WO2021163947A1 - Universal integrated circuit card (uicc) authentication - Google Patents
Universal integrated circuit card (uicc) authentication Download PDFInfo
- Publication number
- WO2021163947A1 WO2021163947A1 PCT/CN2020/075951 CN2020075951W WO2021163947A1 WO 2021163947 A1 WO2021163947 A1 WO 2021163947A1 CN 2020075951 W CN2020075951 W CN 2020075951W WO 2021163947 A1 WO2021163947 A1 WO 2021163947A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- integrated circuit
- circuit card
- adf
- universal integrated
- directory
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
Definitions
- the present disclosure generally relates to methods and systems for accessing network services on a wireless device. More specifically, the present disclosure relates to registering, to a network, a non-compliant universal integrated circuit card (UICC) of a device.
- UICC universal integrated circuit card
- Some designs of mobile communications/wireless devices include a single universal integrated circuit card (UICC) , multiple universal integrated circuit cards, or multiple subscriber identity module (SIM) cards.
- the cards store user identity information for multiple subscriptions that enable users to access multiple separate mobile telephony networks.
- Some of the UICCs e.g., embedded UICCs (eUICCs)
- eUICCs embedded UICCs
- a UICC may be removable or implemented within memory of mobile communications devices.
- the information stored in a UICC may enable mobile communications devices to communicate with a variety of different types of mobile telephony networks.
- mobile telephony networks include third generation (3G) , fourth generation (4G) , long term evolution (LTE) , fifth generation (5G) , time division multiple access (TDMA) , code division multiple access (CDMA) , CDMA 2000, wideband CDMA (WCDMA) , global system for mobile communications (GSM) , single-carrier radio transmission technology (1xRTT) , and universal mobile telecommunications systems (UMTS) .
- Each subscription enabled by a UICC or SIM may utilize a particular radio access technology (RAT) to communicate with its respective network.
- RAT radio access technology
- a registration procedure may fail to complete when a non-compliant UICC is blocked due to an authentication failure.
- a method for registering, to a network, a non-compliant universal integrated circuit card (UICC) of a mobile equipment includes selecting a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card.
- the method also includes issuing a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- the method further includes sending an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- the apparatus includes means for selecting a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card.
- the apparatus also includes means for issuing a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- the apparatus further includes means for sending an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- the apparatus includes a memory and a communication interface coupled to the UICC of the mobile equipment.
- the apparatus also includes at least one processor coupled to the memory and the communication interface of the UICC of the mobile equipment.
- the at least one processor is configured to select a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card.
- the at least one processor is also configured to issue a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- the at least one processor is further configured to send an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- FIGURE 1 shows a wireless device communicating with a wireless communications system.
- FIGURE 2 shows a block diagram of the wireless device in FIGURE 1, according to an aspect of the present disclosure.
- FIGURE 3 is a process flow diagram of a method for authenticating, to a network, a non-compliant universal integrated circuit card (UICC) of a device that is blocked due to an authentication failure, according to aspects of the present disclosure.
- UICC universal integrated circuit card
- FIGURE 4 is a process flow diagram of another method for registering, to a network, a non-compliant universal integrated circuit card (UICC) of a mobile equipment, according to aspects of the present disclosure.
- UICC universal integrated circuit card
- FIGURE 5 is a component block diagram of a wireless device suitable for implementing the method for registering, to a network, a non-compliant universal integrated circuit card (UICC) of a mobile equipment, according to aspects of the present disclosure.
- UICC universal integrated circuit card
- FIGURE 6 is a block diagram showing an exemplary wireless communications system in which a configuration of the disclosure may be advantageously employed.
- SIM subscriber identification module
- USIM universal subscriber identity module
- UICC user identity module
- RUIM removable user identity module
- SIMs may store network specific information used to authenticate and identify subscribers on the network, the most important of which are the integrated circuit card identifier (ICCID) , international mobile subscriber identity (IMSI) , authentication key (Ki) , and local area identity (LAI) .
- the SIM may also store other carrier specific data, such as short message service center (SMSC) numbers, service provider names (SPNs) , service dialing numbers (SDNs) , and value added service (VAS) applications.
- SMSC short message service center
- SPNs service provider names
- SDNs service dialing numbers
- VAS value added service
- a USIM and an RUIM may be modules in UMTS and CDMA networks, respectively, which provide equivalent functions to a SIM in a GSM network.
- SIM, ” “USIM, ” and “RUIM” may be used interchangeably to refer to a general module that is not restricted to a particular standard or technology.
- SIM may also be used as a shorthand reference to a communications network associated with a particular SIM, because the information stored in a SIM enables the wireless device to establish a communications link with a particular network.
- the SIM and the communications network, as well as the services and subscriptions supported by that network, correlate to one another.
- UICC universal integrated circuit card
- SIM SIM
- USIM universal integrated circuit card
- SIM card SIM card
- SIM card SIM card
- Various UICCs may have storage capabilities ranging from two to three kilobytes up to one gigabyte of information.
- a UICC securely stores a service-subscriber key for identification purposes on mobile telephony devices (e.g., mobile phones and computers) .
- the UICC allows users to change phones by simply removing the UICC from one mobile phone and inserting it into another mobile phone or broadband telephony device.
- the UICC includes its unique serial number, international mobile subscriber identifier (IMSI) of the mobile entity, security authentication and ciphering information, temporary information related to the local network, a list of the services the user has access to, and passwords.
- IMSI international mobile subscriber identifier
- a wireless device initiates registration with a network for the UICC.
- a processor e.g., a baseband processor
- AID initial select application identifier
- Applications residing on a UICC are executed by an external reader, such as a baseband processor, by first selecting the application by an AID and then sending commands to the selected application. After completing the initialization phase to activate a USIM application, an authentication procedure is performed.
- An authentication procedure is initiated by the network, which transfers an authentication request message to the mobile entity with the UICC.
- a current UICC directory is set to an application directory (e.g., 3F00/7F10/5F3A) rather than an application dedicated file (ADF) directory or an ADF subdirectory.
- the 3GPP TS 31.102/ETSI TS 102 221 specification specifies that a current UICC directory is set to a USIM ADF or any USIM ADF subdirectory of the UICC side before an authentication command is delivered to the UICC.
- the mobile equipment explicitly sets the current UICC directory to a USIM ADF directory by selecting a file identifier (FID) for the ADF.
- FID file identifier
- an authentication function is related to a USIM and is not executable unless the USIM application has been selected and activated, the current UICC directory is the USIM ADF or any subdirectory under this ADF, and a successful PIN verification procedure has been performed (see clause 5) .
- ETSI TS 102 221 clause 8.3 specifies that the reserved FID ‘7FFF’ can be used as a file identifier or FID for the ADF of the current active application on a given logical channel.
- the mobile equipment When using the file identifier for the ADF (e.g., reserved FID ‘7FFF’ ) and the mobile equipment fails to switch the current UICC directory to a USIM ADF or any USIM ADF subdirectory, the mobile equipment is forced to reset the UICC, which leads to authentication failure.
- the mobile equipment fails the authentication procedure, registration of the universal integrated circuit card fails. Accordingly, without authentication, the mobile equipment fails to register a network for the UICC.
- aspects of the present disclosure are directed to a method for registering a non-compliant universal integrated circuit card (UICC) of a device (e.g., a mobile equipment) to a network by preventing blocking of the non-compliant UICC due to an authentication failure.
- the non-compliant UICC is prevented from being blocked due to an authentication failure.
- the method includes selecting a first available immediate elementary file (EF) identification (ID) from an internal cache of the mobile equipment, in which the immediate EF ID falls under ADF. Because the UICC has completed initialization, a cache of the mobile equipment includes a collection of immediate EF IDs that fall under ADF and have been accessed and are proven available.
- EF immediate elementary file
- selecting an EF sets the current EF and the current directory remains the DF (dedicated file) , ADF or MF (master file) , which is the parent of this EF.
- the method further includes issuing a select command to the UICC to trigger a switch to the selected immediate EF ID.
- the mobile equipment delivers the authentication command message to the UICC and the UICC will feed back an expected response when the UICC directory is successfully switched to a USIM ADF directory or subdirectory.
- FIGURE 1 shows a wireless device 110 that includes the disclosed universal integrated circuit card to be registered to a network.
- the wireless device 110 communicates with a wireless communications system 120.
- the wireless device 110 includes a multi-band (e.g., dual-band) concurrent millimeter wave (mmW) transceiver.
- the wireless communications system 120 may be a 5G system, a long term evolution (LTE) system, a code division multiple access (CDMA) system, a global system for mobile communications (GSM) system, a wireless local area network (WLAN) system, millimeter wave (mmW) technology, or some other wireless system.
- LTE long term evolution
- CDMA code division multiple access
- GSM global system for mobile communications
- WLAN wireless local area network
- mmW millimeter wave
- a CDMA system may implement wideband CDMA (WCDMA) , time division synchronous CDMA (TD-SCDMA) , CDMA2000, or some other version of CDMA.
- WCDMA wideband CDMA
- TD-SCDMA time division synchronous CDMA
- CDMA2000 Code Division synchronous CDMA2000
- mmW millimeter wave
- FIGURE 1 shows the wireless communications system 120 including two base stations 130 and 132 and one system controller 140.
- a wireless system may include any number of base stations and any number of network entities.
- the wireless device 110 may be referred to as a mobile equipment, a user equipment (UE) , a mobile station, a terminal, an access terminal, a subscriber unit, a station, etc.
- the wireless device 110 may also be a cellular phone, a smartphone, a tablet, a wireless modem, a personal digital assistant (PDA) , a handheld device, a laptop computer, a Smartbook, a netbook, a cordless phone, a wireless local loop (WLL) station, a device, etc.
- the wireless device 110 may be capable of communicating with the wireless communications system 120.
- the wireless device 110 may also be capable of receiving signals from broadcast stations (e.g., a broadcast station 134) , signals from satellites (e.g., a satellite 150) in one or more global navigation satellite systems (GNSS) , etc.
- the wireless device 110 may support one or more radio technologies for wireless communications such as 5G, LTE, CDMA2000, WCDMA, TD-SCDMA, GSM, 802.11, etc.
- the wireless device 110 may support carrier aggregation, which is operation on multiple carriers. Carrier aggregation may also be referred to as multi-carrier operation. According to an aspect of the present disclosure, the wireless device 110 may be able to operate in low-band from 698 to 960 megahertz (MHz) , mid-band from 1475 to 2170 MHz, and/or high-band from 2300 to 2690 MHz, ultra-high band from 3400 to 3800 MHz, and long-term evolution (LTE) in LTE unlicensed bands (LTE-U/LAA) from 5150 MHz to 5950 MHz.
- LTE long-term evolution
- Low-band, mid-band, high-band, ultra-high band, and LTE-U refer to five groups of bands (or band groups) , with each band group including a number of frequency bands (or simply, “bands” ) .
- each band may cover up to 200 MHz and may include one or more carriers.
- each carrier may cover up to 40 MHz in LTE.
- LTE Release 11 supports 35 bands, which are referred to as LTE/UMTS bands and are listed in 3GPP TS 36.101.
- the wireless device 110 may be configured with up to five carriers in one or two bands in LTE Release 11.
- FIGURE 2 shows a block diagram of the wireless device 110 in FIGURE 1, according to an aspect of the present disclosure.
- the wireless device 110 may include a universal integrated circuit card (UICC) interface 202, which may receive an embedded UICC (eUICC) 204 that stores profiles associated with one or more subscriptions from network providers.
- UICC universal integrated circuit card
- eUICC embedded UICC
- a UICC used in various examples may include user account information, an international mobile subscriber identity (IMSI) , a set of SIM application toolkit (SAT) commands, and storage space for phone book contacts.
- the UICC may further store home identifiers (e.g., a system identification number (SID) /network identification number (NID) pair, a home preferred list of mobile networks (HPLMN) code, etc. ) to indicate the network operator providers for each subscription of the UICC.
- SID system identification number
- NID network identification number
- HPLMN home preferred list of mobile networks
- ICCID integrated circuit card identity
- SIM serial number may be printed on the UICC for identification.
- the UICC may be implemented within a portion of memory of the wireless device 110 (e.g., in a memory 214) , and thus need not be a separate or removable circuit, chip, or card.
- the wireless device 110 may include at least one controller, such as a general processor 206, which may be coupled to a coder/decoder (CODEC) 208.
- the CODEC 208 may in turn be coupled to a speaker 210 and a microphone 212.
- the general processor 206 may also be coupled to the memory 214.
- the memory 214 may be a non-transitory computer-readable storage medium that stores processor-executable instructions.
- the memory 214 may store an operating system (OS) , as well as user application software and executable instructions.
- OS operating system
- the memory 214 may also store locally cached profiles for subscriptions supported by the eUICC 204.
- the general processor 206 and the memory 214 may each be coupled to at least one baseband processor or baseband modem processor 216.
- the eUICC 204 in the wireless device 110 may utilize one or more baseband-RF resources.
- a baseband-RF resource may include the baseband modem processor 216, which may perform baseband/modem functions for communications with and controlling of a radio access technology (RAT) .
- the baseband-RF resource may include one or more amplifiers and radios, referred to generally as radio frequency (RF) resources (e.g., RF resource 218) .
- the baseband-RF resources may share the baseband modem processor 216 (e.g., a single device that performs baseband/modem functions for all RATs on the wireless device 110) .
- each baseband-RF resource may include physically or logically separate baseband processors (e.g., BB1, BB2) .
- the RF resource 218 may be a transceiver that performs transmit/receive functions for the eUICC 204 on the wireless device 110.
- the RF resource 218 may include separate transmit and receive circuitry, or may include a transceiver that combines transmitter and receiver functions. In some examples, the RF resource 218 may include multiple receive circuits.
- the RF resource 218 may be coupled to a wireless antenna (e.g., a wireless antenna 220) .
- the RF resource 218 may also be coupled to the baseband modem processor 216.
- the general processor 206, the memory 214, the baseband modem processor (s) 216, and the RF resource 218 may be included in the wireless device 110 as a system-on-chip 250.
- the eUICC 204 and its corresponding UICC interface 202 may be external to the system-on-chip 250.
- various input and output devices may be coupled to components on the system-on-chip 250, such as interfaces or controllers.
- Example user input components suitable for use in the wireless device 110 may include, but are not limited to, a keypad 224, a touchscreen display 226, and the microphone 212.
- the keypad 224, the touchscreen display 226, the microphone 212, or a combination thereof may perform the function of receiving a request to initiate an outgoing call or for receiving a personal identification number.
- Interfaces may be provided between the various devices and modules to implement functions in the wireless device 110 to enable communications in the wireless device.
- the eUICC 204, the baseband processor BB1, BB2, the RF resource 218, and the wireless antenna 220 may constitute two or more radio access technologies (RATs) .
- the wireless device 110 may be a communications device that includes a UICC, baseband processor, and RF resource configured to support two different RATs, such as 5G or LTE and GSM. More RATs may be supported on the wireless device 110 by adding more RF resources, and antennae for connecting to additional mobile networks.
- the wireless device 110 may include, among other things, additional UICC or SIM cards, UICC or SIM interfaces, multiple RF resources associated with the additional UICC or SIM cards, and additional antennae for supporting subscription communications with additional mobile networks.
