PROVISIONING OF SECURITY MODULES

A method of managing the provisioning of security modules is described. On successful loading onto a selected chip of a data file providing a service credential for an associated subscription profile, a proof of loading (PoL) file is generated that is cryptographically authenticated using a PoL sign...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: BIGET, Patrick Marcel Roland, ALLARD, Jérôme, Frédérick, LÜDERS-JENSEN, Kim, TEBBUTT, Colin, Dean
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A method of managing the provisioning of security modules is described. On successful loading onto a selected chip of a data file providing a service credential for an associated subscription profile, a proof of loading (PoL) file is generated that is cryptographically authenticated using a PoL signing key, the PoL file identifying a unique data file identifier for the loaded data file and a unique chip identifier of the chip onto which the loaded data file has been loaded. The PoL file is processed using token generation software executed in a secure execution environment. The token generation software restricts generation of a token to ensure that, for a given data file, if two or more chips are successfully loaded with that given data file, the token is generated for only one of the two or more chips. In response to successful generation of the token for the selected chip, the selected chip is activated for service access.