Key derivation for a module using an embedded universal integrated circuit card
First Claim
1. A method for a module using an embedded universal integrated circuit card (eUICC) to derive a first shared secret key and a second shared secret key, the method comprising the module:
- storing a network public key and a module identity in the eUICC, wherein the module uses the network public key to authenticate an eUICC subscription manager;
receiving a token for a key derivation function from the authenticated eUICC subscription manager;
deriving a module private key and a module public key, wherein the module sends the derived module public key and the module identity to the eUICC subscription manager;
deriving the first shared secret key using the key derivation function and a set of cryptographic parameters, wherein the key derivation function uses as input at least (i) the derived module private key, (ii) the set of cryptographic parameters, and (iii) the received token;
deriving the second shared secret key using (i) a shared secret algorithm and (ii) the derived first shared secret key as a random number for the shared secret algorithm, wherein the shared secret algorithm uses a secure hash algorithm; and
receiving an eUICC profile, wherein the eUICC uses the derived second shared secret key to decrypt the eUICC profile.
4 Assignments
0 Petitions
Accused Products
Abstract
A module with an embedded universal integrated circuit card (eUICC) can include a first eUICC profile and a set of cryptographic algorithms. The first eUICC profile can include an initial shared secret network key K for authentication with a wireless network. The module can receive a key K network token from, and send a key K module token to, an eUICC subscription manager (eUICC-SM). The module can use the key K network token, a derived module private key, a key derivation function, and a shared secret algorithm to derive a shared secret key that supports communication with the UICC-SM. eUICC-SM can use the received key K module token, a private key, the key derivation function, and the shared secret algorithm in order to derive the same shared secret key derived by the module. The module can subsequently receive a second eUICC profile encrypted using the derived shared secret key.
194 Citations
20 Claims
-
1. A method for a module using an embedded universal integrated circuit card (eUICC) to derive a first shared secret key and a second shared secret key, the method comprising the module:
-
storing a network public key and a module identity in the eUICC, wherein the module uses the network public key to authenticate an eUICC subscription manager; receiving a token for a key derivation function from the authenticated eUICC subscription manager; deriving a module private key and a module public key, wherein the module sends the derived module public key and the module identity to the eUICC subscription manager; deriving the first shared secret key using the key derivation function and a set of cryptographic parameters, wherein the key derivation function uses as input at least (i) the derived module private key, (ii) the set of cryptographic parameters, and (iii) the received token; deriving the second shared secret key using (i) a shared secret algorithm and (ii) the derived first shared secret key as a random number for the shared secret algorithm, wherein the shared secret algorithm uses a secure hash algorithm; and receiving an eUICC profile, wherein the eUICC uses the derived second shared secret key to decrypt the eUICC profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for a module using an embedded integrated circuit card (eUICC) to support authentication, the method comprising the module:
-
reading a module identity from a protected memory and sending the module identity to an eUICC subscription manager; receiving a first profile for the eUICC, wherein the first profile includes a first network module identity and a first key K; using the eUICC, the first network module identity, and the first key K to authenticate with a first wireless network, sending to an eUICC subscription manager an algorithm token for a shared secret algorithm after authenticating with the first key K, wherein the module uses an asymmetric ciphering algorithm to encrypt the algorithm token; deriving a shared secret key using the algorithm token and the shared secret algorithm, wherein the shared secret algorithm includes a secure hash algorithm and a component parameter; receiving a second profile for the eUICC, wherein the module decrypts the second profile using the derived shared secret key, wherein the decrypted second profile includes a second network module identity and a second key K; and authenticating with a second wireless network using the second network module identity and the second key K. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method for a module to send a sensor measurement, the method comprising the module:
-
recording in a protected memory a first module private key, a first module public key, a server public key, and a module identity; sending (i) the module identity and (ii) a module digital signature to a server for an embedded universal integrated circuit card (eUICC) subscription manager, wherein the module uses the first module private key for the module digital signature, and wherein the module sends from an Internet Protocol address and port (IP;
port) number;receiving a response at the IP;
port number, wherein the response includes a server digital signature and a first shared secret key, wherein the module verifies the server digital signature using the server public key, wherein the first shared secret key is decrypted with an asymmetric ciphering algorithm and the first module private key;deriving a second shared secret key using (i) a shared secret algorithm and (ii) the received first shared secret key as a random number for the shared secret algorithm, wherein the shared secret algorithm uses a secure hash algorithm; receiving (i) a set of cryptographic parameters, and (ii) a profile for an eUICC, wherein the profile is decrypted using the derived second shared secret key; deriving a second module public key and a second module private key using the set of cryptographic parameters; selecting the received profile before authenticating with a wireless network; sending a message with the second module public key and the module identity, wherein the module authenticates using the first module private key; and
,sending the sensor measurement in a module encrypted data, wherein the module uses the second module private key to encrypt the module encrypted data. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification