SGP 21-v3 0
SGP 21-v3 0
RSP Architecture
Version 3.0
28 March 2022
Copyright Notice
Copyright © 2022 GSM Association
Disclaimer
The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept
any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document.
The information contained in this document may be subject to change without prior notice.
Compliance Notice
The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy.
This Permanent Reference Document is classified by GSMA as an Industry Specification, as such it has been developed and is maintained by
GSMA in accordance with the provisions set out in GSMA AA.35 - Procedures for Industry Specifications.
1 Introduction 4
1.1 Overview 4
1.2 Scope 4
1.3 Intended Audience 4
1.4 Definition of Terms 4
1.5 Abbreviations 12
1.6 References 14
1.7 Conventions 16
2 Principles 17
2.1 Basic Principles 17
2.2 Profile Requirements 18
3 Roles 18
3.1 eUICC Manufacturer 18
3.2 [Void] 19
3.3 Operator and Mobile Service Provider 19
3.4 [Void] 19
3.5 Certificate Issuer 19
4 Remote SIM Provisioning System Architecture 20
4.1 eUICC Architecture 20
4.2 Interfaces 23
4.3 eUICC Requirements 27
4.4 Eligibility Check 30
4.5 Device Requirements 32
4.6 Device Initialisation 34
4.7 Profile Requirements 35
4.8 Profile Metadata Requirements 36
4.9 NFC Requirements 38
4.10 Subscription Manager Data Preparation + (SM-DP+) 39
4.11 Local Profile Assistant (LPA) 44
4.12 Subscription Manager – Discovery Service (SM-DS) 53
4.13 Profile Policy Management 60
4.14 Certification 63
4.15 eUICC OS Update 67
4.16 Enterprise Requirements 69
4.17 LPA PRoxy 71
4.18 Device Change Support 78
5 Operational Procedures 81
5.1 LPA Initiated Download 81
5.2 Profile Download with Activation Code 85
5.3 Local Profile Management 88
5.4 Remote Profile Management 97
Annex A [Void] 106
Annex B Profile Production Procedure (Informative) 107
1 Introduction
1.1 Overview
This document provides an architecture approach as a proposed solution for the Remote
SIM Provisioning of eSIM Devices across all markets.
1.2 Scope
The aim of this document is to define a common architecture framework to enable the
Remote SIM Provisioning and management of the Embedded UICC (eUICC) in Devices.
The aim of this architecture framework is to provide the basis for ensuring global
interoperability for Remote SIM Provisioning between Operators in different deployment
scenarios.
Term Description
A Device that relies on the capabilities of a Primary Device for the
Companion Device
purpose of Remote SIM Provisioning.
A code entered by an End User required by the SM-DP+ to validate
Confirmation Code
the request to download a Profile.
Confirmation Code Required A parameter to indicate whether the Confirmation Code is required
Flag or not.
Refers to the hierarchy of User Intent and Confirmation Request,
where:
• User Intent is the first and lowest level
Confirmation Level
• Simple Confirmation is the second level
• Strong Confirmation is the third and highest level
Note: For examples of implementation, please refer to Annex C.
Describes a request for Strong Confirmation or a Simple
Confirmation Request
Confirmation as defined in this specification.
A privileged assignment as defined in GlobalPlatform Card
Delegated Management
Specification [9].
Identifier of a third party platform used to delegate the management
Delegated Platform Identifier
of a Profile.
Delegated Profile Content Platform delegated by the Profile Owner and used for the same
Management Platform purpose as the Profile Content Management Platform: to manage
(DPCMP) the contents of an installed Profile.
User equipment used in conjunction with an eUICC to connect to a
Device
mobile network. E.g. a tablet, wearable, smartphone or handset.
Device Application An application installed in a Device.
Given that one or more Profiles related to their respective
Subscriptions are installed in an old Device, the process for
Device Change
installing one or more Profiles related to the same Subscriptions to
a new Device.
Device Change
Set of rules that apply to a Profile to support Device Change.
Configuration
A set of Device-related information used for Remote SIM
Device Information Code Provisioning operations (e.g. for Profile preparation between the
SM-DP+ and the Operator).
An entity responsible for manufacturing Devices. The Device
Device Manufacturer Manufacturer MAY be responsible for the selection and insertion of
eUICCs in Devices.
A mode hidden from the End User that allows access to and use of
Device Test Mode
Test Profiles.
A Profile in a state where all files and applications (e.g. NAA)
Disabled Profile
present in the Profile are not selectable.
An interrogation of the Discovery Service by a Device for Event
Discovery Request
Records that are registered for its eUICC.
An eUICC implemented on discrete standalone hardware, including
Discrete eUICC
its own dedicated volatile and non-volatile memory.
Term Description
Procedure operated between the eUICC and the SM-DP+ to enable
the SM-DP+ and the Operator or Mobile Service Provider to
Eligibility Check
validate the eligibility of an eUICC and the Device for the
installation of a Profile using information sent by the eUICC.
The information set sent from the eUICC to the SM-DP+ to allow
Eligibility Check Information
eligibility checking of the combination of an eUICC and a Device.
A Profile in a state where all files and/or applications (e.g. NAA) are
Enabled Profile
selectable.
End User The person using the Device.
Information that pertains to the identity of an End User e.g.
End User Data personal details, name, address, biometric characteristics,
assigned identification numbers, etc.
A business, organisation, or government entity that subscribes to
mobile services to be utilised by its workforce in support of the
Enterprise business or activities of the Enterprise. The Enterprise, as the
Subscriber, owns the relationship with the Mobile Service
Provider(s).
A Device that supports the installation and enforcement of
Enterprise Capable Device
Enterprise Rules.
An Operational Profile for which the Subscriber is an Enterprise.
Enterprise Profile
This Profile may include restrictions on the End User of the Device.
A rule stored in an Enterprise Profile that can be used by the Profile
Enterprise Rule Owner to restrict End User controllability for enabling and installing
Profiles on Enterprise Capable Devices.
eSIM is the top level generic descriptor applied to the Devices and
eSIM
eUICCs that support Remote SIM Provisioning.
eSIM CA A GSMA Certificate Issuer or an Independent eSIM CA.
eSIM Products eUICC, Devices, and Servers defined in this specification.
A UICC which enables the remote and/or local management of
eUICC Profiles in a secure way.
Note: The term originates from “embedded UICC”.
Mechanism used by the SM-DP+ or SM-DS to authenticate the
eUICC Authentication
eUICC.
A Certificate issued by the EUM for a specific eUICC.
eUICC Certificate
This Certificate can be verified using the EUM Certificate.
eUICC Eligibility Check The information set sent from the eUICC to the SM-DP+ to allow
Information eligibility checks.
Defines the eUICC Type which is either removable or non-
eUICC Form Factor Type
removable.
eUICC Manufacturer (EUM) The eUICC Manufacturer provides eUICC products.
An action that returns the eUICC to a state equivalent to a factory
eUICC Memory Reset
state.
A mechanism to correct existing features on the eUICC by the
eUICC OS Update
original OS manufacturer.
Term Description
The eUICC OS Manager is a Device component that consolidates
eUICC OS Manager
the functions dealing with the eUICC OS Update.
eUICC Test Memory Reset An action that deletes all post-issuance Test Profiles on an eUICC.
A Certificate chaining to an eSIM CA, of a GSMA accredited EUM
EUM Certificate
which can be used to verify eUICC Certificates.
EUM Keyset Keyset used by the EUM to update ECASD content.
Public key included in the EUM Certificate (called PK.EUM.ECDSA
EUM Public Key
in SGP.22 [24]).
Key used by the EUM to sign eUICC Certificates (called
EUM Private Key
SK.EUM.ECDSA in SGP.22 [24]).
A request for a Profile download or an RPM operation which is set
Event by an SM-DP+ on behalf of a Mobile Service Provider or an
Operator, to be processed by a specific eUICC.
A process for the LDS to query the SM-DS to determine the
Event Checking
presence of Event Records registered for an eUICC.
Unique identifier of an Event for a specific EID generated by the
Event-ID
SM-DP+/SM-DS.
The set of information stored on the SM-DS for a specific Event, via
the Event Registration procedure. This information consists of
Event Record either:
• the Event-ID, EID, and SM-DP+ address or
• the Event-ID, EID, and SM-DS address
A process notifying the SM-DS on the availability of information on
Event Registration
either a specific SM-DP+ or a specific SM-DS for a specific eUICC.
A process for the LDS to retrieve Event Records for an eUICC from
Event Retrieval
an SM-DS.
A pre-production eUICC whose functional or security certifications
Field-Test eUICC
are not yet completed by the EUM.
Form Factor Physical manifestation of the UICC.
GSMA Certificate Issuer A Certificate Authority accredited by GSMA.
Unique number to identify a Profile in an eUICC as defined by ITU-
ICCID
T E.118 [14][14].
IC Dedicated Software As defined in BSI-CC-PP-0084 [40].
A non-GSMA CI that issues digital public key Certificates for a
Independent eSIM CA specific region, company or group of companies for eSIM
purposes.
Integrated eUICC An eUICC implemented on an Integrated TRE.
Integrated eUICC Test
An external interface for the purpose of testing eUICC functionality.
Interface
A TRE implemented inside a System-on-Chip (SoC), optionally
Integrated TRE
making use of remote volatile and/or non-volatile memory.
International Mobile Unique identifier owned and issued by Operators as defined in
Subscriber Identity 3GPP TS 23.003 [3] Section 2.2.
Term Description
An application that can be downloaded, installed, executed and
removed on any eUICC compliant with technical requirements of a
Interoperable Application runtime environment (resources, APIs, version, ...), regardless of its
Form Factor, its Manufacturer, Device type, Device Manufacturer,
Operator, and Mobile Service Provider.
A Security Domain on the UICC as defined by GlobalPlatform Card
Issuer Security Domain
Specification [9].
The process that associates a Protected Profile Package with a
specific eUICC so that a Profile Download including Bound Profile
Package generation can be triggered.
Link Profile
Note: This is normally an offline process, binding is an online
process happening during the communication between the SM-
DP+ and the eUICC.
A functional element in the Device or in the eUICC that provides
Local Profile Assistant (LPA)
the LPD, LDS and LUI features.
Local Profile Management are operations that are locally initiated
Local Profile Management
on the ESeu interface.
Local Profile Management Operations are enable Profile, disable
Local Profile Management Profile, delete Profile, query Profile Metadata, eUICC Memory
Operation Reset, eUICC Test Memory Reset, set/edit nickname, add Profile,
and edit default SM-DP+ address.
In case of MEP: logical connection between an endpoint in the
Logical Interface
Device and an Enabled Profile or another logical secure element.
Assurance that the LPA has not been compromised or affected.
The assurance SHALL be provided to the various Remote SIM
LPA Integrity Provisioning entities to ensure that the LPA can be trusted to
execute the actions requested
Note: This could be linked with a certification process.
Defines the operational LPA Mode which is either LPA in the
LPA Mode
eUICC or in the Device.
A component of the Device used as a proxy between an Operator
LPA Proxy authorised platform and the corresponding Profile to manage the
Profile’s content.
An SM-DP+ that is authorised by the Profile Owner to perform RPM
Managing SM-DP+
on the Profile to the eUICC on which their Profile resides.
Reference data for an RSP Server which could be an Activation
MatchingId
Code Token or the EventID.
A Device where more than one enabled Profile can be used on the
MEP-capable Device
same eUICC.
An entity providing access capability and communication services
Mobile Network Operator
to Subscribers through a mobile network infrastructure.
The Mobile Service Provider provides Subscriptions to Subscribers
either as part of an Operator or as a party with a wholesale
Mobile Service Provider
agreement with an Operator. The Mobile Service Provider could
also be the Operator.
Term Description
An entity providing access capability and communication services
Mobile Virtual Network to its Subscribers through a mobile network infrastructure but does
Operator not have an allocation of spectrum. This refers to an MVNO with
own IMSI range and core network.
Application residing in a Profile providing authorisation to access a
Network Access Application
network.
Data required to authenticate to an ITU E.212 [4] network. This
Network Access Credentials
MAY include data such as Ki/K and IMSI stored within a NAA.
NFC Device A Device compliant with GSMA TS.26 [17].
An eUICC supporting the contactless functionalities defined in
NFC eUICC
SGP.03 [20].
NFC Profile A Profile containing contactless applications.
Non-Enterprise Capable A Device that does not support the enforcement of Enterprise
Device Rules.
An arbitrary random number generated for one time use, employed
Nonce
for cryptographic communication.
A report about a Profile download or Remote/Local Profile
Notification Management Operation processed by the eUICC or about the
progress of such an operation.
A list defined in the Profile containing SM-DP+s that are to receive
Notification Receivers
Notifications concerning that Profile.
A combination of data and applications to be provisioned on an
eUICC for the purpose of providing services by a Mobile Service
Provider. The Profile SHALL be in support of a Subscription with
Operational Profile
the relevant Mobile Service Provider and allow connectivity to a
mobile network. Applications MAY be included to provide non-
telecommunication services.
A Mobile Network Operator or Mobile Virtual Network Operator; a
Operator company providing wireless cellular network services. An Operator
owns one or more IMSI ranges.
A set of credentials owned by the Operator, including Network
Operator Credentials Access Credentials, OTA Keys for Remote File/Application
management, and authentication algorithm parameters.
The credentials included in the Profile used in conjunction with OTA
OTA Keys
Platforms.
A platform for remote management of UICCs and the content of
OTA Platform
enabled Profiles on the eUICCs.
Policy Enforcement A function that executes Policy Rules to implement a policy.
Defines the atomic action of a policy and the conditions under
Policy Rule
which it is executed.
Address configured in a Profile indicating where the Device needs
Polling Address
to connect to retrieve RPM Events for this Profile.
A Device that can be used to provide some capabilities to a
Primary Device
Companion Device for the purpose of Remote SIM Provisioning.
Term Description
A combination of data and applications to be provisioned on an
Profile
eUICC for the purpose of providing services.
Profile Content Management Platform owned by the Profile Owner, used to manage the content
Platform (PCMP) of an enabled Profile.
The description of a Profile in a format specific to the Mobile
Profile Description Service Provider or Operator; example formats could be an Excel
table, xml format, or plain text.
A combination of local and remote management operations (enable
Profile Management Profile, disable Profile, delete Profile, list Profile information, and
query Profile Metadata)
Profile Management Encompasses all the procedures applied during the lifetime of a
Lifecycle Profile.
Profile Management An operation related to the content and state update of a Profile in
Operation a dedicated ISD-P on the eUICC.
Information pertaining to a Profile used for the purpose of Local
Profile Metadata
Profile Management and Remote Profile Management.
The entity that controls the operations that can be performed upon
Profile Owner its Profile. With the exception of Test Profile, this is always a Mobile
Service Provider or an Operator.
A personalised Profile using an interoperable description format
Profile Package that is transmitted to an eUICC to load and install a Profile as
defined by Trusted Connectivity Alliance [5][5].
The functional element within the Profile Policy Management
Profile Policy Enabler
system that interprets and enforces Profile Policy Rules.
A policy control system that allows the Mobile Service Provider to
Profile Policy Management implement, manage and enforce its subscription terms and
conditions associated with the installed Profile.
Defines a qualification for or enforcement of an action to be
Profile Policy Rule
performed on a Profile when a certain condition occurs.
A Profile Package which has been cryptographically protected for
Protected Profile Package
storage but not linked to a particular eUICC.
Defines an implementation-independent set of security
requirements and objectives for a category of products or systems
which meet similar consumers’ needs for IT security. A Protection
Protection Profile
Profile is intended to be reusable and to define requirements which
are known to be useful and effective in meeting the identified
objectives.
A service which is provided by a combination of a push server and
Push Service a push client on the Device, to send a push notification from an
SM-DS to an LDS.
Remote Memory Volatile or non-volatile memory residing outside of the TRE
Remote Profile Management Profile Management operations performed by a Managing SM-DP+
(RPM) at the request of the Profile Owner.
The downloading, installing, enabling, disabling, and deleting of a
Remote SIM Provisioning
Profile on an eUICC.
Term Description
Replay Attack An attack based on previously used or outdated data.
A Certificate used to authenticate other entities within the Remote
Root Certificate
SIM Provisioning framework.
A globally identified central access point for finding Events from
Root SM-DS
one or more SM-DP+(s).
Security Domain As defined in GlobalPlatform Card Specification [9].
A secure and non-interceptable mechanism by which the End User
Simple Confirmation
confirms their action, e.g. by selecting Yes/No, OK/Cancel.
A privileged assignment as defined in GlobalPlatform Card
Simple Mode
Specification [9].
A Certificate chaining to an eSIM CA of a GSMA accredited SM-
SM-DP+ Certificate
DP+.
A Certificate chaining to an eSIM CA of a GSMA accredited SM-
SM-DS Certificate
DS.
Identifier of the SM-DP+ that is globally unique and is included as
SMDPid part of the SM-DP+ Certificate.
Note: This is referred to as the smdpOid in SGP.22 [24].
A secure and non-interceptable mechanism to guarantee a higher
level of User Intent than Simple Confirmation by which the End
Strong Confirmation
User confirms their action, e.g., by inputting PIN or fingerprint,
repeating Simple Confirmation, entering Confirmation Code, etc.
An entity (associated with one or more users) that is engaged in a
Subscriber
Subscription with a Mobile Service Provider.
Information that pertains to the identity of a Subscriber such as
contract details, authentication credentials, cryptographic keys etc.
Subscriber Data
Note: In many instances, the Subscriber is also the End User and
therefore Subscriber Data is likely to include End User Data.
A Subscription describes the commercial relationship between the
Subscription
Subscriber and the Mobile Service Provider.
Prepares Profile Packages, secures each with a Profile protection
key, stores Profile protection keys in a secure manner as well as
the Protected Profile Packages in a Profile Package repository, and
Subscription Manager Data links the Protected Profile Packages to specified EIDs.