- the eUICC 204 may support multiple mobile network operator profiles, or subscription profiles. For example, a user may download multiple profiles onto the eUICC 204. Each profile may store static SIM information that is used to support a subscription with one or more mobile telephony networks. Thus, the eUICC 204 may play the role of multiple SIMs, because each SIM supports one profile.
- the wireless device 110 may be configured to locally cache one or more subscription profiles associated with or stored in the UICC.
- the profiles may be cached in the memory 214, part of which may be designated memory for the modem.
- FIGURE 3 is a process flow diagram of a method 300 for authenticating a non-compliant universal integrated circuit card (UICC) of a mobile equipment, according to aspects of the present disclosure.
- a network initiates authentication of a UICC of the mobile equipment including the UICC as a subsystem.
- the mobile equipment receives an authentication request message from the network to begin the authentication procedure.
- a processor e.g., a baseband processor
- the wireless device communicates through a UICC interface to perform successful authentication of the UICC.
- the mobile equipment completes an initialization prior to the authentication procedure, in which the UICC may activate a USIM application.
- a current UICC directory is set to an application directory (e.g., 3F00/7F10/5F3A) rather than an application dedicated file (ADF) directory or an ADF subdirectory.
- ADF application dedicated file
- the current UICC directory is set to a USIM ADF or any USIM ADF subdirectory before an authentication command is delivered to the UICC.
- control flow branches to block 308, in which an authentication command is sent to the UICC. Otherwise, control flow proceeds to block 312, in which the mobile equipment explicitly sets the current UICC directory to a USIM ADF directory by selecting a file identifier (FID) for ADF (e.g., 7FFF) .
- FID file identifier
- the baseband processor determines whether the current UICC directory was successfully set to a USIM ADF or any USIM ADF subdirectory. When successful, the mobile equipment sends an authentication command to the UICC at block 308. Otherwise, control flow branches to block 316.
- the baseband processor selects a first available immediate elementary file (EF) identification (ID) from an internal cache of the mobile equipment, in which the immediate EF ID falls under an ADF. Because the UICC has completed initialization, a cache of the mobile equipment includes a collection of immediate EF IDs that fall under an ADF and have been accessed and are proven available. As specified by the standard, selecting an EF sets the current EF and the current directory remains the DF (dedicated file) , ADF or MF (master file) , which is a parent of the current EF.
- a select command is issued to the UICC to trigger a switch to the selected immediate EF ID.
- the mobile equipment delivers the authentication command message to the UICC and the UICC feeds back an expected response when the UICC directory is successfully switched to a USIM ADF directory or subdirectory.
- the UICC authentication procedure is successfully completed. Otherwise, at block 320, when issuing the select command to the UICC to trigger a switch to the selected immediate EF ID fails to switch the current UICC directory to a USIM ADF or any USIM ADF subdirectory, the mobile equipment is forced to reset the UICC at block 322, which leads to authentication procedure failure at block 324.
- the mobile equipment fails the authentication procedure, registration of the universal integrated circuit card fails. Accordingly, without authentication, the mobile equipment fails to register a network for the UICC.
- FIGURE 4 depicts a simplified flowchart of a method 400 for registering a non-compliant universal integrated circuit card (UICC) of a mobile equipment to a network.
- a processor e.g., a baseband processor
- a processor selects a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card.
- USIM universal subscriber identity module
- ADF application dedicated file
- the baseband processor selects a first available immediate elementary file (EF) identification (ID) from an internal cache of the mobile equipment, in which the immediate EF ID falls under an ADF.
- EF immediate elementary file
- ID immediate elementary file
- a cache of the mobile equipment includes a collection of immediate EF IDs that fall under an ADF and have been accessed and are proven available by the universal integrated circuit card.
- the processor and/or a UICC interface issues a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory. For example, as shown at block 318 of FIGURE 3, a select command is issued to the UICC to trigger a switch to the selected immediate EF ID from the internal cache of the mobile equipment.
- the processor sends an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory. For example, as shown at block 320 of FIGURE 3, it is determined whether the UICC directory is successfully switched to a USIM ADF directory or subdirectory.
- the mobile equipment delivers the authentication command message to the universal integrated circuit card. Otherwise, at block 320, when issuing the select command to the UICC to trigger a switch to the selected immediate EF ID fails to switch the current UICC directory to a USIM ADF or any USIM ADF subdirectory, the mobile equipment is forced to reset the UICC at block 322.
- an apparatus for registering a non-compliant universal integrated circuit card (UICC) of a device to a network may include means for selecting a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card; means for issuing a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory; and means for sending an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- USIM universal subscriber identity module
- ADF application dedicated file
- the selecting means, the issuing means, and/or the sending means may be the baseband modem processor 216, the general processor 206, and/or the memory 214.
- the aforementioned means may be any module or apparatus configured to perform the functions recited by the aforementioned means.
- FIGURE 5 is a component block diagram of a wireless device 500 suitable for implementing the method for authenticating a non-compliant universal integrated circuit card (UICC) .
- UICC universal integrated circuit card
- Aspects of the present disclosure may be implemented in any of a variety of wireless devices, an example of which (e.g., wireless device 500) is illustrated in FIGURE 5.
- the wireless device 500 may be similar to the wireless device 110 and may implement the method 300 and the method 400.
- the wireless device 500 may include a processor 502 coupled to a touchscreen controller 504 and an internal memory 506.
- the processor 502 may be one or more multi-core integrated circuits designated for general or specific processing tasks.
- the internal memory 506 may be volatile or non-volatile memory, and may also be secure and/or encrypted memory, or unsecure and/or unencrypted memory, or any combination thereof.
- the touchscreen controller 504 and the processor 502 may also be coupled to a touchscreen panel 512, such as a resistive-sensing touchscreen, capacitive-sensing touchscreen, infrared sensing touchscreen, etc. Additionally, the display of the wireless device 500 need not have touch screen capability.
- the wireless device 500 may have one or more cellular network transceivers 508 coupled to the processor 502 and to one or more antennas 510 and configured for sending and receiving cellular communications.
- the one or more cellular network transceivers 508 and the one or more antennas 510 may be used with the above-mentioned circuitry to implement the various example methods described.
- the wireless device 500 may include one or more UICC or SIM cards 516 coupled to the one or more cellular network transceivers 508 and/or the processor 502, and may be configured as described above.
- the wireless device 500 may also include speakers 514 for providing audio outputs.
- the wireless device 500 may also include a housing 520, constructed of a plastic, metal, or a combination of materials, for containing all or some of the components discussed herein.
- the wireless device 500 may include a power source 522 coupled to the processor 502, such as a disposable or rechargeable battery.
- the rechargeable battery may also be coupled to the peripheral device connection port to receive a charging current from a source external to the wireless device 500.
- the wireless device 500 may also include a physical button 524 for receiving user inputs.
- the wireless device 500 may also include a power button 526 for turning the wireless device 500 on and off.
- FIGURE 6 is a block diagram showing an exemplary wireless communications system in which a configuration of the disclosure may be advantageously employed.
- FIGURE 6 shows three remote units 620, 630, and 650 and two base stations 640.
- Remote units 620, 630, and 650 include IC devices 625A, 625B, and 625C that include the disclosed wireless device including the subsystem or universal integrated circuit card. It will be recognized that other devices may also include the disclosed wireless device, such as the base stations, switching devices, and network equipment.
- FIGURE 6 shows forward link signals 680 from the base stations 640 to the remote units 620, 630, and 650 and reverse link signals 690 from the remote units 620, 630, and 650 to base stations 640.
