Method for downloading a subscription from an operator to a UICC embedded in a terminal

Information

  • Patent Grant
  • 9532223
  • Patent Number
    9,532,223
  • Date Filed
    Tuesday, December 6, 2011
    12 years ago
  • Date Issued
    Tuesday, December 27, 2016
    7 years ago
Abstract
The present invention relates to a method for downloading a subscription from an operator to a UICC embedded in a terminal. The method includes transmitting from the terminal, to a platform, an identifier and a request for downloading the subscription; verifying in the platform that the terminal is authorized to download the subscription by verifying the rights of the terminal in accordance with its identifier; and downloading the subscription to the UICC if the rights are confirmed and, otherwise, refusing to download the subscription.
Description

The present invention concerns a method for downloading a subscription from an operator to a UICC (Universal Integrated Circuit Card) embedded in a terminal. It generally relates to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications.


A UICC can be in the format of a smart card, or may be in any other format such as for example but not limited to a packaged chip as described in PCT/SE2008/050380, or any other format. It can be used in mobile terminals in GSM and UMTS networks for instance. The UICC ensures network authentication, integrity and security of all kinds of personal data.


In a GSM network, the UICC contains mainly a SIM application and in a UMTS network it is the USIM application. A UICC may contain several other applications, making it possible for the same smart card to give access to both GSM and UMTS networks, and also provide storage of a phone book and other applications. It is also possible to access a GSM network using an USIM application and it is possible to access UMTS networks using a SIM application with mobile terminals prepared for this. With the UMTS release 5 and later stage network like LTE, a new application, the IP multimedia Services Identity Module (ISIM) is required for services in the IMS (IP Multimedia Subsystem). The telephone book is a separate application and not part of either subscription information module.


In a CDMA network, the UICC contains a CSIM application, in addition to 3GPP USIM and SIM applications. A card with all three features is called a removable user identity card, or R-UIM. Thus, the R-UIM card can be inserted into CDMA, GSM, or UMTS handsets, and will work in all three cases.


In 2G networks, the SIM card and SIM application were bound together, so that “SIM card” could mean the physical card, or any physical card with the SIM application.


The UICC smart card consists of a CPU, ROM, RAM, EEPROM and I/O circuits. Early versions consisted of the whole full-size (85×54 mm, ISO/IEC 7810 ID-1) smart card. Soon the race for smaller telephones called for a smaller version of the card.


Since the card slot is standardized, a subscriber can easily move their wireless account and phone number from one handset to another. This will also transfer their phone book and text messages. Similarly, usually a subscriber can change carriers by inserting a new carrier's UICC card into their existing handset. However, it is not always possible because some carriers (e.g. in U.S.) SIM-LOCK the phones that they sell, thus preventing competitor carriers' cards being used.


The integration of the ETSI framework and the Application management framework of Global Platform is standardized in the UICC configuration.


UICCs are standardized by 3GPP and ETSI.


A UICC can normally be removed from a mobile terminal, for example when the user wants to change his mobile terminal. After having inserted his UICC in his new terminal, the user will still have access to his applications, contacts and credentials (network operator).


It is also known to solder or weld the UICC in a terminal, in order to get it dependent of this terminal. This is done in M2M (Machine to Machine) applications. The same objective is reached when a chip (a secure element) containing the SIM or USIM applications and files is contained in the terminal. The chip is for example soldered to the mother-board of the terminal or machine and constitutes an UICC.


This disclosed invention applies to such soldered UICCs or to such chips containing the same applications than the chips comprised in UICCs. A parallel can be done for UICCs that are not totally linked to devices but that are removable with difficulty because they are not intended to be removed, located in terminals that are distant or deeply integrated in machines. A special form factor of the UICC (very small for example and therefore not easy to handle) can also be a reason to consider it as in fact integrated in a terminal. The same applies when a UICC is integrated in a machine that is not intended to be opened.


