Technique for obtaining a network access profile
11503474 · 2022-11-15
Assignee
Inventors
Cpc classification
International classification
Abstract
Obtaining a communication network access profile for a first security module associated with a first user device. On receipt of a command for associating the first user device with a subscription with an operator including a second user device associated with a second security module, the second user device sends the first user device a message including a contact address of a server configured to provide by downloading an access profile and a datum allowing the server to interrogate a control server to obtain an order for downloading the access profile. This message triggers sending by the first security module a request for obtaining an access profile associated with the subscription, addressed to the contact address and having the datum. On obtaining an order, the access profile is downloaded into the first security module, a confirmation being sent by the first user device to the second user device.
Claims
1. A method for obtaining a first access profile for accessing a network for a first security module associated with a first user device, said method comprising: for a second user device with which a second security module is associated, the second security module having obtained a second access profile for accessing the network in conjunction with a subscription with an operator: on receipt of a command for associating the first user device with said subscription, sending by the second user device to the first user device, a message comprising a contact address of a server configured to provide by downloading said first access profile and a datum allowing the server to interrogate a control server so as to obtain an order for downloading of the first access profile, said message being intended to trigger a sending by said first security module of a request for obtaining said first access profile in association with said subscription, the request being addressed to the contact address of the server and comprising said datum allowing said server to interrogate the control server; and receiving by the second user device from the first user device of a confirmation of downloading of the first access profile into the first security module.
2. The method for obtaining as claimed in claim 1, in which the second user device obtains from the second security module the contact address.
3. The method for obtaining as claimed in claim 1, in which the second user device obtains from the second security module the datum allowing the server to interrogate the control server.
4. The method for obtaining as claimed in claim 1, in which data associated with said first or second access profile comprise the contact address and the datum allowing the server to interrogate the control server.
5. The method for obtaining as claimed in claim 1, in which the sent message furthermore comprises a subscription identifier in respect of a subscription with the operator.
6. A method for obtaining a first access profile for accessing a network for a first security module associated with a first user device, said method comprising: receiving by a server configured to provide by downloading said first access profile, a request for obtaining said first access profile in association with a subscription with an operator originating from said first security module, the subscription comprising at least one second user device with which a second security module is associated, the second security module having obtained a second access profile for accessing the network in conjunction with said subscription, the request being addressed to the contact address of the server and comprising a datum allowing said server to interrogate a control server so as to obtain an order for downloading of the first access profile; as a function of the datum received, interrogating the control server so as to obtain an order for downloading of the first access profile into the first security module; and on obtaining of said order, downloading the first access profile into the first security module, a confirmation being sent by the first user device to the second user device once the first access profile has been downloaded.
7. A user device, so-called second user device, with which is associated a security module, so-called second security module, said second device comprising: a processor; and a non-transitory computer-readable medium comprising instructions stored thereon, which when executed by the processor configure the user device to perform acts comprising: receiving a command for associating a first user device with a subscription with an operator comprising at least said second user device, the second security module having obtained second access profile for accessing the network in conjunction with said subscription; sending to the first user device a message comprising a contact address of a server configured to provide by downloading a first access profile for accessing the network and a datum allowing the server to interrogate a control server so as to obtain an order for downloading of the first access profile for a first security module associated with the first device, said message being intended to trigger a sending by said first security module of a request for obtaining the first access profile in association with said subscription, the request being addressed to the contact address of the server and comprising said datum allowing said server to interrogate the control server; receiving from the first user device a confirmation of downloading of the first access profile into the first security module.
8. A server configured to provide by downloading an access profile, said server comprising: a processor; and a non-transitory computer-readable medium comprising instructions stored thereon, which when executed by the processor configure the user device to perform acts comprising: receiving a request for obtaining a first access profile for accessing a network in association with a subscription with an operator originating from a first security module associated with a first user device, the subscription comprising at least one second user device with which a second security module is associated, the second security module having obtained a second access profile for accessing the network in conjunction with said subscription, the request being addressed to the contact address of the server and comprising a datum allowing said server to interrogate a control server so as to obtain an order for downloading of the first access profile; as a function of the datum received, interrogating the control server so as to obtain an order for downloading of the first access profile into the first security module; and downloading the first access profile into the first security module on obtaining of an order originating from the control server, a confirmation being sent by the first user device to the second user device once the first access profile has been downloaded.
9. A non-transitory recording medium readable by a second user device and on which a program is recorded, the program comprising instructions which when executed by a processor of the second user device configure the second user device to obtain a first access profile for accessing a network for a first security module associated with a first user device, the second user device being associated with a second security module, the second security module having obtained second access profile for accessing the network in conjunction with a subscription with an operator, wherein the instructions configure the second user device to: on receipt of a command for associating the first user device with said subscription, send by the second user device to the first user device, a message comprising a contact address of a server configured to provide by downloading the first access profile and a datum allowing the server to interrogate a control server so as to obtain an order for downloading of the first access profile, said message being intended to trigger a sending by said first security module of a request for obtaining the first access profile in association with said subscription, the request being addressed to the contact address of the server and comprising said datum allowing said server to interrogate the control server; and receive by the second user device from the first user device of a confirmation of downloading of the first access profile into the first security module.
10. A non-transitory recording medium readable by a server and on which a program is recorded-, the program comprising instructions which when executed by a processor of the server configure the server to obtain a first access profile for accessing a network for a first security module associated with a first user device, wherein the instructions configure the server to: receive a request for obtaining the first access profile in association with a subscription with an operator originating from said first security module, the subscription comprising at least one second user device with which a second security module is associated, the second security module having obtained a second access profile for accessing the network in conjunction with said subscription, the request being addressed to the contact address of the server and comprising a datum allowing said server to interrogate a control server so as to obtain an order for downloading of the first access profile; as a function of the datum received, interrogating the control server so as to obtain an order for downloading of the first access profile into the first security module; and on obtaining of said order, downloading the first access profile into the first security module.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The technique for obtaining a communication network access profile for a first security module will be better understood with the aid of the following description of particular embodiments, with reference to the appended drawings in which:
(2)
(3)
(4)
(5)
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
(6)
(7) Hereinafter in the description, examples are presented of several embodiments applying to a security module of eUICC card type such as undergoing standardization within the framework of the GSMA association, but the method for obtaining an access profile also applies to other types of security module. More generally, the security module is an inviolable dedicated platform, comprising hardware and software, able to securely host applications and their confidential and cryptographic data and providing a secure execution environment for applications, for example a card of UICC type.
(8) The description which follows is concerned with the context of technical specifications, such as are defined by the GSMA association. More precisely, the architecture for remote configuration management is defined in the technical specification SGP.21 “RSP Architecture”, version 2.0, dated 23 Aug. 2016 and the procedures are defined in the technical specification SGP.22 “RSP Technical Specification” version 2.0 dated 14 Oct. 2016.
(9) A user device 10, with which a security module 20 is associated, is designed to access the network of a mobile operator by means of an access profile for the network generated by this operator for this security module. The user device 10 in association with the security module 20 form a first mobile terminal. More precisely, the access profile is generated for this security module by a subscription data management server, which is not represented in
(10) The communication network of the mobile operator, called mobile network, is for example a wireless communication network of 3G or 4G type, such as standardized by the 3GPP. The user devices 10, 11 each comprise a first communication module, designed to access the communication network.
(11) The access profile is identified by a unique number ICCID (for “Integrated Circuit Card ID”) making it possible to identify the access profile in a security module.
(12) The security module 20, 21 is typically a card of “eUICC” type (from the English “embedded Universal Integrated Circuit Card”), also called “eSIM” (from the English “embedded Subscriber Identity Module”), or embedded or irremovable SIM card. No limitation is attached to this type of card. In a particular embodiment, the security module 20, 21 is a chip card with an operating system offering the functionalities of a card of eUICC type. In another particular embodiment, the security module 20, 21 is integrated into the user device 10, 11 thus forming a single entity. Each security module 20, 21 is identified by a security module identifier EID (for “eUICC-ID”).
(13) In
(14) The server 30 links a protected profile folder to a security module and downloads, once a secure downloading session has been established, this or these access profiles linked to an LPA (for “Local Profile Assistant”) application executing on the user device.
(15) In
(16) It is underscored here that for the sake of simplification, other items of equipment in particular responsible for operations and maintenance, for billing, for order taking, . . . are not represented in this
(17) The user devices 10, 11 also comprise a second communication module, allowing them to communicate directly (that is to say without passing through the mobile communication network). The two user devices 10, 11 are thus situated in proximity to one another. A particular embodiment involves a near field communication module, for example an NFC (for “Near Field Communication”) module. Another particular embodiment involves a short-range radio communication module of WiFi, Bluetooth type. Yet another embodiment involves a wired communication module.
(18) The various exchanges between the two user devices 10, 11 are carried by a communication channel established by means of the second communication module.