- remote unit 620 is shown as a mobile telephone
- remote unit 630 is shown as a portable computer
- remote unit 650 is shown as a fixed location remote unit in a wireless local loop system.
- a remote unit may be a mobile phone, a hand-held personal communications systems (PCS) unit, a portable data unit such as a personal digital assistant (PDA) , a GPS enabled device, a navigation device, a set top box, a music player, a video player, an entertainment unit, a fixed location data unit such as meter reading equipment, or other communications device that stores or retrieves data or computer instructions, or combinations thereof.
- FIGURE 6 illustrates remote units according to the aspects of the disclosure, the disclosure is not limited to these exemplary illustrated units. Aspects of the disclosure may be suitably employed in many devices, which include the wireless device including the universal integrated circuit card.
- the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein.
- a machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein.
- software codes may be stored in a memory and executed by a processor unit.
- Memory may be implemented within the processor unit or external to the processor unit.
- the term “memory” refers to types of long term, short term, volatile, nonvolatile, or other memory and is not to be limited to a particular type of memory or number of memories, or type of media upon which memory is stored.
- the functions may be stored as one or more instructions or code on a computer-readable medium. Examples include computer-readable media encoded with a data structure and computer-readable media encoded with a computer program.
- Computer-readable media includes physical computer storage media. A storage medium may be an available medium that can be accessed by a computer.
- such computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer; disk and disc, as used herein, includes compact disc (CD) , laser disc, optical disc, digital versatile disc (DVD) , floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
- instructions and/or data may be provided as signals on transmission media included in a communications apparatus.
- a communications apparatus may include a standard cell circuit having signals indicative of instructions and data. The instructions and data are configured to cause one or more processors to implement the functions outlined in the claims.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- a general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
- a processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, multiple microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method for registering, to a network, a non-compliant universal integrated circuit card (UICC) of a mobile equipment is described. The method includes selecting a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card. The method also includes issuing a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory. The method further includes sending an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory.
Description
The present disclosure generally relates to methods and systems for accessing network services on a wireless device. More specifically, the present disclosure relates to registering, to a network, a non-compliant universal integrated circuit card (UICC) of a device.
Some designs of mobile communications/wireless devices (e.g., smart phones, tablet computers, and laptop computers) include a single universal integrated circuit card (UICC) , multiple universal integrated circuit cards, or multiple subscriber identity module (SIM) cards. The cards store user identity information for multiple subscriptions that enable users to access multiple separate mobile telephony networks. Some of the UICCs (e.g., embedded UICCs (eUICCs) ) are capable of supporting remote provisioning of network subscription information. A UICC may be removable or implemented within memory of mobile communications devices.
The information stored in a UICC may enable mobile communications devices to communicate with a variety of different types of mobile telephony networks. Examples of mobile telephony networks include third generation (3G) , fourth generation (4G) , long term evolution (LTE) , fifth generation (5G) , time division multiple access (TDMA) , code division multiple access (CDMA) , CDMA 2000, wideband CDMA (WCDMA) , global system for mobile communications (GSM) , single-carrier radio transmission technology (1xRTT) , and universal mobile telecommunications systems (UMTS) . Each subscription enabled by a UICC or SIM may utilize a particular radio access technology (RAT) to communicate with its respective network. A registration procedure, however, may fail to complete when a non-compliant UICC is blocked due to an authentication failure.
SUMMARY
A method for registering, to a network, a non-compliant universal integrated circuit card (UICC) of a mobile equipment is described. The method includes selecting a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card. The method also includes issuing a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory. The method further includes sending an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory.
An apparatus for registering, to a network, a non-compliant universal integrated circuit card (UICC) of a mobile equipment is described. The apparatus includes means for selecting a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card. The apparatus also includes means for issuing a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory. The apparatus further includes means for sending an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory.
An apparatus for authenticating a universal integrated circuit card (UICC) of a mobile equipment is described. The apparatus includes a memory and a communication interface coupled to the UICC of the mobile equipment. The apparatus also includes at least one processor coupled to the memory and the communication interface of the UICC of the mobile equipment. The at least one processor is configured to select a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card. The at least one processor is also configured to issue a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory. The at least one processor is further configured to send an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory.
This has outlined, rather broadly, the features and technical advantages of the present disclosure in order that the detailed description that follows may be better understood. Additional features and advantages of the present disclosure will be described below. It should be appreciated by those skilled in the art that this present disclosure may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present disclosure. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the teachings of the present disclosure as set forth in the appended claims. The novel features, which are believed to be characteristic of the present disclosure, both as to its organization and method of operation, together with further objects and advantages, will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present disclosure.
For a more complete understanding of the present disclosure, reference is now made to the following description taken in conjunction with the accompanying drawings.
FIGURE 1 shows a wireless device communicating with a wireless communications system.
FIGURE 2 shows a block diagram of the wireless device in FIGURE 1, according to an aspect of the present disclosure.
FIGURE 3 is a process flow diagram of a method for authenticating, to a network, a non-compliant universal integrated circuit card (UICC) of a device that is blocked due to an authentication failure, according to aspects of the present disclosure.
FIGURE 4 is a process flow diagram of another method for registering, to a network, a non-compliant universal integrated circuit card (UICC) of a mobile equipment, according to aspects of the present disclosure.
FIGURE 5 is a component block diagram of a wireless device suitable for implementing the method for registering, to a network, a non-compliant universal integrated circuit card (UICC) of a mobile equipment, according to aspects of the present disclosure.
FIGURE 6 is a block diagram showing an exemplary wireless communications system in which a configuration of the disclosure may be advantageously employed.
The detailed description set forth below, in connection with the appended drawings, is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of the various concepts. However, it will be apparent to those skilled in the art that these concepts may be practiced without these specific details. In some instances, well-known structures and components are shown in block diagram form in order to avoid obscuring such concepts. As described herein, the use of the term “and/or” is intended to represent an “inclusive OR” , and the use of the term “or” is intended to represent an “exclusive OR” .
The terms “subscriber identification module, ” “SIM, ” “universal subscriber identity module, ” “USIM, ” “user identity module, ” “UIM, ” “removable user identity module, ” and “RUIM” are used herein to mean a memory that may be an integrated circuit or embedded into a removable card, which stores an international mobile subscriber identity (IMSI) , related key, and/or other information used to identify and/or authenticate a wireless device on a network. In some networks (e.g., GSM networks) , SIMs may store network specific information used to authenticate and identify subscribers on the network, the most important of which are the integrated circuit card identifier (ICCID) , international mobile subscriber identity (IMSI) , authentication key (Ki) , and local area identity (LAI) . The SIM may also store other carrier specific data, such as short message service center (SMSC) numbers, service provider names (SPNs) , service dialing numbers (SDNs) , and value added service (VAS) applications. In various aspects, a USIM and an RUIM may be modules in UMTS and CDMA networks, respectively, which provide equivalent functions to a SIM in a GSM network. However, the terms “SIM, ” “USIM, ” and “RUIM” may be used interchangeably to refer to a general module that is not restricted to a particular standard or technology.
The term “SIM” may also be used as a shorthand reference to a communications network associated with a particular SIM, because the information stored in a SIM enables the wireless device to establish a communications link with a particular network. Thus, the SIM and the communications network, as well as the services and subscriptions supported by that network, correlate to one another.
The terms “universal integrated circuit card, ” “UICC, ” “smart card, ” and “SIM card, ” are used interchangeably to refer to a memory chip or integrated circuit used to provide a SIM, a USIM, and/or an RUIM, to a wireless device in order to store the described provisioning and/or other data. Various UICCs may have storage capabilities ranging from two to three kilobytes up to one gigabyte of information.
