The invention concerns consumer integrated secure elements like eSIM (embedded UICCs also called eUICCs or integrated UICCs, also called iUICCs) and servers that manage such integrated secure elements for consumer products (tablets, smartphones, PDAs, telematics, especially for patching an OS (operating system). The present invention is applicable to cellular networks (3G (UMTS), 4G networks (LTE) or 5G networks), and particularly applies to automotive systems.
Patent application WO2020/201313 patches an operating system on a secure element transparently through an SM-SR platform.
In this patent application, a SM-DP platform patches an operating system on a secure element embedded in a terminal.
The proposed method comprises the following steps:
A GSMA compliant eUICC or iUICC (secure element or eSIM in the following description) is soldered to devices and deployed on the field. It is managed by a set of well identified OTA platforms (SM-SR/SM-DP). A SM-SR is a Subscription Manager Secure Routing platform and a SM-DP is a Subscription Manager Data Preparation platform. The SM-DP is the entity which operators use to securely encrypt their operator profiles (a profile being a set of file system, applications, and credentials) ready for over the air installation within the secure element through the SM-SR.
The SM-SR securely delivers the encrypted operator profile to the secure element and then, once the profile is installed, remotely manages the secure element thereafter (enable, disable and delete the profile as necessary during the product's lifetime). Maintenance of the operating system and of the content of the secure element requires an OTA (Over the Air) or Internet connectivity. But applying the operating systems maintenance commands requires a specific application installed on the device that would be allowed to send commands to the eSIM.
The GSMA eSIM specifications allow an EUM (secure element manufacturer) to use proprietary commands to patch a secure element OS, but an EUM generally doesn't own one of the identified platforms above (SM-SR/SM-DP) and the identified platforms do not have management of OS patches in their scope.
Using the solution described in WO2020/201313 could be implemented for M2M secure elements, but the different architecture (no SM-SR, no direct access to the ISD-P, no possibility to execute arbitrary APDUs) makes it not applicable to a Consumer secure element.
Therefore, the scope of the invention is to propose a solution for patching an OS of a Consumer secure element without using a SM-SR.
In this respect, the invention proposes a method to update an OS installed in a secure element thanks to an OS update platform exposing the same ES9+ interface as an SM-DP+, the secure element being an eUICC or an iUICC cooperating with a terminal, the secure element and the terminal being comprised in a device, the method comprising:
Preferably, the method comprises informing the original equipment manufacturer of the device comprising the terminal that an OS update script is available.
Advantageously, the ISD-P in the secure element is deleted after the execution of the OS update script.
Advantageously, the secure element forbids the ISD-P to be enabled if the ISD-P is not deleted.
Preferably, the loading of the OS update script includes some steps of dynamic generation of script commands in function of the features of the secure element.
Advantageously, the OS update script contains one or more PE-NonStandard commands permitting the installation and execution of the OS update script. Preferably, the content of the PE-NonStandard is itself encrypted.
The invention also concerns a system comprising an OS update platform exposing the same ES9+ interface as a SM-DP+, the system comprising a secure element cooperating with a terminal, the secure element and the terminal being comprised in a device, the secure element being able to update an OS upon receiving an OS update script of an OS update platform of the secure element manufacturer of the secure element, the terminal comprising a LPA, wherein:
The invention also concerns a secure element cooperating with a terminal, the secure element and the terminal being comprised in a device, the secure element being able to update an OS script upon receiving an OS update script of an OS update platform of the secure element manufacturer of the secure element, the terminal comprising a LPA, wherein:
The secure element can be an eUICC or an iUICC.
Other particularities and advantages of the invention will appear when reading an advantageous embodiment of the invention, which is given as an illustration and not a limitation, and referring to the appended unique FIGURE that represents a preferred method according to the invention.
In
The script platform 104 behaves like a standard SM-DP+ in its interface to the LPA 105 and to the EUM 100.
These different devices having been described, a preferred method of implementing the invention will now be explained.
When the EUM 100 or service provider decides to send an update script (patch) to the target secure element 106, the steps are the followings, as represented:
At step 1, the EUM 100 sends an OS update script to the script platform 104, and optionally signed tokens. At the same time (step 1), it informs the OEM device maker 101 that an OS update script is available.
At the same step 1, the EUM 100, the OEM, or the secure element owner 100, or a Service Provider or MNO having rights to request installation of OS update scripts on the secure element 106, requests the script platform 104 to install the update script on this secure element 106.
This secure element can be an identified secure element or a batch of secure elements to be updated.
At step 2, the EUM, OEM device maker or MNO, or service provider, having access to the end-user, can then (facultative step) inform the user 103 (through an e-mail, SMS, push service, . . . ) that an OS update script is available. The end-user 103 is thus informed that he is invited to perform an operation.
