WO2023146352A1 - 기기 변경 시 사용자 인증 방법 및 장치 - Google Patents
기기 변경 시 사용자 인증 방법 및 장치 Download PDFInfo
- Publication number
- WO2023146352A1 WO2023146352A1 PCT/KR2023/001290 KR2023001290W WO2023146352A1 WO 2023146352 A1 WO2023146352 A1 WO 2023146352A1 KR 2023001290 W KR2023001290 W KR 2023001290W WO 2023146352 A1 WO2023146352 A1 WO 2023146352A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- profile
- terminal
- device change
- code
- confirmation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/60—Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/43—Security arrangements using identity modules using shared identity modules, e.g. SIM sharing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/062—Pre-authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
Definitions
- the present disclosure relates to a method and apparatus for installing and managing an eUICC profile.
- 5G mobile communication technology defines a wide frequency band to enable fast transmission speed and new services. It can also be implemented in the ultra-high frequency band ('Above 6GHz') called Wave.
- 6G mobile communication technology which is called a system after 5G communication (Beyond 5G)
- Beyond 5G in order to achieve transmission speed that is 50 times faster than 5G mobile communication technology and ultra-low latency reduced to 1/10, tera Implementations in Terahertz bands (eg, such as the 3 Terahertz (3 THz) band at 95 GHz) are being considered.
- eMBB enhanced mobile broadband
- URLLC ultra-reliable low-latency communications
- mMTC massive machine-type communications
- Beamforming and Massive MIMO to mitigate the path loss of radio waves in the ultra-high frequency band and increase the propagation distance of radio waves, with the goal of satisfying service support and performance requirements, and efficient use of ultra-high frequency resources
- numerology support multiple subcarrier interval operation, etc.
- BWP Band-Width Part
- large capacity New channel coding methods such as LDPC (Low Density Parity Check) code for data transmission and Polar Code for reliable transmission of control information, L2 pre-processing, and dedicated services specialized for specific services Standardization of network slicing that provides a network has been progressed.
- LDPC Low Density Parity Check
- NR-U New Radio Unlicensed
- UE Power Saving NR terminal low power consumption technology
- NTN non-terrestrial network
- IAB Intelligent Internet of Things
- IIoT Intelligent Internet of Things
- DAPS Dual Active Protocol Stack
- 2-step random access that simplifies the random access procedure
- RACH for Standardization in the field of air interface architecture/protocol for technologies such as NR
- an architecture eg, service based architecture, service based interface
- MEC mobile edge computing
- AR augmented reality
- VR virtual reality
- MR mixed reality
- XR extended reality
- AI artificial intelligence
- ML machine learning
- FD-MIMO Full Dimensional MIMO
- Array Antenna for guaranteeing coverage in the terahertz band of 6G mobile communication technology.
- multi-antenna transmission technologies such as large scale antennas, metamaterial-based lenses and antennas to improve coverage of terahertz band signals, high-dimensional spatial multiplexing technology using Orbital Angular Momentum (OAM), RIS ( Reconfigurable Intelligent Surface) technology, as well as full duplex technology to improve frequency efficiency and system network of 6G mobile communication technology, satellite, and AI (Artificial Intelligence) are utilized from the design stage and end-to-end (End-to-End) -to-End) Development of AI-based communication technology that realizes system optimization by internalizing AI-supported functions and next-generation distributed computing technology that realizes complex services beyond the limits of terminal computing capabilities by utilizing ultra-high-performance communication and computing resources could be the basis for
- UICC Universal Integrated Circuit Card
- the UICC may include an access control module for a terminal to access a network of a mobile communication service provider. Examples of such access control modules include Universal Subscriber Identity Module (USIM), Subscriber Identity Module (SIM), and IP Multimedia Service Identity Module (ISIM).
- USIM Universal Subscriber Identity Module
- SIM Subscriber Identity Module
- ISIM IP Multimedia Service Identity Module
- a UICC including a USIM is also commonly referred to as a USIM card.
- SIM Subscriber Identity Module
- SIM IP Multimedia Service Identity Module
- an eUICC refers to a UICC card that is fixed to a terminal and can remotely download and select a SIM module.
- SIM module information to be downloaded is collectively referred to as an eUICC profile or, more simply, a profile.
- An embodiment of the present disclosure provides a method and apparatus for effectively providing a service in a mobile communication system.
- an object of the present disclosure is to provide a method and apparatus for a terminal to select a communication service and connect to a network in a communication system.
- an object of the present disclosure is to provide a method and apparatus for downloading, installing, and managing a profile for a terminal to connect to a network in a communication system online.
- an object of the present disclosure is to provide a method and apparatus for efficiently re-downloading a profile installed by a terminal to connect to a network to another terminal in a communication system.
- the present disclosure for solving the above problems is a method performed by a first terminal in a wireless communication system supporting device change, and a device change request for a device change for a profile of the first terminal is performed by a profile server. sending a message; receiving a device change request response message including a confirmation code required indicator for the device change from the profile server; confirming receipt of a confirmation code input based on the confirmation code required indicator for device change; Based on the verification code, generating verification code hash information; and transmitting a device change confirmation message including the confirmation code hash information to the profile server.
- the present disclosure to solve the above problems is a method performed by a profile server in a wireless communication system supporting device change, in which a device change request for a device change for a profile of the first terminal is performed by a first terminal.
- receiving a message ; receiving a verification code from a service provider; Transmitting a device change request response message including a confirmation code required indicator for the device change to the first terminal based on the confirmation code; receiving a device change confirmation message including confirmation code hash information from the first terminal, based on the confirmation code required indicator for device change; and determining a result of the device change request based on the received confirmation code hash information.
- the present disclosure for solving the above problems is a first terminal in a wireless communication system supporting device change, comprising: a transceiver for transmitting and receiving a signal; and
- the present disclosure for solving the above problems is a profile server in a wireless communication system supporting device change, comprising: a transceiver for transmitting and receiving signals; and a control unit connected to the transceiver, wherein the control unit receives a device change request message for device change for a profile of the first terminal from a first terminal, receives a confirmation code from a service provider, and confirms the confirmation. Based on the code, a device change request response message including a confirmation code required indicator for device change is transmitted to the first terminal, and based on the confirmation code required indicator for device change, from the first terminal , Receiving a device change confirmation message including confirmation code hash information, and determining a result of the device change request based on the received confirmation code hash information.
- the present invention for solving the above problems is a control signal processing method in a wireless communication system, comprising: receiving a first control signal transmitted from a base station; processing the received first control signal; and transmitting a second control signal generated based on the processing to the base station.
- a mobile communication system can effectively provide a service.
- an activation code required for reinstallation of the profile is reissued from the profile server or a profile transfer request result is sent from the profile server.
- a confirmation number or character string for user authentication can be further sent to the profile server when requesting a profile move.
- the profile to be moved is deleted first, and the profile deletion evidence that can prove the profile is deleted is delivered to the server and activated.
- the result of code or profile migration can be transmitted to other terminals so that other terminals can efficiently download and install the profile from the profile server.
- a profile server in a communication system may receive a request from a terminal to reinstall a profile installed in the terminal to another terminal. If necessary, send a request to the operator to confirm whether the profile can be moved, if necessary, request a confirmation number or character string for user authentication from the terminal, request deletion of the profile from the terminal if necessary, and deliver proof of profile deletion if necessary
- the prepared profile is prepared by setting it to a non-downloadable state, when necessary, an activation code to download the prepared profile is generated, and when the terminal deletes the profile, the profile is changed to a downloadable state.
- FIG. 1 is a diagram illustrating a method in which a terminal connects to a mobile communication network using a UICC (Universal Integrated Circuit Card) loaded with a fixed profile according to an embodiment of the present disclosure.
- UICC Universal Integrated Circuit Card
- FIG. 2 is a diagram illustrating a configuration of a system in which a terminal manages a profile installed in a first terminal according to a user's input and installs the profile in a second terminal according to an embodiment of the present disclosure.
- FIG. 3 is a diagram illustrating an example of a procedure between a first terminal, a second terminal, and a server for a second terminal to download a profile according to an embodiment of the present disclosure.
- FIG. 4 is a block diagram illustrating components of a terminal according to an embodiment of the present disclosure.
- FIG. 5 is a block diagram illustrating components of a profile server according to an embodiment of the present disclosure.
- each block of the process flow chart diagrams and combinations of the flow chart diagrams can be performed by computer program instructions.
- These computer program instructions may be embodied in a processor of a general purpose computer, special purpose computer, or other programmable data processing equipment, so that the instructions executed by the processor of the computer or other programmable data processing equipment are described in the flowchart block(s). It creates means to perform functions.
- These computer program instructions may also be stored on a computer usable or computer readable storage medium that can be directed to a computer or other programmable data processing equipment to implement functionality in a particular way, such that the computer usable or computer readable
- the instructions stored on the storage medium are also capable of producing an article of manufacture containing instruction means for performing the functions described in the flowchart block(s).
