SURVEILLANCE METHOD FOR A MOBILE TELECOMMUNICATIONS TERMINAL
20170223524 · 2017-08-03
Inventors
Cpc classification
H04M1/72403
ELECTRICITY
H04W12/084
ELECTRICITY
H04W88/06
ELECTRICITY
H04L63/0853
ELECTRICITY
International classification
H04W8/18
ELECTRICITY
Abstract
A surveillance method for a mobile telecommunications terminal having an eSIM card. A plurality of subscription profiles are stored in the eSIM card. The surveillance method includes steps of incrementing a counter each time a change of subscription profile order is received, determining a number of change of subscription profile orders received during a predetermined duration, and, if the number of change of subscription profile orders received during the predetermined duration is greater than a predetermined threshold, deducing therefrom that operation is suspect.
Claims
1. A surveillance method for a mobile telecommunications terminal having an integrated circuit of the eUICC or eSIM card type, a plurality of subscription profiles being stored in the integrated circuit, and the surveillance method comprising the following steps: incrementing a counter each time a change of subscription profile order is received; determining a number of change of subscription profile orders received during a predetermined duration; and if the number of change of subscription profile orders received during the predetermined duration is greater than a predetermined threshold, deducing therefrom that operation of the mobile telecommunications terminal is suspect.
2. The surveillance method according to claim 1, further including the step of sending a warning message to a user of the mobile telecommunications terminal when suspect operation of the mobile telecommunications terminal is deduced from the number of change of subscription profile orders that have been received.
3. The surveillance method according to claim 2, wherein the warning message is sent via a pop-up window that is displayed on a screen of the mobile telecommunications terminal.
4. The surveillance method according to claim 2, wherein the warning message requires confirmation from the user prior to executing a change of subscription profile order following detection of suspect operation.
5. The surveillance method according to claim 2, further comprising the step of reinitializing the counter when the warning message has been sent.
6. The surveillance method according to any preceding claim 1, wherein the predetermined duration and the predetermined threshold are configurable.
7. The surveillance method according to claim 1, wherein the surveillance method is controlled by the integrated circuit.
8. The surveillance method according to claim 7, wherein the counter is implemented in the integrated circuit.
9. The surveillance method according to claim 7, wherein the determined duration is measured by a timer implemented in the mobile telecommunications terminal and controlled by the integrated circuit by means of a tool of the SIM application toolkit (STK) type.
Description
DETAILED DESCRIPTION OF THE INVENTION
[0017] The surveillance method of the invention is implemented in this example for surveillance of a mobile telephone fitted with an eSIM card positioned inside the mobile telephone.
[0018] The eSIM card of the mobile telephone comprises a memory module and a microcontroller.
[0019] The memory module of the eSIM card comprises a read only memory (ROM), an electrically erasable programmable read only memory (EEPROM) or a flash memory, and a random access memory (RAM). A plurality of subscription profiles corresponding to a plurality of different telephone operators and all associated with a user of the mobile telephone are loaded and stored in the memory module of the eSIM card.
[0020] The microcontroller of the eSIM card runs the surveillance method of the invention by executing a program of the operating system of the eSIM card. The program is stored in the memory module of the eSIM card.
[0021] A counter is executed by the microcontroller of the eSIM card. The counter is initialized on zero during initialization of the eSIM card. Thereafter, each time the microcontroller of the eSIM card receives an order to change the subscription profile, the counter is incremented.
[0022] When a first change of subscription profile order is received after the eSIM card has been initialized, a timer dedicated to implementing the surveillance method of the invention is started.
[0023] The timer is embodied in the form of a timer included in a microcontroller of an electrical card of the mobile telephone. The electrical card is distinct from the eSIM card. The timer is controlled by the microcontroller of the eSIM card by means of a set of commands that are programmed and stored in the memory module of the eSIM card. The set of program commands serves in particular to provide an interface between the eSIM card and the distinct electrical card, and enables the eSIM card to control the distinct electrical card in order to implement a predefined set of functions (including control of the timer). The set of commands programmed in the eSIM card forms a SIM application toolkit (STK).
[0024] Once it has started, the timer measures a certain predetermined duration. During the predetermined duration, the eSIM card makes use of the counter to determine the number of subscription profile change orders it receives (including the first subscription profile change order).
[0025] At the end of the predetermined duration, if the number of subscription profile change orders received during the predetermined duration is less than or equal to a predetermined threshold, the eSIM card considers that the mobile telephone is operating normally. Subscription profile change orders are executed by the eSIM card. The counter and the timer are reinitialized.
[0026] At the end of the predetermined duration, if the number of change of subscription profile orders received during the predetermined duration is greater than the predetermined threshold, then the eSIM card deduces from the number of subscription profile change orders that the mobile telephone is operating in suspect manner.
[0027] The change of subscription profile change order following detection of suspect operation is not executed immediately.
[0028] The eSIM card causes a pop-up window to be displayed on a screen of the mobile telephone, sending a warning message to the user of the mobile telephone. In particular, the warning message requires confirmation from the user prior to executing the subscription profile change order after detecting suspect operation.
[0029] If the user confirms that this change of subscription profile order was indeed issued voluntarily by the subscriber in person, then the change of subscription profile change order is executed and the counter and the timer are reinitialized.
[0030] Otherwise, the change of subscription profile order is not executed. The counter and the timer are reinitialized.
[0031] Advantageously, the eSIM card then causes an action to be performed from amongst the following actions: totally or partially deactivating the mobile telephone; deleting the malware application; displaying recommendations to the user for correcting the suspect operation; and returning an information message to one or more telephone operators.
[0032] It should be observed that both the predetermined duration during which the number of change of subscription profile orders is determined in order to detect suspect operation of the mobile telephone, and also the predetermined threshold with which the number of subscription profile change orders is compared, can themselves be configured by the user of the mobile telephone. This thus makes the detection of suspect operation flexible so that it can be adapted by the user to the way a user makes use of the mobile telephone and manages a plurality of subscriptions.
[0033] The invention is not limited to the above-described particular implementation, but on the contrary covers any variant coming within the ambit of the invention as defined by the claims.
[0034] It is stated above that the surveillance method of the invention is controlled by executing a program of the operating system of the eSIM card. However, this program may alternatively be included in an “applet” executed by the microcontroller of the eSIM card.
[0035] In this example, the eSIM card is embedded or integrated in a mobile telephone. Nevertheless, the invention naturally applies to other mobile telecommunications terminals: a tablet, a smartphone, a connected watch, etc.
[0036] The invention also naturally applies to any type of removable or non-removable integrated circuit other than a circuit of the eUICC type, and not only to eSIM cards (e.g. to non-removable and embedded USIM type cards).