A UICC securely stores a service-subscriber key for identification purposes on mobile telephony devices (e.g., mobile phones and computers) . The UICC allows users to change phones by simply removing the UICC from one mobile phone and inserting it into another mobile phone or broadband telephony device. The UICC includes its unique serial number, international mobile subscriber identifier (IMSI) of the mobile entity, security authentication and ciphering information, temporary information related to the local network, a list of the services the user has access to, and passwords.
During an initialization phase of a UICC, a wireless device initiates registration with a network for the UICC. For example, a processor (e.g., a baseband processor) of the wireless device may provide passwords based on an initial select application identifier (AID) command. Applications residing on a UICC are executed by an external reader, such as a baseband processor, by first selecting the application by an AID and then sending commands to the selected application. After completing the initialization phase to activate a USIM application, an authentication procedure is performed.
An authentication procedure is initiated by the network, which transfers an authentication request message to the mobile entity with the UICC. Because the UICC has activated a USIM application on a logical channel, a current UICC directory is set to an application directory (e.g., 3F00/7F10/5F3A) rather than an application dedicated file (ADF) directory or an ADF subdirectory. The 3GPP TS 31.102/ETSI TS 102 221 specification, however, specifies that a current UICC directory is set to a USIM ADF or any USIM ADF subdirectory of the UICC side before an authentication command is delivered to the UICC. In one aspect of the present disclosure, the mobile equipment explicitly sets the current UICC directory to a USIM ADF directory by selecting a file identifier (FID) for the ADF.
As specified by 3GPP TS 31.102 clause 7.1.1, an authentication function is related to a USIM and is not executable unless the USIM application has been selected and activated, the current UICC directory is the USIM ADF or any subdirectory under this ADF, and a successful PIN verification procedure has been performed (see clause 5) . In addition, ETSI TS 102 221 clause 8.3 specifies that the reserved FID ‘7FFF’ can be used as a file identifier or FID for the ADF of the current active application on a given logical channel. Unfortunately, explicitly setting the UICC directory to a USIM ADF by using the file identifier for ADF (e.g., reserved FID ‘7FFF’ ) often results in a failure to switch the current UICC directory to a USIM ADF or any USIM ADF subdirectory.
When using the file identifier for the ADF (e.g., reserved FID ‘7FFF’ ) and the mobile equipment fails to switch the current UICC directory to a USIM ADF or any USIM ADF subdirectory, the mobile equipment is forced to reset the UICC, which leads to authentication failure. When the mobile equipment fails the authentication procedure, registration of the universal integrated circuit card fails. Accordingly, without authentication, the mobile equipment fails to register a network for the UICC.
Aspects of the present disclosure are directed to a method for registering a non-compliant universal integrated circuit card (UICC) of a device (e.g., a mobile equipment) to a network by preventing blocking of the non-compliant UICC due to an authentication failure. In one aspect, the non-compliant UICC is prevented from being blocked due to an authentication failure. The method includes selecting a first available immediate elementary file (EF) identification (ID) from an internal cache of the mobile equipment, in which the immediate EF ID falls under ADF. Because the UICC has completed initialization, a cache of the mobile equipment includes a collection of immediate EF IDs that fall under ADF and have been accessed and are proven available. As specified by ETSI TS 102 221 clause 8.4.1, selecting an EF sets the current EF and the current directory remains the DF (dedicated file) , ADF or MF (master file) , which is the parent of this EF. The method further includes issuing a select command to the UICC to trigger a switch to the selected immediate EF ID. The mobile equipment delivers the authentication command message to the UICC and the UICC will feed back an expected response when the UICC directory is successfully switched to a USIM ADF directory or subdirectory.
FIGURE 1 shows a wireless device 110 that includes the disclosed universal integrated circuit card to be registered to a network. The wireless device 110 communicates with a wireless communications system 120. The wireless device 110 includes a multi-band (e.g., dual-band) concurrent millimeter wave (mmW) transceiver. The wireless communications system 120 may be a 5G system, a long term evolution (LTE) system, a code division multiple access (CDMA) system, a global system for mobile communications (GSM) system, a wireless local area network (WLAN) system, millimeter wave (mmW) technology, or some other wireless system. A CDMA system may implement wideband CDMA (WCDMA) , time division synchronous CDMA (TD-SCDMA) , CDMA2000, or some other version of CDMA. In a millimeter wave (mmW) system, multiple antennas are used for beamforming (e.g., in the range of 30 GHz, 60 GHz, etc. ) . For simplicity, FIGURE 1 shows the wireless communications system 120 including two base stations 130 and 132 and one system controller 140. In general, a wireless system may include any number of base stations and any number of network entities.
The wireless device 110 may be referred to as a mobile equipment, a user equipment (UE) , a mobile station, a terminal, an access terminal, a subscriber unit, a station, etc. The wireless device 110 may also be a cellular phone, a smartphone, a tablet, a wireless modem, a personal digital assistant (PDA) , a handheld device, a laptop computer, a Smartbook, a netbook, a cordless phone, a wireless local loop (WLL) station, a
device, etc. The wireless device 110 may be capable of communicating with the wireless communications system 120. The wireless device 110 may also be capable of receiving signals from broadcast stations (e.g., a broadcast station 134) , signals from satellites (e.g., a satellite 150) in one or more global navigation satellite systems (GNSS) , etc. The wireless device 110 may support one or more radio technologies for wireless communications such as 5G, LTE, CDMA2000, WCDMA, TD-SCDMA, GSM, 802.11, etc.
The wireless device 110 may support carrier aggregation, which is operation on multiple carriers. Carrier aggregation may also be referred to as multi-carrier operation. According to an aspect of the present disclosure, the wireless device 110 may be able to operate in low-band from 698 to 960 megahertz (MHz) , mid-band from 1475 to 2170 MHz, and/or high-band from 2300 to 2690 MHz, ultra-high band from 3400 to 3800 MHz, and long-term evolution (LTE) in LTE unlicensed bands (LTE-U/LAA) from 5150 MHz to 5950 MHz. Low-band, mid-band, high-band, ultra-high band, and LTE-U refer to five groups of bands (or band groups) , with each band group including a number of frequency bands (or simply, “bands” ) . For example, in some systems each band may cover up to 200 MHz and may include one or more carriers. For example, each carrier may cover up to 40 MHz in LTE. Of course, the range for each of the bands is merely exemplary and not limiting, and other frequency ranges may be used. LTE Release 11 supports 35 bands, which are referred to as LTE/UMTS bands and are listed in 3GPP TS 36.101. The wireless device 110 may be configured with up to five carriers in one or two bands in LTE Release 11.
FIGURE 2 shows a block diagram of the wireless device 110 in FIGURE 1, according to an aspect of the present disclosure. The wireless device 110 may include a universal integrated circuit card (UICC) interface 202, which may receive an embedded UICC (eUICC) 204 that stores profiles associated with one or more subscriptions from network providers.
A UICC used in various examples may include user account information, an international mobile subscriber identity (IMSI) , a set of SIM application toolkit (SAT) commands, and storage space for phone book contacts. The UICC may further store home identifiers (e.g., a system identification number (SID) /network identification number (NID) pair, a home preferred list of mobile networks (HPLMN) code, etc. ) to indicate the network operator providers for each subscription of the UICC. An integrated circuit card identity (ICCID) SIM serial number may be printed on the UICC for identification. In some aspects, the UICC may be implemented within a portion of memory of the wireless device 110 (e.g., in a memory 214) , and thus need not be a separate or removable circuit, chip, or card.
