METHOD AND SYSTEM FOR PERSONALIZING A SECURITY ELEMENT OF A TERMINAL
20170230830 · 2017-08-10
Inventors
Cpc classification
H04L63/06
ELECTRICITY
H04W12/35
ELECTRICITY
H04W12/04
ELECTRICITY
H04L63/0876
ELECTRICITY
International classification
Abstract
Provided are a method for personalizing a security element for a mobile end device for communicating via a mobile radio network as well as a corresponding system. The method comprises the following steps: supplying initialization data of an initialization entity to the security element, wherein the initialization data comprise a personalization token; supplying the personalization token from the security element to a personalization entity; checking the validity of the personalization token through the personalization entity; and after successfully checking the validity of the personalization token, supplying personalization data from the personalization entity to the security element, wherein authorization data for authenticating the security element in encrypted form are already part of the initialization data and the personalization data comprise a key for decrypting the authorization data.
Claims
1-15. (canceled)
16. A method for personalizing a security element for an end device for communicating via a mobile radio network, wherein the method comprises the following steps: supplying initialization data from an initialization entity to the security element, wherein the initialization data comprise a personalization token; supplying the personalization token from the security element to a personalization entity; checking the validity of the personalization token through the personalization entity; and after successfully checking the validity of the personalization token, supplying personalization data from the personalization entity to the security element; wherein authorization data for authenticating the security element in encrypted form are already part of the initialization data and the personalization data comprise a key for decrypting the authorization data.
17. The method according to claim 16, wherein the method comprises, prior to the step of supplying the initialization data from the initialization entity to the security element, the further step of supplying the initialization data and a batch of personalization tokens from the personalization entity to the initialization entity.
18. The method according to claim 17, wherein the personalization tokens are digitally signed by the personalization entity.
19. The method according to claim 16, wherein the supplying of the personalization data from the personalization entity to the security element is effected via a secure communication channel between the personalization entity and the security element.
20. The method according to claim 19, wherein for establishing a secure communication channel between the personalization entity and the security element, a key individual to the security element is agreed upon between the personalization entity and the security element with which the personalization data are secured.
21. The method according to claim 19, wherein the secure communication channel between the personalization entity and the security element is based on a public-key infrastructure and the initialization data which are transferred to the security element comprise a certificate of the personalization entity having a public key of the personalization entity.
22. The method according to claim 21, wherein a TLS communication channel is formed between the personalization entity and the security element.
23. The method according to claim 16, wherein the security element in the step of supplying the personalization token to the personalization entity, transfers, besides the personalization token, an identifier of the security element to the personalization entity.
24. The method according to claim 16, wherein more than one personalization token is supplied on the security element.
25. The method according to claim 16, wherein the method comprises, after the step of successfully checking the validity of the personalization token, the further step of marking the personalization token on the personalization entity as invalid.
26. The method according to claim 16, wherein the personalization entity is configured to check the validity of the personalization token by means of further mechanisms.
27. A system for personalizing a security element for an end device for communicating via a mobile radio network, comprising: an initialization entity which is configured to supply initialization data to the security element, wherein the initialization data comprise a personalization token; and a personalization entity which is configured to receive the personalization token from the security element, to check the validity of the personalization token, and, after successfully checking the validity of the personalization token, to supply personalization data to the security element, wherein the authorization data for authenticating the security element in encrypted form are already part of the initialization data, and the personalization data comprises a key for decrypting the authorization data.
28. The system according to claim 27, wherein the authorization data are provided as subscription authorization data for authenticating the security element vis-à-vis the mobile radio network.
29. A security element, wherein the security element has been personalized by means of the method according to claim 16.
30. An end device having a security element according to claim 29.
Description
[0020] Further features, advantages and objects of the invention will emerge from the following detailed description of several embodiment examples and embodiment alternatives. Reference is made to the drawings, in which there are shown:
[0021]
[0022]
[0023]
[0024] An exemplary mobile end device 10 is represented in
[0025] According to preferred embodiments of the invention, the security element 14 is configured as an eUICC (embedded Universal Integrated Circuit Card) having a SIM application implemented thereon, i.e. as a security element which is a permanent component of the mobile end device 10 and is employed in a mobile radio network for uniquely and securely identifying the user or subscriber and for supplying different functions and value-added services. Alternatively, the security element 14 can be configured as a UICC (Universal Integrated Circuit Card) or SIM card (Subscriber Identity Module) which is known to the skilled person as one of the currently most frequently employed forms of security element. The skilled person will recognize, however, that other kinds of security elements, which are designated as USIM, R-UIM, ISIM, and the like, depending on the generation and type of underlying mobile radio standard, are likewise embraced by the present invention.
[0026] According to further preferred embodiments of the invention, the security element 14 can be configured as a combination of hardware and software components in a trustworthy part of an operating system of a central processing unit of the mobile end device 10, which is also known to the skilled person as a secure runtime environment (“Trusted Execution Environment”; TEE). The security element 14 can then be configured for example within such a secure runtime environment of the mobile end device 10 in the form of programs running therein, so-called Trustlets®.
