Abstract:
A secure element (SE) in a device processes profile policy rule (PPR) update information received in a message. The SE uses a rule authorization table (RAT), when processing the message, to control whether a PPR ON/OFF state will be adjusted. The PPR information identifies a profile. For example, a mobile network operator (MNO) in control of the profile may specify a policy indicating that the profile is to be deleted when the profile is disabled. The SE consults the RAT to determine verification rules for the identified policy. In some embodiments, public key infrastructure techniques authenticating a signature are used to verify that the MNO has signed the message. If the signature fails the verification, no change is made to the PPR ON/OFF state.
Abstract:
Representative embodiments set forth techniques for enabling a mobile device to be a member of various trust circles. According to some embodiments, an embedded Universal Integrated Circuit Card (eUICC) included in the mobile device can be configured to store, for each trust circle of which the eUICC is a member, at least one digital certificate associated with a Certificate Authority (CA) that serves as a root of the trust circle. In this manner, the at least one digital certificate for each trust circle enables the eUICC to participate as a member of the trust circle. According to some embodiments, the eUICC can be pre-configured to include digital certificates that establish membership to trust circles that the mobile device may encounter during operation. Moreover, the eUICC can also be updated to modify the different trust circles, which can further enable the functionality of the mobile device to evolve throughout its operation.
Abstract:
The embodiments set forth techniques for enabling mobile devices to trigger an electronic Subscriber Identity Module (eSIM) provisioning process. In some embodiments, a main operating system (OS) of the mobile device communicates a provisioning command to an embedded Universal Integrated Circuit Card (eUICC) included in the mobile device. In turn, the provisioning command causes the eUICC to establish a secure channel with a provisioning server. The provisioning command can include, for example, a network address (e.g., a uniform resource locator (URL), Internet Protocol (IP) address, etc.) associated with the provisioning server, an indication of a security protocol to be used for the secure channel, and/or other information. Using this information, the eUICC establishes the secure channel with the provisioning server, whereupon the provisioning server can provision the eSIM to the eUICC over the secure channel.
Abstract:
A method for establishing a secure communication channel between an off-card entity and an embedded Universal Integrated Circuit Card (eUICC) is provided. The method involves establishing symmetric keys that are ephemeral in scope. Specifically, an off-card entity, and each eUICC in a set of eUICCs managed by the off-card entity, possess long-term Public Key Infrastructure (PKI) information. When a secure communication channel is to be established between the off-card entity and an eUICC, the eUICC and the off-card entity can authenticate one another in accordance with the respectively-possessed PKI information (e.g., verifying public keys). After authentication, the off-card entity and the eUICC establish a shared session-based symmetric key for implementing the secure communication channel. Specifically, the shared session-based symmetric key is generated according to whether perfect or half forward security is desired. Once the shared session-based symmetric key is established, the off-card entity and the eUICC can securely communicate information.
Abstract:
An apparatus configured to engage in an embedded subscriber identity module (eSIM) profile transfer process to receive at a target device, executing a first operating system (OS) that implements a first protocol stack related to eSIM profile transfers, an eSIM profile from a source device executing a second OS that implements a second protocol stack related to eSIM profile transfers to the target device, wherein the first protocol stack and the second protocol stack are different, process, based on signals received from the source device, a token for transferring the eSIM profile, generate, for transmission to an enablement server, a request for the eSIM profile, wherein the request comprises the token and process, based on signals received from the enablement server, the eSIM profile.
Abstract:
This application sets forth techniques for authenticating a mobile device with a cellular wireless network without electronic Subscriber Identity Module (eSIM) credentials by using an Extensible Authentication Protocol Transport Layer Security (EAP-TLS) procedure. The mobile device authenticates with an Authentication Server Function (AUSF) of the cellular wireless network using an embedded Universal Integrated Circuit Card (eUICC) certificate. Processing circuitry of the mobile wireless device external to the eUICC implements the EAP-TLS procedure and authenticates validity of the AUSF. In some embodiments, the eUICC provides key generation and storage for a session key for communication between the mobile device and the cellular wireless network. In some embodiments, a third-party managed Unified Data Management (UDM) broker authenticates the mobile device based on knowledge of the eUICC certificate and provides a session key to the cellular wireless network for subsequent communication with the mobile device, upon successful authentication of the mobile device.
Abstract:
A user equipment (UE) may attempt to access an edge data network. The UE generates a first credential based on a second credential, the second credential generated for a procedure between the UE and a cellular network, generating an identifier corresponding to the first credential, and generates a multi-access edge computing (MEC) authorization parameter. The UE then transmits an application registration request message to a server associated with an edge data network, the application registration request message including an indication of the first credential, the identifier corresponding to the first credential and the first authorization parameter. The UE then receives an authentication accept message or an authentication reject message from the server associated with the edge data network.
Abstract:
Embodiments described herein relate to credential wrapping for secure transfer of electronic SIMs (eSIMs) between wireless devices. Transfer of an eSIM from a source device to a target device includes re-encryption of sensitive eSIM data, e.g., eSIM encryption keys, financial transaction credentials, transit authority credentials, and the like, using new encryption keys that include ephemeral elements applicable to a single, particular transfer session between the source device and the target device. The sensitive eSIM data encrypted with a symmetric key (Ks) is re-wrapped with a new header that includes a version of Ks encrypted with a new key encryption key (KEK) and information to derive KEK by the target device. The re-encrypted sensitive SIM data is formatted with additional eSIM data into a new bound profile package (BPP) to transfer the eSIM from the source device to the target device.
Abstract:
Techniques to protect subscriber identity in messages communicated between a user equipment (UE) and a cellular wireless network entity by using multiple ephemeral asymmetric keys are disclosed. The UE determines multiple ephemeral UE public and secret key pairs, while the cellular wireless network entity provides a network public key to the UE. The network public key may be updated over time. Multiple encryption keys based on the multiple ephemeral UE secret keys and the public network key are derived and used to encrypt a subscription permanent identifier (SUPI) to generate multiple subscription concealed identifiers (SUCIs). Each SUCI is used only once for messages communicated to a cellular wireless network and discarded after use. New SUCI are generated when the network public key is updated.
Abstract:
A device for wireless terminal authentication may include at least one processor configured to receive, from a wireless terminal device, a request for user information, the request comprising a certificate corresponding to the wireless terminal device. The at least one processor may be further configured to verify the certificate based at least in part on a public key stored on the electronic device. The at least one processor may be further configured to, when the certificate is verified, determine whether the certificate indicates that the wireless terminal device is authorized to receive the requested user information. The at least one processor may be further configured to transmit, to the wireless terminal device, the requested user information when the certificate indicates that the wireless terminal device is authorized to receive the requested user information.