The wireless device 110 may include at least one controller, such as a general processor 206, which may be coupled to a coder/decoder (CODEC) 208. The CODEC 208 may in turn be coupled to a speaker 210 and a microphone 212. The general processor 206 may also be coupled to the memory 214. The memory 214 may be a non-transitory computer-readable storage medium that stores processor-executable instructions. The memory 214 may store an operating system (OS) , as well as user application software and executable instructions. The memory 214 may also store locally cached profiles for subscriptions supported by the eUICC 204.
The general processor 206 and the memory 214 may each be coupled to at least one baseband processor or baseband modem processor 216. The eUICC 204 in the wireless device 110 may utilize one or more baseband-RF resources. A baseband-RF resource may include the baseband modem processor 216, which may perform baseband/modem functions for communications with and controlling of a radio access technology (RAT) . The baseband-RF resource may include one or more amplifiers and radios, referred to generally as radio frequency (RF) resources (e.g., RF resource 218) . In some examples, the baseband-RF resources may share the baseband modem processor 216 (e.g., a single device that performs baseband/modem functions for all RATs on the wireless device 110) . In other examples, each baseband-RF resource may include physically or logically separate baseband processors (e.g., BB1, BB2) .
The RF resource 218 may be a transceiver that performs transmit/receive functions for the eUICC 204 on the wireless device 110. The RF resource 218 may include separate transmit and receive circuitry, or may include a transceiver that combines transmitter and receiver functions. In some examples, the RF resource 218 may include multiple receive circuits. The RF resource 218 may be coupled to a wireless antenna (e.g., a wireless antenna 220) . The RF resource 218 may also be coupled to the baseband modem processor 216.
In some examples, the general processor 206, the memory 214, the baseband modem processor (s) 216, and the RF resource 218 may be included in the wireless device 110 as a system-on-chip 250. In some examples, the eUICC 204 and its corresponding UICC interface 202 may be external to the system-on-chip 250. Further, various input and output devices may be coupled to components on the system-on-chip 250, such as interfaces or controllers. Example user input components suitable for use in the wireless device 110 may include, but are not limited to, a keypad 224, a touchscreen display 226, and the microphone 212.
In some examples, the keypad 224, the touchscreen display 226, the microphone 212, or a combination thereof, may perform the function of receiving a request to initiate an outgoing call or for receiving a personal identification number. Interfaces may be provided between the various devices and modules to implement functions in the wireless device 110 to enable communications in the wireless device.
Functioning together, the eUICC 204, the baseband processor BB1, BB2, the RF resource 218, and the wireless antenna 220 may constitute two or more radio access technologies (RATs) . For example, the wireless device 110 may be a communications device that includes a UICC, baseband processor, and RF resource configured to support two different RATs, such as 5G or LTE and GSM. More RATs may be supported on the wireless device 110 by adding more RF resources, and antennae for connecting to additional mobile networks.
In some examples (not shown) , the wireless device 110 may include, among other things, additional UICC or SIM cards, UICC or SIM interfaces, multiple RF resources associated with the additional UICC or SIM cards, and additional antennae for supporting subscription communications with additional mobile networks.
The eUICC 204 may support multiple mobile network operator profiles, or subscription profiles. For example, a user may download multiple profiles onto the eUICC 204. Each profile may store static SIM information that is used to support a subscription with one or more mobile telephony networks. Thus, the eUICC 204 may play the role of multiple SIMs, because each SIM supports one profile.
In various examples, the wireless device 110 may be configured to locally cache one or more subscription profiles associated with or stored in the UICC. The profiles may be cached in the memory 214, part of which may be designated memory for the modem.
FIGURE 3 is a process flow diagram of a method 300 for authenticating a non-compliant universal integrated circuit card (UICC) of a mobile equipment, according to aspects of the present disclosure. At block 302, a network initiates authentication of a UICC of the mobile equipment including the UICC as a subsystem. At block 304, the mobile equipment receives an authentication request message from the network to begin the authentication procedure. At blocks 304-310, a processor (e.g., a baseband processor) of the wireless device communicates through a UICC interface to perform successful authentication of the UICC.
The mobile equipment completes an initialization prior to the authentication procedure, in which the UICC may activate a USIM application. When the UICC has activated a USIM application on a logical channel, a current UICC directory is set to an application directory (e.g., 3F00/7F10/5F3A) rather than an application dedicated file (ADF) directory or an ADF subdirectory. At block 306, it is determined whether a current UICC directory is a USIM ADF or any USIM ADF subdirectory. The current UICC directory is set to a USIM ADF or any USIM ADF subdirectory before an authentication command is delivered to the UICC. When the current UICC directory is set to a USIM ADF or any USIM ADF subdirectory (at block 306) , control flow branches to block 308, in which an authentication command is sent to the UICC. Otherwise, control flow proceeds to block 312, in which the mobile equipment explicitly sets the current UICC directory to a USIM ADF directory by selecting a file identifier (FID) for ADF (e.g., 7FFF) .
At block 314, the baseband processor determines whether the current UICC directory was successfully set to a USIM ADF or any USIM ADF subdirectory. When successful, the mobile equipment sends an authentication command to the UICC at block 308. Otherwise, control flow branches to block 316.
At block 316, the baseband processor selects a first available immediate elementary file (EF) identification (ID) from an internal cache of the mobile equipment, in which the immediate EF ID falls under an ADF. Because the UICC has completed initialization, a cache of the mobile equipment includes a collection of immediate EF IDs that fall under an ADF and have been accessed and are proven available. As specified by the standard, selecting an EF sets the current EF and the current directory remains the DF (dedicated file) , ADF or MF (master file) , which is a parent of the current EF. At block 318, a select command is issued to the UICC to trigger a switch to the selected immediate EF ID.
At block 320, it is determined whether the UICC directory is successfully switched to a USIM ADF directory or subdirectory. At block 308, the mobile equipment delivers the authentication command message to the UICC and the UICC feeds back an expected response when the UICC directory is successfully switched to a USIM ADF directory or subdirectory. At block 310, the UICC authentication procedure is successfully completed. Otherwise, at block 320, when issuing the select command to the UICC to trigger a switch to the selected immediate EF ID fails to switch the current UICC directory to a USIM ADF or any USIM ADF subdirectory, the mobile equipment is forced to reset the UICC at block 322, which leads to authentication procedure failure at block 324. When the mobile equipment fails the authentication procedure, registration of the universal integrated circuit card fails. Accordingly, without authentication, the mobile equipment fails to register a network for the UICC.
FIGURE 4 depicts a simplified flowchart of a method 400 for registering a non-compliant universal integrated circuit card (UICC) of a mobile equipment to a network. At block 402, a processor (e.g., a baseband processor) of the mobile equipment selects a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card. For example, as shown at block 316 of FIGURE 3, the baseband processor selects a first available immediate elementary file (EF) identification (ID) from an internal cache of the mobile equipment, in which the immediate EF ID falls under an ADF. Because the universal integrated circuit card has completed initialization, a cache of the mobile equipment includes a collection of immediate EF IDs that fall under an ADF and have been accessed and are proven available by the universal integrated circuit card.
At block 404, the processor and/or a UICC interface issues a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory. For example, as shown at block 318 of FIGURE 3, a select command is issued to the UICC to trigger a switch to the selected immediate EF ID from the internal cache of the mobile equipment. At block 406, the processor sends an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory. For example, as shown at block 320 of FIGURE 3, it is determined whether the UICC directory is successfully switched to a USIM ADF directory or subdirectory. At block 308, the mobile equipment delivers the authentication command message to the universal integrated circuit card. Otherwise, at block 320, when issuing the select command to the UICC to trigger a switch to the selected immediate EF ID fails to switch the current UICC directory to a USIM ADF or any USIM ADF subdirectory, the mobile equipment is forced to reset the UICC at block 322.
