[go: up one dir, main page]

WO2013176502A1 - Method for providing mobile communication provider information and device for performing same - Google Patents

Method for providing mobile communication provider information and device for performing same Download PDF

Info

Publication number
WO2013176502A1
WO2013176502A1 PCT/KR2013/004536 KR2013004536W WO2013176502A1 WO 2013176502 A1 WO2013176502 A1 WO 2013176502A1 KR 2013004536 W KR2013004536 W KR 2013004536W WO 2013176502 A1 WO2013176502 A1 WO 2013176502A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
module
euicc
mobile communication
encapsulated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/KR2013/004536
Other languages
French (fr)
Korean (ko)
Inventor
이형진
김관래
김주영
박철현
이진형
정윤필
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KT Corp
Original Assignee
KT Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020130057509A external-priority patent/KR102173534B1/en
Application filed by KT Corp filed Critical KT Corp
Priority to US14/403,102 priority Critical patent/US9924357B2/en
Publication of WO2013176502A1 publication Critical patent/WO2013176502A1/en
Anticipated expiration legal-status Critical
Priority to US15/696,320 priority patent/US10462667B2/en
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data

Definitions

  • the present invention relates to a method for providing mobile carrier information to a terminal having a built-in UICC and an apparatus for performing the same.
  • a UICC Universal Integrated Circuit Card
  • SMS Short Message Service
  • IMSI International Mobile Subscriber Identity
  • HPLMN Home Public Land Mobile Network
  • the UICC may be referred to as a subscriber identity module (SIM) card in the case of the Global System for Mobile communications (GSM) scheme, and may be referred to as a universal subscriber identity module (USIM) card in the case of a wideband code division multiple access (WCDMA) scheme. .
  • SIM subscriber identity module
  • GSM Global System for Mobile communications
  • USIM universal subscriber identity module
  • the terminal When the user mounts the UICC on the terminal, the terminal automatically performs user authentication using the information stored in the UICC so that the user can conveniently use the terminal.
  • the user when the user replaces the terminal, the user can easily replace the terminal while maintaining the mobile communication service and user information subscribed to by the user simply by mounting the UICC removed from the existing terminal to the new terminal. have.
  • the user may simply change the mobile communication provider by replacing the UICC inserted in the terminal currently being used with the UICC of another mobile communication provider.
  • the UICC of the existing removable plastic structure Built-in UICC (abbreviated as 'eUICC') to provide the same service as a detachable UICC even when a chip-type terminal integrated structure is provided instead of a detachable structure in order to provide more shock and heat resistance.
  • 'eUICC' Built-in UICC
  • the eUICC is mounted on the terminal at the manufacturing stage of the terminal and released, and due to the physical structure of the terminal that cannot be detached from the terminal, the eUICC cannot be changed through the eUICC detachment.
  • An object of the present invention for solving the above problems is to provide a mobile carrier information to the eUICC while maintaining a high security, and to provide a mobile carrier information that can maintain a high security even after the carrier information is stored in the eUICC To provide a way.
  • another object of the present invention is to provide a mobile communication provider information that can provide mobile carrier information to the eUICC, while maintaining a high security, even after the mobile carrier information is stored in the eUICC providing a mobile carrier information will be.
  • a method for providing mobile carrier information performed by a terminal having an eUICC, the mobile carrier information is encapsulated and included Receiving the received data and storing the received data in the eUICC.
  • the authentication key information for authentication of the terminal may be encapsulated to receive the included data.
  • the data encapsulated with the authentication key information may be configured as data of an authentication processing module for processing authentication of the terminal.
  • the encryption module data generating the format of the authentication key information for authentication of the terminal may be received in a different format than before.
  • the storing of the received data in the eUICC may include storing an authentication processing module configured to process authentication of the terminal in the eUICC, wherein the mobile communication service provider information includes an authentication key, wherein the authentication key is the authentication key. It may be stored in the eUICC in a state encapsulated in a processing module.
  • any one of an authentication success response, an authentication failure response, and a synchronization failure response May provide a response to the terminal.
  • the mobile communication provider information providing method may further include the step of performing a process for preventing the exposure of the authentication key when the authentication key is used after the authentication processing module is stored in the eUICC.
  • a method for providing mobile operator information the method for providing mobile operator information performed by a mobile operator server, the module encapsulating mobile operator information. Generating and transmitting the encapsulated module to a specific terminal.
  • the generating of the module encapsulating the mobile communication provider information may include generating the encapsulated module by encapsulating the authentication key with the mobile communication provider information in the authentication processing module performing the authentication process.
  • the encapsulated module may be generated as a file having the same form as the applet file.
  • the transmitting of the encapsulated module to a specific terminal may include transmitting the encapsulated module to a subscription manager-data preparation (SM-DP), and transmitting the encapsulated module to the SM-SR (SM-DP). And transmitting the encapsulated module to the specific terminal through an over the air (OTA) communication scheme.
  • SM-DP subscription manager-data preparation
  • SM-DP SM-SR
  • OTA over the air
  • the mobile operator information providing apparatus for achieving another object of the present invention, the processing for downloading the module in which the mobile carrier information is encapsulated and the module in which the mobile carrier information is encapsulated EUICC having a processing unit to perform.
  • the module in which the mobile communication provider information is encapsulated may include an authentication key encapsulating the authentication key of the device, and may be configured as an authentication processing module for performing authentication.
  • the processing unit may receive an authentication request message from the device and provide the authentication request message to the authentication processing module, and receive a response provided as an authentication result from the authentication processing module and provide the response to the device.
  • the authentication processing module performs an authentication process corresponding to the authentication request provided from the processing unit, and then, among the authentication success response indicating authentication success, authentication failure response indicating authentication failure, and synchronization failure response indicating synchronization failure. Any response may be provided to the device through the processing unit.
  • the information of the mobile carrier to be delivered for providing to the eUICC is encapsulated in arbitrary data such as an authentication processing module.
  • Authentication key can be delivered by applying the highest security technique.
  • the information of the mobile communication service provider can be delivered to the eUICC by applying the highest level of security.
  • the authentication key is encapsulated and stored inside the eUICC so that the interface to access the authentication key does not exist, so that the authentication key is not exposed by an external hacking attack using the interface, thereby replicating the eUICC. You can prevent it.
  • FIG. 1 is a conceptual diagram illustrating an environment in which a method for providing mobile service provider information according to an embodiment of the present invention is executed.
  • FIG. 2 is a conceptual diagram illustrating a method for providing mobile service provider information according to an embodiment of the present invention.
  • FIG. 3 is a flowchart illustrating an authentication process between a terminal and a mobile service provider network.
  • FIG. 4 is a block diagram illustrating a configuration of an eUICC to which a mobile communication service provider information providing method according to another embodiment of the present invention is applied.
  • FIG. 5 is a conceptual diagram illustrating a method for providing mobile carrier information according to another embodiment of the present invention.
  • FIG. 6 is a conceptual diagram illustrating a process of performing authentication processing after an authentication key is stored in an eUICC according to another embodiment of the present invention.
  • FIG. 7 illustrates an example of an authentication interface used in a method for providing mobile carrier information according to another embodiment of the present invention.
  • FIG. 8 illustrates an example of an authentication success response interface used in a method for providing mobile carrier information according to another embodiment of the present invention.
  • FIG. 9 illustrates an example of a synchronization failure response interface used in a method for providing mobile carrier information according to another embodiment of the present invention.
  • FIG. 10 is a flowchart illustrating a method for providing mobile carrier information according to another embodiment of the present invention.
  • FIG. 1 is a conceptual diagram illustrating an environment in which a method for providing mobile service provider information according to an embodiment of the present invention is executed.
  • a method of providing mobile carrier information is a mobile network operator (MNO) server (hereinafter referred to as an MNO server) 110, a subscriber information management server.
  • MNO mobile network operator
  • the 130 and the eUICC 150 may be performed in an environment connected to each other through a network.
  • the MNO server 110 is provided by the eUICC 150 to provide a mobile communication service to a subscriber who has subscribed to a mobile communication service provided by a mobile communication system such as Wideband Code Division Multiple Access (WCDMA) and Long Term Evolution (LTE). Generate mobile operator information.
  • a mobile communication system such as Wideband Code Division Multiple Access (WCDMA) and Long Term Evolution (LTE).
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • the mobile carrier information may be referred to by other terms such as an operator credential, an MNO credential, a profile, an eUICC profile, or a profile package.
  • the subscriber information management server 130 processes functions such as information management for the eUICC 150, information management for various telecommunication service providers, authentication and remote information change according to the change of the mobile communication service provider of the subscriber.
  • the subscriber information management server 130 issues overall management of the eUICC 150 such as issuing mobile operator information to the eUICC 150 and processing a procedure for changing a subscription or changing a mobile carrier. do.
  • the subscriber information management server 130 may include a subscription manager (SM: abbreviated as "SM”) or a profile manager (PM: profile manager, abbreviated as “PM”).
  • SM subscription manager
  • PM profile manager
  • SM uses the Subscription Manager-Data Preparation (SM-DP), which plays a role in generating mobile carrier information, and the Subscription Manager Secure Routing (SM-SR), which directly transfers operator information to eUICC (150). It may include.
  • SM-DP Subscription Manager-Data Preparation
  • SM-SR Subscription Manager Secure Routing
  • the SM-DP performs a process such as encryption on the data to be provided to the eUICC 150 by the mobile communication service provider (MNO), configures a package to which security is applied, and delivers it to the SM-SR.
  • MNO mobile communication service provider
  • the package to which security is applied may be composed of mobile communication provider information generated by the MNO server 110.
  • the SM-SR routes to another SM-SR or delivers to the corresponding eUICC 150 so that the security-applied package received from the SM-DP can be normally delivered to the target eUICC 150.
  • OTA over-the-air
  • the eUICC 150 decodes the OTA package received through the OTA communication method from the SM-SR, extracts the package encrypted by the SM-DP, and decodes the extracted package to obtain actual mobile service provider information. Mobile carrier information is stored in the eUICC (150).
  • FIG. 2 is a conceptual diagram illustrating a method for providing mobile service provider information according to an embodiment of the present invention.
  • the authentication key K will be described as an example of mobile communication provider information provided to the eUICC.
  • the MNO server 210 includes an authentication key K of a subscriber, a UICC data file (for example, a network connection file such as IMSI, HPLMN), a user information file (for example, an SMS file, Phonebook, etc.) and applets and the like, and generate the file to the SM-DP (230).
  • a UICC data file for example, a network connection file such as IMSI, HPLMN
  • a user information file for example, an SMS file, Phonebook, etc.
  • applets and the like and generate the file to the SM-DP (230).
  • the SM-DP 230 encrypts the file provided from the MNO server 210 and then transfers the encrypted file to the SM-SR 250.
  • the SM-DP 230 generates an OTA package including a file to be delivered to the eUICC 270 through the SM-SR 250, and the authentication key (K) of the subscriber and the UICC data file (for example, the OTA package).
  • K authentication key
  • a credential of a mobile communication service provider (MNO) such as IMSI, HPLMN, etc. may be included.
  • SM-SR 250 delivers the encrypted OTA package provided from SM-DP 230 to the corresponding eUICC 270.
  • the SM-SR 250 may deliver an OTA package to the eUICC 270 using an encrypted OTA communication method.
  • the eUICC 270 decrypts the encrypted OTA package received from the SM-SR 250 to obtain an authentication key K, a UICC data file, and the like, and stores the encrypted key.
  • the authentication key K encrypted by the SM-DP 230 and provided to the eUICC 270 is one of the mobile communication provider information as described above. That is, the authentication key K is a subscriber key shared between the eUICC 270 and the authentication center (AuC) of the mobile communication service provider and authenticates between the network of the mobile communication service provider and the subscriber (or eUICC 270). Used for
  • the authentication key is for authenticating the mobile operator network and has the highest level of importance in security. If the authentication key K value is exposed, the corresponding eUICC 270 can be duplicated, and the voice call, the multimedia message service (SMS / MMS), the data service, etc. of the subscriber can be hacked through the duplication.
  • K which is important information of the highest level of security, is applied at the same level of security (for example, a simple encryption level) as other information (for example, IMSI, HPLMN, SMS, phonebook, etc.). It is illustrated as passing through a wireless network.
  • level of security for example, a simple encryption level
  • other information for example, IMSI, HPLMN, SMS, phonebook, etc.
  • the subscriber authentication key information such as the authentication key K is provided and stored in the eUICC 270 during the opening process of the terminal, it is provided to the eUICC 270 before authentication with the eUICC 270 and the mobile communication network. In this process, an unsecured public wireless network is used.
  • the authentication key K since the authentication key K can be duplicated when the eUICC 270 is exposed, the authentication key K is information having the highest level of security. Therefore, in order to deliver the authentication key K, it is necessary to apply the highest security to the authentication key K and deliver it, and the highest security level for the authentication key K must be maintained even inside the eUICC 270.
  • a method for applying the highest level of security to the authentication key K and maintaining the highest level of security even after the authentication key is downloaded into the eUICC 270 is provided. to provide.
  • a method of applying the highest level of security to the authentication key K the eUICC 270 receives the authentication key K from the remote, the authentication key K is eUICC (270)
  • the authentication key information K is not used alone.
  • the authentication process of the terminal receives an input value (for example, a random number value) from the network to perform a predetermined calculation with the internally stored authentication key, and is processed by a method of delivering the calculation result to the network.
  • an input value for example, a random number value
  • the authentication key only needs to exist in the eUICC 270 in such a way that the eUICC 270 can perform authentication processing with the mobile service provider network without any problem.
  • the authentication key information K is independently transmitted. No output is required.
  • FIG. 3 is a flowchart illustrating an authentication process between a terminal and a mobile service provider network.
  • a mobile switching center (MSC) or a serving GPRS support node (SGSN) 330 transmits an authentication data request message to the authentication center 350 to perform an authentication procedure.
  • Subscriber authentication data is requested (S301).
  • the authentication data request message may include IMSI (International Mobile Subscriber Identity) information which is subscriber identification information of the telecommunication service.
  • IMSI International Mobile Subscriber Identity
  • the authentication center 350 distinguishes subscribers using IMSI information included in the authentication data request message received from the MSC or SGSN 330, and uses a random number (RAND), a K, an authentication management field (AMF), and a sequence (SQN). Based on the value of Number, an Expected Response (XRES), Authentication Token (AUTN), Ciphering Key (CK), Integrity Key (IK), and Message Authentication Code (MAK) value are generated (S303).
  • RAND random number
  • K an authentication management field
  • SQL authentication management field
  • SQN sequence
  • XRES Expected Response
  • AUTN Authentication Token
  • CK Ciphering Key
  • IK Integrity Key
  • MAK Message Authentication Code
  • the RAND means a random number, and is generated in a home network operated by a predetermined mobile communication provider and transmitted to the terminal 310.
  • K means a secret key and is called an authentication key, and is stored in each of the USIMs mounted on the authentication center 350 and the terminal 310 of the home network.
  • AMF is used to indicate the type of algorithm used for authentication and which key value was used when generating the authentication vector.
  • SQN is a sequence number, and the rules for generating an SQN for each mobile carrier may be different, and are used to confirm that the authentication vector received from the USIM is a new value.
  • XRES is used to determine the validity of a USIM card.
  • Authentication Token consists of SQN + AK, MAC and AMF.
  • Anonymity Key (AK) is used to mask the regularity of the SQN value by masking the increasing SQN value each time authentication is attempted.
  • CK is a value used for a ciphering algorithm, and is used to encrypt data transmitted between the terminal 310 and the MSC or SGSN 330.
  • IK is a value used in the integrity algorithm, and is used to verify the integrity of a signaling message transmitted and received over a radio section.
  • the MAC is used to determine the validity of the network in the terminal 310.
  • the authentication center 350 configures an authentication vector (AV) including RAND, XRES, CK, IK, and ATUN, and performs n authentication vectors (AV (AV) through an authentication data response message).
  • AV authentication vector
  • 1... n)) is transmitted to the MSC or SGSN 330 (S305).
  • one authentication vector consists of RAND, AUTN, CK, IK, and XRES
  • the AUTN consists of SQN + AK, MAC, and AMF.
  • n authentication vectors (AV (1 ... n)) mean an array of n authentication vectors having a basic configuration of RAND, AUTN, XRES, CK, and IK. That is, AV (i) means an authentication vector composed of RAND (i), AUTN (i), XRES (i), CK (i), and IK (i).
  • the MSC or SGSN 330 selects an authentication vector AV (i) to be used for authentication among n authentication vectors provided from the authentication center 350 and requests the authentication vector AV (i) to be authenticated (AUTHENTICATION REQUEST).
  • the RAND (i) and the AUTN (i) among the components of the selected authentication vector AV (i) are transmitted to the terminal 310 (S307).
  • the terminal 310 transmits the RAND (i) and the AUTN (i) included in the authentication request message received from the MSC or SGSN 330 to the USIM.
  • USIM inputs RAND (i), AUTN (i) value and K value, which is an authentication key stored in the USIM card, as input from the terminal 310, RES (Response), XMAC (Expected Message Authentication Code), and CK (Ciphering Key). ), IK (Integrity Key) and SQN (Sequence Number) values are generated (S309).
  • the USIM compares the MAC value provided from the RNC (Radio Network Controller) with the generated XMAC value (S311).
  • the USIM transmits an AUTHENTICATION REJECT message to the MSC or SGSN 330 (S313).
  • the authentication rejection message may include MAC failure as information indicating a cause of authentication failure.
  • the USIM determines whether the SQN value extracted from the AUTN is within a predetermined SQN range (S315).
  • the USIM if the SQN is out of a predetermined range, the USIM generates an AUTS and includes the synchronization failure information indicating the cause of the authentication failure in the AUTENTICATION REJECT message and the generated Authentication re-Synchronization token (AUTS).
  • AUTS Authentication re-Synchronization token
  • the USIM transmits the generated RES value to the MSC or SGSN 330 by including it in the authentication response (AUTHENTICATION RESPONSE) message (S319).
  • the MSC or SGSN 330 compares the RES value received from the terminal 310 (or USIM) and the XRES value stored in the VLR (Visitor Location Register) / SGSN through an AUTHENTICATION RESPONSE message (S321).
  • the MSC or SGSN 330 selects IK and CK from the authentication vector array (S323), thereby ending the entire authentication procedure.
  • the MSC or SGSN 330 receives an authentication rejection message from the terminal 310 through step S313, or if the RES value and the XRES value are different from each other, the authentication center reports an authentication failure message (AUTHENTICATION FAILURE REPORT) message. It transmits to 350 (S325).
  • the authentication failure report message may include information such as IMSI, cause of authentication failure, access type, authentication re-attempt information, VLR / SGSN address, and RAND value.
  • the MSC or SGSN 330 when the MSC or SGSN 330 receives an authentication rejection message from the terminal 310 through step S317, the MSC or SGSN 330 sends an authentication data request message to retry authentication. (S327).
  • the authentication data request message may include synchronization failure indication information, RAND or AUTS information.
  • the eUICC may include one authentication request message and three response messages, that is, an authentication response (AUTENTICATION).
  • AUTENTICATION RESPONSE (RES)
  • AUTENTICATION REJECT MAC failure
  • AUTENTICATION REJECT Sync failure
  • the terminal can process the above three types of responses to the authentication request, even if the authentication key K does not exist alone in the eUICC, the terminal can perform authentication with the mobile operator network. It means that there is.
  • FIG. 4 is a block diagram illustrating a configuration of an eUICC to which a mobile communication service provider information providing method according to another embodiment of the present invention is applied.
  • the eUICC 400 may include a processing unit 410 and an authentication processing module 430.
  • the processor 410 may perform a process necessary to download the authentication processing module 430.
  • the processor may execute various applications related to the eUICC 400.
  • the authentication processing module 430 is a module that performs processing related to authentication, and includes an authentication key K 431 encapsulated therein.
  • the authentication key K 431 downloaded by the eUICC 400 from the mobile communication service provider server is not transmitted in a single form, and a module of a predetermined type is used. Encapsulated and delivered.
  • encapsulating and transmitting the authentication key K 431 means not transmitting the authentication key K 431 in a single form.
  • the module used for encapsulation of the authentication key K 431 may use various types of modules.
  • the module used for encapsulation of the authentication key K 431 processes the authentication key K 431 together with any other information to generate the format of the authentication key K 431 into a new format different from the original form. It can be any encryption module that can.
  • the encapsulation module uses the above-mentioned three responses (ie, authentication response, authentication rejection (MAC failure)), and authentication rejection using a specific value that the terminal receives from the network as an input value (for example, a random number value). It may be configured as an authentication processing module 430 that can output one of (synchronization failure).
  • the eUICC 400 since the authentication key K 431 is delivered in a single form or does not use a specific interface for the delivery of the authentication key K 431, the eUICC 400 uses an unauthenticated network. Even when downloading the authentication key K 431, there is no possibility that the authentication key K 431 leaks by hacking.
  • various security techniques are applied in the authentication processing module 430 to prevent the authentication key K 431 from being exposed.
  • the authentication processing module 430 may hide the position where the authentication key K 431 is used for the operation on the memory through a pseudo encryption operation.
  • all the buffers used for encryption / decryption using the authentication key are initialized so that the calculated value cannot be estimated.
  • the countermeasure function is provided during encryption / decryption operation using the authentication key to prevent illegal access.
  • the authentication key required for encryption / decryption may be included in the authentication processing module 430, and thus, even when applying the security scheme as described above, there is no need to newly assign an encryption key.
  • the authentication processing module 430 internally has the authentication key K 431, not only the security techniques described above but also a number of techniques for defending against external attacks may be applied.
  • FIG. 5 is a conceptual diagram illustrating a method for providing mobile carrier information according to another embodiment of the present invention, and illustrates an example of a process of downloading a module in which an eUICC encapsulates an authentication key K from an MNO server.
  • the MNO server 510 generates a module encapsulating an authentication key K of a subscriber and transmits the generated module to the encapsulation module SM-DP 530.
  • the MNO server 510 may encapsulate the authentication key K using the authentication processing module 501.
  • the MNO server 510 may generate the authentication processing module 501 in which the authentication key is encapsulated as a file (or a library) having the same form as a general applet (for example, .cap).
  • the SM-DP 530 transfers the authentication processing module 501 provided from the MNO server 510 to the SM-SR 550.
  • the SM-DP 530 encrypts the authentication processing module 501 to be delivered to the eUICC 570 through the SM-SR 550 to generate an OTA package, and generates the encrypted OTA package by the SM-SR 550. Can be delivered to.
  • the SM-SR 550 delivers the OTA package provided from the SM-DP 530 to the corresponding eUICC 570.
  • the SM-SR 550 may deliver an OTA package to the eUICC 570 using an encrypted OTA communication method, and the encrypted OTA package may include an authentication processing module 501 encapsulated with an authentication key. have.
  • the eUICC 570 may extract the authentication processing module 501 in which the authentication key is encapsulated by decrypting the encrypted OTA package received from the SM-SR 550, and then store the extracted authentication processing module 501 therein.
  • an authentication key transmitted from the MNO server 510 to the eUICC 570 is converted into a file having a different format (for example, authentication processing).
  • the encapsulated file can be encrypted and delivered to eUICC 570, thereby enhancing the security level for delivery of the authentication key to the highest level.
  • the eUICC should be able to perform an authentication function with the mobile service provider network without exposing the authentication key K to the outside.
  • FIG. 6 is a conceptual diagram illustrating a process of performing authentication processing after an authentication key is stored in an eUICC according to another embodiment of the present invention.
  • the terminal 610 and the eUICC 630 are shown as independent blocks, respectively, but these are merely for convenience of description, and in practice, the eUICC 630 is mounted in a chip form inside the terminal 610. Can be configured.
  • the eUICC 630 simply transmits and receives a message with the terminal 610 through an interface for one to four authentication processes, and provides an authentication function with the mobile service provider network. Even if the authentication key K is not downloaded in a single form, the authentication process requiring the authentication key K can be performed.
  • the processing unit 631 of the eUICC sends an authentication request to the authentication processing module. Provided at 633.
  • the authentication processing module 633 performs the above-described processing corresponding to the authentication request provided from the processing unit 631, and then provides a response to the authentication request to the processing unit 631, and the processing unit 631 receives the authentication success response.
  • the response message provided from the authentication processing module is provided to the terminal through the corresponding interface among the interface 602, the authentication failure response interface 603, and the synchronization failure response interface 604.
  • the authentication interface 601, the authentication success response interface 602, the authentication failure response interface 603, and the synchronization failure response interface 604 may be configured in a message form.
  • FIG. 7 illustrates an example of an authentication interface used in a method for providing mobile carrier information according to another embodiment of the present invention.
  • 8 illustrates an example of an authentication success response interface used in a method for providing mobile carrier information according to another embodiment of the present invention.
  • 9 illustrates an example of a synchronization failure response interface used in the method for providing mobile carrier information according to another embodiment of the present invention.
  • an authentication interface (or an authentication message) includes a CLA field indicating a class of an instruction, an INS field indicating an instruction, a P1 field indicating a first parameter, and a second parameter. It may include a P2 field indicating a parameter, an Lc field indicating a length of command data, and a DATA field including authentication related data.
  • the DATA field may include a random number (RAND) and an authentication token (AUTN) provided from a network.
  • the authentication processing module When receiving the authentication message from the terminal, the authentication processing module calculates an XMAC (Expected Message Authentication Code) using the RAND and the secret key (K). Thereafter, the authentication processing module compares the calculated MAC (Message Authentication Code) included in the AUTN with the calculated XMAC to determine whether the two values are the same. In addition, the authentication processing module checks whether the sequence number (SQN) is within a predefined valid area.
  • XMAC Exected Message Authentication Code
  • the authentication processing module calculates RES (Response), which is an authentication response, and the authentication success response interface (or authentication success response message) as shown in FIG. Inform the terminal that the authentication is successful.
  • the authentication processing module also transmits the encryption key CK and the integrity key IK calculated together with the RES to the terminal.
  • the authentication success response interface (or authentication success response message) may be configured as illustrated in FIG. 8. That is, the authentication success response interface may include a 'DB' field indicating whether authentication is successful, an RES indicating an authentication value, an encryption key CK, an integrity key IK, and 2G (second generation mobile communication method) encryption key Kc information. have.
  • the terminal receives the authentication success response message from the eUICC, and transmits to the network including the corresponding response (RES) received in the authentication response (AUTHENTICATION RESPONSE) message.
  • the network (MSC or SGSN) receiving the authentication response from the terminal compares the authentication response RES transmitted by including it in the authentication response message transmitted from the terminal to the XRES (Expected Response) stored in advance.
  • RES and XRES are the same, the terminal is authenticated on the network side.
  • the terminal and the network configure a secure channel using the encryption key CK and the integrity key IK generated therebetween, and then perform communication using the secure channel. Reliability is guaranteed.
  • the terminal transmits the information including the information indicating the cause of the failure in the authentication rejection (AUTHENTICATION REJECT) message corresponding to the authentication failure response message provided from the eUICC to the network.
  • synchronization management is performed to prevent a situation where an unauthorized user acquires an authentication vector transmitted as it is without encryption in the wireless section by using an authentication vector obtained by an unauthorized user.
  • synchronization management means processing that an authentication vector used once cannot be reused.
  • the authentication processing module checks the MAC and SQN included in the AUTN delivered from the network. If the calculated XMAC and the MAC delivered from the network are the same but the SQN is not within the valid range, the authentication module determines that the synchronization has failed and fails to synchronize. Respond to the terminal using a message (or synchronization failure response interface).
  • the network (authentication center) generates an SQN larger than the value stored in the authentication processing module, and the authentication processing module updates the stored SQN value with the SQN value generated in the network upon successful authentication.
  • the authentication processing module transmits a synchronization failure response message (or synchronization failure response interface) having a format as shown in FIG. 9 upon synchronization failure to the terminal.
  • the synchronization failure response message may include 'DC' indicating a synchronization failure tag, 'OE' indicating the length of AUTS, and AUTS information.
  • the network (authentication center) generates a new authentication vector containing an authentication re-synchronization token (AUTS) sent from the authentication processing module and a prestored RAND.
  • AUTS authentication re-synchronization token
  • the network checks MAC-S (Message Authentication Code-Synchronization) of the AUTS. If the MAC-S value is valid, the network performs a reauthentication procedure with the terminal by generating a new authentication vector after updating the SQN. In general, authentication should succeed after resynchronization.
  • MAC-S Message Authentication Code-Synchronization
  • FIG. 10 is a flowchart illustrating a method for providing mobile carrier information according to another embodiment of the present invention, illustrating a processing performed by a terminal having an eUICC.
  • a terminal receives data (eg, an authentication processing module) in which mobile communication provider information such as an authentication key is encapsulated from a network (S1001).
  • data eg, an authentication processing module
  • mobile communication provider information such as an authentication key
  • the terminal stores the data in the eUICC (S1003).
  • the mobile carrier information encapsulated in the received data is stored in the eUICC in a state encapsulated in the data.
  • the terminal determines whether an authentication request is received from the network (S1005), and when an authentication request is received, transmits parameters included in the authentication request to the eUICC through an authentication interface (S1007).
  • the terminal receives a response corresponding to the authentication request from the eUICC (S1009).
  • the response corresponding to the authentication request may be any one of an authentication success response, an authentication failure response, and a synchronization failure response, as described with reference to FIGS. 6 to 9.
  • the terminal transmits a message corresponding to the response received from the eUICC to the network (S1011).
  • the authentication key transmitted for providing to the eUICC can be delivered by applying the highest security technique.
  • the mobile operator profile does not exist in the eUICC before the terminal is opened, authentication is not performed between the terminal and the mobile operator network, and thus, through an open wireless network that is not secured.
  • the carrier's information should be conveyed.
  • the information providing method of the mobile communication service provider according to the embodiment of the present invention can expect a greater security effect in such an environment.
  • the authentication key is encapsulated and stored inside the eUICC so that an interface for accessing the authentication key does not exist, so that the authentication key is not exposed by an external hacking attack using the interface, thereby replicating the eUICC. Can be prevented.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

이동통신사업자 정보 제공 방법 및 이를 수행하는 장치Method of providing mobile carrier information and apparatus for performing the same

본 발명은 내장 UICC를 구비한 단말에 이동통신사업자 정보를 제공하는 방법 및 이를 수행하는 장치에 관한 것이다.The present invention relates to a method for providing mobile carrier information to a terminal having a built-in UICC and an apparatus for performing the same.

UICC(Universal Integrated Circuit Card)는 단말 내에 삽입되어 사용자가 가입한 이동 통신 네트워크와 사용자 인증을 위한 모듈로 사용될 수 있는 스마트 카드이다. UICC는 SMS(Short Message Service), 폰 북(phone book) 등과 같은 사용자의 개인 정보와, IMSI(International Mobile Subscriber Identity), HPLMN(Home Public Land Mobile Network) 등의 사용자가 가입한 이동 통신 사업자에 대한 사업자 정보를 저장할 수 있다.A UICC (Universal Integrated Circuit Card) is a smart card that can be inserted into a terminal and used as a module for user authentication with a mobile communication network subscribed to by a user. UICC is used for personal information of users such as Short Message Service (SMS), phone book, etc., and for mobile operators such as International Mobile Subscriber Identity (IMSI) and Home Public Land Mobile Network (HPLMN). Store business information.

UICC는 GSM(Global System for Mobile communications) 방식의 경우에는 SIM(Subscriber Identity Module) 카드로 불릴 수 있고, WCDMA(Wideband Code Division Multiple Access) 방식의 경우에는 USIM(Universal Subscriber Identity Module) 카드로 불릴 수 있다.The UICC may be referred to as a subscriber identity module (SIM) card in the case of the Global System for Mobile communications (GSM) scheme, and may be referred to as a universal subscriber identity module (USIM) card in the case of a wideband code division multiple access (WCDMA) scheme. .

사용자가 UICC를 단말에 장착하면, 단말은 UICC에 저장된 정보들을 이용하여 사용자 인증을 자동으로 수행함으로써 사용자가 편리하게 단말을 사용할 수 있도록 한다. 또한, 사용자가 단말을 교체하는 경우, 사용자는 기존의 단말에서 탈거한 UICC를 새로운 단말에 장착하는 것만으로 사용자가 가입한 이동통신 서비스 및 사용자 정보를 그대로 유지한 상태에서 단말을 용이하게 교체할 수 있다. 또는, 사용자는 현재 사용중인 단말에 삽입된 UICC를 다른 이동통신사업자의 UICC로 교체함으로써 간편하게 이동 통신 사업자를 변경할 수도 있다.When the user mounts the UICC on the terminal, the terminal automatically performs user authentication using the information stored in the UICC so that the user can conveniently use the terminal. In addition, when the user replaces the terminal, the user can easily replace the terminal while maintaining the mobile communication service and user information subscribed to by the user simply by mounting the UICC removed from the existing terminal to the new terminal. have. Alternatively, the user may simply change the mobile communication provider by replacing the UICC inserted in the terminal currently being used with the UICC of another mobile communication provider.

그러나 단말에서 UICC를 착탈하기 어려운 경우, 예를 들면 기계 대 기계(Machine to Machine, M2M) 통신용 단말의 내부에 UICC가 실장되어 외부에서 교체하기 어려운 구조로 제조된 경우나, 기존 착탈식 플라스틱 구조의 UICC 보다 충격 및 열에 대한 내구성이 요구되는 경우를 위해 착탈식 구조가 아닌 칩 형태의 단말 일체형 구조로 제공되는 경우에도 착탈식 UICC와 동일한 서비스 제공이 가능하도록 내장 UICC(Embedded UICC, 이하 'eUICC'라 약칭함) 구조가 제안되었다.However, when it is difficult to detach the UICC from the terminal, for example, when the UICC is mounted inside the machine to machine (M2M) communication terminal and manufactured in a structure that is difficult to replace from the outside, the UICC of the existing removable plastic structure Built-in UICC (abbreviated as 'eUICC') to provide the same service as a detachable UICC even when a chip-type terminal integrated structure is provided instead of a detachable structure in order to provide more shock and heat resistance. A structure has been proposed.

eUICC는 기존 착탈식 형태의 UICC와 달리 eUICC가 단말의 제조 단계에서 단말에 실장되어 출시되어, 단말에 착탈될 수 없는 물리적 구조의 특성으로 인하여, eUICC 착탈을 통해 이동통신사업자를 변경할 수 없다.Unlike the existing detachable type UICC, the eUICC is mounted on the terminal at the manufacturing stage of the terminal and released, and due to the physical structure of the terminal that cannot be detached from the terminal, the eUICC cannot be changed through the eUICC detachment.

따라서, eUICC가 실장된 단말의 이동 통신 사업자를 변경하기 위해서는, 변경할 이동통신사업자의 정보를 원격에서 eUICC에 제공하기 위한 방법이 요구된다.Therefore, in order to change the mobile communication service provider of the terminal on which the eUICC is mounted, a method for remotely providing information of the mobile communication service provider to the eUICC is required.

그러나, 현재까지는 eUICC에 이동통신사업자의 정보를 제공하는 기능이나 이를 위한 인터페이스 등이 구체적으로 정의되지 않았고, 이에 따라 기존의 UICC를 구비한 단말에 이동통신사업자 정보를 제공하는 방법을 eUICC를 구비한 단말에 그대로 적용하는 경우에는 보안에 취약해지는 단점이 있다.However, until now, a function for providing information of a mobile carrier to an eUICC or an interface for the mobile communication provider has not been specifically defined, and accordingly, a method of providing mobile carrier information to a terminal having an existing UICC is provided with an eUICC. If it is applied to the terminal as it is, there is a disadvantage that the vulnerability to security.

상술한 문제점을 해결하기 위한 본 발명의 목적은 높은 보안을 유지하면서 eUICC에 이동통신사업자의 정보를 제공할 수 있고, 이동통신사업자 정보가 eUICC에 저장된 이후에도 높은 보안을 유지할 수 있는 이동통신사업자 정보 제공 방법을 제공하는 것이다.An object of the present invention for solving the above problems is to provide a mobile carrier information to the eUICC while maintaining a high security, and to provide a mobile carrier information that can maintain a high security even after the carrier information is stored in the eUICC To provide a way.

또한, 본 발명의 다른 목적은 높은 보안을 유지하면서 eUICC에 이동통신 사업자 정보를 제공할 수 있고, 이동통신사업자 정보가 eUICC에 저장된 이후에도 높은 보안을 유지할 수 있는 이동통신사업자 정보를 제공 장치를 제공하는 것이다.In addition, another object of the present invention is to provide a mobile communication provider information that can provide mobile carrier information to the eUICC, while maintaining a high security, even after the mobile carrier information is stored in the eUICC providing a mobile carrier information will be.

본 발명의 목적들은 이상에서 언급한 목적으로 제한되지 않으며, 언급되지 않은 본 발명의 다른 목적 및 장점들은 하기의 설명에 의해서 이해될 수 있으며, 본 발명의 실시예에 의해 보다 분명하게 이해될 것이다. 또한, 본 발명의 목적 및 장점들은 특허 청구 범위에 나타낸 수단 및 그 조합에 의해 실현될 수 있음을 쉽게 알 수 있을 것이다.The objects of the present invention are not limited to the above-mentioned objects, and other objects and advantages of the present invention which are not mentioned above can be understood by the following description, and will be more clearly understood by the embodiments of the present invention. Also, it will be readily appreciated that the objects and advantages of the present invention may be realized by the means and combinations thereof indicated in the claims.

상술한 본 발명의 목적을 달성하기 위한 본 발명의 일 측면에 따른 이동통신사업자 정보 제공 방법에 따르면, eUICC를 구비한 단말에서 수행되는 이동통신사업자 정보 제공 방법으로, 이동통신사업자 정보가 캡슐화되어 포함된 데이터를 수신하는 단계 및 상기 수신한 데이터를 상기 eUICC에 저장하는 단계를 포함한다.According to a method for providing mobile carrier information according to an aspect of the present invention for achieving the above object of the present invention, a method for providing mobile carrier information performed by a terminal having an eUICC, the mobile carrier information is encapsulated and included Receiving the received data and storing the received data in the eUICC.

여기서, 상기 이동통신사업자 정보가 캡슐화되어 포함된 데이터를 수신하는 단계는, 상기 단말의 인증을 위한 인증키 정보가 캡슐화되어 포함된 데이터를 수신할 수 있다. 또한, 상기 인증키 정보가 캡슐화되어 포함된 데이터는 상기 단말의 인증을 처리하는 인증 처리 모듈의 데이터로 구성될 수 있다.Here, in the receiving of the encapsulated data of the mobile communication provider information, the authentication key information for authentication of the terminal may be encapsulated to receive the included data. In addition, the data encapsulated with the authentication key information may be configured as data of an authentication processing module for processing authentication of the terminal.

여기서, 상기 이동통신사업자 정보가 캡슐화되어 포함된 데이터를 수신하는 단계는, 상기 단말의 인증을 위한 인증키 정보의 형식을 이전과 다른 형식으로 생성하는 암호화 모듈 데이터를 수신할 수 있다.Here, in the receiving of the data including the mobile communication provider information encapsulated, the encryption module data generating the format of the authentication key information for authentication of the terminal may be received in a different format than before.

여기서, 상기 수신한 데이터를 상기 eUICC에 저장하는 단계는, 상기 단말의 인증을 처리하는 인증 처리 모듈을 상기 eUICC에 저장하고, 상기 이동통신사업자 정보는 인증키를 포함하되, 상기 인증키는 상기 인증 처리 모듈에 캡슐화된 상태로 상기 eUICC에 저장될 수 있다.The storing of the received data in the eUICC may include storing an authentication processing module configured to process authentication of the terminal in the eUICC, wherein the mobile communication service provider information includes an authentication key, wherein the authentication key is the authentication key. It may be stored in the eUICC in a state encapsulated in a processing module.

여기서, 상기 인증 처리 모듈은 상기 eUICC에 저장된 후, 상기 단말로부터 제공된 인증 요청에 상응하여 인증 처리를 수행한 후, 인증 처리 결과에 대한 응답으로 인증 성공 응답, 인증 실패 응답 및 동기화 실패 응답 중 어느 하나의 응답을 상기 단말에 제공할 수 있다.Here, after the authentication processing module is stored in the eUICC, and performs an authentication process corresponding to the authentication request provided from the terminal, in response to the authentication processing result, any one of an authentication success response, an authentication failure response, and a synchronization failure response. May provide a response to the terminal.

여기서, 상기 이동통신사업자 정보 제공 방법은, 상기 인증 처리 모듈이 상기 eUICC에 저장된 후, 상기 인증키가 사용되는 경우 상기 인증키의 노출을 방지하기 위한 처리를 수행하는 단계를 더 포함할 수 있다.Here, the mobile communication provider information providing method may further include the step of performing a process for preventing the exposure of the authentication key when the authentication key is used after the authentication processing module is stored in the eUICC.

또한, 본 발명의 목적을 달성하기 위한 본 발명의 다른 측면에 따른 이동통신사업자 정보 제공 방법에 따르면, 이동통신사업자 서버에서 수행되는 이동통신사업자 정보 제공 방법으로, 이동통신사업자 정보를 캡슐화한 모듈을 생성하는 단계 및 상기 캡슐화한 모듈을 특정 단말로 전송하는 단계를 포함한다.According to another aspect of the present invention, there is provided a method for providing mobile operator information, the method for providing mobile operator information performed by a mobile operator server, the module encapsulating mobile operator information. Generating and transmitting the encapsulated module to a specific terminal.

여기서, 상기 이동통신사업자 정보를 캡슐화한 모듈을 생성하는 단계는, 인증 처리를 수행하는 인증 처리 모듈에 상기 이동통신사업자 정보로 인증키를 캡슐화하여 포함시켜 상기 캡슐화한 모듈을 생성할 수 있다.The generating of the module encapsulating the mobile communication provider information may include generating the encapsulated module by encapsulating the authentication key with the mobile communication provider information in the authentication processing module performing the authentication process.

여기서, 상기 이동통신사업자 정보를 캡슐화한 모듈을 생성하는 단계는, 상기 캡슐화한 모듈을 애플릿 파일과 동일한 형태의 파일로 생성할 수 있다.In the generating of the module encapsulating the mobile communication provider information, the encapsulated module may be generated as a file having the same form as the applet file.

여기서, 상기 캡슐화한 모듈을 특정 단말로 전송하는 단계는, 상기 캡슐화한 모듈을 SM-DP(Subscription Manager - Data Preparation)에 전송하는 단계와, 상기 SM-DP가 상기 캡슐화한 모듈을 SM-SR(Subscription Manager Secure Routing)에 전송하는 단계 및 상기 SM-SR이 상기 캡슐화한 모듈을 OTA(Over The Air) 통신 방식을 통해 상기 특정 단말로 전송하는 단계를 포함할 수 있다.The transmitting of the encapsulated module to a specific terminal may include transmitting the encapsulated module to a subscription manager-data preparation (SM-DP), and transmitting the encapsulated module to the SM-SR (SM-DP). And transmitting the encapsulated module to the specific terminal through an over the air (OTA) communication scheme.

또한, 본 발명의 다른 목적을 달성하기 위한 본 발명의 일 측면에 따른 이동통신사업자 정보 제공 장치는, 이동통신사업자 정보가 캡슐화된 모듈 및 상기 이동통신사업자 정보가 캡슐화된 모듈을 다운로드 하기 위한 처리를 수행하는 처리부를 구비하는 eUICC를 포함한다.In addition, the mobile operator information providing apparatus according to an aspect of the present invention for achieving another object of the present invention, the processing for downloading the module in which the mobile carrier information is encapsulated and the module in which the mobile carrier information is encapsulated EUICC having a processing unit to perform.

여기서, 상기 이동통신사업자 정보가 캡슐화된 모듈은 상기 장치의 인증을 위한 인증키가 캡슐화되어 포함되고, 인증을 위한 처리를 수행하는 인증 처리 모듈로 구성될 수 있다.Here, the module in which the mobile communication provider information is encapsulated may include an authentication key encapsulating the authentication key of the device, and may be configured as an authentication processing module for performing authentication.

여기서, 상기 처리부는 상기 장치로부터 인증 요청 메시지를 수신하여 상기 인증 처리 모듈에 제공하고, 상기 인증 처리 모듈로부터 인증 결과로 제공된 응답을 수신하여 상기 장치에 제공할 수 있다.Here, the processing unit may receive an authentication request message from the device and provide the authentication request message to the authentication processing module, and receive a response provided as an authentication result from the authentication processing module and provide the response to the device.

여기서, 상기 인증 처리 모듈은 상기 처리부로부터 제공된 인증 요청에 상응하여 인증 처리를 수행한 후, 인증 성공을 지시하는 인증 성공 응답, 인증 실패를 지시하는 인증 실패 응답 및 동기화 실패를 지시하는 동기화 실패 응답 중 어느 하나의 응답을 상기 처리부를 통해 상기 장치에 제공할 수 있다.Here, the authentication processing module performs an authentication process corresponding to the authentication request provided from the processing unit, and then, among the authentication success response indicating authentication success, authentication failure response indicating authentication failure, and synchronization failure response indicating synchronization failure. Any response may be provided to the device through the processing unit.

상술한 바와 같은 상술한 바와 같은 본 발명의 실시예에 따른 이동통신사업자의 정보 제공 방법 및 장치에 따르면, eUICC에 제공하기 위해 전달하는 이동통신사업자의 정보를 인증 처리 모듈과 같은 임의의 데이터에 캡슐화하여 전달함으로써 인증키를 최상위 보안 기법을 적용하여 전달할 수 있다.According to the method and apparatus for providing information of a mobile carrier according to an embodiment of the present invention as described above, the information of the mobile carrier to be delivered for providing to the eUICC is encapsulated in arbitrary data such as an authentication processing module. Authentication key can be delivered by applying the highest security technique.

따라서, 보안이 이루어지지 않은 공개된 무선 네트워크를 통해 이동통신사업자의 정보를 전달하는 경우에도 최상위 레벨의 보안을 적용하여 이동통신사업자의 정보를 eUICC에 전달할 수 있다.Accordingly, even when the information of the mobile communication service provider is transmitted through the unsecured public wireless network, the information of the mobile communication service provider can be delivered to the eUICC by applying the highest level of security.

또한, 본 발명에서는 eUICC 내부에 인증키를 캡슐화하여 저장하여 인증키에 접근할 수 인터페이스가 존재하지 않도록 구성함으로써 인터페이스를 이용한 외부 해킹 공격에 의해 인증키가 노출되지 않게 되고, 이에 따라 eUICC의 복제를 방지할 수 있다.In addition, in the present invention, the authentication key is encapsulated and stored inside the eUICC so that the interface to access the authentication key does not exist, so that the authentication key is not exposed by an external hacking attack using the interface, thereby replicating the eUICC. You can prevent it.

도 1은 본 발명의 일 실시예에 따른 이동통신사업자 정보 제공 방법이 실행되는 환경을 나타내는 개념도이다.1 is a conceptual diagram illustrating an environment in which a method for providing mobile service provider information according to an embodiment of the present invention is executed.

도 2는 본 발명의 일 실시예에 따른 이동통신사업자 정보 제공 방법을 설명하기 위한 개념도이다.2 is a conceptual diagram illustrating a method for providing mobile service provider information according to an embodiment of the present invention.

도 3은 단말과 이동통신사업자 네트워크 사이의 인증 과정을 나타내는 순서도이다.3 is a flowchart illustrating an authentication process between a terminal and a mobile service provider network.

도 4는 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법 이 적용되는 eUICC의 구성을 나타내는 블록도이다.4 is a block diagram illustrating a configuration of an eUICC to which a mobile communication service provider information providing method according to another embodiment of the present invention is applied.

도 5는 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법을 나타내는 개념도이다.5 is a conceptual diagram illustrating a method for providing mobile carrier information according to another embodiment of the present invention.

도 6은 본 발명의 다른 실시예에 따라 eUICC에 인증키가 저장된 이후의 인증 처리의 수행 과정을 설명하기 위한 개념도이다.6 is a conceptual diagram illustrating a process of performing authentication processing after an authentication key is stored in an eUICC according to another embodiment of the present invention.

도 7은 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법에서 사용되는 인증 인터페이스의 일 예를 나타낸 것이다.7 illustrates an example of an authentication interface used in a method for providing mobile carrier information according to another embodiment of the present invention.

도 8은 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법에서 사용되는 인증 성공 응답 인터페이스의 일 예를 나타내는 것이다.8 illustrates an example of an authentication success response interface used in a method for providing mobile carrier information according to another embodiment of the present invention.

도 9는 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법에서 사용되는 동기화 실패 응답 인터페이스의 일 예를 나타내는 것이다.9 illustrates an example of a synchronization failure response interface used in a method for providing mobile carrier information according to another embodiment of the present invention.

도 10은 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법을 나타내는 흐름도이다.10 is a flowchart illustrating a method for providing mobile carrier information according to another embodiment of the present invention.

본 발명은 다양한 변경을 가할 수 있고 여러 가지 실시예를 가질 수 있는 바, 특정 실시예들을 도면에 예시하고 상세하게 설명하고자 한다.As the present invention allows for various changes and numerous embodiments, particular embodiments will be illustrated in the drawings and described in detail in the written description.

그러나, 이는 본 발명을 특정한 실시 형태에 대해 한정하려는 것이 아니며, 본 발명의 사상 및 기술 범위에 포함되는 모든 변경, 균등물 내지 대체물을 포함하는 것으로 이해되어야 한다.However, this is not intended to limit the present invention to specific embodiments, it should be understood to include all modifications, equivalents, and substitutes included in the spirit and scope of the present invention.

본 출원에서 사용한 용어는 단지 특정한 실시예를 설명하기 위해 사용된 것으로, 본 발명을 한정하려는 의도가 아니다. 단수의 표현은 문맥상 명백하게 다르게 뜻하지 않는 한, 복수의 표현을 포함한다. 본 출원에서, "포함하다" 또는 "가지다" 등의 용어는 명세서상에 기재된 특징, 숫자, 단계, 동작, 구성요소, 부품 또는 이들을 조합한 것이 존재함을 지정하려는 것이지, 하나 또는 그 이상의 다른 특징들이나 숫자, 단계, 동작, 구성요소, 부품 또는 이들을 조합한 것들의 존재 또는 부가 가능성을 미리 배제하지 않는 것으로 이해되어야 한다.The terminology used herein is for the purpose of describing particular example embodiments only and is not intended to be limiting of the present invention. Singular expressions include plural expressions unless the context clearly indicates otherwise. In this application, the terms "comprise" or "have" are intended to indicate that there is a feature, number, step, operation, component, part, or combination thereof described in the specification, and one or more other features. It is to be understood that the present disclosure does not exclude the possibility of the presence or the addition of numbers, steps, operations, components, components, or combinations thereof.

다르게 정의되지 않는 한, 기술적이거나 과학적인 용어를 포함해서 여기서 사용되는 모든 용어들은 본 발명이 속하는 기술 분야에서 통상의 지식을 가진 자에 의해 일반적으로 이해되는 것과 동일한 의미를 가지고 있다. 일반적으로 사용되는 사전에 정의되어 있는 것과 같은 용어들은 관련 기술의 문맥 상 가지는 의미와 일치하는 의미를 가진 것으로 해석되어야 하며, 본 출원에서 명백하게 정의하지 않는 한, 이상적이거나 과도하게 형식적인 의미로 해석되지 않는다.Unless defined otherwise, all terms used herein, including technical or scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art. Terms such as those defined in the commonly used dictionaries should be construed as having meanings consistent with the meanings in the context of the related art and shall not be construed in ideal or excessively formal meanings unless expressly defined in this application. Do not.

이하, 첨부한 도면들을 참조하여, 본 발명의 바람직한 실시예를 보다 상세하게 설명하고자 한다. 본 발명을 설명함에 있어 전체적인 이해를 용이하게 하기 위하여 도면상의 동일한 구성요소에 대해서는 동일한 참조부호를 사용하고 동일한 구성요소에 대해서 중복된 설명은 생략한다.Hereinafter, with reference to the accompanying drawings, it will be described in detail a preferred embodiment of the present invention. In the following description of the present invention, the same reference numerals are used for the same elements in the drawings and redundant descriptions of the same elements will be omitted.

도 1은 본 발명의 일 실시예에 따른 이동통신사업자 정보 제공 방법이 실행되는 환경을 나타내는 개념도이다.1 is a conceptual diagram illustrating an environment in which a method for providing mobile service provider information according to an embodiment of the present invention is executed.

도 1을 참조하면, 본 발명의 일 실시예에 따른 이동통신사업자 정보 제공 방법은 이동통신사업자(MNO: Mobile Network Operator) 서버(이하, 'MNO 서버'라 지칭함)(110), 가입자정보관리 서버(130) 및 eUICC(150)가 네트워크를 통해 서로 연결된 환경에서 수행될 수 있다.Referring to FIG. 1, a method of providing mobile carrier information according to an embodiment of the present invention is a mobile network operator (MNO) server (hereinafter referred to as an MNO server) 110, a subscriber information management server. The 130 and the eUICC 150 may be performed in an environment connected to each other through a network.

MNO 서버(110)는 WCDMA(Wideband Code Division Multiple Access), LTE(Long Term Evolution) 등과 같은 이동 통신 시스템에서 제공하는 이동 통신 서비스에 가입한 가입자에게 이동 통신 서비스를 제공하기 위해 eUICC(150)가 구비해야 하는 이동통신사업자 정보를 생성한다. 여기서, 이동통신사업자 정보는 오퍼레이터 크레덴셜(Operator Credential), MNO 크레덴셜, 프로파일(Profile), eUICC 프로파일 또는 프로파일 패키지(Profile Package) 등의 다른 용어로 지칭될 수 있다.The MNO server 110 is provided by the eUICC 150 to provide a mobile communication service to a subscriber who has subscribed to a mobile communication service provided by a mobile communication system such as Wideband Code Division Multiple Access (WCDMA) and Long Term Evolution (LTE). Generate mobile operator information. Here, the mobile carrier information may be referred to by other terms such as an operator credential, an MNO credential, a profile, an eUICC profile, or a profile package.

가입자정보관리 서버(130)는 eUICC(150)에 대한 정보 관리, 여러 이통통신 사업자에 대한 정보 관리, 가입자의 이동통신 사업자 변경에 따른 인증 및 원격 정보 변경 등의 기능을 처리한다. The subscriber information management server 130 processes functions such as information management for the eUICC 150, information management for various telecommunication service providers, authentication and remote information change according to the change of the mobile communication service provider of the subscriber.

즉, 가입자정보관리 서버(130)는 이동통신사업자 정보를 eUICC(150)에 발급하고 가입(Subscription) 변경이나 이동통신사업자 변경에 대한 절차를 처리하는 등의 eUICC(150)에 대한 전반적인 관리를 수행한다.That is, the subscriber information management server 130 issues overall management of the eUICC 150 such as issuing mobile operator information to the eUICC 150 and processing a procedure for changing a subscription or changing a mobile carrier. do.

가입자정보관리 서버(130)는 가입 관리자(SM: Subscription Manager, 이하 'SM'이라 약침함) 또는 프로파일 관리자(PM: Profile Manager, 이하 'PM'이라 약칭함)를 포함할 수 있다.The subscriber information management server 130 may include a subscription manager (SM: abbreviated as "SM") or a profile manager (PM: profile manager, abbreviated as "PM").

SM은 이동통신사업자 정보를 생성하는 역할을 수행하는 주체인 SM-DP(Subscription Manager - Data Preparation)와 eUICC(150)에 사업자 정보를 직접적으로 전달하는 주체인 SM-SR(Subscription Manager Secure Routing)을 포함할 수 있다.SM uses the Subscription Manager-Data Preparation (SM-DP), which plays a role in generating mobile carrier information, and the Subscription Manager Secure Routing (SM-SR), which directly transfers operator information to eUICC (150). It may include.

SM-DP는 이동통신 사업자(MNO)가 eUICC(150)에 제공할 데이터에 대해 암호화 등의 처리를 수행하여 보안이 적용된 패키지(Package)를 구성한 후, 이를 SM-SR에 전달한다. 여기서, 보안이 적용된 패키지는 MNO 서버(110)에서 생성한 이동통신사업자 정보로 구성될 수 있다.The SM-DP performs a process such as encryption on the data to be provided to the eUICC 150 by the mobile communication service provider (MNO), configures a package to which security is applied, and delivers it to the SM-SR. Here, the package to which security is applied may be composed of mobile communication provider information generated by the MNO server 110.

SM-SR은 SM-DP로부터 전달받은 보안이 적용된 패키지가 목적 eUICC(150)에 정상적으로 전달될 수 있도록 다른 SM-SR로 라우팅하거나 또는 해당 eUICC(150)로 전달하는 역할을 수행한다. 여기서, 보안이 적용된 패키지가 해당 eUICC(150)로 전달되는 과정에서는 보안이 적용된 OTA(Over The Air) 통신 방식이 사용될 수 있다.The SM-SR routes to another SM-SR or delivers to the corresponding eUICC 150 so that the security-applied package received from the SM-DP can be normally delivered to the target eUICC 150. Here, in the process of delivering the security-applied package to the corresponding eUICC 150, an over-the-air (OTA) communication method with security may be used.

eUICC(150)는 SM-SR로부터 OTA 통신 방식을 통해 전달받은 OTA 패키지를 복호화하여 SM-DP가 암호화한 패키지를 추출한 후, 추출된 패키지를 복호화하여 실제 이동통신사업자 정보를 획득한 후, 획득한 이동통신사업자 정보를 eUICC(150) 내에 저장한다.The eUICC 150 decodes the OTA package received through the OTA communication method from the SM-SR, extracts the package encrypted by the SM-DP, and decodes the extracted package to obtain actual mobile service provider information. Mobile carrier information is stored in the eUICC (150).

도 2는 본 발명의 일 실시예에 따른 이동통신사업자 정보 제공 방법을 설명하기 위한 개념도이다. 이하에서는 eUICC에 제공되는 이동통신사업자 정보의 예로 인증키 K를 예를 들어 설명한다. 2 is a conceptual diagram illustrating a method for providing mobile service provider information according to an embodiment of the present invention. Hereinafter, the authentication key K will be described as an example of mobile communication provider information provided to the eUICC.

도 2를 참조하면, 먼저 MNO 서버(210)는 가입자의 인증키(K), UICC 데이터 파일(예를 들면, IMSI, HPLMN 등의 네트워크 접속 파일), 사용자 정보 파일(예를 들면, SMS 파일, 폰북 등)) 및 애플릿 등과 관련된 파일을 생성하고, 생성한 파일을 SM-DP(230)에 전달한다. Referring to FIG. 2, first, the MNO server 210 includes an authentication key K of a subscriber, a UICC data file (for example, a network connection file such as IMSI, HPLMN), a user information file (for example, an SMS file, Phonebook, etc.) and applets and the like, and generate the file to the SM-DP (230).

SM-DP(230)는 MNO 서버(210)로부터 제공받은 파일을 암호화한 후, 암호화된 파일을 SM-SR(250)에 전달한다. 여기서, SM-DP(230)는 SM-SR(250)을 통해 eUICC(270)에 전달될 파일을 포함하는 OTA 패키지를 생성하고, OTA 패키지에는 가입자의 인증키(K), UICC 데이터 파일(예를 들면, IMSI, HPLMN) 등과 같은 이동통신 사업자(MNO)의 크레덴셜(credential)이 포함될 수 있다.The SM-DP 230 encrypts the file provided from the MNO server 210 and then transfers the encrypted file to the SM-SR 250. Here, the SM-DP 230 generates an OTA package including a file to be delivered to the eUICC 270 through the SM-SR 250, and the authentication key (K) of the subscriber and the UICC data file (for example, the OTA package). For example, a credential of a mobile communication service provider (MNO) such as IMSI, HPLMN, etc. may be included.

SM-SR(250)은 SM-DP(230)로부터 제공된 암호화된 OTA 패키지를 해당 목적 eUICC(270)에 전달한다. 여기서, SM-SR(250)는 암호화된 OTA 통신 방식을 이용하여 eUICC(270)에 OTA 패키지를 전달할 수 있다.SM-SR 250 delivers the encrypted OTA package provided from SM-DP 230 to the corresponding eUICC 270. Here, the SM-SR 250 may deliver an OTA package to the eUICC 270 using an encrypted OTA communication method.

eUICC(270)는 SM-SR(250)로부터 전달받은 암호화된 OTA 패키지를 복호화하여 인증키(K), UICC 데이터 파일 등을 획득한 후, 이를 저장한다.The eUICC 270 decrypts the encrypted OTA package received from the SM-SR 250 to obtain an authentication key K, a UICC data file, and the like, and stores the encrypted key.

SM-DP(230)에서 암호화하여 eUICC(270)에 제공되는 인증키 K는 전술한 바와 같이 이동통신사업자 정보의 하나이다. 즉, 인증키 K는 eUICC(270)와 이동통신 사업자의 인증 센터(AuC: Authentication Center)간에 공유하는 가입자 키(subscriber key)로써 해당 이동통신 사업자의 네트워크와 가입자(또는 eUICC(270))간에 인증을 위해 사용된다.The authentication key K encrypted by the SM-DP 230 and provided to the eUICC 270 is one of the mobile communication provider information as described above. That is, the authentication key K is a subscriber key shared between the eUICC 270 and the authentication center (AuC) of the mobile communication service provider and authenticates between the network of the mobile communication service provider and the subscriber (or eUICC 270). Used for

인증키는 이동통신 사업자 네트워크를 인증하기 위한 것으로 보안상 최상위 레벨의 중요도를 가진다. 만약, 인증키 K 값이 노출되는 경우 해당 eUICC(270)는 복제가 가능하게 되며, 복제를 통해 해당 가입자의 음성 통화, SMS/MMS(Multimedia message service), 데이터 서비스 등이 해킹당할 수 있다. The authentication key is for authenticating the mobile operator network and has the highest level of importance in security. If the authentication key K value is exposed, the corresponding eUICC 270 can be duplicated, and the voice call, the multimedia message service (SMS / MMS), the data service, etc. of the subscriber can be hacked through the duplication.

도 2에 도시한 실시예에서는 보안상 최상위 레벨의 중요한 정보인 K를 다른 정보(예를 들면, IMSI, HPLMN, SMS, 폰북 등)와 동일한 레벨의 보안(예를 들면, 단순한 암호화 정도)을 적용하여 무선 네트워크를 통해 전달하는 것으로 예시하였다.In the embodiment shown in Fig. 2, K, which is important information of the highest level of security, is applied at the same level of security (for example, a simple encryption level) as other information (for example, IMSI, HPLMN, SMS, phonebook, etc.). It is illustrated as passing through a wireless network.

인증키 K와 같은 가입자 인증키 정보는 단말의 개통 과정 중에 eUICC(270)에 제공되어 저장하게 되므로, eUICC(270)와 이동통신 사업자 네트워크와의 인증이 이루어지기 전에 eUICC(270)에 제공되고, 이와 같은 과정에서 보안이 이루어지지 않은 공개된 무선 네트워크를 사용하게 된다.Since the subscriber authentication key information such as the authentication key K is provided and stored in the eUICC 270 during the opening process of the terminal, it is provided to the eUICC 270 before authentication with the eUICC 270 and the mobile communication network. In this process, an unsecured public wireless network is used.

따라서, 인증키 K와 같은 이동통신사업자 정보의 전달을 위해서는 더욱 더 높은 수준의 보안이 요구된다.Therefore, a higher level of security is required for the delivery of mobile operator information such as authentication key K.