Preparation+ (SM-DP+) The SM-DP+ binds Protected Profile Packages to the respective
EID and securely downloads these Bound Profile Packages to the
LPA of the respective eUICC. The SM-DP+ is also capable of
performing Remote Profile Management.
Subscription Manager This entity is responsible for providing addresses of one or more
Discovery Service (SM-DS) SM-DP+(s) to an LDS.
A security module consisting of hardware and low-level software
Tamper Resistant Element providing resistance against software and hardware attacks,
(TRE) capable of securely hosting operating systems together with
applications and their confidential and cryptographic data.
Term Description
A combination of data and applications to be provisioned on an
eUICC to provide connectivity to test equipment for the purpose of
Test Profile
testing the Device and the eUICC. A test Profile is not intended to
store any Operator Credentials.
According to NIST SP 800-53r4 [18][18][18], a mechanism by
which an End User (through an input Device) can communicate
directly with the security functions of the information system with
Trusted Link the necessary confidence to support the system security policy.
This mechanism can only be activated by the End User or the
security functions of the information system and cannot be imitated
by untrusted software.
User Intent Describes the acquisition of the End User input.
1.5 Abbreviations
Abbreviation Description
AC Activation Code
AID Application Identifier
APDU Application Protocol Data Unit
API Application Programming Interface
ARA-M Access Rule Application - Master
ARF Access Rule File
AuC Authentication Centre
BSS Business Support Services
CA Certificate Authority
CASD Controlling Authority Security Domain
CAT Card Application Toolkit
CC Confirmation Code
CI Certificate Issuer
CREL Contactless Registry Event Listener
CRS Contactless Registry Services
DNSCurve Domain Name System Curve
DNSSEC Domain Name System Security Extensions
DPCMP Delegated Profile Content Management Platform
DPI Delegated Platform Identifier
ECASD eUICC Controlling Authority Security Domain
EID Embedded UICC Identifier
eSVN embedded UICC Specification Version Number
ETSI European Telecommunications Standards Institute
eUICC Embedded UICC
EUM eUICC Manufacturer
Abbreviation Description
FASG Fraud and Security Group
FFS For Further Study
FIFO First In First Out
GSMA GSM Association
GSMA CI GSMA Certificate Issuer
HLR Home Location Register
HR High Resolution
HTTP Hypertext Transfer Protocol
ICCID Integrated Circuit Card Identifier
IMEI International Mobile Equipment Identity
IMSI International Mobile Subscriber Identity
ISD-P Issuer Security Domain - Profile
ISD-R Issuer Security Domain - Root
ISIM IP Multimedia Services Identity Module
ISO International Standards Organisation
ITU International Telecommunications Union
LDS Local Discovery Service
LPA Local Profile Assistant
LPD Local Profile Download
LPR LPA PRoxy
LUI Local User Interface
M4M Mifare4Mobile
MEP Multiple Enabled Profiles
MNO-SD Mobile Network Operator - Security Domain
MSISDN Mobile Subscriber International Subscriber Directory Number
MSP Mobile Service Provider
NAA Network Access Application
NFC Near Field Communication
OCR Optical Character Recognition
OS Operating System
OTA Over The Air
PCMP Profile Content Management Platform
PFS Perfect Forward Secrecy
PPR Profile Policy Rule
PPSE Proximity Payment System Environment
QR Code Quick Response Code
RAM Remote Application Management
RAT Rules Authorisation Table
Abbreviation Description
RFM Remote File Management
RMPF Remote Memory Protection Function
RPM Remote Profile Management
RSP Remote SIM Provisioning
SEAC (Global Platform) Secure Element Access Control
SAS Security Accreditation Scheme
SCP Secure Channel Protocol
SCWS Smart Card Web Server
SD Security Domain
SIM Subscriber Identity Module
SM-DP+ Subscription Manager - Data Preparation +
SM-DS Subscription Manager - Discovery Service
SoC System-on-Chip
SSD Supplementary Secure Domain
TRE Tamper Resistant Element
UIMe User Interface Module for LPAe
URL Uniform Resource Locator
USIM Universal Subscriber Identity Module
1.6 References
Ref Document Number Title
X.509 Public Key Infrastructure Certificate and
[1] RFC 5280
Certificate Revocation List (CRL) Profile
UICC-Terminal interface; Physical and logical
[2] ETSI TS 102 221
characteristics
Digital cellular telecommunications system (Phase 2+);
[3] 3GPP TS 23.003 Universal Mobile Telecommunications System (UMTS);
Numbering, addressing and identification
The international identification plan for public networks
[4] ITU E.212
and Subscriptions
Trusted Connectivity Alliance: eUICC Profile Package -
[5] TCAPP
Interoperable Format Technical Specification
“Key words for use in RFCs to Indicate Requirement
[6] RFC 2119 Levels”, S. Bradner
http://www.ietf.org/rfc/rfc2119.txt
[7] 3GPP TS 21.133 3G security; Security threats and requirements
GSMA Remote Provisioning Architecture for
[8] SGP.02
Embedded UICC Technical specification
[9] GPC_SPE_034 GlobalPlatform Card Specification with its Amendments
1.7 Conventions
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”,
“SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be
interpreted as described in RFC2119 [6] and clarified by RFC8174 [52][52], when, and only
when, they appear in all capitals, as shown here.
“FFS” or “For Further Study” means that it will be covered in the next version of SGP.21.
2 Principles
This section contains the principles related to the GSMA Remote SIM Provisioning system
for the Embedded UICC.
The solution based on the requirements described within this document has to be provided
in a non-discriminatory manner.
3 Roles
3.2 [Void]
3.4 [Void]
To SM-DP+
To SM-DP+
To Operator
To SM-DS
the Device
To LPA in
To UIMe
ES6 ES8+ ES25 ES11 ES9+ ES10a,b,c
eUICC
Telecom
Operating Framework
System
File System
Applets
Applets
CASD
CASD
NAAs
NAAs
SSD
SSD
ECASD
4.1.1.1 ECASD
The Embedded UICC Controlling Authority Security Domain (ECASD) is responsible for the
secure storage of credentials needed to support the required security domains on the
eUICC.
There SHALL only be one ECASD on an eUICC. The ECASD SHALL be installed and
personalised by the EUM during the eUICC manufacturing as described in GlobalPlatform
Card Specification [9].
Additionally, the ECASD SHALL provide security functions used during key establishment
and eUICC Authentication.
4.1.1.2 ISD-R
The ISD-R is responsible for the creation of new ISD-Ps and the lifecycle management of all
ISD-Ps.
4.1.1.3 ISD-P
The ISD-P is a secure container (security domain) for the hosting of a Profile. The ISD-P is
used for Profile download and installation in collaboration with the Profile Package
interpreter for the decoding/interpretation of the received Bound Profile Package.
4.1.1.4 MNO-SD
The MNO-SD is the on-card representative of the Operator which issued the Profile. It
contains the Operator’s Over-The-Air (OTA) Keys and provides a secure OTA channel.
4.2 Interfaces
Figure 3: Interfaces on the eUICC Architecture with the LPA in the Device
Configuration
4.2.2 [Void]
• between the LUI in the Device and the LPA services for Local Profile Management by
the End User.
• between the LPR in the Device and the LPA services to retrieve Metadata that would
be needed for Profile content management through LPA Proxy.
• An internet connectivity available or provided on the same Device where the LPA
resides
or
• An internet connection shared from another Device via a local go-between connection
Figure 4: Example Connection Methods for Companion Devices to reach out to the
SM-DP+
Figure 5: Example Connection Methods for Companion Devices to reach out to the
SM-DP+ with a Remote Primary Device
• The LUI uses CAT commands (e.g. CAT menu navigation) as defined in ETSI TS
102 223 [34] and the UIMe is the CAT interpreter. Besides the support of these
commands, there are no additional requirements for the UIMe.
• The LUI uses SCWS as defined by OMA SpecWorks [38] and the UIMe is a browser.
Besides the support of these commands, there are no additional requirements for the
UIMe.
• The LUI uses a limited set of specific CAT Envelopes and the UIMe is a tailored
application.
GSMA PRD Specification TS.43 [54] is an example for the protocol to use on the ESapp
interface.
Eligibility Check Information. Some Eligibility Check parameters MAY be required due to
Device capabilities which must be supported by the Profile/eUICC and delivered as part of
the Eligibility Check Information set.
Note: It is assumed that the EID is normally shared to the SM-DP+ by other means and
could be used for the Eligibility Check procedure.
Note: The Device MAY implement a mechanism for connecting an external SIM card for the
purpose of testing in the context of Device repair, without affecting the state of the eUICC.
4.7.2 [Void]
Figure 7: End User Interaction and Interfaces between a Primary and Companion
Device, where the Companion Device MAY have a UI
The LDS MAY support the Event Checking procedure. If the Event
LDS2 Checking procedure is supported by the LDS, requirements LDS3 to
LDS6 SHALL apply.
The Event Checking procedure SHALL provide a means for the LDS to
query the SM-DS to determine the presence of any Event Records
LDS3
registered for an eUICC, without requiring the eUICC and SM-DS to
perform the common mutual authentication procedure.
