Patent application number | Description | Published |
20110211699 | Key distribution method and system - This invention discloses a key distribution method and system. The method includes: notifying, by an application provider management platform, a supplementary security domain of an application provider that is set on a smart card and corresponds to the application provider management platform to generate a public/private key pair including a public cryptographic key and a private cryptographic key; receiving, by the application provider management platform, the public cryptographic key from the supplementary security domain of the application provider that has been encrypted by the public key of the application provider obtained in advance and has been signed by a Controlling Authority Security Domain (CASD) on the smart card through a card issuer management platform; authenticating, by the application provider management platform, a signature and using the private key of the application provider to perform decryption to obtain the public cryptographic key; and sending, by the application provider management platform, a trust point's public is key used for external authentication and a certificate of the supplementary security domain of the application provider to the supplementary security domain of the application provider after the trust point's public key and the certificate have been encrypted by the public cryptographic key of the supplementary security domain of the application provider and the encrypted data have been signed by the private key of the application provider, to complete distribution of a key of the supplementary security domain. | 09-01-2011 |
20120173743 | Method and System for Changing Selected Home Operator of Machine to Machine Equipment - A method and a system for changing the Selected Home Operator (SHO) of a Machine to Machine Equipment (M2ME) are disclosed. The method includes: the M2ME establishing a connection with a Registration Operator (RO) through a Trusted Environment (TRE) functional entity, the RO registering the M2ME in the new SHO; the new SHO sending the new International Mobile Subscriber Identity (IMSI) to the RO or authorizing the RO to provide a new IMSI after it has passed the verification of the M2ME by the Platform Validation Authority (PVA); the RO sending the new IMSI to the M2ME through the connection established by the TRE functional entity; the M2ME replacing the old IMSI in the Universal Integrated Circuit Card (UICC) with the new IMSI; wherein the UICC and the TRE function entity are all located in the M2ME. | 07-05-2012 |
20120178418 | Method and System for Changing a Selected Home Operator of a Machine to Machine Equipment - A method and system for changing a SHO of a M2ME are provided. The method includes: mode one: a new SHO receiving parameters of the M2ME, after the M2ME passes the verification by a PVA, providing a MCIM of the new SHO to the M2ME through a connection between the M2ME and a RO provided by an old SHO; and the M2ME installs the new MCIM in a UICC; or, mode two: a new SHO receiving parameters of the M2ME, after the M2ME passes the verification by a PVA, providing a MCIM of the new SHO to the M2ME through a connection between the M2ME and a RO established by a TRE functional entity; and the M2ME installs the new MCIM in a UICC; and both the UICC and the TRE functional entity are located in the M2ME. The present invention is able to change the SHO of the M2ME. | 07-12-2012 |
20130290723 | Key sharing method and system for machine type communication (MTC) server - The disclosure discloses a key sharing method for a Machine Type Communication (MTC) server, wherein when establishing a safe connection and performs safe communications with a first MTC server via a Generic Bootstrapping Architecture (GBA) process, an MTC device may send a second MTC server a request message containing a bootstrapping identifier (B-TID) currently used by the MTC device and the first MTC server and a host identifier NAF-ID | 10-31-2013 |
20140134995 | Method and system for triggering MTC device - The present disclosure discloses a method and system for triggering a Machine Type Communication MTC device. The method includes that: an MTC server sends a Bootstrapping Server Function entity BSF a request message including information on a GBA-PUSH Information GPI request and information on a triggering request; the BSF generates GPI and adds parametric information of a triggering instruction in the GPI according to the information on the triggering request through a GPI request processing flow, and sends the GPI including the parametric information of the triggering instruction to the MTC server; the MTC server sends the GPI including the parametric information of the triggering instruction to an MTC device to be triggered; and the MTC device is triggered according to the parametric information of the triggering instruction in the received GPI. With the present disclosure, secure triggering of an MTC device is implemented, and it is ensured that a secure connection can be established between the MTC device and an MTC server. | 05-15-2014 |
20140244994 | Method, apparatus and system for binding MTC device and UICC - A method for binding a Machine Type Communication (MTC) device and a Universal Integrated Circuit Card (UICC) is disclosed. The method includes: during a process of establishment of a shared key, a Network Application Function (NAF) acquires identity information of the MTC device and identity information of the UICC ( | 08-28-2014 |
20140302816 | Method and apparatus for binding universal integrated circuit card and machine type communication device - The disclosure discloses a method and apparatus for binding a UICC and an MTC device to solve a problem of restriction to a binding relationship imposed by a life cycle of a pre-shared key Ks_local when binding of the MTC device and the UICC is implemented by way of GBA-U. With the disclosure, after a binding relationship between the MTC device and the UICC is established on the UICC, when a stored key shared by the MTC device and the UICC expires, a key Ks_local shared by the UICC and the MTC device can be re-established through a process of establishing the shared key Ks_local based on the GBA-U according to the established binding relationship, such that the binding relationship between the UICC and the MTC device is not restricted by the life cycle of a shared key Ks_local. | 10-09-2014 |