한편, 원격지에서 인증키 K를 제공하기 위해서, eUICC(270)에 인증키 K의 제공을 위한 별도의 인터페이스를 이용할 수도 있다. 그러나, 보안상 최상위 레벨의 중요도를 가지는 인증키 K를 어떤 형식(암호화 또는 비암호화)으로든 그대로 주고 받을 수 있는 인터페이스가 존재한다는 것은 보안 공격에 매우 취약하게 된다는 것을 의미하고, 취약한 보안으로 인하여 인증키 K의 원격 전송 과정에서 해킹될 수 있는 확률이 높아짐을 의미한다.On the other hand, in order to provide the authentication key K in the remote location, it is also possible to use a separate interface for providing the authentication key K to the eUICC (270). However, the existence of an interface that can send and receive the authentication key K, which has the highest level of security, in any form (encrypted or non-encrypted), means that it is very vulnerable to a security attack. This means that the probability of being hacked in the remote transmission process of K increases.

즉, 인증키 K는 노출되었을 때 eUICC(270)의 복제가 가능하므로, 보안상 최상위 레벨의 중요도를 가지는 정보이다. 따라서, 인증키 K를 전달하기 위해서는 인증키 K에 최상위의 보안을 적용하여 전달할 필요가 있으며, eUICC(270) 내부에서도 인증키 K에 대해 최상위 보안레벨이 유지될 수 있어야 한다.In other words, since the authentication key K can be duplicated when the eUICC 270 is exposed, the authentication key K is information having the highest level of security. Therefore, in order to deliver the authentication key K, it is necessary to apply the highest security to the authentication key K and deliver it, and the highest security level for the authentication key K must be maintained even inside the eUICC 270.

상기한 바와 같은 요구를 충족시키기 위해 본 발명의 다른 실시예에서는 인증키 K에 최상위 레벨의 보안을 적용하고, 인증키가 eUICC(270)의 내부에 다운로드된 이후에도 최상위의 보안을 유지할 수 있는 방법을 제공한다.In another embodiment of the present invention to satisfy the above requirements, a method for applying the highest level of security to the authentication key K and maintaining the highest level of security even after the authentication key is downloaded into the eUICC 270 is provided. to provide.

본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법에서는 인증키 K에 최상위 레벨의 보안을 적용하는 방법으로, eUICC(270)가 원격으로부터 인증키 K를 전달받고, 인증키 K가 eUICC(270)의 내부에서 이동통신 사업자의 네트워크와 인증을 위해 사용되는 과정에서도 인증키 정보 K가 단독적으로 사용되지 않도록 하는 방법을 적용한다.In the method of providing mobile communication service provider information according to another embodiment of the present invention, a method of applying the highest level of security to the authentication key K, the eUICC 270 receives the authentication key K from the remote, the authentication key K is eUICC (270) In the process of being used for authentication and network of the mobile communication service provider inside the), the authentication key information K is not used alone.

일반적으로, 단말의 인증 과정은 네트워크로부터 입력값(예를 들면, 난수 값 등)을 전달받아 내부적으로 저장된 인증키와 함께 약속된 계산을 수행하고, 계산 결과를 네트워크로 전달하는 방법으로 처리된다.In general, the authentication process of the terminal receives an input value (for example, a random number value) from the network to perform a predetermined calculation with the internally stored authentication key, and is processed by a method of delivering the calculation result to the network.

즉, 인증키는 eUICC(270)가 이동통신사업자 네트워크와 인증 처리를 문제없이 수행할 수 있는 형태로만 eUICC(270) 내에 존재하면 되며, 도 2에 도시한 바와 같이 인증키 정보 K를 단독적으로 전달하거나 출력할 필요가 없다.That is, the authentication key only needs to exist in the eUICC 270 in such a way that the eUICC 270 can perform authentication processing with the mobile service provider network without any problem. As shown in FIG. 2, the authentication key information K is independently transmitted. No output is required.

도 3은 단말과 이동통신사업자 네트워크 사이의 인증 과정을 나타내는 순서도이다.3 is a flowchart illustrating an authentication process between a terminal and a mobile service provider network.

도 3은 단말(310)에 장착된 USIM과 이동통신사업자의 인증 센터(AuC: Authentication Center)(350)간에 서로 공유하고 있는 인증키(K)를 이용하여 단말(310)과 네트워크간에 양방향으로 유효성을 확인하는 절차를 나타낸 것으로, 도 3에 도시한 절차의 수행을 통해 데이터의 기밀성 및 무결성을 보장하기 위해 사용되는 파라미터(Ciphering Key, Integrity Key)가 생성된다.3 is valid in both directions between the terminal 310 and the network by using an authentication key (K) shared between the USIM mounted on the terminal 310 and an authentication center (AuC) 350 of the mobile communication service provider. As a procedure for confirming the operation, a parameter (Ciphering Key, Integrity Key) used to ensure confidentiality and integrity of data is generated by performing the procedure illustrated in FIG. 3.

도 3을 참조하면, 먼저 MSC(Mobile Switching Centre) 또는 SGSN(Serving GPRS Support Node)(330)은 인증 절차를 수행하기 위해 인증 데이터 요청(AUTHENTICATION DATA REQUEST) 메시지를 인증 센터(350)로 전송함으로써, 가입자 인증 데이터를 요구한다(S301). 여기서, 인증 데이터 요청 메시지에는 이통통신 서비스의 가입자 식별정보인 IMSI(International Mobile Subscriber Identity) 정보가 포함될 수 있다.Referring to FIG. 3, first, a mobile switching center (MSC) or a serving GPRS support node (SGSN) 330 transmits an authentication data request message to the authentication center 350 to perform an authentication procedure. Subscriber authentication data is requested (S301). Here, the authentication data request message may include IMSI (International Mobile Subscriber Identity) information which is subscriber identification information of the telecommunication service.

인증 센터(350)는 MSC 또는 SGSN(330)으로부터 수신한 인증 데이터 요청 메시지에 포함된 IMSI 정보를 이용하여 가입자를 구별하고, RAND(Random number), K, AMF(Authentication Management Field) 및 SQN(Sequence Number) 값에 기초하여 XRES(Expected response), AUTN(Authentication Token), CK(Ciphering Key), IK(Integrity Key) 및 MAC(Message Authentication Code) 값을 생성한다(S303).The authentication center 350 distinguishes subscribers using IMSI information included in the authentication data request message received from the MSC or SGSN 330, and uses a random number (RAND), a K, an authentication management field (AMF), and a sequence (SQN). Based on the value of Number, an Expected Response (XRES), Authentication Token (AUTN), Ciphering Key (CK), Integrity Key (IK), and Message Authentication Code (MAK) value are generated (S303).

여기서, RAND는 임의의 숫자(random number)를 의미하며, 소정의 이동통신사업자가 운용하는 홈 네트워크(home network)에서 생성되어 단말(310)로 전송된다. K는 비밀키를 의미하고 인증키(authentication key)라 불리며, 홈 네트워크(home network)의 인증 센터(350)와 단말(310)에 장착된 USIM에 각각 저장되어 있다. AMF는 인증시 사용한 알고리즘의 유형과, 인증 벡터(authentication vector) 생성 시 어떤 키 값을 사용했는지 알려주는 용도로 사용된다. SQN은 시퀀스(Sequence) 번호로, 이동통신 사업자별로 SQN을 생성하는 규칙이 다를 수 있으며, USIM에서 수신된 인증 벡터가 새로운 값이라는 것을 확인하는데 사용된다.Here, the RAND means a random number, and is generated in a home network operated by a predetermined mobile communication provider and transmitted to the terminal 310. K means a secret key and is called an authentication key, and is stored in each of the USIMs mounted on the authentication center 350 and the terminal 310 of the home network. AMF is used to indicate the type of algorithm used for authentication and which key value was used when generating the authentication vector. SQN is a sequence number, and the rules for generating an SQN for each mobile carrier may be different, and are used to confirm that the authentication vector received from the USIM is a new value.

XRES는 USIM 카드에 대한 유효성을 판단할 때 사용된다. AUTN(Authentication Token)은 SQN+AK, MAC, AMF로 구성된다. AK(Anonymity Key)는 인증을 시도 할 때마다 증가하는 SQN 값을 매스킹하여 SQN 값의 규칙성이 외부에 노출되지 않도록 하는 용도로 사용된다. CK는 암호화(ciphering) 알고리즘에 사용되는 값으로, 단말(310)과 MSC 또는 SGSN(330)간에 전송되는 데이터를 암호화 하는 용도로 사용된다. IK는 무결성(integrity) 알고리즘에 사용되는 값으로, 무선 구간을 통해 송수신 되는 시그널링(signaling) 메시지에 대한 무결성을 확인하는 용도로 사용된다. MAC은 단말(310)에서 네트워크의 유효성을 판단하는데 사용된다.XRES is used to determine the validity of a USIM card. Authentication Token (AUTN) consists of SQN + AK, MAC and AMF. Anonymity Key (AK) is used to mask the regularity of the SQN value by masking the increasing SQN value each time authentication is attempted. CK is a value used for a ciphering algorithm, and is used to encrypt data transmitted between the terminal 310 and the MSC or SGSN 330. IK is a value used in the integrity algorithm, and is used to verify the integrity of a signaling message transmitted and received over a radio section. The MAC is used to determine the validity of the network in the terminal 310.

한편, 인증 센터(350)는 RAND, XRES, CK, IK, ATUN을 포함하는 인증 벡터(AV: Authentication Vector)를 구성하고, 인증 데이터 응답(AUTHENTICATION DATA RESPONSE) 메시지를 통하여 n개의 인증 벡터(AV(1…n))를 MSC 또는 SGSN(330)으로 전송한다(S305). 여기서, 하나의 인증 벡터는 RAND, AUTN, CK, IK, XRES로 구성되며, AUTN은 SQN+AK, MAC, AMF로 구성된다. 또한, n개의 인증 벡터(AV(1…n))는 RAND, AUTN, XRES, CK, IK를 기본 구성으로 하는 n개의 인증 벡터들의 배열을 의미한다. 즉 AV(i)는 RAND(i), AUTN(i), XRES(i), CK(i), IK(i)로 구성된 인증 벡터를 의미한다.Meanwhile, the authentication center 350 configures an authentication vector (AV) including RAND, XRES, CK, IK, and ATUN, and performs n authentication vectors (AV (AV) through an authentication data response message). 1… n)) is transmitted to the MSC or SGSN 330 (S305). Here, one authentication vector consists of RAND, AUTN, CK, IK, and XRES, and the AUTN consists of SQN + AK, MAC, and AMF. In addition, n authentication vectors (AV (1 ... n)) mean an array of n authentication vectors having a basic configuration of RAND, AUTN, XRES, CK, and IK. That is, AV (i) means an authentication vector composed of RAND (i), AUTN (i), XRES (i), CK (i), and IK (i).

MSC 또는 SGSN(330)은 인증 센터(350)로부터 제공된 n개의 인증 벡터들 중 인증에 사용할 인증 벡터(AV(i))를 선택하고 선택한 인증 벡터(AV(i))를 인증 요청(AUTHENTICATION REQUEST) 메시지에 포함시켜 단말(310)로 전송함으로써, 선택한 인증 벡터(AV(i))의 구성 요소 중 RAND(i) 및 AUTN(i)를 단말(310)로 전송한다(S307).The MSC or SGSN 330 selects an authentication vector AV (i) to be used for authentication among n authentication vectors provided from the authentication center 350 and requests the authentication vector AV (i) to be authenticated (AUTHENTICATION REQUEST). By including the message and transmitting the message to the terminal 310, the RAND (i) and the AUTN (i) among the components of the selected authentication vector AV (i) are transmitted to the terminal 310 (S307).

단말(310)은 MSC 또는 SGSN(330)로부터 수신한 인증 요청(AUTHENTICATION REQUEST) 메시지에 포함된 RAND(i) 및 AUTN(i)를 USIM에 전달한다.The terminal 310 transmits the RAND (i) and the AUTN (i) included in the authentication request message received from the MSC or SGSN 330 to the USIM.

USIM은 단말(310)로부터 전달받은 RAND(i), AUTN(i) 값 및 USIM 카드 내부에 저장된 인증키인 K 값을 입력으로 RES(Response), XMAC(Expected Message Authentication Code), CK(Ciphering Key), IK(Integrity Key) 및 SQN(Sequence Number) 값을 생성한다(S309).USIM inputs RAND (i), AUTN (i) value and K value, which is an authentication key stored in the USIM card, as input from the terminal 310, RES (Response), XMAC (Expected Message Authentication Code), and CK (Ciphering Key). ), IK (Integrity Key) and SQN (Sequence Number) values are generated (S309).

이후, USIM은 RNC(Radio Network Controller)로부터 제공받은 MAC 값과 생성된 XMAC 값을 비교한다(S311).Thereafter, the USIM compares the MAC value provided from the RNC (Radio Network Controller) with the generated XMAC value (S311).

USIM은 MAC 값과 XMAC 값이 서로 다른 것으로 판단되면, 인증 거절(AUTHENTICATION REJECT) 메시지를 MSC 또는 SGSN(330)에 전송한다(S313). 여기서, 인증 거절 메시지에는 인증 실패의 원인(cause)을 나타내는 정보로 MAC 실패(MAC failure)가 포함될 수 있다.If it is determined that the MAC value and the XMAC value are different from each other, the USIM transmits an AUTHENTICATION REJECT message to the MSC or SGSN 330 (S313). Here, the authentication rejection message may include MAC failure as information indicating a cause of authentication failure.

또는, USIM은 MAC 값과 XMAC 값이 서로 동일한 것으로 판단되면, AUTN으로부터 추출한 SQN 값이 미리 지정된 SQN 범위 내에 포함되는가를 판단한다(S315).Or, if it is determined that the MAC value and the XMAC value are the same, the USIM determines whether the SQN value extracted from the AUTN is within a predetermined SQN range (S315).

여기서, SQN이 미리 지정된 범위를 벗어나는 경우, USIM은 AUTS를 생성하고 인증 거절(AUTHENTICATION REJECT) 메시지에 인증 실패 원인을 나타내는 동기 실패(Sync failure) 정보와 생성된 AUTS(Authentication re-Synchronization token)를 포함시켜 MSC 또는 SGSN(330)으로 전송한다(S317). 여기서, 상기 AUTS는 MAC-S와 SQNms+AK로 구성된다.Here, if the SQN is out of a predetermined range, the USIM generates an AUTS and includes the synchronization failure information indicating the cause of the authentication failure in the AUTENTICATION REJECT message and the generated Authentication re-Synchronization token (AUTS). To the MSC or SGSN 330 (S317). Here, the AUTS is composed of MAC-S and SQNms + AK.

또는, 단계 S315에서 SQN이 미리 지정된 범위내에 포함되는 경우 USIM은 생성한 RES 값을 인증 응답(AUTHENTICATION RESPONSE) 메시지에 포함시켜 MSC 또는 SGSN(330)으로 전송한다(S319).Alternatively, if the SQN is included in the predetermined range in step S315, the USIM transmits the generated RES value to the MSC or SGSN 330 by including it in the authentication response (AUTHENTICATION RESPONSE) message (S319).

MSC 또는 SGSN(330)은 인증 응답(AUTHENTICATION RESPONSE) 메시지를 통해 단말(310)(또는 USIM)로부터 수신한 RES 값과 VLR(Visitor Location Register)/SGSN에 저장된 XRES 값을 비교한다(S321).The MSC or SGSN 330 compares the RES value received from the terminal 310 (or USIM) and the XRES value stored in the VLR (Visitor Location Register) / SGSN through an AUTHENTICATION RESPONSE message (S321).

여기서, RES 값과 XRES 값이 같은 경우 MSC 또는 SGSN(330)은 인증 벡터 배열에서 IK 및 CK를 선택하고(S323), 이로써 전체 인증 절차가 종료된다.Here, when the RES value and the XRES value are the same, the MSC or SGSN 330 selects IK and CK from the authentication vector array (S323), thereby ending the entire authentication procedure.

한편, MSC 또는 SGSN(330)은 단계 S313을 통해 단말(310)로부터 인증 거절(AUTHENTICATION REJECT) 메시지를 수신하거나, RES 값과 XRES 값이 서로 다른 경우 인증 실패 보고(AUTHENTICATION FAILURE REPORT) 메시지를 인증 센터(350)에 전송한다(S325). 여기서, 인증 실패 보고 메시지에는 IMSI, 인증 실패 원인(cause), 접속 유형(access type), 인증 재시도(authentication re-attempt) 정보, VLR/SGSN 주소, RAND 값 등의 정보를 포함할 수 있다.On the other hand, the MSC or SGSN 330 receives an authentication rejection message from the terminal 310 through step S313, or if the RES value and the XRES value are different from each other, the authentication center reports an authentication failure message (AUTHENTICATION FAILURE REPORT) message. It transmits to 350 (S325). Here, the authentication failure report message may include information such as IMSI, cause of authentication failure, access type, authentication re-attempt information, VLR / SGSN address, and RAND value.

또한, MSC 또는 SGSN(330)은 단계 S317을 통해 단말(310)로부터 인증 거절(AUTHENTICATION REJECT) 메시지를 수신하는 경우, 인증을 재시도 하기 위한 인증 데이터 요청 (AUTHENTICATION DATA REQUEST) 메시지를 인증 센터(350)에 전송할 수 있다(S327). 여기서, 인증 데이터 요청 메시지에는 동기 실패 지시(Synchronization failure indication) 정보, RAND 또는 AUTS 정보가 포함될 수 있다.In addition, when the MSC or SGSN 330 receives an authentication rejection message from the terminal 310 through step S317, the MSC or SGSN 330 sends an authentication data request message to retry authentication. (S327). In this case, the authentication data request message may include synchronization failure indication information, RAND or AUTS information.

도 3에 도시한 인증 절차를 참조하면, eUICC를 구비하는 단말이 이동통신사업자 네트워크와 인증 기능을 수행하기 위해서 eUICC는 1개의 인증 요청(AUTHENTICATION REQUEST) 메시지와 3개의 응답 메시지 즉, 인증 응답(AUTENTICATION RESPONSE(RES)), 인증 거절(AUTENTICATION REJECT(MAC failure)), 인증 거절(AUTENTICATION REJECT(Sync failure))을 처리해야 함을 알 수 있다.Referring to the authentication procedure illustrated in FIG. 3, in order for a terminal having an eUICC to perform an authentication function with a mobile service provider network, the eUICC may include one authentication request message and three response messages, that is, an authentication response (AUTENTICATION). RESPONSE (RES)), AUTENTICATION REJECT (MAC failure), AUTENTICATION REJECT (Sync failure).

이는 단말이 인증 요청에 대하여 상기한 3가지 형태의 응답으로 처리할 수 있는 경우, 인증키 K가 eUICC 내부에 단독적인 형태로 존재하지 않아도, 단말은 이동통신사업자 네트워크와의 인증 기능을 수행할 수 있음을 의미한다.When the terminal can process the above three types of responses to the authentication request, even if the authentication key K does not exist alone in the eUICC, the terminal can perform authentication with the mobile operator network. It means that there is.

본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법에서는 도 3에 도시한 바와 같은 인증 처리 과정을 고려하여 원격지에 위치한 장치에서 eUICC에 인증키를 전달할 때, 인증키를 단독적인 형태가 아닌 임의의 모듈(예를 들면, 인증 처리 모듈) 내에 캡슐화시켜 전달하는 방법을 사용한다.In the method of providing mobile communication service provider information according to another embodiment of the present invention, when the authentication key is transmitted to the eUICC from a device located at a remote location in consideration of the authentication process as shown in FIG. A method of encapsulating and delivering in a module (eg, an authentication processing module) is used.

도 4는 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법 이 적용되는 eUICC의 구성을 나타내는 블록도이다.4 is a block diagram illustrating a configuration of an eUICC to which a mobile communication service provider information providing method according to another embodiment of the present invention is applied.

도 4를 참조하면, eUICC(400)는 처리부(410) 및 인증 처리 모듈(430)을 포함할 수 있다.Referring to FIG. 4, the eUICC 400 may include a processing unit 410 and an authentication processing module 430.

처리부(410)는 인증 처리 모듈(430)을 다운로드 하기 위해 필요한 처리를 수행할 수 있다. 또한, 처리부는 eUICC(400)와 관련된 다양한 어플리케이션들을 실행할 수 있다.The processor 410 may perform a process necessary to download the authentication processing module 430. In addition, the processor may execute various applications related to the eUICC 400.

인증 처리 모듈(430)은 인증과 관련된 처리를 수행하는 모듈로, 내부에 인증키 K(431)가 캡슐화되어 포함된다.The authentication processing module 430 is a module that performs processing related to authentication, and includes an authentication key K 431 encapsulated therein.

본 발명의 다른 실시예에서는 전술한 본 발명의 일 실시예와는 달리 eUICC(400)가 이통통신사업자 서버로부터 다운로드하는 인증키 K(431)가 단독적인 형태로 전달되지 않으며 미리 지정된 형식의 모듈을 통해 캡슐화(encapsulated)되어 전달된다. 여기서 인증키 K(431)를 캡슐화하여 전달한다는 것은 인증키 K(431)를 단독적인 형태로 전달하지 않는 것을 의미한다.In another embodiment of the present invention, unlike the above-described embodiment of the present invention, the authentication key K 431 downloaded by the eUICC 400 from the mobile communication service provider server is not transmitted in a single form, and a module of a predetermined type is used. Encapsulated and delivered. Herein, encapsulating and transmitting the authentication key K 431 means not transmitting the authentication key K 431 in a single form.

인증키 K(431)의 캡슐화에 사용되는 모듈은 다양한 형식의 모듈이 사용될 수 있다. 예를 들어, 인증키 K(431)의 캡슐화에 사용되는 모듈은 인증키 K(431)를 임의의 다른 정보들과 함께 가공하여 인증키 K(431)의 형식을 원래 형식과 다른 새로운 형식으로 생성할 수 있는 임의의 암호화 모듈이 될 수 있다. The module used for encapsulation of the authentication key K 431 may use various types of modules. For example, the module used for encapsulation of the authentication key K 431 processes the authentication key K 431 together with any other information to generate the format of the authentication key K 431 into a new format different from the original form. It can be any encryption module that can.

바람직하게는, 상기 캡슐화 모듈은 단말이 네트워크로부터 받는 특정 값을 입력 값(예를 들어, 난수 값)으로 하여 상기한 3가지의 응답(즉, 인증 응답, 인증 거절(MAC 실패), 및 인증 거절(동기화 실패))중의 하나를 출력할 수 있는 인증 처리 모듈(430)로 구성될 수 있다.Preferably, the encapsulation module uses the above-mentioned three responses (ie, authentication response, authentication rejection (MAC failure)), and authentication rejection using a specific value that the terminal receives from the network as an input value (for example, a random number value). It may be configured as an authentication processing module 430 that can output one of (synchronization failure).

본 발명의 다른 실시예에서는 인증키 K(431)가 단독적인 형태로 전달되거나, 인증키 K(431)의 전달을 위한 특정 인터페이스를 사용하지 않기 때문에 eUICC(400)가 인증되지 않은 네트워크를 이용하여 인증키 K(431)를 다운로딩하는 경우에도 해킹에 의해서 인증키 K(431)가 유출될 가능성이 없다.In another embodiment of the present invention, since the authentication key K 431 is delivered in a single form or does not use a specific interface for the delivery of the authentication key K 431, the eUICC 400 uses an unauthenticated network. Even when downloading the authentication key K 431, there is no possibility that the authentication key K 431 leaks by hacking.

또한, 인증키 K(431)를 eUICC(400)의 인증 처리 모듈(430) 내부에 저장함에 따라 다음과 같이 최상위 보안 레벨을 적용하는 효과를 얻을 수 있다.In addition, by storing the authentication key K 431 inside the authentication processing module 430 of the eUICC (400), it is possible to obtain the effect of applying the highest security level as follows.

인증키 K(431)를 생성 또는 변경하기 위한 단말과의 인터페이스가 존재하지 않는다. 전술한 바와 같이 인증키 K(431)를 단독적인 형태 그대로 주고 받을 수 있는 인터페이스가 존재한다는 것은 보안 공격에 매우 취약해지는 문제가 발생할 수 있고, 해킹될 수 있는 확률이 높아지게 된다. 예를 들어, 해킹 프로그램이 인증 알고리즘과 인증키 K와의 인터페이스 정보를 알아내는 경우 해킹 프로그램은 인증 알고리즘처럼 동작하여 인증키 K를 추출해 낼 수 있다. 그러나, 본 발명의 다른 실시예에에서는 상기한 바와 같은 인터페이스를 사용하지 않기 때문에 인증키가 해킹될 가능성이 없다.There is no interface with the terminal for generating or changing the authentication key K 431. As described above, the existence of an interface capable of transmitting and receiving the authentication key K 431 in its own form may cause a problem that becomes very vulnerable to a security attack, and increases the probability of being hacked. For example, if the hacking program finds the interface information between the authentication algorithm and the authentication key K, the hacking program may behave like the authentication algorithm and extract the authentication key K. However, in another embodiment of the present invention, since the interface as described above is not used, there is no possibility that the authentication key is hacked.

또한, 본 발명의 다른 실시예에서는 인증 처리 모듈(430) 내에 다양한 보안 기법을 적용하여 인증키 K(431)가 노출되는 것을 방지한다. Also, in another embodiment of the present invention, various security techniques are applied in the authentication processing module 430 to prevent the authentication key K 431 from being exposed.

예를 들어, 인증 처리 모듈(430)은 슈도(Pseudo) 암호화 연산을 통해 메모리 상에서 인증키 K(431)가 연산에 사용된 위치를 숨길 수 있다. 또한, 인증키를 이용한 암/복호화시 사용된 버퍼를 모두 초기화하여 연산된 값을 추정할 수 없도록 한다. 또한, 인증키를 이용한 암/복호화 연산시 역탐지(counter measure) 기능을 제공하여 불법 접근을 방지한다. 여기서, 암/복호화에 필요한 인증키는 인증 처리 모듈(430) 내에 가지고 있으면 되므로 상기한 바와 같은 보안 기법을 적용하는 경우에도 신규로 암호화키를 할당받을 필요가 없다.For example, the authentication processing module 430 may hide the position where the authentication key K 431 is used for the operation on the memory through a pseudo encryption operation. In addition, all the buffers used for encryption / decryption using the authentication key are initialized so that the calculated value cannot be estimated. In addition, the countermeasure function is provided during encryption / decryption operation using the authentication key to prevent illegal access. In this case, the authentication key required for encryption / decryption may be included in the authentication processing module 430, and thus, even when applying the security scheme as described above, there is no need to newly assign an encryption key.

또한, 인증 처리 모듈(430)내에 내부적으로 인증키 K(431)를 가지고 있음에 따라 상술한 바와 같은 보안 기법들 뿐만 아니라 외부의 공격으로부터 방어할 수 있는 수많은 기법들을 적용할 수 있다.In addition, since the authentication processing module 430 internally has the authentication key K 431, not only the security techniques described above but also a number of techniques for defending against external attacks may be applied.

도 5는 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법을 나타내는 개념도로서, eUICC가 인증키 K를 캡슐화한 모듈을 MNO 서버로부터 다운로드 하는 과정을 예시한 것이다.FIG. 5 is a conceptual diagram illustrating a method for providing mobile carrier information according to another embodiment of the present invention, and illustrates an example of a process of downloading a module in which an eUICC encapsulates an authentication key K from an MNO server.

도 5를 참조하면, 먼저 MNO 서버(510)는 가입자의 인증키(K)를 캡슐화한 모듈을 생성하고, 생성한 캡슐화 모듈 SM-DP(530)에 전달한다. 여기서, MNO 서버(510)는 인증 처리 모듈(501)을 이용하여 인증키 K를 캡슐화할 수 있다. 또한, MNO 서버(510)는 인증키가 캡슐화된 인증 처리 모듈(501)을 일반 애플릿과 동일한 형태(예를 들면, .cap)의 파일(또는 라이브러리)로 생성할 수 있다.Referring to FIG. 5, first, the MNO server 510 generates a module encapsulating an authentication key K of a subscriber and transmits the generated module to the encapsulation module SM-DP 530. Here, the MNO server 510 may encapsulate the authentication key K using the authentication processing module 501. In addition, the MNO server 510 may generate the authentication processing module 501 in which the authentication key is encapsulated as a file (or a library) having the same form as a general applet (for example, .cap).

SM-DP(530)는 MNO 서버(510)로부터 제공받은 인증 처리 모듈(501)을 SM-SR(550)에 전달한다. 여기서, SM-DP(530)는 SM-SR(550)을 통해 eUICC(570)에 전달될 인증 처리 모듈(501)을 암호화하여 OTA 패키지를 생성하고, 암호화된 OTA 패키지를 SM-SR(550)에 전달할 수 있다.The SM-DP 530 transfers the authentication processing module 501 provided from the MNO server 510 to the SM-SR 550. Here, the SM-DP 530 encrypts the authentication processing module 501 to be delivered to the eUICC 570 through the SM-SR 550 to generate an OTA package, and generates the encrypted OTA package by the SM-SR 550. Can be delivered to.

SM-SR(550)은 SM-DP(530)로부터 제공된 OTA 패키지를 해당 목적 eUICC(570)에 전달한다. 여기서, SM-SR(550)는 암호화된 OTA 통신 방식을 이용하여 eUICC(570)에 OTA 패키지를 전달할 수 있고, 암호화된 OTA 패키지에는 인증키가 캡슐화되어 포함된 인증 처리 모듈(501)이 포함될 수 있다.The SM-SR 550 delivers the OTA package provided from the SM-DP 530 to the corresponding eUICC 570. Here, the SM-SR 550 may deliver an OTA package to the eUICC 570 using an encrypted OTA communication method, and the encrypted OTA package may include an authentication processing module 501 encapsulated with an authentication key. have.

eUICC(570)는 SM-SR(550)로부터 전달받은 암호화된 OTA 패키지를 복호화하여 인증키가 캡슐화된 인증 처리 모듈(501)을 추출한 후, 추출한 인증 처리 모듈(501)을 내부에 저장할 수 있다.The eUICC 570 may extract the authentication processing module 501 in which the authentication key is encapsulated by decrypting the encrypted OTA package received from the SM-SR 550, and then store the extracted authentication processing module 501 therein.

도 5에 도시한 바와 같이 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법에서는, MNO 서버(510)로부터 eUICC(570)로 전달되는 인증키를 다른 형식의 파일(예를 들면, 인증 처리 모듈(501))에 캡슐화한 후, 캡슐화된 파일을 암호화하여 eUICC(570)에 전달함으로써, 인증키의 전달에 대한 보안 레벨을 최상위 레벨로 강화시킬 수 있다.As shown in FIG. 5, in the method of providing mobile service provider information according to another embodiment of the present invention, an authentication key transmitted from the MNO server 510 to the eUICC 570 is converted into a file having a different format (for example, authentication processing). After encapsulating in module 501, the encapsulated file can be encrypted and delivered to eUICC 570, thereby enhancing the security level for delivery of the authentication key to the highest level.

한편, 인증키가 캡슐화된 인증 처리 모듈이 eUICC의 내부에 저장된 이후, eUICC는 인증키 K가 외부에 노출되지 않으면서 이동통신사업자 네트워크와 인증 기능을 수행할 수 있어야 한다.Meanwhile, after the authentication processing module encapsulating the authentication key is stored inside the eUICC, the eUICC should be able to perform an authentication function with the mobile service provider network without exposing the authentication key K to the outside.

도 6은 본 발명의 다른 실시예에 따라 eUICC에 인증키가 저장된 이후의 인증 처리의 수행 과정을 설명하기 위한 개념도이다.6 is a conceptual diagram illustrating a process of performing authentication processing after an authentication key is stored in an eUICC according to another embodiment of the present invention.

도 6에서는 단말(610)과 eUICC(630)를 각각 독립적인 블록으로 도시하였으나, 이는 설명의 편의를 위한 것일 뿐이며, 실제로 eUICC(630)는 단말(610)의 내부에 칩 형태로 실장되는 방식으로 구성될 수 있다.In FIG. 6, the terminal 610 and the eUICC 630 are shown as independent blocks, respectively, but these are merely for convenience of description, and in practice, the eUICC 630 is mounted in a chip form inside the terminal 610. Can be configured.