During the Event Checking procedure, the LDS SHALL provide the SM-
DS an information for identifying the eUICC in order to check the
LDS4
presence of Event Record(s) registered for that eUICC, without
compromising the privacy of the EID.
There SHALL be a means for the LDS to determine whether the SM-DS
LDS5 supports the Event Checking (e.g. by a pre-configuration by the OEM or
by a response from the SM-DS).
If both the LDS and the SM-DS support Event Checking, the LDS
LDS6 SHOULD perform the Event Checking procedure prior to the Event
Retrieval against that SM-DS.
The LDS MAY support a Push Service. If a Push Service is supported by
LDS7
the LDS, requirements LDS8 and LDS9 SHALL apply.
There SHALL be a means for the LDS to request an SM-DS to be notified
LDS8
about Events registered for the eUICC.
With regard to LDS8, the request SHALL include the information for
LDS9 identifying the corresponding eUICC and the information about the Push
Service to be used by the SM-DS for the notification.
Table 25: LDS Requirement
The principle of operation remains the same for all use cases. The SM-DP+ will send an
Event Registration message for a target Device to an SM-DS.
In a simple deployment, only the Root SM-DS is configured on the eUICC. The Root SM-DS
address is unique and filled in the eUICC. The LDS in the target Device polls the Root SM-
DS using the same logical location. When the Root SM-DS has an Event-ID for the target
Device it will respond with the SM-DP+ address, or if there is no Event-ID the response will
be a null response.
In a deployment with cascaded SM-DSs, the SM-DP+ will send an Event Registration to an
Alternative SM-DS, which may not be configured as the Root SM-DS on the eUICC. This
Alternative SM-DS will cascade the Event Registration to the Root SM-DS. The LDS in the
target Device polls the Root SM-DS and will receive the Alternative SM-DS address. It will
then request the Event from the Alternative SM-DS, which will respond with the SM-DP+
address.
Figure 14 shows both configurations. The Root SM-DS is configured at the time of Device
manufacture and is invariant.
a. The SM-DP+ has an Event Registration action waiting for a target eUICC identified by
the EID.
Procedure:
1. The SM-DP+ establishes a secure connection to an Alternative SM-DS of the
Profile Owner´s choice.
2. The SM-DP+ notifies the Alternative SM-DS about an Event Registration action.
3. to 4. The Alternative SM-DS registers and confirms the Event Registration.
5. The Alternative SM-DS establishes a secure connection to the Root SM-DS.
6. The Alternative SM-DS informs the Root SM-DS that for the given EID, an Event
Record is waiting at the Alternative SM-DS.
7. The Root SM-DS registers the Event Registration.
8. The Root SM-DS confirms the receipt of the information.
a. The SM-DP+ has an Event Deletion action waiting for a target eUICC identified by the
EID
Procedure:
1. The SM-DP+ establishes a secure connection to an Alternative SM-DS of the Profile
Owner´s choice.
2. The SM-DP+ notifies the Alternative SM-DS about an Event Deletion action.
3. to 4. The Alternative SM-DS deletes the Event Record and confirms the Event Deletion.
5. The Alternative SM-DS establishes a secure connection to the Root SM-DS.
6. The Alternative SM-DS informs the Root SM-DS that for the given EID, an Event
Record has to be deleted.
7. The Root SM-DS deletes the Event Record.
8. The Root SM-DS confirms the deletion of the Event Record.
Procedure:
1. to 3. In order to generate a Discovery Request, the LDS requests the eUICC to generate
its Authentication information which contains (at least) the eUICC-Certificate and is
signed by the eUICC.
4. to 5. The LDS establishes a secure communication to the Root SM-DS.
6. The Root SM-DS verifies the authenticity of the eUICC by checking the eUICC
Authentication information.
7. In case the eUICC is authentic and an Event Record is waiting, it delivers back:
a. The address of the SM-DP+, where an action is waiting.
or
b. The rest of the following actions:
i. The address of the Alternative SM-DS, where an Event Record can be
retrieved.
ii. The LDS establishes a secure connection to the Alternative SM-DS.
iii. The Alternative SM-DS verifies the authenticity of the eUICC by
checking the eUICC Authentication information.
iv. In case the eUICC is authentic and an Event Record has been
received, it delivers back the address of the SM-DP+, where an action
is waiting.
8. The LPA establishes a connection to the SM-DP+ and the waiting action can be
performed.
4.13.1 Introduction
The Profile Policy Management function provides mechanisms by which Mobile Service
Providers are able to reinforce the conditions or policies (operational and business) under
which services are provided to the Subscriber. In some instances this MAY also include the
enforcement of the policies set by the Subscriber.
Profile Policy Management MAY also be applied with other already existing Policy
Enforcement technologies which are also subject to agreement by the Subscriber.
The realisation of the Profile Policy Management function is based on two key elements. The
first element is the Profile Policy Enabler which is contained within the eUICC. The second
element is a set of defined Profile Policy Rules which are required for the actual enforcement
of specific policies.
The RAT is provisioned at eUICC manufacturing time; or during the initial Device setup
provided that there is no installed Operational Profile. The OEM or EUM is responsible for
setting the content of the RAT.
The RAT contains a set of entries that are mandatory for all eUICCs. In addition optional
entries MAY be included:
• For Profile Policy Rules that are optional to implement (e.g. POL4), the RAT contains
additional entries permitting the use of these Profile Policy Rules.
• The RAT may also contain Operator-specific entries that provide exceptions to the
requirement to obtain Authenticated User Confirmation prior to download and
installation of a Profile that contains specific Profile Policy Rules.
4.14 Certification
the publishers reserve the right to explicitly amend features in this specification related to
software update in future versions.
There may need to be some industry procedures to manage eUICC OS Updates that affect
installed Profiles.
Note: Such a mechanism cannot be included in the RSP Test Specification, nor can it be
restricted by the Protection Profile.
To perform the eUICC OS Update and manage the End User interactions according to the
Device Manufacturer’s choice of user experience, the following information are needed:
• The Device needs to know if an eUICC OS Update is available for its eUICC; and
also which supplier is providing the eUICC OS Update. When and how this detection
is performed is out of scope of this specification.
• Before the eUICC OS Update is applied to the eUICC, the Device needs to know if
the update will impact the eUICC services, and whether eUICC reboot(s) will be
needed.
• At the end of the eUICC OS Update, the Device needs to have a confirmation that
the eUICC OS Update is finished and a status to know if it was successful or not.
These information are provided to the eUICC OS Manager delivered over the ESoem
interface.
The management of the eUICC OS Update itself (including the deployment process, the way
the Device triggers the eUICC OS Update, the retry policy in case of failure (if applicable)
and the internal management inside the eUICC) is out of scope of this specification.
Only the Profile Owner, acting on behalf of the Enterprise, SHALL be able
ENT6 to set Enterprise Rules for its Enterprise Profile(s), at the Profile ordering
phase.
For an Enterprise Capable Device, it SHALL be possible for the
Enterprise to control whether the End User can locally: enable any Profile,
ENT7
enable only Enterprise Profiles, or enable only the specific Enterprise
Profile. Strong Confirmation SHALL be enforced.
Figure 18: LPA PRoxy Architecture (with LPA configuration in the Device)
While the Profile Content Management Platform of the Profile Owner has the role of
managing the content of the Profile, it might redirect the LPR towards a Delegated Profile
Content Management Platform used by a third party to manage a subset of the Profile that
has been delegated. This is applicable in Simple Mode, Delegated Management, or
Authorised Management.
The Device Application may be used to trigger the LPR and may receive status regarding
the information exchanged between the Management Platform and the eUICC.
Three methods may trigger the connection request from the LPA to the Profile Content
Management Platform
• An automatic triggering after the enabling of a Profile (this mode is configured in the
Profile to be activated or not activated)
• An RPM command sent from a SM-DP+ to the LPA
• A specific API command sent from a Device Application to the LPA
Start Conditions:
a. A Profile which requests the automatic trigger of the LPR procedure is enabled;
an optional parameter DPI may be attached to this request to signify an expected
connection to a Delegated PCMP.
OR
b. A RPM Profile update command which triggers the LPR procedure is received
from the SM-DP+; an optional parameter DPI may be attached to this request to
signify an expected connection to a Delegated PCMP.
OR
c. A specific API command sent from a Device Application to the LPA to trigger the
LPR procedure to initiate a Profile content management session (Card Content
Management Session); an optional parameter DPI may be attached to this
request to signify an expected connection to a Delegated PCMP.
Procedure:
1. The LPR requests the ICCID and the PCMP endpoint URI associated to the
Profile Content Management Platform from the eUICC.
2. The eUICC sends the ICCID of the Enabled Profile and the PCMP address to the
LPR.
3. The LPR connects to the PCMP, with the DPI as a parameter if provided during
the initialisation of the LPR Procedure. This step is followed by step 4 (sending
the lists of C-APDU from the PCMP) or 10 (sending the URI of a Delegated
PCMP) or 18 (end of processing).
