Tamper resistant device for an integrated circuit card
First Claim
1. A tamper resistant device for an embedded Universal Integrated Circuit Card, the device comprising:
- memory storing a first security domain that includes a telecommunication profile and a second security domain that includes an application profile;
a first physical interface configured to be coupled to a baseband processor that is configured to operate with a mobile telecommunications network, the first physical interface configured to allow the baseband processor to access the telecommunication profile; and
a second physical interface configured to be coupled to an application processor, the second physical interface configured to allow the application processor to access the application profile, wherein the tamper resistant device is configured to enable accessibility to the application profile when corresponding commands are received in signals exchanged at the first interface and to enable accessibility to the telecommunication profile if corresponding commands are received in signals exchanged at the second interface, and wherein the device is configured to perform a routing operation to select whether accessibility to the first security domain or the second security domain is enabled based on which physical interface the commands are received.
2 Assignments
0 Petitions
Accused Products
Abstract
A tamper resistant device can be used for an integrated circuit card. The device includes memory storing a first security domain that includes a telecommunication profile and a second security domain that includes an application profile. A first physical interface is configured to be coupled to a baseband processor configured to operate with a mobile telecommunications network. A second physical interface configured to be coupled to an application processor. The first physical interface configured to allow the baseband processor to access the telecommunication profile and the second physical interface is configured to allow the application processor to access the application profile. The tamper resistant device is configured to enable accessibility to the application profile if corresponding commands are received at the first interface and to enable accessibility to the telecommunication profile if corresponding commands are received at the second interface.
15 Citations
21 Claims
-
1. A tamper resistant device for an embedded Universal Integrated Circuit Card, the device comprising:
-
memory storing a first security domain that includes a telecommunication profile and a second security domain that includes an application profile; a first physical interface configured to be coupled to a baseband processor that is configured to operate with a mobile telecommunications network, the first physical interface configured to allow the baseband processor to access the telecommunication profile; and a second physical interface configured to be coupled to an application processor, the second physical interface configured to allow the application processor to access the application profile, wherein the tamper resistant device is configured to enable accessibility to the application profile when corresponding commands are received in signals exchanged at the first interface and to enable accessibility to the telecommunication profile if corresponding commands are received in signals exchanged at the second interface, and wherein the device is configured to perform a routing operation to select whether accessibility to the first security domain or the second security domain is enabled based on which physical interface the commands are received. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An electronic device comprising:
-
a tamper resistant device implementing an integrated circuit card, the tamper resistant device storing a first security domain that includes a telecommunication profile and a second security domain that includes an application profile; a baseband processor configured to operate with a mobile telecommunications network; an application processor; a first physical interface configured to allow access from the baseband processor to the telecommunication profile, the first physical interface being a serial peripheral interface (SPI); and a second physical interface configured to allow access from the application processor to the application profile, the second physical interface being an International Standards Organization (ISO) interface, wherein the tamper resistant device is configured to enable accessibility to the application profile if corresponding commands are received in signals exchanged on the first interface and to enable accessibility to the telecommunication profile if corresponding commands are received in signals exchanged on the second interface. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of accessing profiles in a tamper resistant device implementing an embedded Universal Integrated Circuit Card, the device comprising a serial peripheral interface (SPI) configured to allow a baseband processor access to a telecommunications profile stored in a first security domain and an International Standards Organization (ISO) interface distinct from the serial peripheral interface, the ISO interface configured to allow an application processor access to an application profile stored in a second security domain, the method comprising:
-
receiving commands at the serial peripheral interface or the ISO interface; enabling accessibility to the application profile when the commands are received at the serial peripheral interface; and enabling accessibility to the telecommunication profile when the commands are received at the ISO interface. - View Dependent Claims (19, 20, 21)
-
Specification