In non-removable universal integrated circuit card (UICC) ecosystems, a handset manufacturer should have ability to replace and repair end user devices. When the devices are replaced or repaired, the network subscription information may also need to be transferred from an older device to a newer device. Without a physical SIM-card that can be taken out and inserted into another device, the network subscription is transferred by other means, for example via direct connection between the devices.
The embodiments described below are not limited to implementations which solve any or all of the disadvantages of known devices and covers.
The following presents a simplified summary of the disclosure in order to provide a basic understanding to the reader. This summary is not an extensive overview of the disclosure and it does not identify key/critical elements or delineate the scope of the specification. Its sole purpose is to present a selection of concepts disclosed herein in a simplified form as a prelude to the more detailed description that is presented later.
An electronic device and methods are presented. The electronic device has a network connection provided via non-removable secure element with a subscription identification code such as IMSI. The device comprises two unique identification codes linked to each other, wherein the second code is readable for validation by an external reader when the device is switched off. One described method is for transferring a network subscription from a first device to a second, wherein the first device also has a non-removable secure element and is switched off. Another method disclosed is for identifying and potentially validating an electronic device which is e.g. in a power off mode.
Many of the attendant features will be more readily appreciated as the same becomes better understood by reference to the following detailed description considered in connection with the accompanying drawings.
The present description will be better understood from the following detailed description read in light of the accompanying drawings, wherein:
Like reference numerals are used to designate like parts in the accompanying drawings.
The detailed description provided below in connection with the appended drawings is intended as a description of the present examples and is not intended to represent the only forms in which the present example may be constructed or utilized. However, the same or equivalent functions and sequences may be accomplished by different examples.
The subscription identification code for identifying a subscriber can be, for example, the international mobile subscriber identity (IMSI) code. This code can be issued by a mobile network operator (MNO) and can normally be validated when the device 10 is connected to the subscription network. In the example embodiment shown on
The second device identification code 13 is readable with external reader equipment 14 when the device 10 is in a disconnected from the network. This includes any situation in which the device 10 is disconnected. For example, device 10 may be in a power off mode or broken. The external reader 14 may be electronic or optical equipment. For example, the reader 14 may be a quick response (QR) code reader or a near field communication (NFC) reader, in which case the second device identification code 13 may be implemented as a QR code or an NFC chip. This allows for simple and reliable reading of the second device identification code 13 without using the network connection or the power of the device 10, i.e. including the situations when the device 10 is disconnected, switched off or does not work. The external reader equipment 14 may also be authorized by the authorizing entity. The schematic connection 15 between the reader equipment 14 and the second code 13 shows that second code 13 is readable regardless of the state of the device 10. The first device identification code 12 may also be readable by the reader equipment 14.
The electronic device 10 described above may be used in a system which includes the device 10, an authorized service point comprising the reader equipment 14, the authorizing entity such as the OEM connected with the authorized service point, and a mobile network operator. In this system, even if the device 10 is disconnected from the network, for example in a power off mode, the identification codes 12, 13 of the device can still be read and securely validated, and the subscription may be changed directly through the network operator, ensuring that it is no longer running on an “old” device 10 if the subscription is transferred to a “new” device. All user data may also be erased or blocked immediately when the device is powered back on.
The method shown on
The method may also comprise notifying the authorizing entity of the subscription transfer and data transfer if it was performed.
According to an embodiment, a method of blocking a network subscription in an electronic device when the electronic device is in disconnected from the network. The device may be like the device 10 described with reference to
The method starts similarly to the method described with reference to
The method may also comprise blocking access to user data on the electronic device when the electronic device returns to a power on mode, and notifying the authorizing entity of the blocked network subscription and access to user data and personal communication services such as email or social media applications.
This method may be used, for example, to block the subscription and personal data temporarily or permanently, e.g. if a device is broken and needs to be repaired at a service point.
An entity is authorized to request validation at 304, wherein the entity may be, for example, a trusted service point with suitable reader equipment. Validation requests that are sent by the authorized entity can include information identifying the electronic device as parameters. For example, the request may include the unique first and second device identification codes. When a request for validation of the second device identification code is received from the authorized entity at 305, the validation is performed and results sent at 306. In an embodiment, the validation may comprise: calculating a third device identification code using the same cryptographic function on the received one or more parameters, for example on the first device identification code; and comparing the resulting calculated third device identification code with the received second device identification code. Alternatively, the received parameters may be compared to a database. When the validation is complete, results are sent back at 306 to the authorized entity.