Note: Steps 4 to 9 MAY be skipped if the PCMP requests a redirection to the DPCMP
4. The PCMP provides a list of Command APDUs (C-APDUs) and the AID of the
targeted application of the Enabled Profile.
5. The LPR opens a logical channel to the AID of the targeted application of the
Enabled Profile.
6. The LPR transmits the list of C-APDUs to the targeted application of the Enabled
Profile within the MNO-SD.
7. The targeted application sends back the list of Response APDU (R-APDU) to the
LPR.
8. The LPR closes the logical channel.
9. The LPR sends the list of R-APDUs to the PCMP, and in addition, the DPI
parameter if provided during the LPR procedure initialisation request.
Additionally, this step is equivalent to step 3: the LPR connects to the PCMP,
with the DPI as a parameter, if provided during the initialisation of the LPR
procedure.
This step is followed by step 4 (sending a new list of C-APDUs from the PCMP)
or 10 (sending the URI of a Delegated PCMP) or 18 (end of processing).
Note: Steps 10 to 17 MAY be skipped if the DPI parameter is not provided during the LPR
procedure initialisation request.
10. The PCMP provides the address of the DPCMP to the LPR to initialise the
redirection.
11. The LPR connects to the DPCMP address.
12. The DPCMP provides a list of Command APDUs (C-APDUs) and the AID of the
targeted application of the Enabled Profile.
13. The LPR opens a logical channel to the AID of the targeted application of the
Enabled Profile.
14. The LPR transmits the list of C-APDUs to the targeted application of the Enabled
Profile within the MNO-SD
15. The targeted application sends back the list of Response APDUs (R-APDUs) to
the LPR.
16. The LPR closes the logical channel,
17. This step is equivalent to step 3: The LPR connects to the PCMP, with the DPI
as a parameter if provided during the initialisation of the LPR Procedure.
This step is followed by step 4 (sending the lists of C-APDU from the PCMP) or
10 (sending the URI of a Delegated PCMP) or 18 (end of processing).
18. The PCMP sends an acknowledgement to the LPR about the end of processing.
Note: When initialising the connection between the LPR and the PCMP or the DPCMP, a
HTTPs session SHALL be established between the LPR and respectively the PCMP and
DPCMP based on a public key of the Root Certificate stored in the Device which
includes authentication using the TLS Certificate, and may check for the presence of the
adequate platform identifier in the TLS Certificate used for the TLS session.
End Condition:
a. The contents of the Enabled Profile have been updated according to updates
received from either the PCMP, the DPCMP or both.
The following flow highlights the specific use of Notifications sent from the LPR to a specific
Device Application(s). These Notifications can be used to inform the End User about the
progress of the Profile management process.
Start Conditions:
a. One of the triggers to start a connection between a (D)PCMP and the eUICC has
been initiated.
b. A Device Application has been registered to receive Notifications during the Profile
content management session.
Procedure:
1. The LPR requests the ICCID and the (D)PCMP endpoint URI associated to the
Profile Content Management Platform from the eUICC.
2. The eUICC sends the ICCID of the Enabled Profile and the (D)PCMP address to
the LPR.
3. The LPR connects to the (D)PCMP.
3.1 The LPR sends a Notification about the operation status to the registered Device
Application.
4. The (D)PCMP provides a list of Command APDUs (C-APDUs) and the AID of the
targeted application of the Enabled Profile.
4.1 The LPR sends a Notification about the operation status to the registered Device
Application
5. The LPR opens a logical channel to the AID of the targeted application of the
Enabled Profile.
6. The LPR transmits the list of C-APDUs to the targeted application of the Enabled
Profile within the MNO-SD.
6.1 The LPR sends a Notification about the operation status to the registered Device
Application
7. The targeted application sends back the list of Response APDU (R-APDU) to the
LPR.
8. The LPR closes the logical channel.
End Condition:
c. The application of the Enabled Profile has been updated according to updates
received from the (D)PCMP. The Device Application has been notified during the
procedure execution.
4.18.1 Overview
An End User subscribes to a mobile service with a Mobile Service Provider, and installs one
or more Profiles in their Device. After a while when the End User needs to use their
Subscriptions on another Device, they can perform a Device Change process in order to
install one or more Profiles related to their Subscriptions in the new Device.
The underlying mechanism for the Device Change process is based upon the download of
the Profiles from the SM-DP+(s) as in the general Profile download procedure. As such, the
Mobile Service Providers may need to update their backend systems such as HSS/AuC and
BSS with respect to the newly installed Profiles, where the details are out of scope of the
specification.
Start Conditions:
a) The End User has an old Device containing one or more Profiles. The End User
gets a new Device
b) The old Device still has connectivity.
Procedure:
1. The End User provides User Intent 'Device Change', indicates which Profiles they
intend to move and optionally provides information (e.g. EID) of the new Device to
the old Device.
2. The old Device prepares Device Change of the installed Profiles that the End User
wants to move, and optionally deletes the installed Profiles based upon the Mobile
Service Providers’ configurations. This step can involve SM-DP+(s) and/or Mobile
Service Providers servers. This may include an Eligibility Check for Device Change.
3. The End User provides User Intent 'Add Profile' to the new Device.
Steps 4 to 5 are repeated for every Profile the End User wants to move in the new
Device. If the installation of one of the Profile fails during the Device Change
operation with more than one Profile, the End User has to confirm to continue the
Device Change procedure with the other Profiles.
4. The new Device downloads and installs a Profile from the SM-DP+.
5. (Optional) The Mobile Service Provider updates the backend system such as
HSS/AuC and BSS.
6. The Profiles can now be enabled using one of the mechanisms described in this
specification.
5 Operational Procedures
1. The LPA initiates Profile Package download and identifies the address of the
SM-DP+ where the Profile is stored and available for download (via e.g. URL,
QR code, manual input, etc.) as well as other information provided (e.g.
Token, SMDPId, Confirmation Code).
2. The LPA authenticates the SM-DP+ through establishing a TLS connection
with the SM-DP+, and verifying the SMDPid if such information has been
provided.
3. to 4. The LPA gets an eUICC challenge
5. to 6. The LPA sends the eUICC challenge and any other relevant information to the
the SM-DP+.
7. to 9. The SM-DP+ signs the eUICC challenge, and generates a DP_Challenge to
be sent back to the eUICC.
10. The LPA sends the material received by the SM-DP+ and the AC Token to
the eUICC; the eUICC checks the SMDPid and authenticates the SM-DP+.
11. The eUICC sends back a signed set of information including the
DP_Challenge, the AC Token, the EID and its Certificate to the LPA.
12. The End User confirms the download of the Profile, optionally with the display
of the Profile name of the Mobile Service Provider.
13. The LPA sends the set of information received in Step 11 from the eUICC to
the SM-DP+.
14. The SM-DP+ verifies the signature; the eUICC is authenticated.
15. to 16. OPTIONAL: The Eligibility Check and Profile binding functions are performed
by the SM-DP+.
17. to 22. OPTIONAL
17. The Mobile Service Provider and Operator is notified about the Profile
Package that is about to be downloaded.
18. If the Mobile Service Provider or Operator has been notified, it MAY request to
stop the download process by indicating an error code to the SM-DP+.
19. If the Mobile Service Provider or Operator sends an error code to the SM-
DP+, the SM-DP+ stops the download process and indicates the error code to
the LPA.
20. The LPA notifies the End User with an appropriate message.
21. to 22. The SM-DP+ MAY receive information from the Operator to prepare the
appropriate Profile Package.
23. to 25. The Bound Profile Package is sent to the eUICC and installed on the eUICC.
26. The Profile Package download report is sent from the SM-DP+ to the Mobile
Service Provider and Operator.
End Condition:
Start Conditions:
1. A Subscription has been established by the Subscriber.
2. Activation Code material and optionally a Confirmation Code has been provided
to the SM-DP+ (Step 1), and an Activation Code has been provided to the End
User and optionally a Confirmation Code (side channel) (Step 2).
Procedure:
3. The End User inputs the Activation Code to the LPA through the LUI.
4. The LPA parses the Activation Code parameters to recognise the SM-DP+
address, the Activation Code Token, the LPA Mode and optionally the SMDPid.
In addition, the LPA MAY parse in the Activation Token the information that a
Confirmation Code is required.
5. If the Confirmation Code parameter in the Activation Code Token is set to
“require Confirmation Code”, the End User is prompted to input a Confirmation
Code provided to them by the issuing Mobile Service Provider.
6. The Activation Code download procedure is initiated by the LPA. The LPA
requests a nonceeUICC from the eUICC.
7. The eUICC creates a nonceeUICC associated with the supported eUICC
Specification Version Number (eSVN).
8. The eUICC transmits the nonceeUICC associated with the supported eSVN to
the LPA.
9. The LPA sends the nonceeUICC associated with the supported eSVN to the SM-
DP+.
Note: Prior to step 9, a HTTPs session SHALL be established between the LPA and the
SM-DP+ based on a public key of the Root Certificate stored in the Device which
includes authentication using the TLS Certificate and checking for the presence of the
SMDPid in the TLS Certificate used for the TLS session.