In the next description, welded UICCs or chips containing or designed to contain the same applications than UICCs will generally be called embedded UICCs or embedded secure elements (in contrast to removable UICCs or removable secure elements). This will also apply to UICCs or secure elements that are removable with difficulty.


The invention concerns simlock and applies to UICCs that are not removable from terminals (embedded UICCs), for example mobile terminals.


Mobile network operators (MNOs) often propose cheap mobile terminals to their subscribers and they do not want them to take subscriptions from other operators, at least for a given period of time after they have bought a new terminal. Therefore, operators lock new sold mobile terminals to their network, to be sure that they will only work on their networks, thanks to UICCs belonging to these operators.


It is however easy for an unfaithful user to desimlock his mobile terminal. Some shops propose for small amounts of money to desimlock recently bought mobile terminals. The desimlocked terminal can then be used on the network of another operator. This represents an important loss of money for the mobile operators since they have sold the terminals with an important discount price in exchange of the fidelity of their subscribers.


The present invention is in particular applicable to mobile terminals comprising an embedded UICC (not removable) which can store at least two subscriptions, one for a MNO#1 (primary MNO who has sold the terminal) and another one, let's say for a MNO#2. MNO#1 who has locked the terminal on his network does not want that the user installs another subscription from another operator on his UICC. This would permit to the user to use his mobile terminal with this other subscription with MNO#2, instead with the subscription with MNO#1.


The present invention proposes a solution to this problem.


The present invention proposes a method for downloading a subscription from an operator to a UICC embedded in a terminal, the method consisting in:

    • transmitting from the terminal to a platform an identifier and a request for downloading the subscription;
    • verifying in the platform that the terminal is authorized to download the subscription by verifying the rights of the terminal thanks to its identifier;
    • downloading the subscription to the UICC if the rights are confirmed and, otherwise, refusing to download the subscription.


The verification preferably consists in comparing the identifier with a list of subscriptions for which a download is authorized.


The identifier is an identifier of the terminal or an identifier of the UICC.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a schematic illustration of a first embodiment of a networked system in which the invention can be implemented;



FIG. 2 is a schematic illustration of a second embodiment of a system in which the invention can be implemented; and



FIGS. 3-5 illustrate steps that are performed in the system in accordance with the principles of the invention.





DETAILED DESCRIPTION

The present invention takes place in a system similar to FIGS. 1 and 2.


In FIG. 1, a central server 90 manages subscriptions stored in a UICC 91 comprised in a terminal 92. The central server 90 manages these subscriptions through a network 93, for example Internet. Central server 90 is connected to different telecommunication networks of operators MNO1 to MNO3.


In another configuration of the system, represented in FIG. 2, the central server is connected to a single operator's network (MNO) and communicates with the other networks MNO1 to MNO3 through this network MNO.


Central server 90 can act as a manager of the subscriptions present on UICC 91. He can for example install a new subscription on the UICC, at the request of the user of terminal 92.


These systems allow a user that has lost his terminal to contact a single entity, the central server 90, in order to ask to this entity to manage its subscriptions. Such a management of subscriptions can for example consist in:

    • Temporarily or definitively block one or several subscriptions;
    • Temporarily or definitively block one or several services from one or several subscriptions;
    • Send short messages to try to warn the person handling the terminal;
    • Geo-localize the terminal;
    • Recovery of the data on the device and the UICC;
    • Deleting or encrypting the data present on the terminal;
    • Selecting a specific application that will allow to re-activate one of several subscriptions if the terminal is recovered.


This management also applies in case of a stolen terminal.


The invention will be better understood in reference to FIG. 3 that represents a system according to the present invention.


The system of FIG. 3 is similar to the system of FIGS. 1 and 2 already described.


According to this invention, in order to download a subscription in the UICC 91, the terminal 92 sends a request for downloading the subscription to the central server 90, this request comprising an identifier of the terminal 92 or an identifier of the UICC 91. The central server 90 comprises a list 94 of all the identifiers of the terminals or UICC that can be managed by this server 90.


The list 94 comprises for each identifier (here the IMEI of the terminal 90) corresponding rights R. To an identifier IMEI1 are associated rights R1. The server 90 verifies that a terminal (UICC) making such a request for downloading a subscription has the right to download this subscription. If the rights are confirmed, the subscription is downloaded to the UICC. If the rights are not allowed, the subscription is not downloaded.


The UICC can comprise a bootstrap subscription allowing a first connexion to the server, in order to download a real subscription afterwards.


Normally, the sold UICC already comprises a subscription to a first MNO and is locked to this operator. The operator can inform the central server 90 when locking is no more necessary and the list 94 is then updated in order to allow the customer to download another subscription.


Instead of verifying the rights associated to a terminal, the rights associated to a UICC can be checked.


Like described in regard to FIGS. 4 and 5, the UICC reference can be used for securing the channel between the terminal 92 and the server 90 as described hereunder.


In the systems represented in FIGS. 4 and 5, an independent application is inserted in the secure element for securing the session between the administrative platform and the terminal. After this step, the server verifies the binding between the identity at the device session level and the identity at the secure element remote management.



FIG. 4 represents a first step of this method.


As can be seen, the secure element 20 comprises an application 28 foreseen to provide session keys to the administrative platform 22. These session keys are generated by the application 28 and transmitted to the mobile equipment 21. The application 28 transmits also an identifier or a certificate to the mobile equipment 21:

    • An identifier is sent from the application 28 to the equipment when a symmetrical encryption is used (on the basis of secret keys) for creating a secure channel between the platform 22 and the equipment 21. The equipment 21 transmits this identifier to the platform 22. The platform 22 then compares the received identifier with identifiers it stores, in order to recognize which application sent the identifier. Once recognized, the platform 22 associates a symmetrical key to the identifier of the application 28. The application 28 and the platform 22 then derive session keys in order to encrypt (for confidentiality reasons) and maintain the integrity of the communication between the equipment 21 and the platform 22. A secure channel has thus been established between the equipment 21 and the platform 22 (examples of such protocols are standardized by Global Platform, PSK-TLS can also be used).
    • Another way to create this secure channel consists in exchanging certificates between the platform 22 and the application 28. The platform authenticates the application 28 by asking it to sign a hash of all the messages already exchanged. The equipment 21 generates a session key and encrypts it for the platform 22. A secured communication (one example of such a standardized is TLS) is then established between the equipment 21 and the platform 22.


In both of the preceding cases a secure channel has been established between the platform and the equipment 21.


The main second step of this method consists in verifying the binding between the identity at the device session level and the identity at the secure element remote management.



FIG. 5 represents this step.


A request to manage content of the secure element is sent to the administrative platform. This management consists for example in downloading content on the secure element 20, deleting or exporting content stored on it or activating or deactivating content stored on it. The download of content can for example consist in downloading an entire Sim application on the secure element, with the associated credentials (IMSI, Ki). It can also consist in downloading a phone book in the secure element 20 from the platform 22.


In order to verify this binding, the secure element 20 sends through the established secure channel a fixed identifier, like for example his ICCID or his serial number. The platform 22 verifies that this request originates from the same secure element (for example the session keys used for establishing the secure channel are compared to the fixed identifier). If the check is positive, the management is authorized. On the contrary, if the check is negative, the management is forbidden.


The invention ensures that the secure element that is managed is the correct one and not another secure element linked to the platform by a malware.


The server 90 can be managed by a unique entity, like for example a card manufacturer, who knows what is stored on each card.