According to a further aspect of the present disclosure, an apparatus for registering a non-compliant universal integrated circuit card (UICC) of a device to a network is described. The apparatus may include means for selecting a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card; means for issuing a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory; and means for sending an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory. The selecting means, the issuing means, and/or the sending means may be the baseband modem processor 216, the general processor 206, and/or the memory 214. In another aspect, the aforementioned means may be any module or apparatus configured to perform the functions recited by the aforementioned means.
FIGURE 5 is a component block diagram of a wireless device 500 suitable for implementing the method for authenticating a non-compliant universal integrated circuit card (UICC) . Aspects of the present disclosure may be implemented in any of a variety of wireless devices, an example of which (e.g., wireless device 500) is illustrated in FIGURE 5. The wireless device 500 may be similar to the wireless device 110 and may implement the method 300 and the method 400.
The wireless device 500 may include a processor 502 coupled to a touchscreen controller 504 and an internal memory 506. The processor 502 may be one or more multi-core integrated circuits designated for general or specific processing tasks. The internal memory 506 may be volatile or non-volatile memory, and may also be secure and/or encrypted memory, or unsecure and/or unencrypted memory, or any combination thereof. The touchscreen controller 504 and the processor 502 may also be coupled to a touchscreen panel 512, such as a resistive-sensing touchscreen, capacitive-sensing touchscreen, infrared sensing touchscreen, etc. Additionally, the display of the wireless device 500 need not have touch screen capability.
The wireless device 500 may have one or more cellular network transceivers 508 coupled to the processor 502 and to one or more antennas 510 and configured for sending and receiving cellular communications. The one or more cellular network transceivers 508 and the one or more antennas 510 may be used with the above-mentioned circuitry to implement the various example methods described. The wireless device 500 may include one or more UICC or SIM cards 516 coupled to the one or more cellular network transceivers 508 and/or the processor 502, and may be configured as described above.
The wireless device 500 may also include speakers 514 for providing audio outputs. The wireless device 500 may also include a housing 520, constructed of a plastic, metal, or a combination of materials, for containing all or some of the components discussed herein. The wireless device 500 may include a power source 522 coupled to the processor 502, such as a disposable or rechargeable battery. The rechargeable battery may also be coupled to the peripheral device connection port to receive a charging current from a source external to the wireless device 500. The wireless device 500 may also include a physical button 524 for receiving user inputs. The wireless device 500 may also include a power button 526 for turning the wireless device 500 on and off.
FIGURE 6 is a block diagram showing an exemplary wireless communications system in which a configuration of the disclosure may be advantageously employed. For purposes of illustration, FIGURE 6 shows three remote units 620, 630, and 650 and two base stations 640. It will be recognized that wireless communications systems may have many more remote units and base stations. Remote units 620, 630, and 650 include IC devices 625A, 625B, and 625C that include the disclosed wireless device including the subsystem or universal integrated circuit card. It will be recognized that other devices may also include the disclosed wireless device, such as the base stations, switching devices, and network equipment. FIGURE 6 shows forward link signals 680 from the base stations 640 to the remote units 620, 630, and 650 and reverse link signals 690 from the remote units 620, 630, and 650 to base stations 640.
In FIGURE 6, remote unit 620 is shown as a mobile telephone, remote unit 630 is shown as a portable computer, and remote unit 650 is shown as a fixed location remote unit in a wireless local loop system. For example, a remote unit may be a mobile phone, a hand-held personal communications systems (PCS) unit, a portable data unit such as a personal digital assistant (PDA) , a GPS enabled device, a navigation device, a set top box, a music player, a video player, an entertainment unit, a fixed location data unit such as meter reading equipment, or other communications device that stores or retrieves data or computer instructions, or combinations thereof. Although FIGURE 6 illustrates remote units according to the aspects of the disclosure, the disclosure is not limited to these exemplary illustrated units. Aspects of the disclosure may be suitably employed in many devices, which include the wireless device including the universal integrated circuit card.
For a firmware and/or software implementation, the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. A machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein. For example, software codes may be stored in a memory and executed by a processor unit. Memory may be implemented within the processor unit or external to the processor unit. As used herein, the term “memory” refers to types of long term, short term, volatile, nonvolatile, or other memory and is not to be limited to a particular type of memory or number of memories, or type of media upon which memory is stored.
If implemented in firmware and/or software, the functions may be stored as one or more instructions or code on a computer-readable medium. Examples include computer-readable media encoded with a data structure and computer-readable media encoded with a computer program. Computer-readable media includes physical computer storage media. A storage medium may be an available medium that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer; disk and disc, as used herein, includes compact disc (CD) , laser disc, optical disc, digital versatile disc (DVD) , floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
In addition to storage on computer-readable medium, instructions and/or data may be provided as signals on transmission media included in a communications apparatus. For example, a communications apparatus may include a standard cell circuit having signals indicative of instructions and data. The instructions and data are configured to cause one or more processors to implement the functions outlined in the claims.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with a general-purpose processor, a digital signal processor (DSP) , an application specific integrated circuit (ASIC) , a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, multiple microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
Although the present disclosure and its advantages have been described in detail, it should be understood that various changes, substitutions, and alterations can be made herein without departing from the technology of the disclosure as defined by the appended claims. For example, relational terms, such as “above” and “below” are used with respect to a substrate or electronic device. Of course, if the substrate or electronic device is inverted, above becomes below, and vice versa. Additionally, if oriented sideways, above and below may refer to sides of a substrate or electronic device. Moreover, the scope of the present application is not intended to be limited to the particular configurations of the process, machine, manufacture, and composition of matter, means, methods, and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding configurations described herein may be utilized according to the present disclosure. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
Claims (20)
- A method for registering, to a network, a non-compliant universal integrated circuit card (UICC) of a mobile equipment, comprising:selecting a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card;issuing a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory; andsending an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- The method of claim 1, further comprising:receiving an authentication request from the network;determining whether the current directory of the universal integrated circuit card is a USIM ADF directory or a USIM ADF subdirectory;switching the current directory of the universal integrated circuit card to an identified USIM ADF directory or an identified USIM ADF subdirectory; andsending the authentication command to the universal integrated circuit card when the current directory of the universal integrated circuit card is switched to the identified USIM ADF directory or the identified USIM ADF subdirectory.
- The method of claim 2, in which switching comprises issuing the select command to the universal integrated circuit card including a file identifier (FID) corresponding to an ADF to trigger a switch to the identified USIM ADF directory or the identified USIM ADF subdirectory.
- The method of claim 1, further comprising resetting the universal integrated circuit card when the current directory of the universal integrated circuit card fails to switch to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- The method of claim 1, in which selecting comprises:accessing a cache of the mobile equipment corresponding to the universal integrated circuit card; andselecting a first available immediate elementary file (EF) identification (ID) under an ADF from the cache of the mobile equipment.
- The method of claim 1, further comprising sending the authentication command to the universal integrated circuit card when the current directory of the universal integrated circuit card is a USIM ADF directory or a USIM ADF subdirectory.
- The method of claim 1, further comprising:completing an authentication procedure by the universal integrated circuit card; andregistering the universal integrated circuit card with the network from which the authentication command is received by the mobile equipment.
- An apparatus for registering, to a network, a non-compliant universal integrated circuit card (UICC) of a mobile equipment, comprising:means for selecting a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card;means for issuing a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory; andmeans for sending an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- The apparatus of claim 8, further comprising:means for receiving an authentication request from the network;means for determining whether the current directory of the universal integrated circuit card is a USIM ADF directory or a USIM ADF subdirectory;means for switching the current directory of the universal integrated circuit card to an identified USIM ADF directory or an identified USIM ADF subdirectory; andmeans for sending the authentication command to the universal integrated circuit card when the current directory of the universal integrated circuit card is switched to the identified USIM ADF directory or the identified USIM ADF subdirectory.