10. Upon receiving the nonceeUICC and the associated eSVN, the SM-DP+ creates
nonceSMDP and signs both the nonceSMDP and the nonceeUICC.
11. The SM-DP+ sends the signed nonceeUICC and nonceSMDP to the LPA.
12. The LPA collects the Activation Code parameters as well as the Device
information needed for the Eligibility Check procedure and optionally the
Confirmation Code and transmits them with the signed nonceeUICC and
nonceSMDP to the eUICC.
13. If configured in the Activation Code, the eUICC and the LPA checks whether the
SMDPid configured in the AC and the SMDPid within the SM-DP+ Certificate for
the Profile installation (called CERT.DPauth in SGP.22 [24]) are the same (in
case of failure, the download SHALL NOT proceed). If configured in the
Activation Code, the eUICC and the LPA checks whether the eSIM CA
Certificate, and the eSIM CA Certificate linked with the SM-DP+ for the Profile
installation (called CERT.DPauth in SGP.22 [24]) are the same (in case of failure,
the download SHALL NOT proceed).
14. The eUICC checks the signature attached to the nonceeUICC. The SM-DP+ is at
this stage authenticated by the eUICC. The eUICC generates key material that
will be used for the session key establishment. The eUICC signs a set of
information with the eUICC private key which includes:
a. The nonceSMDP
b. Key material created by the eUICC to calculate session keys for the
preparation of the Bound Profile Package
c. Activation Code parameters
d. The Device and eUICC information
e. Optionally the Confirmation Code
15. The eUICC sends the signed set of information to the LPA in addition to:
a. The nonceSMDP
b. Key material created by the eUICC to calculate session keys for the
preparation of the Bound Profile Package
c. Activation Code parameters
d. The Device and eUICC information
e. The eUICC Certificate which includes the EID
f. The EUM Certificate
g. Optionally the Confirmation Code
16. The LPA sends the whole set of information received from the eUICC to the SM-
DP+.
17. The SM-DP+ checks the EUM Certificate with the CI Public Key. The SM-DP+
checks the signature of the nonceSMDP; the eUICC is at this stage
authenticated by the SM-DP+.
18. The SM-DP+ proceeds with the eligibility check based on the transmitted
information (EID, Device information, eUICC information, eSVN).
19. The SM-DP+ checks the Activation Code parameters and optionally the
Confirmation Code to retrieve the referenced Profile Package.
20. The Profile Package is downloaded to the eUICC:
a. The SM-DP+ establishes session keys with the eUICC.
b. A Bound Profile Package is prepared on the basis of the eUICC session key
material and is downloaded and installed on the eUICC.
c. Successful installation of the Profile on the eUICC is acknowledged and the
Mobile Service Provider and Operator is notified by the SM-DP+.
d. Successful installation of the Profile on the eUICC is acknowledged by the
eUICC to the LPA which notifies the End User of the status.
End Conditions:
a) A Bound Profile Package has been downloaded and installed on the eUICC in a
Disabled state.
b) The LPA MAY offer the Profile for enablement by the End User.
Start conditions:
a. The target Profile is disabled on the eUICC.
b. The target Profile has been chosen by the End User.
c. The LPA is authenticated to the eUICC as legitimate for performing Local Profile
Management.
Procedure:
1. The End User makes a Profile enable request on the LPA.
2. User Intent is verified.
3. The LPA sends a Profile enable operation for the target Profile to the ISD-R on the
eUICC.
4. The ISD-R checks if applied Profile Policy Rules on the currently Enabled Profile
permit the Profile to be disabled
5. If there is a conflict with Profile Policy Rules, the ISD-R aborts the procedure and
informs the End User via the LPA.
6. The currently Enabled Profile is disabled
7. The target Profile is enabled.
8. The ISD-R informs the LPA of the enabling of the Profile.
9. The End User is informed via the LPA.
10. The ISD-R generates and stores enable Notifications for all Notification Receivers
configured in the Profile Metadata of the target Profile. If this procedure caused
another Profile to be disabled, then the ISD-R also generates and stores disable
Notifications for all Notification Receivers configured in that Profile.
11. All enable and disable Notifications on the eUICC are delivered.
End conditions:
a. The target Profile is enabled.
Start conditions:
a. The target Profile is enabled on the eUICC.
b. The target Profile has been chosen by the End User.
c. The LPA is authenticated to the eUICC as legitimate for performing Local Profile
Management.
Procedure:
1. The End User makes a Profile disable request on the LPA.
2. User Intent is verified.
3. The LPA sends a Profile disable operation to the ISD-R on the eUICC.
4. The ISD-R checks if applied Profile Policy Rules on the target Profile permits the
Profile to be disabled.
5. If there is a conflict with Profile Policy Rules, the ISD-R aborts the procedure and
informs the End User via the LPA.
6. The ISD-R disables the target Profile.
7. The ISD-R informs the LPA of the disabling of the Profile.
8. The End User is informed via the LPA.
9. The ISD-R generates and stores disable Notifications for all Notification Receivers
configured in the Profile Metadata.
10. All disable Notifications on the eUICC are delivered.
End conditions:
a. The target Profile is disabled.
Start conditions:
a. The target Profile is disabled.
b. The target Profile has been chosen by the End User
c. The LPA is authenticated to the eUICC as legitimate for performing Local Profile
Management.
Procedure:
1. The End User makes a Profile deletion request on the LPA.
2. User Intent is verified.
3. The LPA sends a Profile deletion operation for the target Profile to the ISD-R on
the eUICC. The request includes the ISD-P AID of the target Profile.
4. The ISD-R checks if applied Profile Policy Rules permits the Profile to be deleted.
5. If there is a conflict with Profile Policy Rules, the ISD-R aborts the procedure and
informs the End User via the LPA.
6. The ISD-R erases the target Profile and the related ISD-P.
7. The ISD-R informs the LPA of the Profile deletion.
8. The Profile Metadata for the target Profile is erased.
End conditions:
a. The target Profile is deleted.
Start conditions:
a. User Intent has been verified.
b. The target Profile has been chosen by the End User.
c. The LPA is authenticated to the eUICC as legitimate for performing Local Profile
Management.
Procedure:
1. The End User requests the update of the nickname on the LPA.
2. The LPA updates the Profile Metadata of the target Profile with the End User’s
choice of nickname in the eUICC.
End conditions:
a. Profile Metadata of the target Profile has been updated with the End User’s choice
of nickname.
Start conditions:
a. The LPA is authenticated to eUICC as legitimate for performing Local Profile
Management.
b. The list of Profiles accessible to the End User is displayed by the LPA (LUI).
Procedure:
1. The End User selects a Profile to query.
2. The LPA receives a query request from the End User.
3. The LPA requests Profile Metadata from the eUICC.
4. The LPA displays the Profile Metadata to the End User on the LUI.
End conditions:
a. No change to Profile Metadata.
Note: A similar procedure will apply to perform the eUICC Test Memory Reset of the eUICC.
Start conditions:
a. The LPA is authenticated to the eUICC as legitimate for performing Local Profile
Management.
b. The eUICC Memory Reset option is displayed by the LPA (LUI).
Procedure:
1. The End User makes an eUICC Memory Reset request on the LPA (LUI).
2. User Intent is verified.
3. The LPA (LUI) displays a message of consequences of ‘eUICC Memory Reset’ to
the End User.
4. The End User confirms the conformity with the consequences to the LPA.
5. The LPA sends an eUICC Memory Reset operation to the eUICC.
6. The eUICC deletes the Profiles on the eUICC even if one is an Enabled Profile
including the Profile Metadata associated with it.
7. The eUICC informs the LPA of the eUICC Memory Reset of the eUICC.
8. The End User is informed via the LPA (LUI).
9. The eUICC generates and stores delete Notifications for all Notification Receivers
configured in the Profile Metadata of every Profile.
10. All of the delete Notifications on the eUICC are delivered as soon as connectivity
is available.
End conditions:
a. The Profiles are deleted from the eUICC.
Start conditions:
a. User Intent has been verified.
b. The download of a new Profile is allowed on the eUICC.
c. The LPA is authenticated to the eUICC as legitimate for performing Profile
download.
Procedure:
1. The End User obtains an Activation Code to add a Profile to their Device.
2. The LPA requests the End User to enter the Activation Code.
3. Profile Download with Activation Code Procedure as described in Section 5.2.2
starts.
End conditions:
a. The Profile has been installed on the End User’s Device.
b. Profile Metadata has been updated from the Profile.
Start conditions:
a. The End User is willing to edit the default SM-DP+ address
Procedure:
1. The End User edits an SM-DP+ Address via the LPA.
2. Simple Confirmation from the End User is required.
3. Depending on the storage location of the selected SM-DP+ Address:
a. If the address is stored in the eUICC, the LPA sends the default SM-DP+
address for storage in the LPA Services.
b. If the address is stored in the Device, the LPA updates the default SM-DP+
address for storage in the Device.
4. The End User is informed via the LPA.
End conditions:
c. The target default SM-DP+ Address is edited in the LPA Services or the Device.
updating specific Profile Metadata. Profile Owners will also be able to update the list of
Managing SM-DP+(s) that are authorised to perform Remote Profile Management
operations.