Claims
  • 1. Method for downloading a second subscription from a second operator to a universal integrated circuit card (UICC) embedded in a terminal, a first subscription of a first operator being present on said UICC, said method comprising: transmitting from said terminal to a platform an identifier and a request for downloading said second subscription from said second operator;verifying in said platform that said terminal is authorized by said first operator to download said second subscription by verifying the rights of said terminal in accordance with its identifier; anddownloading said second subscription to said UICC if said rights are confirmed and, otherwise, refusing to download said second subscription.
  • 2. Method according to claim 1, wherein said verification comprises comparing said identifier with a list of subscriptions for which a download is authorized.
  • 3. Method according to claim 1, wherein said identifier is an identifier of said terminal.
  • 4. Method according to claim 1, wherein said identifier is an identifier of said UICC.
Parent Case Info

This disclosure is a national phase of PCT/EP2011/071919, filed Dec. 6, 2011, a continuation-in-part of U.S. application Ser. No. 13/312,309, filed Dec. 6, 2011, and claims priority to European Application No. 10306359.0, filed Dec. 6, 2010, the disclosures of which are hereby incorporated by reference.

PCT Information
Filing Document Filing Date Country Kind 371c Date
PCT/EP2011/071919 12/6/2011 WO 00 8/22/2013
Publishing Document Publishing Date Country Kind
WO2012/076525 6/14/2012 WO A
US Referenced Citations (61)
Number Name Date Kind
6978152 Yamaashi et al. Dec 2005 B1
7024390 Mori et al. Apr 2006 B1
7146161 Chou Dec 2006 B2
7349719 Buniatyan Mar 2008 B2
7363056 Faisy Apr 2008 B2
9092775 Bernard et al. Jul 2015 B2
20020186845 Dutta et al. Dec 2002 A1
20040131186 Kasuya et al. Jul 2004 A1
20040235523 Schrire et al. Nov 2004 A1
20040242209 Kruis Dec 2004 A1
20050021875 Bouthemy et al. Jan 2005 A1
20050164737 Brown Jul 2005 A1
20050186954 Kenney Aug 2005 A1
20050239504 Ishii et al. Oct 2005 A1
20050266883 Chatrath Dec 2005 A1
20050279826 Merrien Dec 2005 A1
20060049243 Sakamura et al. Mar 2006 A1
20060079284 Lu et al. Apr 2006 A1
20060086785 Sakata Apr 2006 A1
20060196931 Holtmanns et al. Sep 2006 A1
20060199614 Hyacinthe Sep 2006 A1
20070105532 Martin et al. May 2007 A1
20070239857 Mahalal et al. Oct 2007 A1
20080090614 Sicher et al. Apr 2008 A1
20080130879 Heinonen et al. Jun 2008 A1
20080261561 Gehrmann Oct 2008 A1
20080292074 Boni et al. Nov 2008 A1
20080319823 Ahn et al. Dec 2008 A1
20090159692 Chew et al. Jun 2009 A1
20090163175 Shi et al. Jun 2009 A1
20090191857 Horn et al. Jul 2009 A1
20090191917 Zappulla et al. Jul 2009 A1
20090191918 Mardiks Jul 2009 A1
20090215431 Koraichi Aug 2009 A1
20090217348 Salmela et al. Aug 2009 A1
20090307142 Mardikar Dec 2009 A1
20100035587 Bennett Feb 2010 A1
20100179907 Atkinson Jul 2010 A1
20110028126 Lim et al. Feb 2011 A1
20110035584 Meyerstein et al. Feb 2011 A1
20110059773 Neumann et al. Mar 2011 A1
20110081950 Guven Apr 2011 A1
20110126183 Bernard et al. May 2011 A1
20110136482 Kaliner Jun 2011 A1
20110237190 Jolivet Sep 2011 A1
20110302641 Hald et al. Dec 2011 A1
20110320600 Froeding et al. Dec 2011 A1
20120028609 Hruska Feb 2012 A1
20120108295 Schell et al. May 2012 A1
20120113865 Zhao et al. May 2012 A1
20120190354 Merrien et al. Jul 2012 A1
20120297473 Case et al. Nov 2012 A1
20130318355 Girard et al. Nov 2013 A1
20130329683 Berard et al. Dec 2013 A1
20140019760 Vergnes et al. Jan 2014 A1
20140024343 Bradley Jan 2014 A1
20140031083 Vergnes et al. Jan 2014 A1
20140057680 Proust et al. Feb 2014 A1
20140066011 Bradley Mar 2014 A1
20140122872 Merrien et al. May 2014 A1
20140141747 Merrien et al. May 2014 A1
Foreign Referenced Citations (66)
Number Date Country
101080051 Nov 2007 CN
101179401 May 2008 CN
101309518 Nov 2008 CN
10 2008 033 976 Jan 2010 DE
1 650 717 Apr 2006 EP
1 965 596 Sep 2008 EP
2 056 523 May 2009 EP
2 076 071 Jul 2009 EP
2 871 020 Dec 2005 FR
2 457 221 Aug 2009 GB
2002-236572 Aug 2002 JP
2005-323128 Nov 2005 JP
