Abstract:
The invention proposes a method for switching between a first and a second logical UlCCs comprised in a same physical UlCC. In order to perform the switch, specific areas are defined to manage the overlapped volatile data and overlapped persistent data, each logical UlCC comprising an area for storing overlapped volatile data and an area for storing overlapped persistent data. The physical UlCC comprises also an OS area comprising in operation, during the 'logical' UlCC execution time, the overlapped volatile data and overlapped persistent data. According to this invention, the method consists in, when a switch order is received to switch from the first logical UlCC to the second logical UlCC: v- backup overlapped volatile data from OS area of the physical UlCC to the area for storing overlapped volatile data of the first logical UlCC vi- backup overlapped persistent data from OS area of the physical UlCC to the area for storing overlapped persistent data of the first logical UlCC vii- restore volatile data from the area for storing overlapped volatile data from the second logical UlCC to the OS area for storing overlapped volatile data of the physical UlCC viii- restore persistent data from the area for storing overlapped persistent data from the second logical UlCC to the OS area for storing overlapped persistent data of the physical UlCC.
Abstract:
The invention proposes several methods related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications. The methods relate for example to downloading subscriptions or to transfer subscriptions between UICCs.
Abstract:
The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications.
Abstract:
The invention is a method of sending a message to an application embedded in a secured electronic token. The token is being intended to receive a first message from a distant machine. The token comprises a proxy agent and an admin agent which is able to manage the first message. The first message comprises a header and a body. The method comprises the steps of : - building a second message from the body of the first message when the first message is received by the admin agent, - forwarding the second message to the proxy agent if the header of the first message contains an element having a preset value - extracting an application identifier from the second message in the proxy agent, - forwarding the second message to the application if the extracted application identifier corresponds to the application.