- the computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operational steps are performed on the computer or other programmable data processing equipment to create a computer-executed process to generate computer or other programmable data processing equipment. Instructions for performing processing equipment may also provide steps for performing the functions described in the flowchart block(s).
- each block may represent a module, segment, or portion of code that includes one or more executable instructions for executing specified logical function(s). It should also be noted that in some alternative implementations it is possible for the functions mentioned in the blocks to occur out of order. For example, two blocks shown in succession may in fact be executed substantially concurrently, or the blocks may sometimes be executed in reverse order depending on their function.
- ' ⁇ unit' used in the embodiments of the present disclosure means software or a hardware component such as FPGA or ASIC, and ' ⁇ unit' performs certain roles.
- ' ⁇ part' is not limited to software or hardware.
- ' ⁇ unit' may be configured to be in an addressable storage medium or configured to reproduce one or more processors. Therefore, as an example, ' ⁇ unit' refers to components such as software components, object-oriented software components, class components, and task components, processes, functions, properties, and procedures. , subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
- components and ' ⁇ units' may be combined into smaller numbers of components and ' ⁇ units' or further separated into additional components and ' ⁇ units'.
- components and ' ⁇ units' may be implemented to play one or more CPUs in a device or a secure multimedia card.
- UICC Universal Integrated Circuit Card
- UICC stores personal information such as network access authentication information, phonebook, SMS of mobile communication subscribers, and performs subscriber authentication and traffic security key generation when accessing mobile communication networks such as GSM, WCDMA, LTE, etc. to ensure safe mobile communication use. It means the chip that makes it possible.
- the UICC may include a communication application or an access control module for a terminal to access a network of a mobile communication service provider.
- Examples of such communication applications or access control modules include Universal Subscriber Identity Module (USIM), Subscriber Identity Module (SIM), and IP Multimedia Service Identity Module (ISIM).
- USIM Universal Subscriber Identity Module
- SIM Subscriber Identity Module
- ISIM IP Multimedia Service Identity Module
- the UICC can provide a high-level security function for loading various applications such as electronic wallet, ticketing, and electronic passport.
- a UICC including a USIM is also commonly referred to as a USIM card.
- a UICC including a SIM module is also commonly referred to as a SIM card.
- SIM card SIM card
- UICC card USIM card
- UICC card UICC card
- the SIM card stores personal information of a mobile communication subscriber and performs subscriber authentication and traffic security key generation when accessing a mobile communication network to enable safe mobile communication use.
- a SIM card is manufactured as a dedicated card for a corresponding operator at the request of a specific mobile communication operator, and authentication information for network access of the operator, for example, USIM (Universal Subscriber Identity Module) application and IMSI (International Mobile Subscriber Identity), K value, OPc value, etc. are preloaded on the card and shipped. Therefore, the SIM card is delivered to the subscriber by the mobile communication operator, and then, if necessary, management such as installation, modification, and deletion of applications in the UICC can be performed by utilizing technologies such as OTA (Over The Air).
- USIM Universal Subscriber Identity Module
- IMSI International Mobile Subscriber Identity
- K value International Mobile Subscriber Identity
- OPc value International Mobile Subscriber Identity
- Subscribers can use the mobile communication operator's network and application services by inserting a UICC card into their mobile communication terminal, and when replacing a terminal, by moving and inserting the UICC card from the existing terminal to a new terminal, authentication information stored in the UICC card, mobile communication Communication phone numbers, personal phone books, etc. can be used as they are in the new terminal.
- SIM cards are inconvenient for mobile communication terminal users to receive services from other mobile communication operators.
- a user of a mobile communication terminal has the inconvenience of physically obtaining a SIM card in order to receive a service from a mobile communication service provider. For example, when traveling to another country, it is inconvenient to obtain a local SIM card to receive local mobile communication service.
- the roaming service solves some of the inconveniences, but the charges are relatively high, and there is a problem that the service cannot be received if there is no contract between telecommunication companies.
- the SIM module of the mobile communication service to be used can be downloaded to the UICC card at a time desired by the user.
- a UICC card may be used by downloading and installing a plurality of SIM modules and selecting only one SIM module among them.
- This UICC card may or may not be fixed to the terminal.
- a UICC that is fixed to a terminal and used is called an eUICC (embedded UICC).
- an eUICC refers to a UICC card that is fixed to a terminal and can remotely download and select a SIM module.
- a UICC card capable of remotely downloading and selecting a SIM module is referred to as an eUICC. That is, among UICC cards that can download and select a SIM module remotely, UICC cards that are fixed or not fixed to the terminal are collectively referred to as eUICC.
- the downloaded SIM module information is collectively referred to as an eUICC profile or, more simply, a profile.
- eUICC embedded UICC
- eUICC embedded UICC
- eUICC can download and install profiles using OTA (Over The Air) technology.
- An eUICC can be named as a UICC capable of downloading and installing profiles.
- the method of downloading and installing a profile to an eUICC using OTA technology can also be applied to a detachable UICC that can be inserted into and removed from a terminal. That is, the embodiment of the present disclosure can be applied to a UICC that can download and install a profile using OTA technology.
- UICC may be used interchangeably with “SIM”
- eUICC may be interchanged with “eSIM”.
- profile may mean that an application, a file system, an authentication key value, etc. stored in the UICC are packaged in a software form.
- USIM Profile may mean the same as “profile” or may mean that information included in a USIM application in a profile is packaged in a software form.
- an operation of enabling a terminal to enable a profile means an operation of setting the terminal to receive a communication service through a communication service provider that provided the corresponding profile by changing the state of the corresponding profile to enabled. can do.
- a profile in an active state may be expressed as an “enabled profile”.
- an operation of disabling a profile by a terminal means an operation of changing the state of a corresponding profile to a disabled state so that the terminal cannot receive communication services through a communication service provider that provided the corresponding profile. can do.
- a profile in a deactivated state may be expressed as a “disabled profile”.
- an operation of deleting a profile by a terminal may mean an operation of changing the state of a corresponding profile to a deleted state so that the terminal cannot activate or deactivate the profile any more.
- a profile in a deleted state may be expressed as a “deleted profile”.
- an operation of enabling, disabling, or deleting a profile by a terminal sets the status of each profile to enabled, disabled, or deleted.
- each profile is first marked as to be enabled, to be disabled, or to be deleted, and the UICC of the terminal or terminal Changes each profile to enabled, disabled, or deleted after performing a specific operation (eg, performing a REFRESH or RESET command) It can also mean an action.
- the action of marking a specific profile as intended i.e., to be enabled, to be disabled, or to be deleted) must be performed for one profile.
- the two scheduled status indications may be integrated into one. For example, if a certain profile is marked as to be disabled and to be deleted, the profile may be collectively marked as to be disabled and deleted. .
- the operation of displaying the expected status of one or more profiles by the terminal may be performed sequentially or simultaneously.
- an operation in which the terminal displays the expected state for one or more profiles and then changes the state of the actual profile may be performed sequentially or simultaneously.
- the "profile providing server” may include a function of generating a profile, encrypting the generated profile, generating a profile remote management command, or encrypting the generated profile remote management command.
- the profile providing server includes SM-DP (Subscription Manager Data Preparation), SM-DP+ (Subscription Manager Data Preparation plus), off-card entity of Profile Domain, profile encryption server, profile creation server, profile server, profile provider (Profile Provisioner , PP), Profile Provider, and PPC holder (Profile Provisioning Credentials holder).
- a “profile management server” may include a function of managing a profile.
- the profile management server is SM-SR (Subscription Manager Secure Routing), SM-SR+ (Subscription Manager Secure Routing Plus), off-card entity of eUICC Profile Manager or PMC holder (Profile Management Credentials holder), EM (eUICC Manager), PP (Profile Manager), etc.
- a profile providing server may mean a combination of functions of a profile management server. Accordingly, in various embodiments of the present disclosure, the operation of the profile providing server may be performed in the profile management server. Similarly, the operation of the profile management server or SM-SR may be performed in the profile providing server.
- opening mediation server can be expressed as SM-DS (Subscription Manager Discovery Service), DS (Discovery Service), root opening mediation server (Root SM-DS), alternative opening mediation server (Alternative SM-DS) there is.
- the opening mediation server may receive an event registration request (Register Event Request, Event Register Request) from one or more profile providing servers or opening mediation servers.
- one or more opening mediation servers may be used in combination.
- the first opening mediation server may receive an event registration request from the second opening mediation server as well as the profile providing server.
- the profile providing server and the opening mediation server may be used as a 'RSP (Remote SIM Provisioning) server'.
- the RSP server can be represented by SM-XX (Subscription Manager XX).
- a 'terminal' includes a mobile station (MS), a user equipment (UE), a user terminal (UT), a wireless terminal, an access terminal (AT), a terminal, and a subscriber unit.