2006-050554 Feb 2006 JP
2006-107316 Apr 2006 JP
2007-019897 Jan 2007 JP
2007-513534 May 2007 JP
2007-201883 Aug 2007 JP
2007-235492 Sep 2007 JP
2008-131469 Jun 2008 JP
2008-519343 Jun 2008 JP
2009-037602 Feb 2009 JP
2009-038598 Feb 2009 JP
2010-501092 Jan 2010 JP
2010-532107 Sep 2010 JP
2011-525311 Sep 2011 JP
2012-528534 Nov 2012 JP
2002-0066032 Aug 2002 KR
2003-0044260 Jun 2003 KR
10-0489783 May 2005 KR
10-2005-0095424 Sep 2005 KR
2007-0095048 Sep 2007 KR
10-2008-0014285 Feb 2008 KR
10-2008-0015870 Feb 2008 KR
10-2009-0056019 Jun 2009 KR
10-2010-0095648 Aug 2010 KR
10-2010-011642 Oct 2010 KR
02082715 Oct 2002 WO
03104997 Dec 2003 WO
2004021296 Mar 2004 WO
2004105421 Dec 2004 WO
2007058241 May 2007 WO
2008128874 Oct 2008 WO
WO 2008123827 Oct 2008 WO
2009055910 May 2009 WO
2009092115 Jul 2009 WO
2009091837 Jul 2009 WO
2009095295 Aug 2009 WO
WO 2009103623 Aug 2009 WO
WO2009103623 Aug 2009 WO
2009141024 Nov 2009 WO
2009141035 Nov 2009 WO
2009149788 Dec 2009 WO
2010052332 May 2010 WO
2010068016 Jun 2010 WO
2010138592 Dec 2010 WO
2011139795 Nov 2011 WO
2011159549 Dec 2011 WO
2012012526 Jan 2012 WO
2012058092 May 2012 WO
2012058099 May 2012 WO
2012058429 May 2012 WO
2012058446 May 2012 WO
2012058450 May 2012 WO
2012061516 May 2012 WO
2012061561 May 2012 WO
2012065112 May 2012 WO
Non-Patent Literature Citations (69)
Entry
Office Action (Notice of Reasons for Rejection) issued on Aug. 19, 2014, by the Japan Patent Office in Japanese Patent Application No. 2013-542497, and an English Translation of the Office Action. (9 pages).
Office Action (Notice of Preliminary Rejection) issued on Jun. 27, 2014, by the Korean Intellectual Property Office, in Korean Patent Application No. 10-2013-7017637, and an English Translation of the Office Action. (7 pages).
Office Action (Notice of Preliminary Rejection) issued on Aug. 19, 2014, by the Korean Intellectual Property Office in Korean Patent Application No. 10-2013-7016486, and an English Translation of the Office Action. (6 pages).
Office Action (Notice of Reasons for Rejection) issued on Aug. 5, 2014, by the Japan Patent Office in Japanese Patent Application No. 2013-542474, and an English Translation of the Office Action. (4 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,823, mailed Jan. 5, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (25 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,846, mailed Feb. 10, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (26 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/992,065, mailed Dec. 18, 2014, U.S. Patent and Trademark Office, Alexandria, VA. (26 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,744, mailed Dec. 12, 2014, U.S. Patent and Trademark Office, Alexandria, VA. (33 pages).
Notice of Allowance issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,752, mailed Jan. 21, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (30 pages).
English translation of Office Action issued by the Korean Patent Office on Aug. 28, 2014 in corresponding Korean Application No. 10-2013-7016004. (3 pages).
English translation of Office Action issued by the Korean Patent Office on Apr. 16, 2015 in corresponding Korean Application No. 10-2013-7016004. (2 pages).
Office Action issued by the Russian Patent Office dated Dec. 29, 2014 in corresponding Russian Application No. 2013131034, and English translation of Office Action. (6 pages).
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service aspects; Service principles (Release 11)”, 3GPP TS 22.101 V11.0.0 (Sep. 2010), pp. 1-60.
An English Translation of the Office Action (Notice of Reasons for Rejection) issued on Apr. 15, 2014, by the Japan Patent Office in the Japanese Patent Application No. 2013-542477. (3 pages).
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Specification of the Milenage Algorithm Set; An example algorithm set for the 3GPP authentication and key generation functions f1 , f1* , f2, f3, f4, f5 and f5*; Document 2: Algorithm Specification (Release 11)”, 3GPP TS 35.206 V11.0.0 (Sep. 2012), pp. 1-31.
