUO , Haijing HU , Fangli XU , Yuqin CHEN , Dawei ZHANG , Li LI
IPC: H04W12/069 , H04W12/72 , H04W12/0433 , H04W12/03 , H04W12/122 , H04W12/041 , H04L9/08 , H04L9/16 , H04L9/32 , H04W12/02
CPC classification number: H04W12/069 , H04W12/72 , H04W12/0433 , H04W12/03 , H04W12/122 , H04W12/041 , H04L9/0822 , H04L9/0825 , H04L9/0844 , H04L9/0891 , H04L9/16 , H04L9/3228 , H04W12/02
Abstract: Techniques to protect a subscriber identity, by encrypting a subscription permanent identifier (SUPI) to form one-time use subscription concealed identifiers (SUCIs) using a set of one-time ephemeral asymmetric keys, generated by a user equipment (UE), and network provided keys are disclosed. Encryption of the SUPI to form the SUCIs can mitigate snooping by rogue network entities, such as fake base stations. The UE is restricted from providing the unencrypted SUPI over an unauthenticated connection to a network entity. In some instances, the UE uses a trusted symmetric fallback encryption key KFB or trusted asymmetric fallback public key PKFB to verify messages from an unauthenticated network entity and/or to encrypt the SUPI to form a fallback SUCIFB for communication of messages with the unauthenticated network entity.
-
公开(公告)号:US20220399993A1
公开(公告)日:2022-12-15
申请号:US17820236
申请日:2022-08-16
Applicant: Apple Inc.
Inventor: Xiangying YANG , Jean-Marc PADOVA
IPC: H04L9/08 , H04L9/30 , H04W12/72 , H04W12/037
Abstract: Embodiments described herein relate to credential wrapping for secure transfer of electronic SIMs (eSIMs) between wireless devices. Transfer of an eSIM from a source device to a target device includes re-encryption of sensitive eSIM data, e.g., eSIM encryption keys, financial transaction credentials, transit authority credentials, and the like, using new encryption keys that include ephemeral elements applicable to a single, particular transfer session between the source device and the target device. The sensitive eSIM data encrypted with a symmetric key (Ks) is re-wrapped with a new header that includes a version of Ks encrypted with a new key encryption key (KEK) and information to derive KEK by the target device. The re-encrypted sensitive SIM data is formatted with additional eSIM data into a new bound profile package (BPP) to transfer the eSIM from the source device to the target device.
-
公开(公告)号:US20210219142A1
公开(公告)日:2021-07-15
申请号:US17147410
申请日:2021-01-12
Applicant: Apple Inc.
Inventor: Jean-Marc PADOVA , Xiangying YANG
IPC: H04W12/72 , H04W8/20 , H04W12/069
Abstract: Embodiments described herein relate to eligibility checking for transfer of one or more electronic subscriber identity modules (eSIMs) between two mobile wireless devices. Eligibility to transfer an eSIM to an eUICC of a target device can depend on whether the eUICC of the target device satisfies certain security requirements for the eSIMs to be transferred. The mobile wireless devices can obtain a transfer eligibility result based on communication with one or more network-based servers that can determine compatibility for eSIM transfer.
-
公开(公告)号:US20210092603A1
公开(公告)日:2021-03-25
申请号:US17054148
申请日:2018-05-11
Applicant: Apple Inc.
Inventor: Xiangying YANG , Huarui LIANG , Lijia ZHANG , Shu GUO , Haijing HU , Fangli XU , Yuqin CHEN , Dawei ZHANG , Li LI
Abstract: Techniques to protect a subscriber identity, by encrypting a subscription permanent identifier (SUPI) to form one-time use subscription concealed identifiers (SUCIs) using a set of one-time ephemeral asymmetric keys, generated by a user equipment (UE), and network provided keys are disclosed. Encryption of the SUPI to form the SUCIs can mitigate snooping by rogue network entities, such as fake base stations. The UE is restricted from providing the unencrypted SUPI over an unauthenticated connection to a network entity. In some instances, the UE uses a trusted symmetric fallback encryption key KFB or trusted asymmetric fallback public key PKFB to verify messages from an unauthenticated network entity and/or to encrypt the SUPI to form a fallback SUCIFB for communication of messages with the unauthenticated network entity.
-
16.
公开(公告)号:US20200021993A1
公开(公告)日:2020-01-16
申请号:US16293521
申请日:2019-03-05
Applicant: Apple Inc.