For the avoidance of doubt, Notifications and Policy rules also apply to Remote Profile
Management operations.
Procedure:
Without Discovery Service: An End User triggered request via the LPA to establish
if there is an Event for RPM waiting on an SM-DP+.
5. The LPA requests a Polling Address for pending operations from the eUICC.
6. The Polling Address is sent from the eUICC to the LPA.
7. The LPA sends a query with its EID to the Polling Address. If the contacted peer is
an SM-DS, the SM-DS returns the Event-ID for that EID.
8. The SM-DP+ looks up the pending operations for the specific EID, and sends them
to the LPA.
For each received package, the LPA SHALL do the following:
9. Based upon the operation type the LPA obtains the appropriate level of End User
confirmation.
10. The LPA then sends the received RPM command package to the eUICC.
11. The package is decrypted and verified by the eUICC.
12. The eUICC verifies whether the command package originates from one of the target
Profile’s Managing SM-DP+s.
13. The command is executed according to its operation-specific sequence (see
sections 5.4.3.2, 5.4.3.3, 5.4.3.4, 5.4.3.5, 5.4.3.6, 5.4.3.7).
14. For each command, the eUICC generates and stores Notifications for all
configured Notification Receivers for the command.
15. The eUICC informs the LPA that the RPM procedure is complete and if appropriate
the response information.
16. The LPA informs the SM-DP+ that the RPM procedure is complete and if
appropriate the response information.
17. All pending Notifications on the eUICC are delivered.
Annex A [Void]
Within the eUICC, the current functionality of the UICC is represented by a Profile. Just as
with current UICCs, Profiles are the responsibility of the Operator and Profile production is
performed upon their request and permission (if not produced by the Operators themselves).
Note: The generation of the Bound Profile Package is part of the Profile download with
Activation Code procedure in Section 5.2.2.
Start Condition:
a. Contractual relationship between the Operator and the SM-DP+.
Procedure:
1. The Operator defines its different Profile types (identified by a [non-standardised]
Profile Description ID) which contains the Network Access Application like USIM,
file structure, data and applications, etc.
2. The SM-DP+ creates the Profile Descriptions based on the Operators input with
the corresponding Profile Description ID.
3. The SM-DP+ confirms the Profile Description definition e.g. by sending the
corresponding Profile Description ID.
Note: An Operator can define multiple Profile Descriptions with the SM-DP+
End Condition:
a. The Operator is able to order Protected Profile Packages based on Profile
Description IDs.
Start Condition:
a. IMSI, ICCID and other resources have been allocated by the Operator.
Procedure:
18. The Operator provides the IMSI, ICCID, type of credential to be created (e.g.
Milenage [11][12], TUAK [10] etc.) and other resources that MAY already be
allocated to the SM-DP+. It asks the SM-DP+ to securely generate and store a set
of Operator Credentials.
19. The SM-DP+ securely generates and stores a set of Operator Credentials based
on the Operator’s input with the corresponding IMSI, ICCID and other resources
provided.
20. The SM-DP+ confirms the generation of Operator Credentials and provides them
to the Operator.
This procedure MAY apply between the Profile Description definition, and the Contract
conclusion and Link Profile, depending on whether the Protected Profile Package is created
on demand or prepared in advance.
Start Conditions:
a. Profile Description definition
Procedure:
1. The Operator orders the Protected Profile Package generation by providing the
SM-DP+ with the Profile Description ID and some corresponding Operator input
data (credentials e.g. ICCID, IMSI).The Operator input data required for Protected
Profile Package generation (IMSI, ICCID, K/Ki, OTA Keys, PIN, PUK, etc.) is
either created by the Operator (and provided to the SM-DP+) or by the SM-DP+
(and provided to the Operator).
2. The SM-DP+ creates the Profile Packages.
3. The SM-DP+ creates the Protected Profile Packages.
4. The SM-DP+ stores the Protected Profile Packages (securely).
5. The SM-DP+ confirms the Protected Profile Package generation, and eventually
sends the additional Operator input data created by the SM-DP+.
6. The Operator registers the Operator data in the Operator systems like HLR/AuC
and BSS.
End Condition:
a. The ordered Protected Profile Packages are available at the SM-DP+. The
Operator is able to activate these Subscriptions and a Profile download can be
triggered upon binding to an EID.
• Activation Code with known EID: The EID is given by the Subscriber to the
Mobile Service Provider during the conclusion of the contract.
• Activation Code with unknown EID: The EID is not given by the Subscriber to
the Mobile Service Provider during the conclusion of the contract. The EID is only
provided to the SM-DP+ during the Profile download procedure and is given back
from the SM-DP+ to the Mobile Service Provider.
• Activation Code with EID provided to the Operator: The EID is not
immediately given by the Subscriber during the contract conclusion, but provided
in step two to the Mobile Service Provider.
The contract reference MAY be, but not necessarily, any Activation Code parameter (e.g.
token), ICCID or the IMSI.
In any case, the SM-DP+ SHALL be able to allocate and link a Profile to the corresponding
eUICC during the Profile download procedure.
Procedure:
Steps 1-12 in Figure 44: Contract conclusion with known EID
1. The Subscriber concludes a contract with the Mobile Service Provider and
provides the EID during this process.
2. to 5. Alternatively ‘ICCID allocation by Operator prior to Profile download
procedure’: The Operator allocates the Profile and sends the EID, IMSI and
ICCID to the SM-DP+. The SM-DP+ links the different parameters and
confirms this to the Operator.
6. to 10. Alternatively ‘ICCID allocation by SM-DP+ prior to Profile download
procedure’: The Operator sends the EID, the IMSI and the Profile Description
ID to the SM-DP+. The SM-DP+ allocates an ICCID to a corresponding
Profile, links the different parameters and confirms the allocated ICCID and
the link to the Operator.
11. to 12. The Mobile Service Provider confirms the contract conclusion to the
Subscriber with the corresponding information (contract reference).
End Condition:
a. The Subscriber has concluded a contract and a valid Subscription with the
Mobile Service Provider.
b. The SM-DP+ is informed about a future Profile download procedure request.
Procedure:
Steps 1-9 in Figure 45: Contract conclusion without EID
1. The Subscriber concludes a contract with the Mobile Service Provider without
knowledge of the target eUICC (EID).
2. Alternatively ‘ICCID allocation by Operator’: The Operator allocates the
Profile (ICCID)
3. to 5. Alternatively ‘ICCID allocation by SM-DP+’: The Operator sends the Profile
template (ID) to the SM-DP+. The SM-DP+ allocates a corresponding Profile
(ICCID) and sends the allocated ICCID to the Operator.
6. to 7. Alternatively ‘On-demand ICCID allocation by SM-DP+’: The operator sends
the Profile templates (IDs) allowed for this Activation Code. When the LPA
starts the Profile download process, the SM-DP+ will allocate the ICCID of the
most convenient Profile ID type for the Device and eUICC features.
8. to 9. The Mobile Service Provider confirms the contract conclusion to the Subscriber
with the corresponding information (contract reference).
End Condition:
a. The Subscriber has concluded a contract and a valid Subscription with the
Mobile Service Provider.
b. The SM-DP+ is informed about a future Profile download procedure request.
B.1.4.3 Activation Code with EID Provided to the Mobile Service Provider
Figure 46: Activation Code with EID Provided to the Mobile Service Provider
Procedure:
Steps 1-14 in Figure 46: Activation Code with EID provided to the Mobile Service
Provider
1. The Subscriber concludes a contract with the Mobile Service Provider without
knowledge of the target eUICC (EID).
2. Alternatively ‘ICCID allocation by Operator’: The Operator allocates the
Profile (ICCID)
3. to 5. Alternatively ‘ICCID allocation by SM-DP+’: The Operator sends the Profile
template (ID) to the SM-DP+. The SM-DP+ allocates a corresponding Profile
(ICCID) and sends the allocated ICCID to the Operator.
6. to 7. The Mobile Service Provider confirms the contract conclusion to the
Subscriber with the corresponding information (contract reference).
8. to 9. After the Subscriber has chosen the Device/eUICC, the EID is provided
together with the contract reference to the Mobile Service Provider.
10. to 12. The Operator requests the linking of the eUICC (EID) and Profile (ICCID) by
the SM-DP+. The SM-DP+ links the EID and the ICCID and confirms this to
the Operator.
13. to 14. The Mobile Service Provider confirms the linking of the EID to the
corresponding contract to the Subscriber.
End Condition:
a. The Subscriber has concluded a contract and a valid Subscription with the
Mobile Service Provider.
b. The SM-DP+ is informed about a future Profile download procedure request.
B.2 Profile preparation with dynamic interaction between the SM-DP+ and
the Operator
This section describes a process which might be used to prepare a Profile with dynamic
interaction between the SM-DP+ and the Operator through the ES2+ interface. This function
could be used by the SM-DP+ for activation decisions when conditions are required from the
Operator side.
