Methods and apparatus for establishing a secure communication channel
First Claim
1. A method by an embedded Universal Integrated Circuit Card (eUICC), the method comprising:
- at the eUICC, which is associated with a long-term public key (PKeUICC) and a long-term private key (SKeUICC);
transmitting, to a server via a wireless device, a request to establish a first secure connection with the server, wherein the eUICC is present in the wireless device, and wherein the server is associated with a long-term public key (PKserver) and a long-term private key (SKserver);
producing a signature by using SKeUICC;
sending the signature to the server via the wireless device;
authenticating the server using PKserver;
generating an ephemeral public key (ePKeUICC) and an ephemeral private key (eSKeUICC);
signing ePKeUICC using SKeUICC to produce a signed ePKeUICC;
providing the signed ePKeUICC to the server via the wireless device;
receiving, from the server via the wireless device, an ephemeral key (ePKsewer) that is signed using SKserver;
generating a shared symmetric key using SKeUICC and ePKserver;
storing, within a security domain of the eUICC, the shared symmetric key;
establishing, at a first time, the first secure connection using the shared symmetric key; and
using, at a second time subsequent to the first time, the shared symmetric key to communicate with the server over a second secure connection.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for establishing a secure communication channel between an off-card entity and an embedded Universal Integrated Circuit Card (eUICC) is provided. The method involves establishing symmetric keys that are ephemeral in scope. Specifically, an off-card entity, and each eUICC in a set of eUICCs managed by the off-card entity, possess long-term Public Key Infrastructure (PKI) information. When a secure communication channel is to be established between the off-card entity and an eUICC, the eUICC and the off-card entity can authenticate one another in accordance with the respectively-possessed PKI information (e.g., verifying public keys). After authentication, the off-card entity and the eUICC establish a shared session-based symmetric key for implementing the secure communication channel. Specifically, the shared session-based symmetric key is generated according to whether perfect or half forward security is desired. Once the shared session-based symmetric key is established, the off-card entity and the eUICC can securely communicate information.
23 Citations
20 Claims
-
1. A method by an embedded Universal Integrated Circuit Card (eUICC), the method comprising:
at the eUICC, which is associated with a long-term public key (PKeUICC) and a long-term private key (SKeUICC); transmitting, to a server via a wireless device, a request to establish a first secure connection with the server, wherein the eUICC is present in the wireless device, and wherein the server is associated with a long-term public key (PKserver) and a long-term private key (SKserver); producing a signature by using SKeUICC; sending the signature to the server via the wireless device; authenticating the server using PKserver; generating an ephemeral public key (ePKeUICC) and an ephemeral private key (eSKeUICC); signing ePKeUICC using SKeUICC to produce a signed ePKeUICC; providing the signed ePKeUICC to the server via the wireless device; receiving, from the server via the wireless device, an ephemeral key (ePKsewer) that is signed using SKserver; generating a shared symmetric key using SKeUICC and ePKserver; storing, within a security domain of the eUICC, the shared symmetric key; establishing, at a first time, the first secure connection using the shared symmetric key; and using, at a second time subsequent to the first time, the shared symmetric key to communicate with the server over a second secure connection. - View Dependent Claims (2, 3, 4, 5, 6)
-
7. An embedded Universal Integrated Circuit Card (eUICC) comprising:
-
a memory; and one or more processors, wherein the eUICC is present in a wireless device, and wherein the memory includes instructions that when executed by a processor of the one or more processors, cause the eUICC to perform operations comprising; transmitting, to a server via the wireless device, a request to establish a first secure connection with the server, wherein the server is associated with a long-term public key (PKserver) and a long-term private key (SKserver), producing a signature by using an eUICC long-term private key (SKeUICC), sending the signature to the server via the wireless device, authenticating the server using PKserver, generating an ephemeral public key (ePKeUICC) and an ephemeral private key (eSKeUICC), signing ePKeUICC using SKeUICC to produce a signed ePKeUICC, providing the signed ePKeUICC to the server via the wireless device, receiving, from the server via the wireless device, an ephemeral key (ePKserver) that is signed using SKserver, generating a shared symmetric key using SKeUICC and ePKserver, storing, within a security domain of the eUICC, the shared symmetric key, establishing, at a first time, the first secure connection using the shared symmetric key, and using, at a second time subsequent to the first time, the shared symmetric key to communicate with the server over a second secure connection. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An apparatus comprising:
an embedded universal integrated circuit card, wherein the eUICC includes a memory; and
one or more processors, wherein the memory includes instructions that when executed by a processor of the one or more processors, cause the eUICC to perform operations comprising;transmitting, to a server via the apparatus, a request to establish a first secure connection with a server, wherein the request includes PKeUICC, wherein the server is associated with a long-term public key (PKserver) and a long-term private key (SKserver), producing a signature by using an eUICC a long-term private key (SKeUICC), sending the signature to the server via the apparatus, authenticating the server using PKserver, providing PKeUICC to the server, receiving, from the server via the apparatus, an ephemeral key (ePKsewer) that is signed using SKserver, generating a shared symmetric key using SKeUICC and ePKsewer, storing, within a security domain of the eUICC, the shared symmetric key, establishing, at a first time, the first secure connection using the shared symmetric key, and using, at a second time subsequent to the first time, the shared symmetric key to communicate with the server over a second secure connection. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
Specification