×

Key derivation for a module using an embedded universal integrated circuit card

  • US 10,700,856 B2
  • Filed: 11/27/2018
  • Issued: 06/30/2020
  • Est. Priority Date: 11/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A subscription manager system for distributing a profile to a module comprising:

  • (1) one or more processors; and

    (2) first non-transitory computer-readable media operatively connected to the one or more processors and having stored thereon machine-readable instructions that, when executed by the one or more processors, cause the one or more processors to perform a method comprising steps of;

    (a) recording, in second non-transitory computer-readable media, a digital signature algorithm comprising an elliptic curve digital signature algorithm;

    (b) recording, in the second non-transitory computer-readable media, a module identity, a server private key, and a server certificate for a corresponding server public key, wherein the server public key and the server private key use the elliptic curve digital signature algorithm;

    (c) recording, in the second non-transitory computer-readable media, a symmetric ciphering algorithm, wherein the symmetric ciphering algorithm comprises an Advanced Encryption Standard with a 128 bit key length;

    (d) receiving a certificate associated with the module from a module provider system associated with a module provider, wherein the certificate includes the module identity, a module public key, and cryptographic parameters;

    (e) verifying the certificate associated with the module using a certificate authority;

    (f) sending, to the module, the server certificate, wherein the module verifies the server certificate using a certificate authority public key stored by the module;

    (g) receiving a challenge from the module;

    (h) generating a network private key and a corresponding network public key, using a key pair generation algorithm and the cryptographic parameters;

    (i) sending the generated network public key to the module;

    (j) sending a digital signature and the challenge to the module, wherein the digital signature is generated using the server private key, the challenge, and the digital signature algorithm, wherein the module verifies the digital signature using at least the server public key;

    (k) generating a mutually derived shared key using Elliptic Curve Diffie-Hellman based on at least;

    i. the module public key;

    ii. the network private key; and

    iii. the cryptographic parameters,wherein the mutually derived shared key is derived by the module based on at least;

    iv. a module private key associated with the module public key;

    v. the network public key; and

    vi. the cryptographic parameters;

    (l) encrypting the profile using;

    i. the symmetric ciphering algorithm, andii. the mutually derived shared key; and

    (m) sending the encrypted profile, wherein the encrypted profile includes network access credentials for a wireless network.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×