(19) The method for obtaining a communication network access profile for the second security module 21 will now be described in conjunction with
(20) In the initial state, it is assumed that the user of the user device 10 and of the first security module 20 has taken out a subscription with a communication network operator. In return, he has obtained an activation code AC (for “Activation Code”) which has allowed him to install on the first security module 20 an access profile for the network ICCID1. Once the access profile has been installed, the user can access the communication network and the services provided by the operator of the network within the framework of his subscription contract. The first security module 20 has thus obtained an access profile for accessing the network in conjunction with this subscription.
(21) A direct communication channel, represented by an arrow in
(22) A user or a pool manager has decided to add the second user device 11, more precisely the second security module 21, to this subscription. In a particular embodiment, the subscription makes it possible to associate a plurality of security modules (so-called “multi-SIM”). In another particular embodiment, the subscription makes it possible to associate a single security module. A modification of the subscription is then required. In another embodiment, the user or the pool manager has decided to transfer access to the network from the first security module 20 to the second security module 21 within the framework of his subscription with the operator. Other cases of usage of this technique for obtaining an access profile can also be envisaged.
(23) This command for association of the second user device 11, more precisely of the second security module 21, can be transmitted by means of a man-machine interface of an application offered by the operator on the first user device 10. No limitation is attached to the way of transmitting this command. In a particular embodiment, this application offered by the operator corresponds to the LPA application. Four choices can be offered in an interaction menu: “add a second security module to my subscription”, “subscribe to a multi-security module option on the basis of my current subscription”, “transfer my subscription to a new security module”, “suspend an access profile”.
(24) The first user device 10 thus receives in a step E10 a command for associating the second user device 11 with a subscription with the operator.
(25) In a step E11, through a message M1, the first user device 10, more precisely the LPA application, requests the first security module 20 to provide it with the contact address of the server 30 configured to provide by downloading an access profile, an identification datum and a subscription identifier ID_S. The identification datum allows the server SM-DP+ 30 to determine (in particular when this server SM-DP+ is shared by several operators) and then to interrogate the control server 40 so as to obtain an order for downloading of the access profile, as described subsequently. The datum corresponds for example to an identifier of the operator. The subscription identifier ID_S makes it possible to identify the subscription which is associated with the access profile obtaining request. In an exemplary embodiment, the subscription identifier corresponds to a contract number in the operator's information system. The contract number is for example stored in the access profile by means of an action of personalization of the latter, requiring dynamic generation of the access profile. In another exemplary embodiment, the subscription identifier corresponds to the identifier of the access profile ICCID1 which has been downloaded into the first security module 20.
(26) We are concerned hereinafter with the case where these items of information were provided to the first security module 20 during distribution of the access profile ICCID1 in data associated with this access profile. These data are supplied by the operator. The identification datum may for example correspond to an operator identifier in the data. In another exemplary embodiment, the identification datum corresponds to a field “Service Provider Name” present in metadata associated with the access profile. In another exemplary embodiment, the identification datum corresponds to the pair MCC (for “Mobile Country Code”), MNC (for “Mobile Network Code”).
(27) The message M1 is received by the first security module 20 in a step F10. In response, the first security module 20 sends a message M2, comprising the contact address of the server SM-DP+ 30, the identification datum and the subscription identifier ID_S.
(28) In a step E12, the first user device 10, more precisely the LPA application of this device, sends a message M3 to the second user device 11, more precisely the LPA application executing on this second device. This message M3 carries an item of information relating to an action to be executed and comprises in particular the contact address of the server SM-DP+, the identification datum and the subscription identifier ID_S. It is intended to trigger a sending by the second security module 21 of a request for obtaining an access profile in association with the subscription ID_S.
(29) The message M3 is received in a step E20 by the second user device 11, more precisely the LPA application. Still in the course of this step E20, the second user device 11 sends the second security module 21 a message M4, comprising the data received in the message M3, in particular the item of information relating to an action to be executed, the contact address of the server SM-DP+, the identification datum allowing the server SM-DP+ 30 to interrogate the control server 40 and the subscription identifier ID_S. This message M4 commands the second security module 21 to obtain an access profile with the server SM-DP+ 30 whose contact address is provided in the message M4.
(30) The message M4 is received by the second security module 21 in a step F20. Still in this step F20, the second security module 21 sends an access profile request message M5 to the server SM-DP+ 30 by way of the second user device 11. More precisely, as illustrated in
(31) This message M5 is received by the server SM-DP+ 30 in a step G1. The server SM-DP+ 30 determines that it does not have the information necessary for distributing the access profile. Indeed, this message M5 does not comprise information allowing the server SM-DP+ 30 to identify an access profile to be downloaded. The server SM-DP+ 30 then sends a message M6 to the control server 40 of the operator identified by the identification datum received. This message M6 comprises in particular the action to be executed, the subscription identifier ID_S and the security module identifier EID. The interface between the server SM-DP+ 30 and the control server 40, called interface ES2+ and defined in the specifications of the GSMA Association, is thus adapted to allow the sending of the message M6, allowing the server SM-DP+ 30 to invoke the control server 40 when no access profile is identified in an access profile request.