Optionally, the method may comprise receiving a notification of network subscription transfer from the electronic device to a second electronic device at 307. The method then also comprises assigning a public unique third device identification code to the second electronic device; calculating a unique fourth device identification code based on the third device identification code, for example using the one way hash function algorithm; and assigning the fourth device identification code to the second electronic device so that the fourth device identification code can be read by external reader equipment when the second electronic device is disconnected from the network (e.g. in a power off mode)—incorporated in box 308.
The methods above can provide an effect of secure and reliable validation of a device that is switched off or does not work, which can be used for various tasks such as the ones described above including network subscription transfer to another device, temporary “freezing” of the subscription, blocking access to the electronic device once it is back on, and others.
According to an aspect, an electronic device with a network subscription is provided. The device comprises: an embedded secure element including a subscription identification code for identifying the subscriber, a unique public first device identification code, and a unique second device identification code linked to the first device identification code. The embedded secure element is one of: a physical and virtual secure element, and the second device identification code can be read with external reader equipment when the device is disconnected from the network.
In an embodiment, the second device identification code is adapted to be read by at least one of: optical reading equipment and electronic reading equipment.
In an embodiment the first device identification code is the international mobile station equipment identity code (IMEI).
According to an embodiment, the second device identification code is formed using a cryptographic function having one or more parameters, and wherein at least one of the parameters of the cryptographic function is the first device identification code, thereby linking the first and second device identification codes.
In an embodiment, the first public device identification code can be read with external reader equipment when the device is disconnected from the network.
In an embodiment, the first and second device identification codes are assigned and can be validated by an authorizing entity.
In an embodiment, the authorizing entity is the original equipment manufacturer.
In an embodiment, the embedded secure element is an embedded universal integrated circuit card.
According to an aspect, a method of transferring a network subscription from a first electronic device to a second electronic device when the first electronic device is disconnected from the network is provided. The first electronic device comprises: an embedded secure element including a subscription identification code assigned by a network operator, a unique public first device identification code, and a unique second device identification code assigned by an authorizing entity. And the method itself comprises: reading the second device identification code from the first electronic device with external reader equipment, sending a request for validation of the second device identification code to the authorizing entity, receiving a positive or negative validation from the authorizing entity, and in response to a positive validation, sending a request to the network operator to transfer the network subscription to the second electronic device.
In an embodiment, the method further comprises sending a request to the network operator to cancel the network subscription of the first electronic device.
In an embodiment, the method further comprises transferring user data to the second electronic device, and removing the user data from the first electronic device when the first electronic device returns to a power on mode.
In an embodiment, the method further comprises notifying the authorizing entity of the subscription transfer.
In an embodiment, reading the second device identification code from the first electronic device with external reader equipment is performed by at least one of: optical scanning and near-field communication.
In an embodiment, the method further comprises initiating backup data recovery when the first electronic device returns to a power on mode
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
It will be understood that the benefits and advantages described above may relate to one embodiment or may relate to several embodiments. The embodiments are not limited to those that solve any or all of the stated problems or those that have any or all of the stated benefits and advantages. It will further be understood that reference to ‘an’ item refers to one or more of those items.
Aspects of any of the examples described above may be combined with aspects of any of the other examples described to form further examples without losing the effect sought.
The term ‘comprising’ is used herein to mean including the method blocks or elements identified, but that such blocks or elements do not comprise an exclusive list and a method or apparatus may contain additional blocks or elements.
It will be understood that the above description is given by way of example only and that various modifications may be made by those skilled in the art. The above specification, examples and data provide a complete description of the structure and use of exemplary embodiments. Although various embodiments have been described above with a certain degree of particularity, or with reference to one or more individual embodiments, those skilled in the art could make numerous alterations to the disclosed embodiments without departing from the spirit or scope of this specification.