The user 103 can then authorize (or not) the installation of the update script (step 3). This step can be transparent for the user 103, for example if he has previously accepted to get updates of the OS. The end user can perform a gesture (can be any of: Specific menu in the LPA; flash a QR code; click on a link; . . . ) that triggers the connection of the LPA 105 (through a ES9+ connection) to the script platform 104 (seen as a regular SM-DP+).
The EUM, MNO or OEM can also directly trigger the connection of the LPA 105 (through a ES9+ connection) to the script platform 104.
The OS update platform 104 (named “script platform” in the FIGURE) exposes the same ES9+ interface as an SM-DP+ with the LPA 105.
At steps 4 and 5 the LPA connects to the script platform using the ES9+ SM-DP+ protocol and the script platform requests to create an ISD-P (ES3.CreatelSDP) 107.
At step 6, the LPA 105 downloads the OS update script in the ISD-P 107 of the secure element. In the proposed solution, the LPA only relays messages.
The script platform 104 then performs (after an optional agreement at step 7 of the user 103) an ISD-P key establishment with the ISD-P 107 on the secure element 106 through the LPA 105. This generates an SCP03 keyset (or SCP03t) known only by the script platform 104. This keyset can be used to secure SCP03 or SCP03t scripts.
The script platform 104 then generates or formats the OS update script, adds one or more signed tokens in it, and secures it using SCP03 or SCP03t (see below description of script and of signed tokens). The OS update script can also be secured with SCP03/SCP03t in advance.
At step 8, the script platform 104 sends the secured script to the LPA 105 using ES9+ protocol.
At step 9a, the script platform 104 sends the OS update script to the secure element 106 using ES8+ protocol. This script is received by the ISD-P 107 and sent to the OS system 115 that commands to install the patch 110 in the OS patch 114 (step 9b). The OS of the secure element is then updated.
At step 10, after execution of the script storage or its execution, the secure element 106 returns an execution result to the LPA 105 which forwards it to the script platform 104. This is also done by using the ES8+ protocol.
At step 11, after executing the script, if executed immediately, the eSIM can delete automatically the ISD-P 107. This is transparent to the LPA and to the user 103.
Alternatively, the secure element forbids the ISD-P 107 to be enabled if this ISD-P 107 is not deleted.
The OS update script can consist of either:
In all cases, the script may contain at the end a few instructions of Quality Control (QC) that allow to check that the script is correctly executed/stored.
The content of the PE-NonStandard can itself be encrypted.
Preferably, the original equipment manufacturer of the device comprising the terminal is informed that an OS update script is available. This original equipment manufacturer can be the manufacturer of the modem of a vehicle or of a smartphone. It is thus possible to install on servers of vehicle manufacturers or smartphones OS patches. These original equipment manufacturers can then decide if they want to install an OS patch in their equipments.
The invention also concerns a system comprising an OS update platform exposing the same ES9+ interface as a SM-DP+, the system comprising a secure element cooperating with a terminal, the secure element and the terminal being comprised in a device, the secure element being able to update an OS script upon receiving an OS update script of an OS update platform of the secure element manufacturer of the secure element, the terminal comprising a LPA, wherein:
The invention also concerns a secure element cooperating with a terminal, the secure element and the terminal being comprised in a device, the secure element being able to update an OS script upon receiving an OS update script of an OS update platform of the secure element manufacturer of the secure element, the terminal comprising a LPA, wherein:
This is done thanks to an applet installed in the secure element.
Concerning the signed tokens, the script platform 104 may insert signed tokens in the script. This will allow the secure element to verify that the script has been authorized by one or more actors, as described below:
Additional controls could also be used:
In order to simplify the user experience, the script platform 104, or the actor desiring to trigger the patching, can use a mechanism based on the SM-DS, or on a push service, or on RPM (Remote Profile Management), to trigger automatically the download and execution of the script. This would mean to replace steps 2 and 3 by a call to the SM-DS (Subscription Manager Discovery Server).
For transparency purposes, the script platform 104 may mark in the Profile metadata that the profile (indeed, the OS patch script) is a Test Profile. In this case, especially when linked to step 4, the installation and deletion can be done silently, without risking to show the “Profile” as a regular Profile in the LPA.
In the sequence described above, the LPA 105 doesn't need any proprietary feature. As soon as it can interact with an SM-DP+, it can interact transparently with the script platform 104.
The intent is not to hide the patch execution from the user, but to render the deployment of patches possible without specific development on the device side.
Specific development may still be performed in the device (especially in the LPA 105), in order to render the installation totally transparent to the end-user (automatic maintenance of the OS, or OS update performed along with device OS update), or to provide a user-friendlier user interface rendering of the patch process.
It is also possible to download a EUM patch via any SM-DP+, as long as the SM-DP+ accepts to consider patch scripts as profile scripts, and store them until delivery.
The invention applies to the GSMA eSIM specifications RSP for Consumer eUICC: SGP.22.
Number | Date | Country | Kind |
---|---|---|---|
20306620.4 | Dec 2020 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2021/085722 | 12/14/2021 | WO |