(32) The message M6 is received by the control server 40 in a step H1. The control server 40 determines as a function of the action to be executed and of the current subscription, which are received in the message M6, the actions which must be implemented in the operator's information system. These actions are not further detailed here. We are concerned hereinafter with the case where the decision mechanisms implemented by the control server 40 have led to a decision to download, and if relevant to generate, an access profile.
(33) In a step H2, the control server 40 sends a message M7 to the server SM-DP+ 30. More precisely, this message M7 corresponds to a message “ES2+.DownloadOrder” and gives instruction to the server SM-DP+ of a new profile reservation request. This message M7 allows in particular the server SM-DP+ 30 to reserve an access profile whose identifier is ICCID2. The server SM-DP+ processes this instruction in a step G2 by reserving the access profile ICCID2 or by generating it according to the embodiment.
(34) Still in this step H2, the control server 40 sends a message M8 to the server SM-DP+ 30. More precisely, this message M8 corresponds to a message “ES2+.ConfirmOrder” and confirms the order for downloading “ES2+.DownloadOrder”. In step G2, the server SM-DP+ 30 downloads the access profile ICCID2 (message M9) onto the second security module 21.
(35) The access profile ICCID2 is received and stored by the second security module 21 in a step F21.
(36) In a particular embodiment, the access profile ICCID2 comprises in data associated with the access profile the contact address of the server 30 configured to provide by downloading an access profile, an identification datum and a subscription identifier. This makes it possible to implement the method for obtaining an access profile for a third security module, either from the first user device or terminal 10 or from the second user device or terminal 11.
(37) Once the access profile ICCID2 has been downloaded and installed, the second security module 21 sends a confirmation (message M10) to the second user device 11 of the execution of the message M4 commanding obtaining of an access profile with the server SM-DP+ 30.
(38) The second user device 11 then sends a confirmation (message M11) to the first user device 10, which receives it in a step E13. This confirmation message is a confirmation of downloading of the access profile ICCID2 into the second security module 21. The first user device 10 can then inform the user or the pool manager thereof by way of his man-machine interface. It is underscored here that the successful installation of the access profile triggers a sending of a confirmation (not represented in
(39) In the embodiment described, the message M5, addressed to the server SM-DP+ 30 at the contact address, comprises the action to be executed, the identification datum, the subscription identifier and the security module identifier, which is associated with the action to be executed. In another embodiment, the message M5 is a request for obtaining an access profile, comprising the identification datum, the subscription identifier and the security module identifier, which is associated with the action to be executed.
(40) In the embodiment described, the contact address of the server SM-DP+, the identification datum and the subscription datum ID_S have been provided in data associated with the access profile when downloading the latter into the first security module 20.
(41) In another embodiment, only the contact address of the server SM-DP+ is provided in data associated with the access profile when downloading the latter into the first security module 20. The access profile identifier ICCID1 is transmitted in the various messages exchanged in the guise of datum allowing the server SM-DP+ to identify and to interrogate a control server and in the guise of subscription identifier. The server SM-DP+ 30 determines on the basis of the access profile identifier ICCID1 the operator concerned and thus the control server to be contacted. The control server 40 can obtain on the basis of the access profile identifier ICCID1 the associated contract number by interrogating the database 41. This makes it possible to limit the modifications to be made to the access profile.
(42) In another embodiment, the identification datum is obtained by one of the items of equipment (user device 10, 11, server SM-DP+ 30) on the basis of the network-access identifier, known by the name IMSI, in particular on the basis of the fields MCC and MNC.
(43) It is underscored here that the second security module 21 sends a message destined for the server SM-DP+ by way of the second user device 11. At this juncture, no access profile is downloaded nor installed for this second terminal. This second terminal therefore cannot communicate by way of the communication network. In a particular embodiment, the exchanges are effected by means of a communication channel of WiFi type established in a local network. In another embodiment, the first terminal, formed of the user device 10 and of the security module 20, serves as relay toward the server SM-DP+ 30 via the mobile communication network and the exchanges are effected by means of a communication channel established between the first 10 and second 11 user devices.
(44) In a particular embodiment, the subscription identifier ID_S is supplied by the user or the pool manager by means of the man-machine interface of the application offered by the operator on the first user device 10 as a supplement to the association command.