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Feb. 22, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071674. (8 pages).
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Feasibility Study on Remote Management of USIM Application on M2M Equipment; (Release 8)”, 3GPP TR 33.812 V1.0.0 (Sep. 2008), pp. 1-80.
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority.(Form PCT/ISA/237) issued on Feb. 27, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071660. (6 pages).
An English Translation of the Office Action (Notice of Reasons for Rejection) issued on Jun. 17, 2014, by the Japan Patent Office in the Japanese Patent Application No. 2013-542492. (3 pages).
Madlmayr et al., “The Benefit of using SIM Application Toolkit in the Context of Near Field Communication Applications” International Conference on the Management of Mobile Business, (Jul. 2007), (8 pages).
An English Translation of the Office Action (Notice of Reasons for Rejection) issued on Apr. 30, 2014, by the Japan Patent Office in the Japanese Patent Application No. 2013-542496. (2 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Feb. 15, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071778. (9 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Feb. 27, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071781. (11 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Mar. 28, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071737. (6 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Apr. 4, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071731. (12 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority(Form PCT/ISA/237) issued on Feb. 27, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071664. (8 pages).
Written Opinion of the International Preliminary Examining Authority (Form PCT/IPEA/408) issued on Dec. 13, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071664. (5 pages).
Notification of Transmittal of the International Preliminary Report on Patentability (Forms PCT/IPEA/416 and PCT/IPEA/409) issued on Mar. 8, 2013, by the European Patent Office in the International Application No. PCT/EP2011/071664. (14 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Apr. 12, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071695 and comments filed by the Applicant on May 31, 2012. (10 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Apr. 5, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071785. (9 pages).
Vergnes et al., U.S. Appl. No. 13/992,103, entitle “Method for Exporting Data of a Javacard Application Stored in a UICC to a Host” filed Jun. 6, 2013.
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/312,309, mailed Sep. 25, 2013, U.S. Patent and Trademark Office, Alexandria, VA. (13 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/312,309, mailed Apr. 24, 2014, U.S. Patent and Trademark Office, Alexandria, VA. (13 pages).
“IP Based Over-the Air Handset Configuration Management (IOTA-HCM), 3rd Generation Partnership Project 2 3GPP2”, 3GPP2 C.S0040, Version 1.0, Jul. 18, 2003, pp. 1-68.
“Smart Cards; Card Application Toolkit (CAT) (Release 9)”, ETSI TS 102 223, vol. SCP TEC, No. V9.2.0, (Oct. 1, 2010), pp. 1-209.
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority(Form PCT/ISA/237) issued on Feb. 22, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071675. (12 pages).
International Search Report (PCT/ISA/210) Issued on Apr. 16, 2012, by the European Patent Office as the International Searching Authority for International Application No. PCT/EP2011/071919.
Written Opinion (PCT/ISA/237) issued on Apr. 16, 2012, by the European Patent Office as the International Searching Authority for International Application No. PCT/EP2011/071919.
European Search Report issued Jul. 22, 2011 for European Application No. 10306359.
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,766, mailed Mar. 17, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (33 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/992,039, mailed Mar. 17, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (35 pages).