도 6을 참조하면, eUICC(630)는 하나 내지 네 개의 인증 처리를 위한 인터페이스를 통해 단말(610)과 메시지를 송수신하여 이동통신사업자 네트워크와의 인증 기능을 제공하기만 하면, 단말(610)은 인증키 K를 단독적인 형태로 다운로드하지 않아도 인증키 K가 요구되는 인증 처리를 수행할 수 있다.Referring to FIG. 6, the eUICC 630 simply transmits and receives a message with the terminal 610 through an interface for one to four authentication processes, and provides an authentication function with the mobile service provider network. Even if the authentication key K is not downloaded in a single form, the authentication process requiring the authentication key K can be performed.

즉, 단말(610)은 이동통신사업자 네트워크와 인증을 처리하는 과정에서 인증(Authenticate) 인터페이스(601)를 통해 eUICC의 처리부에 인증을 요청하면, eUICC의 처리부(631)는 인증 요청을 인증 처리 모듈(633)에 제공한다.That is, when the terminal 610 requests authentication to the processing unit of the eUICC through an authentication interface 601 in the process of processing authentication with the mobile service provider network, the processing unit 631 of the eUICC sends an authentication request to the authentication processing module. Provided at 633.

인증 처리 모듈(633)은 처리부(631)로부터 제공된 인증 요청에 상응하여 전술한 바와 같은 처리를 수행한 후, 인증 요청에 대한 응답을 처리부(631)에 제공하고, 처리부(631)는 인증 성공 응답 인터페이스(602), 인증 실패 응답 인터페이스(603) 및 동기화 실패 응답 인터페이스(604) 중 해당 인터페이스를 통해 인증 처리 모듈로부터 제공된 응답 메시지를 단말에 제공한다.The authentication processing module 633 performs the above-described processing corresponding to the authentication request provided from the processing unit 631, and then provides a response to the authentication request to the processing unit 631, and the processing unit 631 receives the authentication success response. The response message provided from the authentication processing module is provided to the terminal through the corresponding interface among the interface 602, the authentication failure response interface 603, and the synchronization failure response interface 604.

도 6에서 인증(Authenticate) 인터페이스(601), 인증 성공 응답 인터페이스(602), 인증 실패 응답 인터페이스(603) 및 동기화 실패 응답 인터페이스(604)는 각각 메시지 형태로 구성될 수 있다.In FIG. 6, the authentication interface 601, the authentication success response interface 602, the authentication failure response interface 603, and the synchronization failure response interface 604 may be configured in a message form.

이하에서는 도 7 내지 도 9를 참조하여 도 6에 도시한 네 개의 인증 처리를 위한 인터페이스 각각에 대해 보다 구체적으로 설명한다.Hereinafter, each of the four interfaces for authentication processing illustrated in FIG. 6 will be described in more detail with reference to FIGS. 7 to 9.

도 7은 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법에서 사용되는 인증 인터페이스의 일 예를 나타낸 것이다. 도 8은 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법에서 사용되는 인증 성공 응답 인터페이스의 일 예를 나타내는 것이다. 또한, 도 9는 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법에서 사용되는 동기화 실패 응답 인터페이스의 일 예를 나타내는 것이다.7 illustrates an example of an authentication interface used in a method for providing mobile carrier information according to another embodiment of the present invention. 8 illustrates an example of an authentication success response interface used in a method for providing mobile carrier information according to another embodiment of the present invention. 9 illustrates an example of a synchronization failure response interface used in the method for providing mobile carrier information according to another embodiment of the present invention.

먼저 도 7을 참조하면, 인증(AUTHENTICATE) 인터페이스(또는 인증 메시지)는 명령어(instruction)의 클래스를 지시하는 CLA 필드, 명령어(instruction)를 나타내는 INS 필드, 제1 파라미터를 지시하는 P1 필드, 제2 파라미터를 지시하는 P2 필드, 명령어(command) 데이터의 길이를 지시하는 Lc 필드 및 인증 관련 데이터를 포함하는 DATA 필드를 포함할 수 있다. 여기서, 상기 DATA 필드에는 네트워크로부터 제공된 RAND(Random number)와 AUTN(Authentication Token)이 포함될 수 있다. First, referring to FIG. 7, an authentication interface (or an authentication message) includes a CLA field indicating a class of an instruction, an INS field indicating an instruction, a P1 field indicating a first parameter, and a second parameter. It may include a P2 field indicating a parameter, an Lc field indicating a length of command data, and a DATA field including authentication related data. Here, the DATA field may include a random number (RAND) and an authentication token (AUTN) provided from a network.

인증 처리 모듈은 단말로부터 인증 메시지를 수신하면, RAND와 비밀키(K)를 이용하여 XMAC(Expected Message Authentication Code)을 계산한다. 이후, 인증 처리 모듈은 AUTN에 포함되어 전달된 MAC(Message Authentication Code)과 계산된 XMAC을 비교하여 두 값이 서로 동일한가를 판단한다. 또한, 인증 처리 모듈은 SQN(Sequence Number)이 미리 정의된 유효한 영역안에 있는지 확인한다.When receiving the authentication message from the terminal, the authentication processing module calculates an XMAC (Expected Message Authentication Code) using the RAND and the secret key (K). Thereafter, the authentication processing module compares the calculated MAC (Message Authentication Code) included in the AUTN with the calculated XMAC to determine whether the two values are the same. In addition, the authentication processing module checks whether the sequence number (SQN) is within a predefined valid area.

만약, MAC과 XMAC이 서로 동일하고, SQN이 유효한 영역안에 있는 경우, 인증 처리 모듈은 인증 응답인 RES(Response)를 계산하고, 도 8에 도시한 바와 같은 인증 성공 응답 인터페이스(또는 인증 성공 응답 메시지)를 이용하여 단말에 인증이 성공하였음을 통보한다. 여기서, 인증 처리 모듈은 RES와 함께 계산된 암호화 키(CK)와 무결성 키(IK)도 단말에 전달한다.If the MAC and XMAC are the same and the SQN is in the valid area, the authentication processing module calculates RES (Response), which is an authentication response, and the authentication success response interface (or authentication success response message) as shown in FIG. Inform the terminal that the authentication is successful. Here, the authentication processing module also transmits the encryption key CK and the integrity key IK calculated together with the RES to the terminal.

인증 성공 응답 인터페이스(또는 인증 성공 응답 메시지)는 도 8에 예시한 바와 같이 구성될 수 있다. 즉, 인증 성공 응답 인터페이스는 인증 성공 여부를 지시하는 'DB' 필드, 인증 값을 지시하는 RES, 암호화 키 CK, 무결성 키 IK 및 2G(2세대 이동통신방식)의 암호화 키 Kc 정보를 포함할 수 있다.The authentication success response interface (or authentication success response message) may be configured as illustrated in FIG. 8. That is, the authentication success response interface may include a 'DB' field indicating whether authentication is successful, an RES indicating an authentication value, an encryption key CK, an integrity key IK, and 2G (second generation mobile communication method) encryption key Kc information. have.

한편, 단말은 eUICC로부터 인증 성공 응답 메시지를 수신하면, 인증 응답(AUTHENTICATION RESPONSE) 메시지 내에 수신한 해당 응답(RES)을 포함하여 네트워크로 전달한다.On the other hand, when the terminal receives the authentication success response message from the eUICC, and transmits to the network including the corresponding response (RES) received in the authentication response (AUTHENTICATION RESPONSE) message.

단말로부터 인증 응답을 수신한 네트워크(MSC 또는 SGSN)는, 단말에서 인증 응답 메시지에 포함시켜 전송한 인증 응답 RES와 미리 저장되어 있는 XRES(Expected Response)를 비교한다. 여기서, RES와 XRES가 동일한 경우, 네트워크측에서 단말은 인증된다.The network (MSC or SGSN) receiving the authentication response from the terminal compares the authentication response RES transmitted by including it in the authentication response message transmitted from the terminal to the XRES (Expected Response) stored in advance. Here, when RES and XRES are the same, the terminal is authenticated on the network side.

상기한 바와 같이 단말이 네트워크에 인증된 후, 단말과 네트워크는 상호간에 생성된 암호화 키(CK)와 무결성 키(IK)를 이용하여 보안 채널을 구성하고, 이후 보안 채널을 이용하여 통신을 수행함으로써 신뢰성을 보장받는다. As described above, after the terminal is authenticated to the network, the terminal and the network configure a secure channel using the encryption key CK and the integrity key IK generated therebetween, and then perform communication using the secure channel. Reliability is guaranteed.

또는, eUICC의 인증 처리 모듈은 계산한 XMAC과 MAC을 비교한 결과, 두 값이 서로 다른 경우, SW(Status Word)=9082로 설정한 인증 실패 응답 메시지(또는 인증 실패 응답 인터페이스)를 단말로 전송한다. 이 경우, 네트워크에 단말의 인증 및 등록은 실패하게 된다.Alternatively, the authentication processing module of the eUICC transmits an authentication failure response message (or authentication failure response interface) with SW (Status Word) = 9082 when the two values are different, as a result of comparing the calculated XMAC and MAC. do. In this case, authentication and registration of the terminal to the network will fail.

단말은 eUICC로부터 제공된 인증 실패 응답 메시지에 상응하여 인증 거절(AUTHENTICATION REJECT) 메시지 내에 실패 원인을 지시하는 정보를 포함시켜 네트워크로 전달한다.The terminal transmits the information including the information indicating the cause of the failure in the authentication rejection (AUTHENTICATION REJECT) message corresponding to the authentication failure response message provided from the eUICC to the network.

한편, 동기화 관리는 무선구간에서 암호화 없이 그대로 전송되는 인증 벡터를 허가받지 않은 사용자가 획득하고 획득한 인증 벡터를 이용하여 공격하는 상황을 방지하기 위해 수행된다. 즉, 동기화 관리는 한번 사용된 인증 벡터가 재사용될 수 없도록 처리하는 것을 의미한다.On the other hand, synchronization management is performed to prevent a situation where an unauthorized user acquires an authentication vector transmitted as it is without encryption in the wireless section by using an authentication vector obtained by an unauthorized user. In other words, synchronization management means processing that an authentication vector used once cannot be reused.

인증 처리 모듈은 네트워크로 부터 전달된 AUTN내에 포함된 MAC과 SQN을 확인하고, 계산한 XMAC과 네트워크로부터 전달된 MAC이 동일하나 SQN이 유효한 범위내에 있지 않을 경우, 동기화가 실패한 것으로 판단하고 동기화 실패 응답 메시지(또는 동기화 실패 응답 인터페이스)를 이용하여 단말에 응답한다.The authentication processing module checks the MAC and SQN included in the AUTN delivered from the network.If the calculated XMAC and the MAC delivered from the network are the same but the SQN is not within the valid range, the authentication module determines that the synchronization has failed and fails to synchronize. Respond to the terminal using a message (or synchronization failure response interface).

일반적으로 네트워크(인증센터)는 SQN을 인증 처리 모듈에 저장된 값보다 큰 값으로 생성하고, 인증 처리 모듈은 인증 성공시 저장된 SQN 값을 네트워크에서 생성한 SQN 값으로 갱신한다.In general, the network (authentication center) generates an SQN larger than the value stored in the authentication processing module, and the authentication processing module updates the stored SQN value with the SQN value generated in the network upon successful authentication.

인증 처리 모듈은 동기화 실패시 도 9에 도시한 바와 같은 포맷을 가지는 동기화 실패 응답 메시지(또는 동기화 실패 응답 인터페이스)를 단말에 전송한다.The authentication processing module transmits a synchronization failure response message (or synchronization failure response interface) having a format as shown in FIG. 9 upon synchronization failure to the terminal.

동기화 실패 응답 메시지는 도 9에 도시한 바와 같이 동기화 실패 태그를 지시하는 'DC', AUTS의 길이를 지시하는 'OE' 및 AUTS 정보를 포함할 수 있다.As shown in FIG. 9, the synchronization failure response message may include 'DC' indicating a synchronization failure tag, 'OE' indicating the length of AUTS, and AUTS information.

네트워크(인증 센터)는 인증 처리 모듈로부터 전달된 AUTS(Authentication re-Synchronization token)와 기저장된 RAND를 포함하는 새로운 인증 벡터를 생성한다. The network (authentication center) generates a new authentication vector containing an authentication re-synchronization token (AUTS) sent from the authentication processing module and a prestored RAND.

즉, 네트워크는 AUTS의 MAC-S(Message Authentication Code-Synchronization)를 확인하고, MAC-S 값이 유효하면 SQN을 갱신한 후에 새로운 인증 벡터를 생성하여 단말과 재인증 절차를 수행한다. 일반적으로 재동기화 이후에 인증은 성공하여야 한다.That is, the network checks MAC-S (Message Authentication Code-Synchronization) of the AUTS. If the MAC-S value is valid, the network performs a reauthentication procedure with the terminal by generating a new authentication vector after updating the SQN. In general, authentication should succeed after resynchronization.

도 10은 본 발명의 다른 실시예에 따른 이동통신사업자 정보 제공 방법을 나타내는 흐름도로서, eUICC를 구비한 단말에서 수행되는 처리 과정을 예시한 것이다.10 is a flowchart illustrating a method for providing mobile carrier information according to another embodiment of the present invention, illustrating a processing performed by a terminal having an eUICC.

도 10을 참조하면, 먼저, 단말은 인증키 등과 같은 이동통신사업자 정보가 캡슐화되어 있는 데이터(예를 들면, 인증 처리 모듈)를 네트워크로부터 수신한다(S1001).Referring to FIG. 10, first, a terminal receives data (eg, an authentication processing module) in which mobile communication provider information such as an authentication key is encapsulated from a network (S1001).

단말은 상기 데이터를 상기 eUICC 내에 저장한다(S1003). 여기서, 수신된 데이터에 캡슐화되어 포함된 이동통신사업자 정보는 데이터에 캡슐화된 상태로 eUICC 내에 저장된다.The terminal stores the data in the eUICC (S1003). Here, the mobile carrier information encapsulated in the received data is stored in the eUICC in a state encapsulated in the data.

이후, 단말은 네트워크로부터 인증 요청이 수신되는가를 판단하고(S1005), 인증 요청이 수신되는 경우, 상기 인증 요청에 포함된 파라미터들을 인증 인터페이스를 통해 eUICC에 전송한다(S1007).Thereafter, the terminal determines whether an authentication request is received from the network (S1005), and when an authentication request is received, transmits parameters included in the authentication request to the eUICC through an authentication interface (S1007).

이후, 단말은 eUICC로부터 인증 요청에 상응하는 응답을 수신한다(S1009). 여기서, 상기 인증 요청에 상응하는 응답은 도 6 내지 도 9를 참조하여 설명한 바와 같이, 인증 성공 응답, 인증 실패 응답 및 동기화 실패 응답 중 어느 하나가 될 수 있다.Thereafter, the terminal receives a response corresponding to the authentication request from the eUICC (S1009). Here, the response corresponding to the authentication request may be any one of an authentication success response, an authentication failure response, and a synchronization failure response, as described with reference to FIGS. 6 to 9.

단말은 eUICC로부터 수신한 응답에 상응하는 메시지를 네트워크로 전송한다(S1011). The terminal transmits a message corresponding to the response received from the eUICC to the network (S1011).

상술한 바와 같은 본 발명의 실시예에 따른 이동통신사업자의 정보 제공 방법 및 장치에 따르면, eUICC에 제공하기 위해 전달하는 인증키를 최상위 보안 기법을 적용하여 전달할 수 있다. 일반적으로 단말의 개통되기 이전에는 eUICC 내에 이동통신사업자의 프로파일(Profile)이 존재하지 않기 때문에, 단말과 이동통신사업자 네트워크간에 인증이 이루어지지 않게 되고 이에 따라 보안이 이루어지지 않은 공개된 무선 네트워크를 통해 이동통신사업자의 정보를 전달해야 한다. 본 발명의 실시예에 따른 이동통신사업자의 정보 제공 방법은 이와 같은 환경에서 더 큰 보안 효과를 기대할 수 있다.According to the method and apparatus for providing information of a mobile communication service provider according to an embodiment of the present invention as described above, the authentication key transmitted for providing to the eUICC can be delivered by applying the highest security technique. In general, since the mobile operator profile does not exist in the eUICC before the terminal is opened, authentication is not performed between the terminal and the mobile operator network, and thus, through an open wireless network that is not secured. The carrier's information should be conveyed. The information providing method of the mobile communication service provider according to the embodiment of the present invention can expect a greater security effect in such an environment.

또한, 본 발명에서는 eUICC의 내부에 인증키를 캡슐화하여 저장하여 인증키에 접근할 수 인터페이스가 존재하지 않도록 구성함으로써 인터페이스를 이용한 외부 해킹 공격에 의해 인증키가 노출되지 않게 되고, 이에 따라 eUICC의 복제를 방지할 수 있다.In addition, in the present invention, the authentication key is encapsulated and stored inside the eUICC so that an interface for accessing the authentication key does not exist, so that the authentication key is not exposed by an external hacking attack using the interface, thereby replicating the eUICC. Can be prevented.

이상 실시예를 참조하여 설명하였지만, 해당 기술 분야의 숙련된 당업자는 하기의 특허 청구의 범위에 기재된 본 발명의 사상 및 영역으로부터 벗어나지 않는 범위 내에서 본 발명을 다양하게 수정 및 변경시킬 수 있음을 이해할 수 있을 것이다.Although described with reference to the embodiments above, those skilled in the art will understand that the present invention can be variously modified and changed without departing from the spirit and scope of the invention as set forth in the claims below. Could be.

Claims (15)

eUICC(Embedded Universal Integrated Circuit Card)를 구비한 단말에서 수행되는 이동통신사업자 정보 제공 방법에 있어서,In the mobile communication provider information providing method performed in a terminal having an embedded universal integrated circuit card (eUICC), 이동통신사업자 정보가 캡슐화되어 포함된 데이터를 수신하는 단계; 및Receiving data in which mobile communication provider information is encapsulated; And 상기 수신한 데이터를 상기 eUICC에 저장하는 단계를 포함하는 이동통신사업자 정보 제공 방법.And storing the received data in the eUICC. 청구항 1에 있어서, The method according to claim 1, 상기 이동통신사업자 정보가 캡슐화되어 포함된 데이터를 수신하는 단계는,Receiving the data containing the mobile communication provider information is encapsulated, 상기 단말의 인증을 위한 인증키 정보가 캡슐화되어 포함된 데이터를 수신하는 것을 특징으로 하는 이동통신사업자 정보 제공 방법.Mobile communication service provider information providing method characterized in that the authentication key information for authentication of the terminal is encapsulated to receive the included data. 청구항 2에 있어서,The method according to claim 2, 상기 인증키 정보가 캡슐화되어 포함된 데이터는 상기 단말의 인증을 처리하는 인증 처리 모듈의 데이터인 것을 특징으로 하는 이동통신사업자 정보 제공 방법.And the data contained by encapsulating the authentication key information is data of an authentication processing module for processing authentication of the terminal. 청구항 1에 있어서,The method according to claim 1, 상기 이동통신사업자 정보가 캡슐화되어 포함된 데이터를 수신하는 단계는,Receiving the data containing the mobile communication provider information is encapsulated, 상기 단말의 인증을 위한 인증키 정보의 형식을 이전과 다른 형식으로 생성하는 암호화 모듈 데이터를 수신하는 것을 특징으로 하는 이동통신사업자 정보 제공 방법.And receiving encryption module data generating a format of authentication key information for authentication of the terminal in a different format than before. 청구항 1에 있어서,The method according to claim 1, 상기 수신한 데이터를 상기 eUICC에 저장하는 단계는,The storing of the received data in the eUICC, 상기 단말의 인증을 처리하는 인증 처리 모듈을 상기 eUICC에 저장하고, 상기 이동통신사업자 정보는 인증키를 포함하되, 상기 인증키는 상기 인증 처리 모듈에 캡슐화된 상태로 상기 eUICC에 저장되는 것을 특징으로 하는 이동통신사업자 정보 제공 방법.An authentication processing module for processing the authentication of the terminal is stored in the eUICC, wherein the mobile communication provider information includes an authentication key, wherein the authentication key is stored in the eUICC encapsulated in the authentication processing module. How to provide carrier information. 청구항 5에 있어서, The method according to claim 5, 상기 인증 처리 모듈은 상기 eUICC에 저장된 후, 상기 단말로부터 제공된 인증 요청에 상응하여 인증 처리를 수행한 후, 인증 처리 결과에 대한 응답으로 인증 성공 응답, 인증 실패 응답 및 동기화 실패 응답 중 어느 하나의 응답을 상기 단말에 제공하는 것을 특징으로 하는 이동통신사업자 정보 제공 방법.After the authentication processing module is stored in the eUICC, performs an authentication process corresponding to the authentication request provided from the terminal, the response of any one of the authentication success response, authentication failure response and synchronization failure response in response to the authentication processing result Mobile communication provider information providing method comprising providing to the terminal. 청구항 5에 있어서,The method according to claim 5, 상기 이동통신사업자 정보 제공 방법은,The mobile communication provider information providing method, 상기 인증 처리 모듈이 상기 eUICC에 저장된 후, 상기 인증키가 사용되는 경우, 상기 인증키의 노출을 방지하기 위한 처리를 수행하는 단계를 더 포함하는 것을 특징으로 하는 이동통신사업자 정보 제공 방법.And after the authentication processing module is stored in the eUICC, if the authentication key is used, performing a process for preventing exposure of the authentication key. 이동통신사업자 서버에서 수행되는 이동통신사업자 정보 제공 방법에 있어서,In the mobile carrier information providing method performed in the mobile operator server, 이동통신사업자 정보를 캡슐화한 모듈을 생성하는 단계; 및Generating a module encapsulating mobile communication provider information; And 상기 캡슐화한 모듈을 특정 단말로 전송하는 단계를 포함하는 이동통신사업자 정보 제공 방법.Mobile communication provider information providing method comprising the step of transmitting the encapsulated module to a specific terminal. 청구항 8에 있어서,The method according to claim 8, 상기 이동통신사업자 정보를 캡슐화한 모듈을 생성하는 단계는,Generating a module encapsulating the mobile operator information, 인증 처리를 수행하는 인증 처리 모듈에 상기 이동통신사업자 정보로 인증키를 캡슐화하여 포함시켜 상기 캡슐화한 모듈을 생성하는 것을 특징으로 하는 이동통신사업자 정보 제공 방법.And generating the encapsulated module by encapsulating and including the authentication key as the mobile communication provider information in the authentication processing module performing authentication processing. 청구항 8에 있어서,The method according to claim 8, 상기 이동통신사업자 정보를 캡슐화한 모듈을 생성하는 단계는,Generating a module encapsulating the mobile operator information, 상기 캡슐화한 모듈을 애플릿 파일과 동일한 형태의 파일로 생성하는 것을 특징으로 하는 이동통신사업자 정보 제공 방법.And providing the encapsulated module as a file having the same type as the applet file. 청구항 8에 있어서,The method according to claim 8, 상기 캡슐화한 모듈을 특정 단말로 전송하는 단계는,The step of transmitting the encapsulated module to a specific terminal, 상기 캡슐화한 모듈을 SM-DP(Subscription Manager - Data Preparation)에 전송하는 단계;Transmitting the encapsulated module to a subscription manager-data preparation (SM-DP); 상기 SM-DP가 상기 캡슐화한 모듈을 SM-SR(Subscription Manager Secure Routing)에 전송하는 단계; 및Transmitting, by the SM-DP, the encapsulated module to a subscription manager secure routing (SM-SR); And 상기 SM-SR이 상기 캡슐화한 모듈을 OTA(Over The Air) 통신 방식을 통해 상기 특정 단말로 전송하는 단계를 포함하는 것을 특징으로 하는 이동통신사업자 정보 제공 방법.And transmitting, by the SM-SR, the encapsulated module to the specific terminal through an over the air (OTA) communication scheme. 이동통신사업자 정보가 캡슐화된 모듈; 및A module in which mobile communication provider information is encapsulated; And 상기 이동통신사업자 정보가 캡슐화된 모듈을 다운로드 하기 위한 처리를 수행하는 처리부를 구비하는 eUICC(Embedded Universal Integrated Circuit Card)를 포함하는 장치.And an embedded universal integrated circuit card (eUICC) having a processing unit for performing a process for downloading a module in which the mobile communication provider information is encapsulated. 청구항 12에 있어서,The method according to claim 12, 상기 이동통신사업자 정보가 캡슐화된 모듈은The module in which the mobile communication provider information is encapsulated 상기 장치의 인증을 위한 인증키가 캡슐화되어 포함되고, 인증을 위한 처리를 수행하는 인증 처리 모듈인 것을 특징으로 하는 장치.And an authentication processing module for encapsulating an authentication key for authentication of the device and performing processing for authentication. 청구항 13에 있어서,The method according to claim 13, 상기 처리부는,The processing unit, 상기 장치로부터 인증 요청 메시지를 수신하여 상기 인증 처리 모듈에 제공하고, 상기 인증 처리 모듈로부터 인증 결과로 제공된 응답을 수신하여 상기 장치에 제공하는 것을 특징으로 하는 장치.Receiving an authentication request message from the device and providing the authentication request message to the authentication processing module, and receiving a response provided as a result of the authentication from the authentication processing module and providing the response to the device. 청구항 13에 있어서,The method according to claim 13, 상기 인증 처리 모듈은, 상기 처리부로부터 제공된 인증 요청에 상응하여 인증 처리를 수행한 후, 인증 성공을 지시하는 인증 성공 응답, 인증 실패를 지시하는 인증 실패 응답 및 동기화 실패를 지시하는 동기화 실패 응답 중 어느 하나의 응답을 상기 처리부를 통해 상기 장치에 제공하는 것을 특징으로 하는 장치.The authentication processing module, after performing an authentication process corresponding to the authentication request provided from the processing unit, any one of an authentication success response indicating authentication success, an authentication failure response indicating authentication failure, and a synchronization failure response indicating synchronization failure. And provide a response to the device through the processing unit.
PCT/KR2013/004536 2012-05-24 2013-05-23 Method for providing mobile communication provider information and device for performing same Ceased WO2013176502A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/403,102 US9924357B2 (en) 2012-05-24 2013-05-23 Method for providing mobile communication provider information and device for performing same
US15/696,320 US10462667B2 (en) 2012-05-24 2017-09-06 Method of providing mobile communication provider information and device for performing the same

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR20120055412 2012-05-24
KR10-2012-0055412 2012-05-24
KR1020130057509A KR102173534B1 (en) 2012-05-24 2013-05-22 Methods for providing information of mobile network operator and apparatus for performing the same
KR10-2013-0057509 2013-05-22

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US14/403,102 A-371-Of-International US9924357B2 (en) 2012-05-24 2013-05-23 Method for providing mobile communication provider information and device for performing same
US15/696,320 Continuation US10462667B2 (en) 2012-05-24 2017-09-06 Method of providing mobile communication provider information and device for performing the same

Publications (1)

Publication Number Publication Date
WO2013176502A1 true WO2013176502A1 (en) 2013-11-28

Family

ID=49624112

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2013/004536 Ceased WO2013176502A1 (en) 2012-05-24 2013-05-23 Method for providing mobile communication provider information and device for performing same

Country Status (1)

Country Link
WO (1) WO2013176502A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111465007A (en) * 2019-01-18 2020-07-28 华为技术有限公司 An authentication method, device and system
WO2021194210A1 (en) * 2020-03-27 2021-09-30 삼성전자 주식회사 Electronic device and method for using cached data based on subscriber identification information in electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040041120A (en) * 2004-04-21 2004-05-14 정경래 Matching up connection system and method in Real-time through mobile communication
KR20050040961A (en) * 2003-10-29 2005-05-04 한국전자통신연구원 Method for servicing roaming between access points and apparatus thereof
KR20080033686A (en) * 2006-10-13 2008-04-17 삼성전자주식회사 Apparatus and method for controlling mobile communication terminal in data communication system
KR20080111374A (en) * 2007-06-18 2008-12-23 삼성전자주식회사 Method and apparatus for transmitting broadcast service for mobile communication and method and apparatus for receiving broadcast service for mobile communication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050040961A (en) * 2003-10-29 2005-05-04 한국전자통신연구원 Method for servicing roaming between access points and apparatus thereof
KR20040041120A (en) * 2004-04-21 2004-05-14 정경래 Matching up connection system and method in Real-time through mobile communication
KR20080033686A (en) * 2006-10-13 2008-04-17 삼성전자주식회사 Apparatus and method for controlling mobile communication terminal in data communication system
KR20080111374A (en) * 2007-06-18 2008-12-23 삼성전자주식회사 Method and apparatus for transmitting broadcast service for mobile communication and method and apparatus for receiving broadcast service for mobile communication

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111465007A (en) * 2019-01-18 2020-07-28 华为技术有限公司 An authentication method, device and system
CN111465007B (en) * 2019-01-18 2022-10-11 华为技术有限公司 Authentication method, device and system
WO2021194210A1 (en) * 2020-03-27 2021-09-30 삼성전자 주식회사 Electronic device and method for using cached data based on subscriber identification information in electronic device
US12477318B2 (en) 2020-03-27 2025-11-18 Samsung Electronics Co., Ltd. Electronic device and method for using cached data based on subscriber identification information in electronic device

Similar Documents

Publication Publication Date Title
WO2016010312A1 (en) Method and device for installing profile of euicc
KR102173534B1 (en) Methods for providing information of mobile network operator and apparatus for performing the same
WO2014193188A1 (en) Method and apparatus for setting profile
WO2020050701A1 (en) Apparatus and method for ssp device and server to negotiate digital certificates
WO2013048084A2 (en) Profile management method, embedded uicc, and device provided with the embedded uicc
FI106604B (en) Procedure for protecting the identity of the subscriber
WO2015065063A1 (en) Method and apparatus to identity verification using asymmetric keys in wireless direct communication network
WO2018147711A1 (en) APPARATUS AND METHOD FOR ACCESS CONTROL ON eSIM
WO2016153281A1 (en) Method and apparatus for downloading profile in wireless communication system
WO2013036010A1 (en) Certification method using an embedded uicc certificate, provisioning and mno changing methods using the certification method, embedded uicc therefor, mno system, and recording medium
WO2013036009A1 (en) Method for managing embedded uicc and embedded uicc, mno system, provision method, and method for changing mno using same
WO2013009045A2 (en) Method for changing mno in embedded sim on basis of dynamic key generation and embedded sim and recording medium therefor
WO2014193181A1 (en) Method and apparatus for installing profile
WO2013036011A2 (en) Method for managing profile of embedded uicc, and embedded uicc, embedded uicc-equipped terminal, provision method, and method for changing mno using same
WO2014171707A1 (en) Security method and system for supporting re-subscription or additional subscription restriction policy mobile communications
WO2013009059A2 (en) Method for setting terminal in mobile communication system
KR20070112260A (en) Network-enabled terminal for setting the SIM / XIC key
WO2019132272A1 (en) Id as blockchain based service
KR20120131541A (en) Method for smart phone registration when accessing security authentication device and method for access authentication of registered smart phone
WO2012093900A2 (en) Method and device for authenticating personal network entity
WO2019009557A1 (en) Method and apparatus for discussing digital certificate by esim terminal and server
WO2022071779A1 (en) Method, ue, and network entity for handling synchronization of security key in wireless network
WO2019194639A1 (en) Method and apparatus for negotiating euicc version
WO2023158243A1 (en) Method and apparatus for transferring and storing activation code for esim device change
WO2013065983A1 (en) Method for modifying rights to security domain for smartcard, and server, smartcard, and terminal for same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13794699

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 14403102

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 09/03/2015)

122 Ep: pct application non-entry in european phase

Ref document number: 13794699

Country of ref document: EP

Kind code of ref document: A1