- MS mobile station
- UE user equipment
- UT user terminal
- AT access terminal
- SS subscriber station
- WTRU wireless transmit/receive unit
- the terminal is such as a cellular phone, a smart phone having a wireless communication function, a personal digital assistant (PDA) having a wireless communication function, a wireless modem, a portable computer having a wireless communication function, and a digital camera having a wireless communication function.
- PDA personal digital assistant
- the terminal may include a machine to machine (M2M) terminal and a machine type communication (MTC) terminal/device, but is not limited thereto.
- M2M machine to machine
- MTC machine type communication
- a terminal may also be referred to as an electronic device.
- an "electronic device” may have a built-in UICC capable of downloading and installing a profile.
- the UICC physically separated from the electronic device may be inserted into the electronic device and connected to the electronic device.
- the UICC in the form of a card can be inserted into an electronic device.
- the electronic device may include a terminal, and in this case, the terminal may be a terminal including a UICC capable of downloading and installing a profile.
- the UICC can be embedded in the terminal, and when the terminal and the UICC are separated, the UICC can be inserted into the terminal or inserted into the terminal and connected to the terminal.
- a UICC that can be installed by downloading a profile may be referred to as an eUICC, for example.
- a terminal or electronic device may include software or an application installed in the terminal or electronic device to control the UICC or eUICC.
- Software or application installed in a terminal or electronic device to control the UICC or eUICC may be referred to as, for example, a Local Profile Assistant (LPA).
- LPA Local Profile Assistant
- profile identifier means profile identifier (Profile ID), ICCID (Integrated Circuit Card ID), Matching ID, event identifier (Event ID), activation code (Activation Code), activation code token (Activation Code Token), command Matches Command Code, Command Code Token, Signed Command Code, Unsigned Command Code, ISD-P or Profile Domain (PD) It can be referred to as a factor that becomes.
- the profile identifier (Profile ID) may indicate a unique identifier of each profile.
- the profile identifier may further include the address of the profile providing server (SM-DP+) capable of indexing the profile.
- the profile identifier may further include the signature of the profile providing server (SM-DP+).
- eUICC identifier may be a unique identifier of an eUICC embedded in a terminal and may be referred to as an EID.
- the eUICC identifier may be an identifier of the corresponding provisioning profile (Provisioning Profile Profile ID).
- provisioning Profile Profile ID identifier of the corresponding provisioning profile
- the eUICC identifier may be a terminal ID.
- the eUICC identifier may refer to a specific secure domain of the eUICC chip.
- a "profile container” may be referred to as a profile domain.
- a profile container may be a security domain.
- APDU application protocol data unit
- PP Profile Provider
- PM Profile Manager
- PPC Profile Provisioning Credentials
- a PPC may include one or more of a symmetric key, a Rivest Shamir Adleman (RSA) certificate and private key, an elliptic curved cryptography (ECC) certificate and private key, a root certification authority (CA), and a certificate chain.
- RSA Rivest Shamir Adleman
- ECC elliptic curved cryptography
- CA root certification authority
- PPCs can be stored or used in the eUICC for each of the plurality of profile providing servers.
- PMC Profile Management Credentials
- PMC can include one or more of symmetric key, RSA certificate and private key, ECC certificate and private key, Root CA and certificate chain.
- PMCs can be stored or used in the eUICC for each of the plurality of profile management servers.
- AID may be an application identifier. This value may be a separator that distinguishes different applications within the eUICC.
- an “event” may be a collective term for profile download, remote profile management, or other profile or eUICC management/processing commands.
- An event may be named a remote SIM provisioning operation (or RSP operation, or RSP operation) or an event record, and each event is a corresponding event identifier (Event Identifier). , Event ID, EventID) or matching identifier (Matching Identifier, Matching ID, MatchingID) and the address (FQDN, IP Address, or URL), the signature of the profile providing server (SM-DP+) or opening brokerage server (SM-DS), and at least one digital certificate of the profile providing server (SM-DP+) or opening brokerage server (SM-DS) It can be referred to as data that
- Command code processing procedure or "command code procedure” or "LPA API (Local Profile Assistant Application Programming Interface)”.
- Profile Download can be used interchangeably with Profile Installation.
- Event Type is a term that indicates whether a specific event is a profile download, remote profile management (eg, deletion, activation, deactivation, replacement, update, etc.), or other profile or eUICC management/processing commands. It can be used and can be named as operation type (Operation Type or OperationType), operation classification (Operation Class or OperationClass), event request type (Event Request Type), event classification (Event Class), event request classification (Event Request Class), etc. can An arbitrary event identifier (EventID or MatchingID) may indicate a path through which the terminal acquired the corresponding event identifier (EventID or MatchingID) or a purpose of use (EventID Source or MatchingID Source).
- profile package may be used interchangeably with a profile or used as a term indicating a data object of a specific profile, and may be named Profile TLV or Profile Package TLV (Profile Package TLV). If the profile package is encrypted using an encryption parameter, it may be named a Protected Profile Package (PPP) or a Protected Profile Package TLV (PPP TLV). If the profile package is encrypted using encryption parameters that can only be decrypted by a specific eUICC, it may be named a bound profile package (BPP) or a bound profile package TLV (BPP TLV).
- the profile package TLV may be a data set expressing information constituting a profile in a tag, length, value (TLV) format.
- LPM Local Profile Management
- LPM changes the state (Enabled, Disabled, Deleted) of a specific profile through software installed on the terminal, or the contents of a specific profile (eg, Profile Nickname, Profile Metadata, etc.) ) can be used for updating.
- the LPM may include one or more local management commands, and in this case, the target profile of each local management command may be the same or different for each local management command.
- Remote Profile Management refers to Profile Remote Management, Remote Management, Remote Management Command, Remote Command, and Remote Profile. It can be named as RPM Package, Profile Remote Management Package, Remote Management Package, Remote Management Command Package, or Remote Command Package. there is.
- RPM changes (updates) the status (Enabled, Disabled, Deleted) of a specific profile or changes (updates) the contents of a specific profile (eg, Profile Nickname, Profile Metadata, etc.) can be used for purposes.
- RPM may include one or more remote management commands, and in this case, the target profile of each remote management command may be the same or different for each remote management command.
- a “certificate” or “digital certificate” refers to a mutual key based on an asymmetric key composed of a pair of a public key (PK) and a secret key (SK). It may indicate a digital certificate used for authentication (Mutual Authentication).
- Each certificate includes one or more public keys (Public Keys, PKs), a Public Key Identifier (PKID) corresponding to each public key, and an identifier of the Certificate Issuer (CI) that issued the corresponding certificate. (Certificate Issuer ID) and digital signature (Digital Signature).
- Certificate Issuer may be named as Certification Issuer, Certificate Authority (CA), Certification Authority, and the like.
- Public Key (PK) and “Public Key ID (PKID)” refer to a specific public key or a certificate including the corresponding public key, or a part of a specific public key or a corresponding public key.
- a part of the included certificate, or the calculated result (e.g., hash) value of a specific public key, or the calculated value (e.g., hash) of a certificate that includes the public key, or a specific public key refers to a storage space in which data are stored, for example, the calculation result (eg, hash) value of a part of a key or the calculation result (eg, hash) value of a part of a certificate including a corresponding public key. can be used interchangeably with the same meaning.
- certificates (primary certificates) issued by one certificate issuer are used to issue other certificates (secondary certificates), or secondary certificates are used to issue tertiary or more certificates in conjunction.
- the correlation between the corresponding certificates can be named as Certificate Chain or Certificate Hierarchy, and in this case, the CI certificate used to issue the first certificate is the Root of Certificate , Root CI, Root CI Certificate, Root CA, Root CA Certificate, etc.
- mobile operator may represent a business that provides communication services to terminals, and includes a business supporting system (BSS), an operational supporting system (OSS), It can collectively refer to a POS terminal (point of sale terminal) and other IT systems.
- BSS business supporting system
- OSS operational supporting system
- POS terminal point of sale terminal
- a communication service provider is not limited to expressing only one specific business providing communication services, but a term that refers to a group or association or consortium of one or more businesses or a representative representing the group or association.
- a telecommunications operator is an operator (operator, OP, or Op.), a mobile network operator (MNO), a mobile virtual network operator (MVNO), and a service provider (service provider or SP) , profile owner (PO), etc., and each communication service provider may set or be assigned at least one name and/or unique identifier (object identifier: OID) of the communication service provider.
- object identifier object identifier: OID
- a telecommunications carrier refers to a group of more than one entity or entity or agency, the name or unique identifier of any group or entity or entity shall be shared by all entities belonging to, or collaborating with, that group or entity. name or unique identifier.
- AKA may indicate authentication and key agreement, and may indicate an authentication algorithm for accessing 3GPP and 3GPP2 networks.
- K is an encryption key value stored in the eUICC used in the AKA authentication algorithm.
- Oc is a parameter value that can be stored in the eUICC used for the AKA authentication algorithm.
- NAA is a Network Access Application (Network Access Application) application program, and may be an application program such as USIM or ISIM stored in the UICC to access a network.
- NAA may be a network access module.
- an “indicator” may be used to express that a certain function, setting, or operation is required or not required, or may be used to express the corresponding function, setting, or operation itself.
- a marker is expressed in various forms such as a string or an alphanumeric string, a true/false operator (boolean - TRUE or FALSE), a bitmap, an array, a flag, and the like. may be used, and other expressions having the same meaning may be used interchangeably.
- a terminal managing a profile for connecting to a network using an embedded universal integrated circuit card includes: a transceiver; and receiving a request for moving the profile from the user, checking profile movement information, sending a message requesting profile movement to the profile server, and further transmitting a confirmation number or character string for user authentication to the profile server if necessary; Receives an activation code or event registration and whether a profile needs to be deleted from the profile server, deletes the profile, transmits the profile deletion result to the profile server, and transmits the activation code or profile transfer request result to another terminal. receive the activation code or profile transfer request result from another terminal, transmit a message requesting a profile to the profile server using the activation code, receive a profile package from the profile server, and retrieve the profile package It may include at least one processor controlling the terminal to install.
- eUICC embedded universal integrated circuit card
- a profile server for providing a profile for network connection to a terminal in a wireless communication system includes a transceiver; and receiving a transfer request message of the profile from the terminal, further receiving a confirmation number or character string for user authentication from the terminal to the profile server if necessary, determining whether the profile can be moved, and downloading the profile or a new profile.
- an activation code that can be downloaded, setting the state of the prepared profile to a state in which download is not possible, if the mobile device can move after deleting the profile, and transmitting the activation code and whether or not the profile needs to be deleted to the terminal; Receives a deletion result of the profile from the terminal, changes the profile to a downloadable state, receives a profile download request message from the terminal, determines whether the profile is in a downloadable state, and determines whether the profile is in a downloadable state If the profile package is sent to the terminal, and if the profile is not downloadable, an error code is transmitted or the profile deletion result included in the profile download request is verified, and the profile deletion result does not exist or verification fails. It may include at least one processor controlling the profile server to transmit an error code.
- FIGS. 1 to 5 a method and device for installing and managing a profile according to the present disclosure will be described with reference to FIGS. 1 to 5 .
- FIG. 1 is a diagram illustrating a mobile communication network connection method of a terminal using a UICC in which a fixed profile is loaded in the terminal according to an embodiment of the present disclosure.
- the UICC 120 may be inserted into the terminal 110 .
- the UICC 120 may be detachable or pre-embedded in a terminal.
- the fixed profile of the UICC 120 loaded with the fixed profile means that 'access information' for accessing a specific carrier is fixed.
- the access information may be a K or Ki value required to authenticate to the network together with IMSI, which is a subscriber identifier, and subscriber identifier.
- the terminal 110 may perform authentication with an authentication processing system (eg, home location register (HLR), AuC, etc.) of a mobile communication service provider using the UICC 120 .
- the authentication process may be an Authentication and Key Agreement (AKA) process.
- AKA Authentication and Key Agreement
- the terminal 110 can use a mobile communication service such as a phone call or mobile data using the mobile communication company network 130 of the mobile communication system.
- FIG. 2 is a diagram illustrating a configuration of a system in which a terminal manages a profile installed in a first terminal according to a user's input and installs the profile in a second terminal according to an embodiment of the present disclosure.
- eSIMs 211 and 221 are mounted on the terminals 210 and 220, and profiles (not shown) may be installed on the eSIMs 211 and 221.
- LPAs 212 and 222 may be installed in the terminals 210 and 220 .
- the eSIMs 211 and 221 may be controlled by the LPAs 212 and 222 .
- the user 200 may control the profiles installed in the eSIMs 211 and 221 of each terminal through the LPAs 212 and 222 .
- the user 200 may receive a communication service from a service provider (hereinafter referred to as “communication service provider” or “business operator” 250).
- a profile (not shown) of the operator 250 may be installed in the first terminal 210 .
- the user 200 may, for example, attempt to re-install the profile installed on the first terminal 210 on the second terminal 220 when the second terminal 220 is newly purchased.
- the operator 250 is connected to the first profile server 230 and the second profile server 240, the LPA 212 of the first terminal 210 is connected to the first profile server 230, and The LPA 222 of the second terminal 220 may be connected to the second profile server 240 .
- the first profile server 230 and the second profile server 240 may be the same as or different from each other.
- each operator server may be connected to each separate profile server, or at least one operator server may be connected to the same profile server.
- each of the profile servers 230 and 240 is configured as a single server for convenience, one or more profile servers (SM-DP+) may be included in the server configuration according to implementations and embodiments. It should be noted that the configuration of various servers as described above may be simply indicated as a single profile server in the drawings below.
- FIG. 3 is a diagram illustrating an example of a procedure between a first terminal, a second terminal, and a server for a second terminal to download a profile according to an embodiment of the present disclosure.
- the first terminal requests a device change from the installed profile to the second terminal through the profile server, and the profile server sends a confirmation code for profile movement to the first terminal, that is, a profile move confirmation code (Confirmation Code or Confirmation Code for Device Change) is requested, the profile server verifies the profile movement confirmation code transmitted by the first terminal, prepares a profile prepared for the second terminal, and the second terminal converts the profile prepared for profile movement to the profile server.
- a profile move confirmation code Confirmation Code or Confirmation Code for Device Change
- FIG. 3 configuration and description of the user 200 , the first terminal 210 , the second terminal 220 , the profile server 230 , and the operator 250 will be referred to FIG. 2 .
- the user 200, the first terminal 210, the second terminal 220, the profile server 230, and the operator 250 are the user 200, the first terminal 210, and the first terminal 210 of FIG. 2, respectively. 2 may correspond to the terminal 220, the first profile server 230, and the operator 250.
- the operator 250 may request the profile server 230 to prepare a profile for the first terminal 210.
- the business operator 250 may perform a contract with the user 200 for a service to be provided with the corresponding profile.
- the user 200 may select a service provided by the operator 250 through the first terminal 210, reserve a service with the operator 250, and purchase a profile corresponding thereto.
- the operator 250 may request profile preparation from the profile server 230 using the ES2+.DownloadOrder function and the ES2+.ConfirmOrder function.
- the operator 250 may selectively include a confirmation code for downloading a profile in the profile preparation request.
- the operator 250 optionally further includes a confirmation code for profile movement that can be used in future profile movement, that is, a profile movement confirmation code (Confirmation Code or Confirmation Code For Device Change) in the profile preparation request.
- a profile movement confirmation code Confirmation Code or Confirmation Code For Device Change
- the verification code for downloading the profile and the verification code for moving the profile may be a string of numbers or a string including at least one number or letter.
- the confirmation code for downloading the profile and the confirmation code for moving the profile may be the same or different, and the business operator 250 reuses the confirmation code for downloading the profile without including the confirmation code for moving the profile. It may be requested that the movement verification code be set to the same value as the verification code for profile download.
- the profile movement verification code and the verification code for profile download may be mixed.
- this may refer to a profile movement confirmation code or a confirmation code for downloading a profile.
- whether the confirmation code indicates a profile movement confirmation code or a confirmation code for profile download can be interpreted according to the overall flow of related operations.
- the profile server 230 may prepare a profile to be delivered to the first terminal 210.
- the profile server 230 or business operator 250 may assign and manage a matching ID corresponding to the prepared profile. If the operator 250 includes a confirmation code for downloading a profile or a confirmation code for moving a profile in the profile preparation request, the profile server 230 may store the corresponding confirmation code to correspond to the prepared profile.
- the profile server 230 may store the corresponding verification code without change or selectively generate and store a hash value of the verification code.
- hash algorithms such as SHA (Secure Hash Algorithm)-0, SHA-1, and SHA-256 can be used.
- the profile server 230 or business operator 250 may generate an activation code for downloading the profile and deliver it to the user 200.
- the activation code is the FQDN of the address of the profile server 230 where the profile is prepared, a matching identifier corresponding to the prepared profile, a profile download confirmation code required indicator (Confirmation Code Required Flag), a profile move confirmation code required indicator (Confirmation Code for Device Change Required Flag) may include at least one.
- the profile download confirmation code required indicator and the profile movement confirmation code required indicator may be used interchangeably.
- the profile download confirmation code required indicator may be used as a profile movement confirmation code required indicator.
- the profile download confirmation code required indicator and the profile movement confirmation code required indicator may be indicated using the same indicator (eg, profile download confirmation code required indicator or confirmation code indicator (Confirmation Code Required Flag)). . If the profile download confirmation code is included in the profile preparation request of the operator 250, the profile download confirmation code required indicator may be set to '1' or 'True'. In addition, if the profile movement verification code is included in the profile preparation request of the business operator 250, the profile movement verification code required indicator may be set to '1' or 'True'.
- the profile server 230 may selectively register an event corresponding to the prepared profile in an opening brokerage server (not shown) accessible to the first terminal 210.
- the event registered in the opening mediation server (not shown) may include at least one of the FQDN of the address of the profile server 230 where the profile is prepared and a matching identifier (or event identifier) of the prepared profile.
- the first terminal 210 stores the profile prepared in the profile server 230 using the activation code provided by the profile server 230 or the business operator 250 or an event acquired from the opening brokerage server (not shown). It can be downloaded and installed in an eSIM (not shown, corresponding to FIG. 2 211) of the first terminal 210.
- the user 200 may request transfer of the first profile to the first terminal 210.
- the user 200 can check information on the first profile (profile metadata) and information that a user who intends to move the first profile should be aware of through the first terminal 210 .
- Information about the first profile and information to be noted by a user who wants to move the first profile may be stored in the first terminal 210 or the first profile.
- Information on the first profile may include, for example, the name or logo of the operator 250, a profile policy, and the like. Information to be noted by the user who intends to move the first profile may include, for example, the remaining number of profile movements permitted by the business operator 250 or the cost the user must pay for profile movement.
- the first profile information may include content requesting acquisition of information of the second terminal 220 to which the profile is to be moved.
- the information of the second terminal 220 includes an eUICC identifier installed in the second terminal 220, a type allocation code (TAC) of the second terminal 220, and an opening brokerage server supported by the second terminal 220 (not shown).
- TAC type allocation code
- the information of the opening brokerage server supported by the second terminal 220 indicates the FQDN of at least one opening brokerage server address and whether the corresponding opening brokerage server supports push notification.
- An indicator may be included.
- at least one address of a profile server to which the terminal must access to move the profile may be stored.
- a profile server that the terminal must access to move the profile may be, for example, the profile server 230 .
- the first profile may include a Profile Move Confirmation Code Required Indicator (Confirmation Code for Device Change Required Flag) indicating whether it is necessary to provide the profile transfer confirmation code to the profile server 230 in the profile transfer request process, If the profile server 230 needs to provide the profile movement confirmation code, the corresponding indicator may be set to 'True' or NULL.
- a Profile Move Confirmation Code Required Indicator Confirmation Code for Device Change Required Flag
- the first terminal 210 may request the profile server 230 to move the first profile.
- Step 3007 may use, for example, at least one of an initiate authentication message, a terminal authentication request message, and a transfer request message, and/or a device change It may be performed by further transmitting an operation type set to change or transfer profile.
- the procedure of requesting movement of the first profile in step 3007 may include transmitting at least a profile identifier (ICCID) of the first profile.
- the procedure for requesting the movement of the first profile includes the eUICC identifier installed in the second terminal 220, the type allocation code (TAC) of the second terminal 220, and the opening brokerage server supported by the second terminal 220 (not shown). City) may optionally include at least one of the information.
- step 3009 the profile server 230 and the operator 250 may check the possibility of moving the first profile.
- step 3009 is performed using a profile move confirmation request message (Confirm Device Change Request) in which the profile server 230 requests the operator 250 to confirm whether or not the profile requested from the first terminal 210 can be moved. It can be.
- the profile movement confirmation request message may include a profile identifier of the requested first profile, and at least one of an eUICC identifier installed in the second terminal 220 and a type allocation code (TAC) of the second terminal 220 may optionally be included.
- TAC type allocation code
- step 3009 the operator 250 receiving the profile transfer confirmation request message from the profile server 230 identifies the requested profile using the profile identifier and determines whether the profile can be moved.
- the profile server 230 determines whether the same profile as the first profile can be reused or whether a new profile needs to be prepared and returns the result to the profile server 230.
- a profile movement confirmation code (or confirmation code) from the first terminal 210, and if reception of the corresponding code is required, a profile movement confirmation code required indicator is transmitted to the profile server (230). ) can be replied to.
- a new profile movement confirmation code may be generated for the current profile movement request, and the generated profile movement confirmation code may be returned to the profile server 230 .
- the corresponding profile when the corresponding profile is moved, it is determined whether it is necessary to receive a profile movement confirmation code (or confirmation code) from the first terminal 210, and if reception of the corresponding code is required, a new profile movement confirmation code for the current profile movement request. can be generated, and the generated profile movement confirmation code can be returned to the profile server 230. At this time, the profile movement verification code required indicator may not be transmitted.
- a profile movement confirmation code or confirmation code
- the profile server 230 may store the corresponding verification code transmitted from the business operator 250 .
- the profile server 230 may store the corresponding verification code without change or selectively generate and store a hash value of the verification code.
- hash algorithms such as SHA (Secure Hash Algorithm)-0, SHA-1, and SHA-256 can be used.
- the profile server 230 may store the corresponding confirmation code to correspond to at least one of a session identifier (TransactionID) and a first profile identifier.
- TransactionID session identifier
- the business operator 250 may deliver the generated profile movement confirmation code to the user 200 using an e-mail, text message, phone call, or the like method.
- the operator 250 may return a first profile deletion indicator (Delete Old Profile) to the profile server 230.
- the business operator 250 may transmit to the profile server 250 information that a user who intends to move the first profile should be aware of.
- the possibility of moving the first profile may be determined by the profile server 230 itself without interworking with the business operator 250.
- the operator 250 may provide settings for movement of the first profile to the profile server 230 before step 3001 or step 3007, and the profile server 230 may store them.
- the profile server 230 may use the profile identifier to identify the requested profile and determine whether the profile can be moved.
- the profile server 230 may determine whether the same profile as the first profile can be reused or whether a new profile should be prepared.
- it may be determined whether it is necessary to receive a profile movement confirmation code from the first terminal 210 .
- a new profile transfer confirmation code may be generated for the current profile transfer request, and a value previously provided by the operator 250 or the same value as the profile download confirmation code used for downloading the existing profile may be used.
- the profile server 230 may deliver the profile movement confirmation code to the user 200 using e-mail, text, phone, or the like, if necessary.
- it may be determined whether or not the first profile needs to be deleted before the second profile for the second terminal 220 to be prepared for moving the first profile to the profile server 230 is delivered to the second terminal 220 .
- the profile server 230 may return the result of the profile move request to the first terminal 210 according to the result of step 3009. For example, at least one of a terminal authentication response message and a transfer response message may be used.
- the profile move request result is a profile move confirmation code required indicator set to 'True' or NULL indicating that the profile move confirmation code needs to be delivered to the profile server 230 when the current profile move request is made. It may include a message including a (Confirmation Code for Device Change required flag) and information that a user intending to move the first profile should be aware of.
- the first terminal 210 may receive confirmation of the first profile movement of the user 200 or a profile movement confirmation code.
- the first terminal 210 sets a profile movement verification code required indicator set to 'True' or any value (NULL) in the information about the first profile stored in the first terminal 210 or the first profile ( If the Confirmation Code for Device Change Required Flag) is included, the profile movement confirmation code can be input.
- the profile move request result returned from the profile server 230 in step 3011 includes a Profile Move Confirmation Code Required Flag set to 'True' or any value (NULL), If there is, a profile movement confirmation code can be input.
- the first terminal 210 may selectively generate a hash value of the input profile movement verification code.
- hash algorithms such as SHA (Secure Hash Algorithm)-0, SHA-1, and SHA-256 can be used.
- the first terminal 210 may selectively include at least one of the following values together with the profile movement confirmation code or the hash value of the profile movement confirmation code.
- the first terminal 210 generates a digital signature of the eSIM (not shown) in the hash value of the event registration notification identifier through the terminal's eSIM (not shown, corresponding to 212 in FIG. 2). can do.
- the first terminal 210 may return a confirmation result of the first profile movement to the profile server 230.
- the confirmation result for the first profile movement includes at least one of the confirmation result for the first profile movement, a profile movement confirmation code, a hash value of the profile movement confirmation code, and a hash value of the profile movement confirmation code. It may include at least one of a signature and a session identifier.
- the profile server 230 may verify the confirmation result of the first profile movement received from the first terminal 210.
- the information about the profile included the Confirmation Code for Device Change Required Flag set to 'True' or NULL, or the profile server 230
- the profile server 230 determines that the first terminal
- the returned profile movement confirmation code or the hash value of the profile movement confirmation code may be compared and verified with the profile movement confirmation code corresponding to the current profile movement request stored in the profile server 230 .
- the profile server 230 may generate a hash value of the profile movement confirmation code corresponding to the current profile movement request.
- hash algorithms such as SHA (Secure Hash Algorithm)-0, SHA-1, and SHA-256 can be used.
- SHA Secure Hash Algorithm
- SHA-1 SHA-1
- SHA-256 SHA-256
- at least one of the following values may be selectively included together with the stored profile movement confirmation code or the hash value of the stored profile movement confirmation code.
- the profile server 230 compares the hash value of the profile movement confirmation code received from the first terminal 210 and the hash value of the profile movement confirmation code generated by the profile server 230, and if the same, the second terminal 220 It is possible to prepare a second profile for.
- the profile server 230 may prepare a second profile to be delivered to the second terminal 220.
- a download order message, a confirm order message, a rpm order message, a release order message, or a handle notification It may be performed using at least one or more of
- the profile server 230 may register an event corresponding to the prepared profile in an opening brokerage server (not shown) accessible to the second terminal 220 .
- the profile server 230 may store a profile download confirmation code corresponding to the second profile or a hash value of the profile download confirmation code. The storage of the confirmation code may be performed when the operator 250 instructs to use the confirmation code in step 3001 or 3009. Also, the confirmation code may be the same as the confirmation code provided by the operator 250 in step 3001 or 3009.
- the profile server 230 may return a result of requesting movement of the first profile to the first terminal 210.
- the result of the first profile movement request may include information capable of downloading the prepared second profile.
- Information capable of downloading the second profile includes an activation code (AC) corresponding to the second profile, a profile deletion indicator (Delete Profile Flag), an event registration indicator (Event Registration Flag), a confirmation code required indicator (Confirmation Code Required Flag) may optionally be included.
- the activation code may include the FQDN of the address of the profile server 230 where the second profile is stored, an event identifier (MatchingID) connected to the second profile, and the like.
- the profile server 230 may include the FQDN of the address of the opening brokerage server 270 for which event registration is completed in the activation code.
- the profile server 230 includes the FQDN of at least one intermediary server address in the activation code, or You can optionally include an FQDN.
- the first terminal 210 may inform the user 200 or the second terminal 220 that the second profile has become downloadable.
- the first terminal 210 may deliver the activation code delivered in step 3017 to the second terminal 220 .
- the first terminal 210 passes the activation code to the second terminal 220, the first terminal 210 converts the activation code into an image form such as a QR code or converts it into a string form and outputs it on the screen , it is possible to notify the user 200 that the activation code is ready.
- the user 200 may input the activation code output on the screen of the first terminal 210 to the second terminal 220 .
- the first terminal 210 outputs that the second profile is ready on the screen, or directly transmits the result to the second terminal 220 through a connection such as wired connection, WiFi, Bluetooth, NFC, etc. there is.
- the second terminal 220 may transmit a profile download request message to the profile server 230.
- the profile download request in step 3021 is a terminal authentication request message (Authenticate Client Request) including at least one of an identifier (eUICC ID, EID) of the eUICC in the second terminal 220 and a matching identifier corresponding to the prepared profile. ) can be used.
- the profile server 230 may provide the second terminal 220 with a second profile corresponding to the matching identifier or the identifier of the eUICC.
- step 3021 may further include exchanging one or more messages between the second terminal 220 and the profile server 230, and the first message that the profile server 230 returns to the second terminal 220. may be a terminal authentication response message (Authenticate Client Response).
- FIG. 4 is a block diagram illustrating components of a terminal according to an embodiment of the present disclosure.
- Each of the terminals described in the present disclosure may correspond to the first terminal or the second terminal described in FIG. 2 .
- the first terminal 210 and the second terminal 220 may be an embodiment of the terminal of FIG. 2, and the expressions “first” and “second” are used to indicate that each terminal is physically different from each other. It just happened.
- the terminal may include a transceiver 410 and a processor 420 .
- the terminal may include a UICC 430.
- the UICC 430 may be inserted into the terminal or may be an eUICC built into the terminal.
- the transceiver 410 may transmit and receive signals, information, data, and the like to and from the profile server.
- the transceiver 410 transmits a message requesting profile movement to the profile server, receives a profile movement confirmation code required indicator from the profile server, and transmits the profile movement confirmation code to the profile server. , Receives an activation code from the profile server, whether an event has been registered in the opening mediation server, and whether or not the profile needs to be deleted, and can transmit the profile deletion result to the profile server.
- the transceiver 410 may transmit a message requesting a profile to a profile server using an activation code and receive a profile package.
- the processor 420 is a component for overall control of the terminal.
- the processor 520 may control overall operations of the terminal according to various embodiments of the present disclosure.
- the processor 420 may be referred to as a control unit.
- the processor 420 may include one or more processors.
- the processor 420 receives a profile move request from a user, checks profile move information, transmits a message requesting profile move to the profile server, and requires a profile move confirmation code from the profile server. Receives an indicator, sends a profile move confirmation code to the profile server, receives an activation code from the profile server or whether an event is registered in the opening brokerage server and whether or not the profile needs to be deleted, deletes the profile, and sends the profile deletion result to the profile server. and control the terminal to deliver the activation code or profile transfer preparation completion to another terminal.
- the processor 420 receives an activation code from another terminal, transmits a message requesting a profile to a profile server using the activation code, receives a profile package from the profile server, and receives a profile package. You can control the terminal to install.
- the UICC 430 may download a profile and install the profile. Also, the UICC 430 may manage profiles.
- the UICC 430 may operate under the control of the processor 420 .
- the UICC 430 may include a processor or controller for installing a profile, or may have an application installed thereon. Some of the applications may be installed in the processor 420 .
- the terminal may further include a storage unit (not shown), and may store data such as a basic program for operation of the terminal, an application program, and setting information.
- the storage unit is a flash memory type, a hard disk type, a multimedia card micro type, a card type memory (eg, SD or XD memory, etc.), a magnetic Memory, magnetic disk, optical disk, RAM (Random Access Memory, RAM), SRAM (Static Random Access Memory), ROM (Read-Only Memory, ROM), PROM (Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read- Only Memory) may include at least one storage medium.
- the processor 520 may perform various operations using various programs, contents, data, etc. stored in the storage unit.
- FIG. 5 is a block diagram illustrating components of a profile server according to an embodiment of the present disclosure.
- Each of the profile servers described in the present disclosure may correspond to the profile server described in FIG. 2 .
- the first profile server 230 and the second profile server 240 may be an embodiment of the server of FIG. 2, and expressions of “first” and “second” indicate that each profile server is physically different from each other. It is only used to indicate.
- the profile server may include a transceiver 510 and a processor 520 .
- the transmitting and receiving unit 510 may transmit and receive signals, information, data, and the like with terminals, opening mediation servers, or operators.
- the transceiver 510 receives a profile movement request message from a terminal, transmits a profile movement confirmation code required indicator to the terminal, receives a profile movement confirmation code from the terminal, and receives an activation code from the terminal. and sending a message including whether or not the profile needs to be deleted, receiving a profile deletion message from the terminal, receiving a profile download request message from the terminal, and sending a profile package to the terminal when the profile is in a downloadable state, and the profile is downloaded. In the case of an impossible state, an error code may be transmitted to the terminal.
- the processor 520 is a component for overall control of the profile server.
- the processor 520 may control the overall operation of the profile server according to various embodiments of the present disclosure.
- the processor 520 may be referred to as a control unit.
- the processor 520 may include one or more processors.
- the processor 520 receives a profile movement request message from the terminal, determines whether the profile can be moved, transmits a profile movement confirmation code required indicator to the terminal, and receives the profile movement confirmation code from the terminal. , prepare a profile for migrating the existing profile, generate an activation code to download the profile, set the status of the prepared profile to a non-downloadable state if the existing profile needs to be deleted, and send the terminal the activation code and Transmits a message including whether or not the profile needs to be deleted, receives a profile deletion result from the terminal, changes the profile to a downloadable state, receives a profile download request message from the terminal, determines whether the profile is in a downloadable state,
- the profile server may be controlled to transmit a profile package to the terminal when the profile is in a downloadable state, and to transmit an error code to the terminal when the profile is in a downloadable state.
- the profile server may further include a storage unit (not shown), and may store data such as basic programs, application programs, and setting information for the operation of the profile server.
- the storage unit is a flash memory type, a hard disk type, a multimedia card micro type, a card type memory (eg, SD or XD memory, etc.), a magnetic Memory, magnetic disk, optical disk, RAM (Random Access Memory, RAM), SRAM (Static Random Access Memory), ROM (Read-Only Memory, ROM), PROM (Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read- Only Memory) may include at least one storage medium.
- the processor 520 may perform various operations using various programs, contents, data, etc. stored in the storage unit.
- the components are not limited.
- a (e.g., first) element is referred to as being "(functionally or communicatively) connected” or “connected” to another (e.g., second) element
- an element is referred to as another (e.g., second) element. It may be directly connected to, or connected through another component (eg, a third component).
- module used in the present disclosure includes a unit composed of hardware, software, or firmware, and may be used interchangeably with terms such as logic, logic block, component, or circuit, for example.
- a module may be an integral part or a minimum unit or part thereof that performs one or more functions.
- the module may be composed of an application-specific integrated circuit (ASIC).
- ASIC application-specific integrated circuit
- Various embodiments of the present disclosure are implemented as software (eg, a program) including instructions stored in a machine-readable storage medium (eg, internal memory or external memory) readable by a machine (eg, a computer).
- a device is a device capable of calling a command stored from a storage medium and operating according to the called command, and includes a terminal (eg, the first terminal 210 and the second terminal) according to various embodiments of the present disclosure. 220)
- a processor eg, processor 520 of FIG. 9 or processor 620 of FIG. 10
- the processor directly or under the control of the processor may cause other components to be executed.
- a function corresponding to a command may be performed using a command, which may include code generated or executed by a compiler or an interpreter.