- The apparatus of claim 9, in which the means for switching comprises means for issuing the select command to the universal integrated circuit card including a file identifier (FID) corresponding to an ADF to trigger a switch to the identified USIM ADF directory or the identified USIM ADF subdirectory.
- The apparatus of claim 8, further comprising means for resetting the universal integrated circuit card when the current directory of the universal integrated circuit card fails to switch to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- The apparatus of claim 8, in which the means for selecting comprises:means for accessing a cache of the mobile equipment corresponding to the universal integrated circuit card; andmeans for selecting a first available immediate elementary file (EF) identification (ID) under an ADF from the cache of the mobile equipment.
- The apparatus of claim 8, further comprising means for sending the authentication command to the universal integrated circuit card when the current directory of the universal integrated circuit card is a USIM ADF directory or a USIM ADF subdirectory.
- The apparatus of claim 8, further comprising:means for completing an authentication procedure by the universal integrated circuit card; andmeans for registering the universal integrated circuit card with the network from which the authentication command is received by the mobile equipment.
- An apparatus for authenticating a universal integrated circuit card (UICC) of a mobile equipment, comprising:a memory;a communication interface coupled to the UICC of the mobile equipment; andat least one processor coupled to the memory and the communication interface of the UICC of the mobile equipment, the at least one processor configured:to select a previously used universal subscriber identity module (USIM) application dedicated file (ADF) directory or a previously used USIM ADF subdirectory of the universal integrated circuit card;to issue a select command to the universal integrated circuit card to trigger a switch to the selected USIM ADF directory or the selected USIM ADF subdirectory; andto send an authentication command to the universal integrated circuit card when a current directory of the universal integrated circuit card is switched to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- The apparatus of claim 15, in which the at least one processor is further configured:to receive an authentication request from the network;to determine whether the current directory of the universal integrated circuit card is a USIM ADF directory or a USIM ADF subdirectory;to switch the current directory of the universal integrated circuit card to an identified USIM ADF directory or an identified USIM ADF subdirectory; andto send the authentication command to the universal integrated circuit card when the current directory of the universal integrated circuit card is switched to the identified USIM ADF directory or the identified USIM ADF subdirectory.
- The apparatus of claim 16, in which the at least one processor is configured to switch by issuing the select command to the universal integrated circuit card including a file identifier (FID) corresponding to an ADF to trigger a switch to the identified USIM ADF directory or the identified USIM ADF subdirectory.
- The apparatus of claim 15, in which the at least one processor is further configured to reset the universal integrated circuit card when the current directory of the universal integrated circuit card fails to switch to the selected USIM ADF directory or the selected USIM ADF subdirectory.
- The apparatus of claim 15, in which the at least one processor is configured to select by:accessing a cache of the mobile equipment corresponding to the universal integrated circuit card; andselecting a first available immediate elementary file (EF) identification (ID) under an ADF from the cache of the mobile equipment.
- The apparatus of claim 15, in which the at least one processor is further configured to send the authentication command to the universal integrated circuit card when the current directory of the universal integrated circuit card is a USIM ADF directory or a USIM ADF subdirectory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/075951 WO2021163947A1 (en) | 2020-02-20 | 2020-02-20 | Universal integrated circuit card (uicc) authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/075951 WO2021163947A1 (en) | 2020-02-20 | 2020-02-20 | Universal integrated circuit card (uicc) authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021163947A1 true WO2021163947A1 (en) | 2021-08-26 |
Family
ID=77390335
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/075951 WO2021163947A1 (en) | 2020-02-20 | 2020-02-20 | Universal integrated circuit card (uicc) authentication |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2021163947A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102892104A (en) * | 2012-09-20 | 2013-01-23 | 东莞宇龙通信科技有限公司 | Method and system for binding multiple subscriber identity module cards |
US8639290B2 (en) * | 2009-09-25 | 2014-01-28 | At&T Intellectual Property I, L.P. | UICC control over devices used to obtain service |
CN104126330A (en) * | 2011-12-23 | 2014-10-29 | 诺基亚公司 | Method and apparatus for simulating multiple orders |
US20150350878A1 (en) * | 2014-05-30 | 2015-12-03 | Apple Inc. | Electronic subscriber identity module selection |
CN107526609A (en) * | 2016-06-21 | 2017-12-29 | 三星电子株式会社 | Electronic equipment including EUICC and the method for operating the electronic equipment |
-
2020
- 2020-02-20 WO PCT/CN2020/075951 patent/WO2021163947A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8639290B2 (en) * | 2009-09-25 | 2014-01-28 | At&T Intellectual Property I, L.P. | UICC control over devices used to obtain service |
CN104126330A (en) * | 2011-12-23 | 2014-10-29 | 诺基亚公司 | Method and apparatus for simulating multiple orders |
CN102892104A (en) * | 2012-09-20 | 2013-01-23 | 东莞宇龙通信科技有限公司 | Method and system for binding multiple subscriber identity module cards |
US20150350878A1 (en) * | 2014-05-30 | 2015-12-03 | Apple Inc. | Electronic subscriber identity module selection |
CN107526609A (en) * | 2016-06-21 | 2017-12-29 | 三星电子株式会社 | Electronic equipment including EUICC and the method for operating the electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9497705B2 (en) | System and methods for using wireless network correlations to acquire service on a multi-SIM device | |
US9781094B2 (en) | Systems and methods for performing remote authentication of a virtual subscriber identity module (SIM) | |
US9913212B2 (en) | Carrier network access for multi-SIM devices | |
US20170325144A1 (en) | Reselection failure detection and prevention in multi-sim wireless communication devices | |
US20160212782A1 (en) | Methods for efficient wireless communications and communications apparatus utilizing the same | |
US10098165B2 (en) | Call setup in wireless communication devices | |
CN100571465C (en) | Location area updating method during double card double standby mobile phone moves | |
US9344877B1 (en) | Symmetric equivalent public land mobile network (EPLMN) configurations among subscriptions | |
US20160295541A1 (en) | Cell acquisition systems and processes for multi-sim devices | |
US8903372B1 (en) | Performing neighbor cell activities in a multi-stack device | |
AU2017269344A1 (en) | Optimal tune away scheme for circuit switched calls on virtual subscriber identity module | |
CN105516958A (en) | Data business transmission method and user terminal | |
WO2021056381A1 (en) | Universal integrated circuit card (uicc) initialization for network service access | |
WO2021163947A1 (en) | Universal integrated circuit card (uicc) authentication | |
WO2020132786A1 (en) | Universal integrated circuit card (uicc) initialization for network service access | |
US20160212791A1 (en) | Methods for efficient wireless communications and communications apparatus utilizing the same | |
WO2021151218A1 (en) | Universal integrated circuit card (uicc) activation | |
WO2021114009A1 (en) | Universal integrated circuit card (uicc) activation | |
CN115362701B (en) | Universal Integrated Circuit Card (UICC) service | |
WO2021226768A1 (en) | Universal integrated circuit card (uicc) profile management | |
CN114982212B (en) | Universal Integrated Circuit Card (UICC) Phonebook Access | |
WO2021092824A1 (en) | Universal integrated circuit card (uicc) activation | |
WO2017166278A1 (en) | Checking public land mobile network (plmn) availability in mobile devices | |
WO2021035668A1 (en) | Universal integrated circuit card (uicc) logical channel utilization | |
WO2021179120A1 (en) | Apparatus and method to support an increased universal integrated circuit card (uicc) voltage class |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20920616 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20920616 Country of ref document: EP Kind code of ref document: A1 |