Inventor: Xiangying YANG , Shu GUO , Lijia ZHANG , Qian SUN , Huarui LIANG , Fangli XU , Yuqin CHEN , Haijing HU , Dawei ZHANG , Hao DUO , Lanpeng CHEN
Abstract: Techniques for identity-based message integrity protection and verification between a user equipment (UE) and a wireless network entity, include use of signatures derived from identity-based keys. To protect against attacks from rogue network entities before activation of a security context with a network entity, the UE verifies integrity of messages by checking a signature using an identity-based public key PKID derived by the UE based on (i) an identity value (ID) of the network entity and (ii) a separate public key PKPKG of a private key generator (PKG) server. The network entity generates signatures for messages using an identity-based private key SKID obtained from the PKG server, which generates the identity-based private key SKID using (i) the ID value of the network entity and (ii) a private key SKPKG that is known only by the PKG server and corresponds to the public key PKPKG.
-
公开(公告)号:US20180295511A1
公开(公告)日:2018-10-11
申请号:US15944738
申请日:2018-04-03
Applicant: Apple Inc.
Inventor: Xiangying YANG , Li LI , Jerrold Von HAUCK
CPC classification number: H04W12/06 , G06F21/32 , H04L9/3231 , H04L9/3271 , H04L2209/80 , H04W4/50 , H04W4/60 , H04W12/08
Abstract: The embodiments set forth techniques for an embedded Universal Integrated Circuit Card (eUICC) to conditionally require, when performing management operations in association with electronic Subscriber Identity Modules (eSIMs), human-based authentication. The eUICC receives a request to perform a management operation in association with an eSIM. In response, the eUICC determines whether a policy being enforced by the eUICC indicates that a human-based authentication is required prior to performing the management operation. Next, the eUICC causes the mobile device to prompt a user of the mobile device to carry out the human-based authentication. The management operation is then performed or ignored in accordance with results of the human-based authentication.
-
公开(公告)号:US20180295500A1
公开(公告)日:2018-10-11
申请号:US15940804
申请日:2018-03-29
Applicant: Apple Inc.
Inventor: Xiangying YANG
CPC classification number: H04W8/183 , H04L63/0853 , H04W4/50 , H04W8/245 , H04W12/06 , H04W12/0802 , H04W60/00
Abstract: Techniques to manage notifications for state changes of eSIMs of a mobile device are described. Processing circuitry of the mobile device provides a command to the eUICC to delete an eSIM. The eUICC changes the state of the eSIM to a locked state and generates a notification of the forthcoming state change before completion of the transition to the deleted state. The processing circuitry sends the notification to a provisioning server and provides to the eUICC a response indicating successful delivery of the notification, and the eUICC subsequently transitions the eSIM to the deleted state. While the eSIM is in the locked state, applications and files of the eSIM can be unusable. In some embodiments, credentials of the eSIM can be reused to re-authenticate with a wireless network in order to deliver the notification to the provisioning server.
-
公开(公告)号:US20180294949A1
公开(公告)日:2018-10-11
申请号:US15940797
申请日:2018-03-29
Applicant: Apple Inc.
Inventor: Xiangying YANG
Abstract: A mobile network operator (MNO) uses a provisioning server to update or install profile content in a profile or electronic subscriber identity module (eSIM). In an exemplary embodiment, the profile is present on a secure element such as an embedded universal integrated circuit card (eUICC) in a wireless device. One or more MNOs use the provisioning server to perform profile content management on profiles in the eUICC. In some embodiments, an MNO has a trust relationship with the provisioning server. In some other embodiments, the MNO does not have a trust relationship with the provisioning server and protects payload targeted for an MNO-associated profile using an over the air (OTA) key.
-
公开(公告)号:US20180278604A1
公开(公告)日:2018-09-27
申请号:US15936331
申请日:2018-03-26
Applicant: Apple Inc.
Inventor: Xiangying YANG , Li LI , Jerrold Von HAUCK
CPC classification number: H04L63/0853 , H04L63/0428 , H04L63/062 , H04L63/065 , H04L63/068 , H04L63/105 , H04W12/04 , H04W12/06 , H05K999/99
Abstract: A method for establishing a secure communication channel between an off-card entity and an embedded Universal Integrated Circuit Card (eUICC) is provided. The method involves establishing symmetric keys that are ephemeral in scope. Specifically, an off-card entity, and each eUICC in a set of eUICCs managed by the off-card entity, possess long-term Public Key Infrastructure (PKI) information. When a secure communication channel is to be established between the off-card entity and an eUICC, the eUICC and the off-card entity can authenticate one another in accordance with the respectively-possessed PKI information (e.g., verifying public keys). After authentication, the off-card entity and the eUICC establish a shared session-based symmetric key for implementing the secure communication channel. Specifically, the shared session-based symmetric key is generated according to whether perfect or half forward security is desired. Once the shared session-based symmetric key is established, the off-card entity and the eUICC can securely communicate information.
-
-
-
-
-
-
-
-
-