- the device-readable storage medium may be provided in the form of a non-transitory storage medium.
- 'non-temporary' only means that the storage medium does not contain a signal and is tangible, but does not distinguish whether data is stored semi-permanently or temporarily in the storage medium.
- Computer program products may be traded between sellers and buyers as commodities.
- the computer program product may be distributed in the form of a device-readable storage medium (eg compact disc read only memory (CD-ROM)) or online through an application store (eg Play StoreTM).
- CD-ROM compact disc read only memory
- application store eg Play StoreTM
- at least part of the computer program product may be temporarily stored or temporarily created in a storage medium such as a manufacturer's server, an application store server, or a relay server's memory.
- Each component may be composed of a single object or a plurality of entities, and some of the sub-components may be omitted, or other sub-components may be various. It may be further included in the embodiment. Alternatively or additionally, some components (eg, modules or programs) may be integrated into one entity and perform the same or similar functions performed by each corresponding component prior to integration. According to various embodiments, operations performed by modules, programs, or other components may be executed sequentially, in parallel, repetitively, or heuristically, or at least some operations may be executed in a different order, may be omitted, or other operations may be added. can
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (15)
- 기기 변경을 지원하는 무선 통신 시스템에서의 제1 단말이 수행하는 방법에 있어서,프로파일 서버로, 상기 제1 단말의 프로파일에 대한 기기 변경을 위한 기기 변경 요청 메시지를 전송하는 단계;상기 프로파일 서버로부터, 상기 기기 변경을 위한 확인 코드 필요 지시자를 포함하는 기기 변경 요청 응답 메시지를 수신 하는 단계;상기 기기 변경을 위한 확인 코드 필요 지시자에 기반하여, 확인 코드 입력의 수신을 확인하는 단계;상기 확인 코드에 기반하여, 확인 코드 해쉬 정보를 생성하는 단계; 및상기 프로파일 서버로, 상기 확인 코드 해쉬 정보를 포함하는 기기 변경 확인 메시지를 전송하는 단계를 포함하는 것을 특징으로 하는 방법.
- 제 1항에 있어서상기 프로파일 서버로부터, 활성화 코드 또는 프로파일 삭제 정보 중 적어도 하나 이상을 포함하는 기기 변경 확인 응답 메시지를 수신하는 단계; 및상기 기기 변경을 위한 상기 활성화 코드를 제2 단말로 제공하는 단계를 더 포함 하는 것을 특징으로 하는 방법.
- 제 1항에 있어서,상기 기기 변경 요청 메시지는 기기 변경을 위한 프로파일 식별자 (integrated circuit card ID, ICCID), 제2 단말에 설치된 eUICC 식별자 (embedded universal integrated circuit card ID, EID), 또는 상기 제2 단말의 TAC(type allocation code) 중 적어도 하나 이상을 포함하며,상기 확인 코드 해쉬 정보는 세션 식별자를 포함하여 생성되는 것을 특징으로 하는 방법.
- 기기 변경을 지원하는 무선 통신 시스템에서의 프로파일 서버가 수행하는 방법에 있어서,제1 단말로부터, 상기 제1 단말의 프로파일에 대한 기기 변경을 위한 기기 변경 요청 메시지를 수신하는 단계;서비스 제공자로부터, 확인 코드를 수신하는 단계;상기 확인 코드에 기반하여, 상기 제1 단말로, 상기 기기 변경을 위한 확인 코드 필요 지시자를 포함하는 기기 변경 요청 응답 메시지를 송신하는 단계;상기 제1 단말로부터, 확인 코드 해쉬 정보를 포함하는 기기 변경 확인 메시지를 수신하는 단계; 및수신한 상기 확인 코드 해쉬 정보에 기반하여 기기 변경 요청에 대한 결과를 판단하는 것을 특징으로 하는 방법.
- 제 4항에 있어서, 기기 변경 요청에 대한 결과는 상기 제1 단말로부터 수신한 확인 코드 해쉬 정보와 저장된 확인 코드 해쉬 정보의 비교에 기반하여 결정되는 것을 특징으로 하는 방법.
- 제 5항에 있어서,상기 제1 단말로부터 수신한 확인 코드 해쉬 정보와 저장된 확인 코드 해쉬 정보가 대응된다고 판단한 경우,상기 제1 단말로, 활성화 코드 또는 프로파일 삭제 정보 중 적어도 하나 이상을 포함하는 기기 변경 확인 응답 메시지를 송신하는 단계; 및상기 기기 변경을 위한 상기 활성화 코드에 기반하여 제2 단말로부터 전송되는, 프로파일 다운로드 요청 메시지를 수신하는 단계를 더 포함하는 것을 특징으로 하는 방법.
- 제 4항에 있어서,상기 서비스 제공자로부터, 기기 변경을 위한 새로운 프로파일 필요 여부에 대한 정보를 포함하는 서비스 제공 메시지를 수신하는 단계를 더 포함하는 것을 특징으로 하는 방법.
- 제 4항에 있어서,상기 서비스 제공자로, 제2 기기 변경 확인 메시지를 전송하는 단계를 더 포함하며,상기 기기 변경 요청 메시지는 프로파일 식별자 (integrated circuit card ID, ICCID), 제2 단말에 설치된 eUICC 식별자 (embedded universal integrated circuit card ID, EID), 또는 상기 제2 단말의 TAC(type allocation code) 중 적어도 하나 이상을 포함하고,상기 제2 기기 변경 확인 메시지는 상기 프로파일 식별자, 제2 단말에 설치된 eUICC 식별자, 또는 제2 단말의 TAC 중 적어도 하나 이상을 포함하는 것을 특징으로 하는 방법.
- 기기 변경을 지원하는 무선 통신 시스템에서의 제1 단말에 있어서,신호를 송수신하는 송수신부; 및송수신부와 연결된 제어부를 포함하며,상기 제어부는 프로파일 서버로, 상기 제1 단말의 프로파일에 대한 기기 변경을 위한 기기 변경 요청 메시지를 전송하고, 상기 프로파일 서버로부터, 상기 기기 변경을 위한 확인 코드 필요 지시자를 포함하는 기기 변경 요청 응답 메시지를 수신 하며, 상기 기기 변경을 위한 확인 코드 필요 지시자에 기반하여, 확인 코드 입력의 수신을 확인하고, 상기 확인 코드에 기반하여, 확인 코드 해쉬 정보를 생성하며, 상기 프로파일 서버로, 상기 확인 코드 해쉬 정보를 포함하는 기기 변경 확인 메시지를 전송하는 것을 특징으로 하는 제1 단말.
- 제 9항에 있어서, 상기 제어부는,상기 프로파일 서버로부터, 활성화 코드 또는 프로파일 삭제 정보 중 적어도 하나 이상을 포함하는 기기 변경 확인 응답 메시지를 수신하고, 상기 기기 변경을 위한 상기 활성화 코드를 제2 단말로 제공하는 단계를 더 포함 하는 것을 특징으로 하는 제1 단말.
- 제 9항에 있어서,상기 기기 변경 요청 메시지는 기기 변경을 위한 프로파일 식별자 (integrated circuit card ID, ICCID), 제2 단말에 설치된 eUICC 식별자 (embedded universal integrated circuit card ID, EID), 또는 상기 제2 단말의 TAC(type allocation code) 중 적어도 하나 이상을 포함하고,상기 확인 코드 해쉬 정보는 세션 식별자를 포함하여 생성되는 것을 특징으로 하는 제1 단말.
- 기기 변경을 지원하는 무선 통신 시스템에서의 프로파일 서버에 있어서,신호를 송수신 하는 송수신부; 및송수신부와 연결된 제어부를 포함하며,상기 제어부는 제1 단말로부터, 상기 제1 단말의 프로파일에 대한 기기 변경을 위한 기기 변경 요청 메시지를 수신하고, 서비스 제공자로부터, 확인 코드를 수신하며, 상기 확인 코드에 기반하여, 상기 제1 단말로, 상기 기기 변경을 위한 확인 코드 필요 지시자를 포함하는 기기 변경 요청 응답 메시지를 송신하고, 상기 제1 단말로부터, 확인 코드 해쉬 정보를 포함하는 기기 변경 확인 메시지를 수신하며, 수신한 상기 확인 코드 해쉬 정보에 기반하여 기기 변경 요청에 대한 결과를 판단하는 것을 특징으로 하는 프로파일 서버.
- 제 12항에 있어서,상기 제어부는 상기 제1 단말로부터 수신한 확인 코드 해쉬 정보와 저장된 확인 코드 해쉬 정보가 대응된다고 판단한 경우, 상기 제1 단말로, 활성화 코드 또는 프로파일 삭제 정보 중 적어도 하나 이상을 포함하는 기기 변경 확인 응답 메시지를 송신하고, 상기 기기 변경을 위한 상기 활성화 코드에 기반하여 제2 단말로부터 전송되는, 프로파일 다운로드 요청 메시지를 수신하며,기기 변경 요청에 대한 결과는 상기 제1 단말로부터 수신한 확인 코드 해쉬 정보와 저장된 확인 코드 해쉬 정보의 비교에 기반하여 결정되는 것을 특징으로 하는 프로파일 서버.
