Embedded universal integrated circuit card supporting two-factor authentication
First Claim
1. A module comprising:
- 1) one or more first processors; and
2) a first non-transitory computer-readable memory operatively connected to the one or more processors, the non-transitory computer-readable memory having stored thereon;
(i) a network application; and
(ii) machine-readable instructions that, when executed by the one or more processors cause the one or more processors to perform, using the network application, a method for providing information to and obtaining information from a subscription manager system and providing information to and receiving information from an embedded universal integrated circuit card in the module;
wherein the embedded universal integrated circuit card is operatively connected to the one or more first processors and comprises;
(I) one or more second processors; and
(II) a second non-transitory computer-readable memory operatively connected to the one or more second processors, the non-transitory computer-readable memory having stored thereon machine readable instructions that, when executed by the one or more second processors cause the one or more second processors to perform steps of;
(a) generating, by the embedded universal integrated circuit card, a first message comprising;
(1) an identity of the embedded universal integrated circuit card;
(2) a nonce; and
(3) a first digital signature, generated using a first eUICC private key, wherein the first eUICC private key corresponds to a first eUICC public key;
(b) providing, by the by the embedded universal integrated circuit card to the network application, the first message to be sent to the subscription manager system;
(c) deriving, by the embedded universal integrated circuit card, a second eUICC private key and a corresponding second eUICC public key using a first random number generator and a set of cryptographic algorithms;
(d) recording, by the embedded universal integrated circuit card, a subscription manager public key which corresponds to a subscription manager private key;
(e) deriving, by the embedded universal integrated circuit card, a profile key using a key exchange algorithm based on at least;
(i) the second eUICC private key, and(ii) the recorded subscription manager public key,wherein the profile key can also be derived at the subscription manager system based at least on;
(iii) the second eUICC public key, and(iv) the subscription manager private key;
(f) receiving, by the embedded universal integrated circuit card via the network application from the subscription manager, an encrypted profile comprising a ciphertext including a key K encrypted with a symmetric key;
(g) receiving, by the embedded universal integrated circuit card, the symmetric key;
(h) decrypting, by the embedded universal integrated circuit card, the ciphertext using the symmetric key;
(i) decrypting, by the embedded universal integrated circuit card, the encrypted profile using the profile key; and
(j) storing, by the embedded universal integrated circuit card, the decrypted profile in the embedded universal integrated circuit card for use in future communications.
3 Assignments
0 Petitions
Accused Products
Abstract
A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.
236 Citations
18 Claims
-
1. A module comprising:
-
1) one or more first processors; and 2) a first non-transitory computer-readable memory operatively connected to the one or more processors, the non-transitory computer-readable memory having stored thereon; (i) a network application; and (ii) machine-readable instructions that, when executed by the one or more processors cause the one or more processors to perform, using the network application, a method for providing information to and obtaining information from a subscription manager system and providing information to and receiving information from an embedded universal integrated circuit card in the module; wherein the embedded universal integrated circuit card is operatively connected to the one or more first processors and comprises; (I) one or more second processors; and (II) a second non-transitory computer-readable memory operatively connected to the one or more second processors, the non-transitory computer-readable memory having stored thereon machine readable instructions that, when executed by the one or more second processors cause the one or more second processors to perform steps of; (a) generating, by the embedded universal integrated circuit card, a first message comprising; (1) an identity of the embedded universal integrated circuit card; (2) a nonce; and (3) a first digital signature, generated using a first eUICC private key, wherein the first eUICC private key corresponds to a first eUICC public key; (b) providing, by the by the embedded universal integrated circuit card to the network application, the first message to be sent to the subscription manager system; (c) deriving, by the embedded universal integrated circuit card, a second eUICC private key and a corresponding second eUICC public key using a first random number generator and a set of cryptographic algorithms; (d) recording, by the embedded universal integrated circuit card, a subscription manager public key which corresponds to a subscription manager private key; (e) deriving, by the embedded universal integrated circuit card, a profile key using a key exchange algorithm based on at least; (i) the second eUICC private key, and (ii) the recorded subscription manager public key, wherein the profile key can also be derived at the subscription manager system based at least on; (iii) the second eUICC public key, and (iv) the subscription manager private key; (f) receiving, by the embedded universal integrated circuit card via the network application from the subscription manager, an encrypted profile comprising a ciphertext including a key K encrypted with a symmetric key; (g) receiving, by the embedded universal integrated circuit card, the symmetric key; (h) decrypting, by the embedded universal integrated circuit card, the ciphertext using the symmetric key; (i) decrypting, by the embedded universal integrated circuit card, the encrypted profile using the profile key; and (j) storing, by the embedded universal integrated circuit card, the decrypted profile in the embedded universal integrated circuit card for use in future communications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification