Abstract:
Method of managing profiles in a secure element, the secure element including a first profile associated with a first communication network and a second profile associated with a second communication network, the first profile being active. The method includes steps of deactivation of the first profile and activation of the second profile. The steps of deactivation and of activation are implemented following the detection of a failure during a local verification pertaining to the first profile for the use of this the first profile. A local verification may be a verification in the secure element of the authorization of access of a user to the first profile, for example three failures of PIN or PUK code or of biometric authentication data.
Abstract:
An embodiment of an emergency call system comprises a device for triggering an emergency call and a communications device having a secure element. In various implementations, the secure element includes at least two profiles, one of which is an emergency profile; means suitable for receiving, over a local communications channel, an event issued by the device for triggering an emergency call; means for activating an emergency profile, enabling emergency calls to be made in a communications network, if said profile is not already active; and means for calling an emergency number in said network in order to make said emergency call.
Abstract:
The invention relates to methods and devices for updating a cache memory in a telecommunications terminal suitable for co-operating with a subscriber identity module. Some implementations of the subscriber identity module may perform operations that include detecting a modification of an elementary file and generating update data associated with the modified elementary file. During a starting stage, the operations may further include receiving a start message from the terminal; receiving a request serving to identity an elementary file for processing; sending the update data associated with the elementary file for processing; and reading the elementary file in compliance with a read command from the terminal. The invention also provides corresponding methods and devices for the terminal, and the corresponding module and terminal.
Abstract:
Disclosed is a method for creating a profile in a target security domain of a secure element. In various implementations, the method includes a reception operation by said target security domain, according to a secure protocol not interpretable by this security domain, of data comprising an installation script of said profile encrypted with a key of the target security domain; a transfer operation of data to a privileged security domain capable of interpreting the protocol; a decryption operation of said protocol by said privileged security domain to obtain said encrypted script; an operation for sending the encrypted script to said target security domain; and a decryption operation of said encrypted script with said key and execution of said script by the target security domain to install said profile. Other embodiments include systems and devices that implement similar functionality.
Abstract:
A method for modifying the profile in a device (D) including a communication module for communicating on a communication network, the device (D) being provided with a microcircuit storing connection data used by the communication module and associated with a profile, the method including the following steps: reception, by the microcircuit and via the communication module, of a request to deactivate (E6) the profile; transmission, by the microcircuit, of a first message (E10) to the device; transmission, by the device and to the microcircuit, of a response (E14) indicative of the existence of a critical situation; following the receipt of the response (E14) by the microcircuit, implementation of a time delay mechanism (E18); upon expiry of the time delay (E18), transmission, by the microcircuit and to the device, of a second message (E22) resulting in the deactivation of the profile. An associated device and microcircuit are also described.
Abstract:
Devices and methods for managing a mobile communications profile stored in a nonvolatile memory of a secure element and performed by the secure element are disclosed. The devices and methods may include operations such as reading the state of a flag stored in the nonvolatile memory of the secure element and indicating whether the profile may be deleted; determining the active or inactive state of the profile; and if the flag indicates that the profile may be deleted and if it is determined that the profile is inactive, then deleting the profile.