- 제 12항에 있어서,상기 제어부는 상기 서비스 제공자로부터, 기기 변경을 위한 새로운 프로파일 필요 여부에 대한 정보를 포함하는 서비스 제공 메시지를 수신하는 것을 특징으로 하는 프로파일 서버.
- 제 12항에 있어서,상기 제어부는 상기 서비스 제공자로, 제2 기기 변경 확인 메시지를 전송하며,상기 기기 변경 요청 메시지는 프로파일 식별자 (integrated circuit card ID, ICCID), 제2 단말에 설치된 eUICC 식별자 (embedded universal integrated circuit card ID, EID), 또는 상기 제2 단말의 TAC(type allocation code) 중 적어도 하나 이상을 포함하고,상기 제2 기기 변경 확인 메시지는 프로파일 식별자, 제2 단말에 설치된 eUICC 식별자, 또는 제2 단말의 TAC 중 적어도 하나 이상을 포함하는 것을 특징으로 하는 프로파일 서버.
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP23747393.9A EP4432709A4 (en) | 2022-01-27 | 2023-01-27 | METHOD AND APPARATUS FOR USER AUTHENTICATION WHEN CHANGING DEVICES |
| CN202380018914.8A CN118901251A (zh) | 2022-01-27 | 2023-01-27 | 用于在改变装置时认证用户的方法和设备 |
| US18/833,187 US20250150830A1 (en) | 2022-01-27 | 2023-01-27 | Method and apparatus for authenticating user when changing devices |
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR10-2022-0012147 | 2022-01-27 | ||
| KR20220012147 | 2022-01-27 | ||
| KR20220017884 | 2022-02-11 | ||
| KR10-2022-0017884 | 2022-02-11 | ||
| KR1020220072427A KR20230115852A (ko) | 2022-01-27 | 2022-06-14 | 기기 변경 시 사용자 인증 방법 및 장치 |
| KR10-2022-0072427 | 2022-06-14 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2023146352A1 true WO2023146352A1 (ko) | 2023-08-03 |
Family
ID=87472105
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2023/001290 Ceased WO2023146352A1 (ko) | 2022-01-27 | 2023-01-27 | 기기 변경 시 사용자 인증 방법 및 장치 |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US20250150830A1 (ko) |
| EP (1) | EP4432709A4 (ko) |
| WO (1) | WO2023146352A1 (ko) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2024176044A (ja) * | 2023-06-07 | 2024-12-19 | トヨタ自動車株式会社 | 情報処理装置、方法、及び、システム |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2016178548A1 (ko) * | 2015-05-07 | 2016-11-10 | 삼성전자 주식회사 | 프로파일 제공 방법 및 장치 |
| KR20170082122A (ko) * | 2016-01-05 | 2017-07-13 | 엘지전자 주식회사 | eUICC가 내장된 장치의 프로파일 제어를 위한 시스템 및 그 제어방법 |
| US20180302115A1 (en) * | 2014-05-23 | 2018-10-18 | Huawei Technologies Co., Ltd. | Euicc management method, euicc, sm platform, and system |
| KR20200110101A (ko) * | 2019-03-13 | 2020-09-23 | 삼성전자주식회사 | eUICC 단말을 변경하는 방법 및 장치 |
| KR20210039733A (ko) * | 2019-10-02 | 2021-04-12 | 삼성전자주식회사 | 무선 통신 시스템의 SIM Profile을 재설치 하는 방법 및 장치 |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9100810B2 (en) * | 2010-10-28 | 2015-08-04 | Apple Inc. | Management systems for multiple access control entities |
| US9191209B2 (en) * | 2013-06-25 | 2015-11-17 | Google Inc. | Efficient communication for devices of a home network |
| WO2016182953A1 (en) * | 2015-05-08 | 2016-11-17 | Simo Holdings Inc. | Virtual subscriber identity module for mobile communication device |
| KR102741007B1 (ko) * | 2019-02-19 | 2024-12-11 | 삼성전자 주식회사 | 이동 통신 시스템의 기기변경 방법 및 장치 |
| US11146944B1 (en) * | 2020-02-20 | 2021-10-12 | Sprint Communications Company L.P. | Mobile phone peer-to-peer electronic subscriber identity module (eSIM) transfer |
| US11129026B1 (en) * | 2020-04-15 | 2021-09-21 | T-Mobile Usa, Inc. | ESIM switching platform |
-
2023
- 2023-01-27 WO PCT/KR2023/001290 patent/WO2023146352A1/ko not_active Ceased
- 2023-01-27 US US18/833,187 patent/US20250150830A1/en active Pending
- 2023-01-27 EP EP23747393.9A patent/EP4432709A4/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180302115A1 (en) * | 2014-05-23 | 2018-10-18 | Huawei Technologies Co., Ltd. | Euicc management method, euicc, sm platform, and system |
| WO2016178548A1 (ko) * | 2015-05-07 | 2016-11-10 | 삼성전자 주식회사 | 프로파일 제공 방법 및 장치 |
| KR20170082122A (ko) * | 2016-01-05 | 2017-07-13 | 엘지전자 주식회사 | eUICC가 내장된 장치의 프로파일 제어를 위한 시스템 및 그 제어방법 |
| KR20200110101A (ko) * | 2019-03-13 | 2020-09-23 | 삼성전자주식회사 | eUICC 단말을 변경하는 방법 및 장치 |
| KR20210039733A (ko) * | 2019-10-02 | 2021-04-12 | 삼성전자주식회사 | 무선 통신 시스템의 SIM Profile을 재설치 하는 방법 및 장치 |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP4432709A4 * |
Also Published As
| Publication number | Publication date |
|---|---|
| EP4432709A4 (en) | 2025-03-19 |
| EP4432709A1 (en) | 2024-09-18 |
| US20250150830A1 (en) | 2025-05-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2020050701A1 (en) | Apparatus and method for ssp device and server to negotiate digital certificates | |
| WO2020091310A1 (en) | Method and apparatus for managing bundles of smart secure platform | |
| WO2016153281A1 (ko) | 무선 통신 시스템에서 프로파일을 다운로드 하는 방법 및 장치 | |
| WO2022108357A1 (en) | Method and apparatus for handling profiles by considering removable euicc supporting multiple enabled profiles | |
| WO2018147711A1 (en) | APPARATUS AND METHOD FOR ACCESS CONTROL ON eSIM | |
| WO2019235804A1 (en) | Method and apparatus for installing and managing profile using message service | |
| WO2023158243A1 (en) | Method and apparatus for transferring and storing activation code for esim device change | |
| WO2019194639A1 (en) | Method and apparatus for negotiating euicc version | |
| WO2020226466A1 (en) | Method and apparatus for managing and verifying certificate | |
| WO2022240144A1 (en) | Method and apparatus for identifying profile deletion when euicc terminal is changed | |
| WO2022045869A1 (en) | Apparatus and method for managing events in communication system | |
| WO2020055034A1 (ko) | 스마트 보안 매체에 설치된 번들의 동시 활성화 관리 방법 및 장치 | |
| WO2020032589A1 (en) | Method, apparatus, and system for authorizing remote profile management | |
| US20230054892A1 (en) | Method and device for providing event in wireless communication system | |
| WO2023146352A1 (ko) | 기기 변경 시 사용자 인증 방법 및 장치 | |
| US20250184730A1 (en) | Method and apparatus for managing events in a wireless communication system | |
| WO2024205259A1 (en) | Method and apparatus for handling profile loading result in wireless communication system | |
| WO2023146364A1 (en) | Method and apparatus for processing event for device change | |
| WO2025165040A1 (ko) | 프로파일 이동을 제공하기 위한 단말 및 서버의 처리 방법 및 장치 | |
| WO2025084807A1 (ko) | Esim 장치 및 프로파일 서버가 양자내성암호화 알고리즘을 협상하기 위한 방법 및 장치 | |
| WO2024237699A1 (ko) | 무선 통신 시스템에서의 대량 프로파일 준비 지연에 따른 처리 방법 및 장치 | |
| KR20230115852A (ko) | 기기 변경 시 사용자 인증 방법 및 장치 | |
| WO2026089580A1 (ko) | eUICC 외부로 프로파일을 이동하기 위한 방법 및 장치 | |
| KR20230028129A (ko) | 무선 통신 시스템에서 이벤트를 제공하기 위한 방법 및 장치 | |
| EP3815407A1 (en) | Method, apparatus, and system for authorizing remote profile management |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23747393 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2023747393 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2023747393 Country of ref document: EP Effective date: 20240614 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 202417053756 Country of ref document: IN |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 18833187 Country of ref document: US |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 202380018914.8 Country of ref document: CN |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWP | Wipo information: published in national office |
Ref document number: 18833187 Country of ref document: US |