Abstract:
The invention concerns a method for downloading subscriptions in secure elements (10), each secure element (10) cooperating with a telecommunication terminal, the method consisting in: - Preparing, at the level of a Subscriber Manager Data Preparation unit (12) a plurality of subscriptions ready to be loaded on the secure elements (10) on demand, these subscriptions not being linked to any particular secure element (10) a that time; - Securing the subscriptions within a SCP03 script : - linked to a first unique AID as being the identifier of the Security Domain containing data of all subscriptions he would like to manage; - with a first SCP03 keyset as defined in GlobalPlatform SCP03 amendment D; - At the occurrence of a request for downloading one of these subscriptions in one of the secure elements (10), requesting a Subscriber Manager Secure Routing unit (SM-SR) to create a ISD-P in this secure element (10) by using a second AID different from the first unique AID; - Transmitting the second AID from the Subscriber Manager Secure Routing unit (SM-SR) to the Subscriber Manager Data Preparation unit (12); - Executing a key establishment procedure between the Subscriber Manager Data Preparation unit (12) and the ISD-P, identified by the second AID, and set a first private SCP03 keyset with the ISD-P; - Opening a new SCP03 channel between the Subscriber Manager Data Preparation unit (12) and the ISD-P by using the shared private SP03 keyset and a pseudo-random based on the second AID; - Setting the first unique AID on the ISD-P as an additional AID; - Opening a new SCP03 channel between the Subscriber Manager Data Preparation unit (12) and the ISD-P by using the shared private SCP03 keyset and a pseudo-random based on the first unique AID; - Sending from the Subscriber Manager Data Preparation unit (12) the subscription to the secure element (10), including the setting of the first SCP03 keyset; - Executing the subscription in the secure element (10) in order to install it by deciphering the subscription thanks to the first SCP03 keyset and the first unique AID.
Abstract:
The invention relates to a method (20) for accessing a service. A first device (12) comprises a chip. The chip comprises data storing means. The data storing means stores data relating to at least two subscriptions (145, 147). According to the invention, the data storing means stores a subscription manager, the method comprises the following steps. A subscription manager de-activates an active subscription, said first subscription, and activates a non-active subscription, said second subscription. The subscription manager includes a first variable relating to a previous active subscription and sets the first variable to the first subscription. The subscription manager sends, through the first device operating system, to a second device (18) a first request (26) for accessing a service by using the second subscription, as a current active subscription. The first device operating system sends to the subscription manager a message (28) for informing the subscription manager of a failure relating to an access to the service associated with the second subscription. The subscription manager includes a second variable relating to a next active subscription and sets the second variable to a current value of the first variable. The subscription manager sends to the first device operating system a message (214) for requesting the first device operating system to re-launch an execution of the subscription manager and to read data. The subscription manager de-activates, based upon a current value of the second variable, the second subscription and activates, based upon the current value of the second variable, the first subscription. The subscription manager sends, through the first device operating system, to the second device a second request (220) for accessing a service by using the first subscription, as a current active subscription. The second device sends to the subscription manager a message (222) for informing the subscription manager of a success relating to an access to the service associated with the first subscription. The invention also relates to a corresponding first device (12).
Abstract:
The invention is a method of managing a non volatile memory embedded in a secure device. The secure device receives a series of ciphered data blocks. A first plain data block is computed by deciphering a first ciphered data block. First plain data block is written into the non volatile memory. The method comprises the step of deciphering the next ciphered data block and computing a first integrity value for the first plain data block in parallel, the computation of first integrity value is carried out by using first plain data block which is stored in the non volatile memory.
Abstract:
The invention relates to a UICC comprising a toolkit applet. The UICC comprises a toolkit security component for establishing and using a secure channel for proactive commands and events exchanged by the toolkit applet of the UICC with a mobile equipment. Other communications between the UICC and the mobile equipment take place outside of this secure channel. The invention also relates to a system comprising a UICC of the above type and a mobile equipment, such as a cell phone. The invention also relates to a method to selectively protect a UICC.