Number | Name | Date | Kind |
---|---|---|---|
7178027 | Faigle | Feb 2007 | B2 |
8225110 | Stahl et al. | Jul 2012 | B2 |
8712474 | Gehrmann | Apr 2014 | B2 |
9525999 | Godfrey | Dec 2016 | B2 |
20060236325 | Rao | Oct 2006 | A1 |
20080045177 | Wise | Feb 2008 | A1 |
20080261561 | Gehrmann | Oct 2008 | A1 |
20090036126 | Morikuni | Feb 2009 | A1 |
20090037207 | Farah | Feb 2009 | A1 |
20090279682 | Strandell | Nov 2009 | A1 |
20120168517 | Lee | Jul 2012 | A1 |
20120329396 | Matsushita | Dec 2012 | A1 |
20130217361 | Mohammed | Aug 2013 | A1 |
20130227656 | Holtmanns | Aug 2013 | A1 |
20130316672 | Nousiainen | Nov 2013 | A1 |
20130337743 | Holtmanns | Dec 2013 | A1 |
20130340044 | Litvin | Dec 2013 | A1 |
20140004827 | O'Leary | Jan 2014 | A1 |
20140006786 | Campagna et al. | Jan 2014 | A1 |
20140066011 | Bradley | Mar 2014 | A1 |
20140143534 | Chastain | May 2014 | A1 |
20140188738 | Huxham | Jul 2014 | A1 |
20150017950 | Zhao | Jan 2015 | A1 |
20150189494 | Idsinga | Jul 2015 | A1 |
20150237496 | Gao | Aug 2015 | A1 |
20150296373 | Morejon | Oct 2015 | A1 |
20150365817 | Chu | Dec 2015 | A1 |
20160088465 | Golla | Mar 2016 | A1 |
20160094930 | Ramanna | Mar 2016 | A1 |
20160150400 | Cha | May 2016 | A1 |
20160164883 | Li | Jun 2016 | A1 |
20160205550 | Rajadurai | Jul 2016 | A1 |
20160210578 | Raleigh | Jul 2016 | A1 |
20160242032 | De Kievit | Aug 2016 | A1 |
Entry |
---|
“Embedded SIM Remote Provisioning Architecture”, Published on: Dec. 17, 2013, Available at: http://www.gsma.com/connectedliving/wp-content/uploads/2014/01/1.-GSMA-Embedded-SIM-Remote-Provisioning-Architecture-Version-1.1.pdf. |
“Benefits Analysis of GSMA Embedded SIM Specification on the Mobile Enabled M2M Industry”, Published on: Sep. 2014, Available at: http://www.gsma.com/newsroom/wp-content/uploads/BRL-Benefits-Analysis-GSMA-Embedded-SIM-Specification-2014.pdf. |
Elenkov, Nikolay, “Accessing the embedded secure element in Android 4.x”, Published on: Aug. 22, 2012, Available at: http://nelenkov.blogspot.in/2012/08/accessing-embedded-secure-element-in.html. |
“Mobile Industry Leaders Kick Start Drive for More Connected Devices”, Published on: Nov. 4, 2011, Available at: http://www.gemalto.com/press/Pages/news—1112.aspx. |
Zhou, et al., “On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards”, In Proceedings of 17th Financial Cryptography, Apr. 1, 2013, 9 pages. |
“EUICC, A Disruption in the SIM Market”, Published on: Dec. 14, 2012, Available at: http://m2mworldnews.com/2012/12/14/euicc-a-disruption-in-the-sim-market/. |
Ziegler, Chris, “Embedded SIMs: they're happening, and Apple thinks they could be in consumer products”, Published on: Jun. 1, 2012, Available at: http://www.theverge.com/2012/6/1/3057577/etsi-euicc-embedded-sim-apple. |
“Mobile Devices and Identity Applications”, Published on: Sep. 2012, Available at: http://www.smartcardalliance.org/resources/pdf/mobile—identity—brief—082712.pdf. |
Inside Secure, “Secure Your Embedded Devices using AT90SC/SO and VaultIC”, Apr. 2011, p. 1-22, https://docmh.com/secure-your-embedded-devices-using-at90sc-so-and-vaultic-pdf. |
Number | Date | Country | |
---|---|---|---|
20160241564 A1 | Aug 2016 | US |