Office Action (Notice of Preliminary Rejection) issued on Feb. 25, 2015, by the Korean Patent Office in Korean Patent Application No. 10-2013-0717638, and an English Translation of the Office Action. (7 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,766, mailed Oct. 1, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (27 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/992,039, mailed Oct. 1, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (28 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,846, mailed Oct. 15, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (23 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 14/603,889, mailed Oct. 23, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (36 pages).
Office Action issued by the Chinese Patent Office on Aug. 27, 2015 in corresponding Chinese Application No. 201180058683.0, and English language translation of Office Action (17 pages).
Office Action issued Nov. 17, 2015 by the Chinese Patent Office in corresponding Chinese Patent Application No. 201180058925.6 (10 pages).
Office Action issued by the U.S. Patent and Trademark Office in U.S. Appl. No. 13/992,103, mailed Nov. 25, 2015, U.S. Patent and Trademark Office, Alexandria, VA (22 pages).
Office Action issued by the Chinese Patent Office on Aug. 19, 2015 in corresponding Chinese Application No. 201180058922.2, and English language translation of Office Action (16 pages).
Office Action issued by the Chinese Patent Office on Nov. 4, 2015 in corresponding Chinese Application No. 201180058688.3 (5 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,744, mailed Jun. 2, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (35 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,689, mailed Jun. 18, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (46 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,823, mailed Jul. 13, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (21 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/992,103, mailed Jul. 13, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (42 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/992,065, mailed Jul. 30, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (32 pages).
Office Action (Notice of Reasons for Rejection) issued on Feb. 2, 2016, by the Japanese Patent Office in Japanese Patent Application No. 2015-018547, and an English Translation of the Office Action. (5 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/992,103, mailed Mar. 30, 2016, U.S. Patent and Trademark Office, Alexandria, VA. (15 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,846, mailed Apr. 5, 2016, U.S. Patent and Trademark Office, Alexandria, VA. (24 pages).
Office Action issued on Jan. 19, 2016, by the European Patent Office in European Patent Application No. 11 811 335.6 (4 pages).
3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Feasibility study on the security aspects of remote provisioning and change of subscription for Machine to Machine (M2M) equipment (Release 9); 3GPP Draft; 33812-920, published by the 3rd Generation Partnership Project (3GPP) in Sophia-Antipolis Cedex, France on Jun. 22, 2010 (87 pages).
3GPP TS 22.101 V11.0.0 (Sep. 2010), Sep. 2010.
European Office Action dated Dec. 23, 2015 issued in corresponding European Patent Appln. No. 11 810 809.1 (5 pages).
European Office Action dated Jan. 19, 2016 issued in corresponding European Patent Appln. No. 11 811 835.6 (6 pages).
Japanese Office Action dated Jan. 5, 2016 issued in corresponding Japanese Patent Appln. No. 2015-082449, with English translation (5 pages).
Japanese Office Action dated Jan. 19, 2016 issued in corresponding Japanese Patent Appln No. 2013-054275 with English translation (14 pages).
U.S. Office Action dated Feb. 1, 2016 issued in corresponding U.S. Appl. No. 13/991,823 (15 pages).
U.S. Office Action dated Feb. 2, 2016 issued in corresponding U.S. Appl. No. 13/992,039 (24 pages).
U.S. Office Action dated Feb. 10, 2016 issued in corresponding U.S. Appl. No. 13/992,065 (23 pages).
Related Publications (1)
Number Date Country
20130324091 A1 Dec 2013 US
Continuation in Parts (1)
Number Date Country
Parent 13312309 Dec 2011 US
Child 13991912 US