The dynamic interaction is described in the following procedure:
Figure 47: Profile preparation with dynamic interaction between the SM-DP+ and the
operator
Procedure:
1. The Operator initialises an activation reference or request for its creation by the
SM-DP+, called MatchingID. This MatchingID may be optionally linked to a
specific EID and associated in addition to a Confirmation Code (CC).
2. The SM-DP+ acknowledges the generate order, and may send back a
MatchingID if not provided by the Operator during the initialisation phase.
3. The Mobile Service Provider is able to generate an Activation Code associated
to the MatchingID, and communicate it to the End User with in addition a
Confirmation Code if desired.
4. At some point of time, the End User requests the installation of a Profile based
on the Activation Code and eventually the Confirmation Code received from the
Mobile Service Provider.
5. Handle order Notification is used by the SM-DP+ for activation decisions when
conditions can’t be taken by the SM-DP+. EID, TAC, IMEI (if available), Eligibility
Check Information and MatchingID are transferred to the Operator and Mobile
Service Provider.
6. The Operator is able to select a particular ICCID and/or a Profile type, sent back
to the SM-DP+ through a DownloadOrder. Additional information elements may
be exchanged between the Operator and the SM-DP+ through the
DownloadOrder.
7. The SM-DP+ may respond with information elements to the Operator and Mobile
Service Provider.
8. The SM-DP+ selects the adequate Profile.
9. The Operator confirms the download order by calling the ConfirmOrder function
of the SM-DP+ with its relevant input data. MatchingID and ICCID are provided
back to the SM-DP+.
10. After the Operator performs a relevant operation on its back-end (e.g.
provisioning of HLR), the releaseProfile function is used to release the Profile in
order to allow the End User to start the download and installation procedure.
11. The SM-DP+ initialises the download of the Profile.
12. to 15. Different Notifications to the Operator and Mobile Service Provider of the
progress of a pending Profile download process may be provided at several
points.
Manual setup
Set / enable
No
(skip)
device access
code / ID? First Access to LPA
(no installed profiles)
Yes
Set
No Yes
device
Enable & Set LPA lock?
No
access (SC) for eUICC
(skip)
management?
Yes No
Device
Lock separately lock set?
No
from device (flag) Yes
lock?
Enter device PIN /
Yes (flag) code to confirm
Enter & confirm
SC PIN / ID
Code
correct? No
LPA lock
restricted / SC set Yes
SC inherited from
prior SC input
Notes:
SC: Strong Confirmation
Stop Device access code (PIN / ID) refers
to device unlock mechanism
Figure 48: Example Flow for Device & LPA Strong Confirmation Access PIN Setup /
Settings
Annex D [Void]
Security Model
The Security Model defines the trust relationships between all the active components of the
eUICC ecosystem with an LPA in the Device.
The figure below shows only the end-to-end logical links where cryptographic keys and
sensitive data are sent. The different links define the end-to-end trust relationship between
entities. We distinguish a hierarchy of seven trust links with link 1 being the most significant
and link 7 being the least significant.
If trust link 1 is broken, all trust links will be broken as a result. If trust link 2 is broken, trust
link 1 remains intact however all other Trusted Links are compromised or broken.
Provides eUICC
Certificate, EID,
reference to its
certification and EUM
to the Operator and
SM-DP+.
TL4 Trust placed in the ES2+ SM-DP+ Certificate Loss of Operator
activities for Profile ES8+ eUICC Certificate or trust on the SM-DP+
data transfer from the eligibility check and/or eUICC.
Operator via the SM- failure.
DP+ to the ISD-R on
the target eUICC.
TL8 Trust in the discovery ES11 LDS security or SM- LDS loss of trust on
process DS security. the SM-DS and vice
versa.
TL9 Trust in the discovery ES11 eUICC security or SM-DS loss of trust
process SM-DS security. on the eUICC and
vice versa.
TL10 Trust in the UI ESeu Device security Loss of trust on the
Device
Remote repair of
already issued
eUICCs: new CI public
key.
EUM TL1, TL2 Loss of SAS Loss of trust from the New SAS for the
certification. Operator and SM-DP+ EUM. Remote repair
on the EUM and its of already issued
eUICCs. eUICCs: new EUM
Certificate, new
eUICC Certificate.
SM-DP+ TL3, TL4, Loss of SAS Loss of trust from the New SAS for the SM-
TL5, TL7, certification. Operator, LPA, SM-DS DP+. New SM-DP+
TL8 and eUICC on the SM- Certificate.
DP+.
The signer is responsible for the revocation of the Certificates it has signed. This section
describes how the new Certificates are pushed to concerned entities according to the
security model.
For cases where the LPA is in the Device, the LPA integrity SHALL be guided by the
following Device classes:
Annex H [Void]
Annex I [Void]
PP-0084 Security IC
+IC Dedicated Software
Device
SoC
Integrated TRE
+Augmentation for
Remote Memory/Isolation
Note: IC Dedicated Software including its authentication by the TRE, is covered by BSI-CC-
PP-0084 [40] and is not required to be augmented by this annex.
Replay protection
IESFR16 The RMPF SHALL detect any replay attack on the Integrated TRE.
The Integrated eUICC SHALL be resistant to replay attacks on the data
IESFR17
stored in Remote Memory.
The Integrated eUICC SHALL be able to verify that the data received from
the Remote Memory is not unsolicited.
Note: Solicited data received from the Remote Memory is data that the
IESFR18
Integrated eUICC did intend to retrieve at runtime from Remote Memory
and/or retrieved data that the Integrated eUICC was able to verify according
to the requirements set in this Annex.
The RMPF SHALL NOT process data if it is unable to detect a replay attack.
Note: Such a situation may arise e.g. if the RMPF uses a counter to detect
IESFR19
replay attacks and the counter expired or became unreliable for any other
reason.
Test Interface
The Integrated eUICC Test Interface SHALL NOT affect the security
IESFR20
requirements defined in this annex.
The Integrated eUICC Test Interface SHALL be compatible with commonly
IESFR21
used interfaces for smartcard testing.
The End User starts the Device Change procedure on the old Device, inserting all the
needed informations to perform the change. After that, the End User configures the new
Device, preparing it for the Profile installation in the context of the Device Change. The
Profile is downloaded and installed in the new Device and the Mobile Service Provider may
perform the update of its backend system such as HSS/AuC and BSS with respect to the
Profile installed in the new Device. The Mobile Service Provider or the End User may delete
the Profile on the old Device.
The Profile downloaded and installed in the new Device can be a new Profile or the same
Profile previously downloaded in the old Device.
At the end of the Device Change procedure the End User has their new Device configured
with the Profile associated to the Subscription, and the old Device is no longer able to
access the mobile service provided by using the old Profile.
Once successfully installed onto the eUICC, the End User activates from the device settings
menu Profile #1 and Profile #2.
The End User is able to receive voice calls and text messages simultaneously (and within
the limits set by the Operational Modes as defined in GSMA TS.37 [48]) and has chosen
which mobile line will be providing the active mobile data connection to the Device.
Figure 54: High Level Diagram of Multi-SIM Device with two Enabled Profiles
The User decides to enable Profile #3. The device interface indicates to the User that
either Profile #1 or Profile #2 has to be disabled to allow this connectivity configuration
change.
The User selects Profile #1 for disabling.
The Device disables Profile #1. The Device enables Profile #3 on logical baseband A.
Figure 55: High Level Diagram of Multi-SIM Device with two Enabled Profiles
With this information, the Device will be able to schedule the eUICC OS update and to build
a consistent user experience to avoid service issues to the End User.
In addition to the above field use case, Device Manufacturers may also use the eUICC OS
update mechanism for refurbishment in production line or for repair center use cases. In
such cases, the Device Application will need the same information as those needed for a
field eUICC OS update. However this information may be used in a different way to take into
account the specifics of a production/repair center environment (e.g. no End User involved).
1. The Device is not notified about the exact timing of an Event Registration. Therefore,
the Device cannot contact the SM-DS right after an Event is registered. This may
lead to a significant delay on the timing between the Event Registration and the
Event Retrieval.
2. Some Root SM-DS may need to support billions of Devices in the field, thus suffering
from a significant computational overhead to perform a lot of mutual authentications
involving HSM. Each Device performs the full mutual authentication with the SM-DS
even if there is no Event that has been registered for that Device.
When the LDS receives a push notification, the Device performs the Event Retrieval
procedure with the SM-DS that sent the push notification. In this way, the Event Record can
be delivered to the Device as soon as the the Event is registered at the SM-DS.
Editorial - Removed yellow highlight from EUICC1 as per eSIMWG1 SGP.21 CR0010r2
eSIMWG1 SGP.21 CR0131R01 - Terms and Requirements for Device Change
eSIMWG1 SGP.21 CR0089r1 SM-DP+
Note: SMDP48 voided in CR, however requirement was not in SGP.21 V2.2 so no change has been made.
Other Information
Type Description
Document Owner Carmen Kwok
Editor / Company Carmen Kwok, GSMA
It is our intention to provide a quality product for your use. If you find any errors or omissions,
please contact us with your comments. You may notify us at prd@gsma.com