[0027] The mobile end device 10 is configured to communicate via the over-the-air interface with a mobile radio network 20 (also designated as a “Public Land Mobile Network” [PLMN]). For this purpose the mobile end device 10 has as a rule an antenna (not shown in
[0028] Hereinafter some preferred embodiments of the invention will be described in connection with a mobile radio network 20 according to the GSM standard “Global Standard for Mobile Communications”), which is specified in a plurality of ETSI specifications. The skilled person will recognize, however, that the present invention can also be used advantageously in connection with other mobile radio networks. Such networks comprise mobile radio networks of the third generation (3GPP), such as UMTS (Universal Mobile Telecommunications System), mobile radio networks of the fourth generation (4G), such as LTE (Long Term Evolution), and other mobile radio networks, such as CDMA, and the like.
[0029] As is known to the skilled person, a mobile radio network or PLMN constructed according to the GSM standard generally comprises a BSS (“Base Station Subsystem”) which consists of a plurality of BTSs (“Base Transceiver Stations”) which define respective radio cells of the PLMN and are connected to a BSC (“Base Station Controller”). Usually, the BSC is one of a plurality of BSCs which communicate with a common MSC (“Mobile Switching Center”). Frequently, a local database, which is called the VLR (“Visitor Location Register”), is part of the MSC in order to hold information available about the mobile radio subscribers who are located at the moment in the radio cells that are served by an MSC (i.e. the range covered by an MSC). The MSC supplies substantially the same functionality as a switching center in a fixed-line network (public-switched telephone network; PSTN) and is in communication with an HLR (“Home Location Register”), which is the PLMN's primary database storing information for logging in or authentication of the mobile radio subscribers. For this purpose, the HLR usually has access to an AUC (“Authentication Center”). As is known to the skilled person, the communication connections between the hereinabove described components of a PLMN can be based on proprietary and/or open standards. The employed protocols can be for example SS7- or IP-based. How the network components are configured as separate or combined units and how the interfaces between said components are configured is up to the MNO, so that the hereinabove description is merely to be understood as exemplary.
[0030] The skilled person will recognize that, although the hereinabove described functional units of a conventional mobile radio network according to the GSM standard can have other names in other or future mobile radio standards, the basic principles are substantially the same and they are hence likewise embraced by the invention. For clarity's sake, in the schematic representation of
[0031] As indicated by the enlarged view of the security element 14 in
[0032] The security element 14 preferably further comprises a memory unit 16 which is preferably implemented as a non-volatile, rewritable memory unit, e.g. in the form of a flash memory. According to the invention, in a first step initialization data 17 from an initialization instance 30 having a personalization token 17a are deposited on this memory unit 16 and in a second step personalization data 18 having (subscription) authorization data (“Subscription Credentials”) 18a are deposited by a personalization entity 40, as this is described hereinafter in detail in connection with
[0033]
[0034] In step S2 of
[0035] In a second phase of the inventive method for personalizing the security element 14, in step S4 of
[0036] In step S5 of
[0037] If in step S5 of
[0038] In the present case subscription authorization data 18a in encrypted form are already a part of the initialization data 17. In this case, the personalization data 18 comprise substantially merely a key for decrypting the subscription authorization data 18a already present in the security element 14.
[0039] According to preferred embodiments of the invention, after the successful check of the personalization token 17a received by the security element 14, said personalization token can be marked as invalid or already employed in a database of the personalization entity 40. In connection with the personalization token 17a received by the security element 14, the identifier ID of the security element 14 can further be stored in the database of the personalization entity 40 so that the personalization entity 40 has information items about which security elements have already been supplied with personalization data.
[0040] According to preferred embodiments of the invention, the supplying or transferring of the personalization data 18 from the personalization entity 40 to the security element 14 is effected via a secure communication channel between the personalization entity 40 and the security element 14. Physically, such a channel can be configured between the personalization entity 40 and the security element 14, for example at least partly by a Wi-Fi network, e.g. in a shop in which a customer acquires the mobile end device 10. As this is indicated in
[0041] Preferably, for establishing a secure communication channel between the personalization entity 40 and the security element 14, a key individual to the security element is agreed upon between the personalization entity 40 and the security element 14 with which the personalization data 18 are secured. According to preferred embodiments of the invention, the secure channel between the personalization entity 40 and the security element 14 is based on a public-key infrastructure. In these preferred embodiments the initialization data 17 which are transferred to the security element 14 preferably comprise a certificate of the personalization entity 40 having a public key of the personalization entity 40. Preferably a TLS (Transport Layer Security) communication channel can in this way be configured between the personalization entity 40 and the security element 14, wherein the personalization entity 40 authenticates itself vis-à-vis the security element 14. Here, a session key which cannot be recomputed by the initialization entity 30 is agreed on between the security element 14 and the personalization entity. The authentication of the security element 14 vis-à-vis the personalization entity 40 is effected preferably via the personalization token 17a.
[0042] According to preferred embodiments of the invention, the personalization entity 40 is configured to check the validity of the personalization token 17a by means of further mechanisms to recognize and, where applicable, decline the abuse of personalization tokens. In this connection it is conceivable that the initialization entity 30 (preferably the manufacturer of the security element 14) must deliver information items to the personalization entity 40 which personalization token has been loaded onto which security element 14 identified by its identifier. Further, mechanisms can be provided for tracking personalization tokens. In this case, the path of the mobile end device in which the security element 14 is installed can be tracked. It can be provided that the employment of a personalization token is possible only within a certain time window as of the supplying of a personalization token.