Abstract:
The invention relates to a method for accessing a service. The method uses a first device comprises a chip. The chip comprises data storing means. The data storing means stores at least one subscription relating, each, to a mobile radio-communication network operator. According to the invention, the data storing means stores at least two applications relating, each, to a service provider. The data storing means stores a link manager. The method comprises the following steps: At least one second device sends to a link manager at least one association command for requesting an association of at least one subscription with at least one application and/or at least one disassociation command for requesting a disassociation of at least one subscription associated with at least one application. The link manager activates and/or de-activates an association or of at least one subscription with at least one application respectively. The invention also relates to corresponding first and second device.
Abstract:
The invention relates to a method (20) for accessing a service. A first device (12) comprises a chip. The chip comprises data storing means. The data storing means stores a subscription manager. The data storing means stores at least two subscriptions. A first subscription is active. At least one second subscription is non-active. A second device sends to the subscription manager a request (22) for switching to the second subscription, as a subscription to be activated. According to the invention,the subscription manager includes a first variable (23) relating to a next active subscription. The method includes the following steps. The subscription manager sets the first variable to the second subscription. The subscription manager sends to the first device operating system a message (210) for requesting the first device operating system to re-launch an execution of the subscription manager and to read data. The first device operating system sends to the subscription manager a message (212) including a command for re-launching an execution of the subscription manager. The subscription manager de-activates, based upon the first variable value, the first subscription. The subscription manager activates, based upon the first variable value,the second subscription. And the subscription manager sends to the first device operating system data (214) relating to the second subscription, as a current active subscription.
Abstract:
The invention is a method for managing a tamper-proof device (10) comprising a plurality of software containers (20, 30) and an operating system (12). The operating system is able to handle a set of communication protocols with external entities. The operating system accesses a pairing data (14) in which each communication protocol of said set has been associated with a single software container and upon receipt of a message from one of the external entities, the operating system uses the pairing data to route the message to the software container associated with the communication protocol used to convey the message.
Abstract:
The invention is a method for managing a tamper-proof device (10) comprising a processor (40) and an operating system (12) able to handle a set of communication protocols with external entities. The operating system accesses a ruling data (14) specifying for each communication protocol of the set whether Card Lock, Card Terminate and Final Application privileges as defined by GlobalPlatform Card Specification (V2.3) are authorized or forbidden. Upon receipt of a command from one of said external entities, the operating system uses the ruling data to deny or to authorize execution of the command based on the communication protocol used to convey the command.
Abstract:
The invention is a method for managing a patch of a software package in a secure element comprising several subscription profiles. The patch is installed on the secure element and no more than one of said subscription profiles is enabled at a time. The method comprises the steps of: -on receipt of an activation command, recording a description of a link that attaches the patch only to a target subscription profile, -enabling the patch for the software package either as soon as the target subscription profile becomes enabled or as soon as the description is recorded if the target subscription profile is already enabled.
Abstract:
The invention concerns a method for downloading subscriptions in secure elements (10), each secure element (10) cooperating with a telecommunication terminal. According to the invention, the method consists in: a) Ciphering at the level of a manufacturer unit of the secure element, the subscriptions with a manufacturer key and a unique first AID; b) Transferring the ciphered subscriptions to a Subscription Manager Data Preparation unit (SM-DP) along with the manufacturer key and the unique first AID; c) At the occurrence of a request for downloading one of these subscriptions in one secure element, generating a second AID by a Subscription Manager Secure Routing unit (SM-SR) in order to be able to address the content of the subscription later on through the second AID. d) Transmitting one ciphered subscription to this secure element (10), along with the manufacturer key and the unique first AID; e) Deciphering in the secure element (10) the subscription with the manufacturer key and the first unique AID and installing the subscription in the secure element (10).