(45) In a particular embodiment, a security code is provided by the user by means of the man-machine interface of an application offered by the operator on the first user device 10. This security code may for example be provided at the same time as the association command. In a variant embodiment, the security code is verified by the security module 20. In another variant embodiment, the security code is transmitted in the various messages M3 (from the user device 10 to the user device 11), M4 (from the user device 11 to the security module 21), M5 (from the security module 21 to the server SM-DP+ 30) and M6 (from the server SM-DP+ 30 to the control server 40). The control server 40 then verifies the security code during step H1. This security code makes it possible to verify that the action has indeed been requested by an authorized user. It is underscored here that this security code may in certain particular embodiments correspond to that of the security module or else that of the user device.
(46) No limitation is attached to these various embodiments and the person skilled in the art is able to define others making it possible to command a downloading of an access profile for a security module from a user device with which is associated another security module with an access profile installed within the framework of a subscription.
(47)
(48) The command module 103 is furthermore designed to receive from the second user device a confirmation of downloading of the access profile into the second security module.
(49) In a particular embodiment, the command module 103 is furthermore designed to obtain the contact address of the security module.
(50) In a particular embodiment, the command module 103 is furthermore designed to obtain the datum allowing the server to interrogate the control server of the security module.
(51) In a particular embodiment, the command module 103 is also designed to implement an LPA application.
(52) In a particular embodiment, the interaction module 104 is designed to interact with a user of the user device 10 by way of a man-machine interface.
(53) It is underscored here that the user device 10 also comprises other processing modules, not represented in
(54)
(55) It is underscored here that the server 30 also comprises other processing modules, not represented in
(56) The technique for obtaining an access profile is implemented by means of software components and/or hardware components. In this regard, the term “module” may correspond in this document equally to a software component, to a hardware component or to a set of hardware and/or software components, able to implement a function or a set of functions, according to what is described above in respect of the module in question.
(57) A software component corresponds to one or more computer programs, one or more subroutines of a program, or more generally to any element of a program or of software. Such a software component is stored in memory and then loaded and executed by a data processor of a physical entity, and is able to access the hardware resources of this physical entity (memories, recording media, communication buses, electronic input/output cards, user interfaces, etc.).
(58) In the same way, a hardware component corresponds to any element of a hardware assembly. It may be a programmable or non-programmable hardware component, with or without an integrated processor for executing software. It is for example an integrated circuit, a chip card, an electronic card for the execution of firmware, etc.
(59) In a particular embodiment, the modules 103, 104 are designed to implement the obtaining method described above. This preferably involves software modules comprising software instructions for executing those of the steps of the method for obtaining an access profile described above, that are implemented by a user device. The invention therefore also relates to: a program for a user device, comprising program code instructions intended to control the execution of the steps of the method for obtaining an access profile described above, when said program is executed by this device; a recording medium readable by a device on which the program for a device is recorded.
(60) In a particular embodiment, the modules 302, 303, 304 are designed to implement the obtaining method described above. This preferably involves software modules comprising software instructions for executing those of the steps of the method for obtaining an access profile described above that are implemented by a server. The invention therefore also relates to: a program for a server, comprising program code instructions intended to control the execution of the steps of the method for obtaining an access profile described above, when said program is executed by this server; a recording medium readable by a server on which the program for a server is recorded.
(61) The software modules may be stored in or transmitted by a data medium. This may be a hardware storage medium, for example a CD-ROM, a magnetic floppy disk or a hard disk, or else a transmission medium such as an electrical, optical or radio signal, or a telecommunication network.
(62) The invention relates furthermore to a system 1 comprising a first user device 10 and a server 30 which is configured to provide by downloading an access profile such as are described above. This system furthermore comprises a second user device 11 with which a second security module 21 is associated, forming a second terminal comprising: a communication module, designed to receive from the first user device a message comprising a contact address of a server 30 configured to provide by downloading an access profile and a datum allowing the server to interrogate a control server 40 so as to obtain an order for downloading of an access profile for the second security module; a profile-obtaining module, designed to send a request for obtaining an access profile in association with a subscription with an operator, the subscription comprising at least the first user device 10 with which the first security module 20 is associated, the request being addressed to the contact address of the server and comprising said datum, and to download the access profile into the second security module;
said communication module furthermore being designed to send to the first user device a confirmation of downloading of the access profile into the second security module.
(63) Although the present disclosure has been described with reference to one or more examples, workers skilled in the art will recognize that changes may be made in form and detail without departing from the scope of the disclosure and/or the appended claims.