专利摘要:
method and system for the dynamic administration of subscriber devices in mobile networks. system and method for administering subscriber mobile devices, comprising: - a home network (400) of a first mobile network operator (mno1), in which data associated with at least one physical sim of a subscriber device with an embedded sim card (euicc), and - a destination network (300) from a second mobile network operator (mno2), which travels the device, obtaining static and dynamic data associated with at least one virtual sim (503, 603) of the device. the dynamic data comprises a subscriber authentication key (ki) and is obtained from a sim provider platform (500, 600) on which the destination network (300) is supported. the static data comprises imsi 1 msisdn identities and is stored in a common warehouse (202) of the destination network (300). For a virtual sim data, it is shown whether or not there is an association in a correlation table (106) of the first mobile network operator (mno1) between the static data from the common store (202) and the physical sim data. from the originating network (400).
公开号:BR102015032106A2
申请号:R102015032106-6
申请日:2015-12-21
公开日:2018-04-03
发明作者:Isabel Flores Cuadrado Ana;Antonia López Ajenjo María;Sobrino Jular Ana
申请人:Telefonica, S.A.;
IPC主号:
专利说明:

(54) Title: METHOD AND SYSTEM FOR THE DYNAMIC ADMINISTRATION OF SUBSCRIBER DEVICES IN MOBILE NETWORKS (51) Int. Cl .: H04W 12/04; H04W4 / 24; H04W 8/20; H04M 17/00 (52) CPC: H04W 12/04, H04W 4/24, H04W 8/205, H04M 17/103 (30) Unionist priority: 12/19/2014 EP 14382542.0 (73) Holder (s): TELEPHONE , SA
(72) Inventor (s): ANA ISABEL FLORES CUADRADO; MARÍAANTONIA LÓPEZ AJENJO; ANA SOBRINO JULAR (74) Attorney (s): MARIA PIA CARVALHO GUERRA (57) Abstract: METHOD AND SYSTEM FOR THE DYNAMIC ADMINISTRATION OF SUBSCRIBER DEVICES IN MOBILE NETWORKS. System and method for administering mobile subscriber devices, comprising: - a network (400) originating from a first mobile network operator (ΜΝΟ1), in which data associated with at least one physical SIM from a subscriber device with an embedded SIM card (eUICC), and - a destination network (300) from a second mobile network operator (ΜΝΟ2), which travels the device, obtaining static data and dynamic data associated with at least one virtual SIM (503, 603) of the device. The dynamic data comprises a subscriber authentication key (Ki) and is obtained from a SIM provider platform (500, 600), on which the destination network (300) is supported.
The static data comprises IMSI1 MSISDN identities and is stored in a common warehouse (202) of the target network (300). For a given virtual SIM, it is verified whether or not there is an association, in a table (106) of correlation of the first mobile network operator (ΜΝΟ1), between the static data from the common warehouse (202) and the data from the physical SIM P(...)
1/94
Descriptive report of invention patent for: METHOD AND SYSTEM FOR THE DYNAMIC ADMINISTRATION OF SUBSCRIBER DEVICES IN MOBILE NETWORKS.
[001] Description [002] Field of the invention [003] The present invention has its application within the telecommunications sector and, in particular, refers to the administration of subscription devices that comprise Subscription Identity Modules (SIM) or Universal Cards of Integrated Circuits (UICC), signatures whose credentials may belong to one or more originating networks, as well as to their Mobile network operators (MNO), and which can switch in roaming between the multiple mobile networks visited.
[004] Background of the invention [005] One of the main problems with M2M (Machine to Machine) devices (eg cars, cartels, counters, vending machines) is that when they are being manufactured, they are often endowed with SIM (Modules Subscription Identity Card) or UICC (Universal Integrated Circuit Cards), whose credentials belong to the MNOs (Mobile Network Operators) of the countries where they were built, or with which their manufacturers have agreements, and do not have to coincide with the MNOs of countries where they will be marketed. In addition, during the manufacturing process, devices are usually sealed; therefore, replacing SIMs afterwards is extremely difficult. When devices are finally activated by an end customer, SIM cards use the wrong credentials to connect to a different operator's network in Roaming, which makes the cost per use much higher than expected. And, in addition, it could include regulatory issues, given that the legislation of some countries does not allow M2M devices to connect permanently in Roaming.
[006] People with a mobile device (or with M2M devices such as electronic books), when traveling abroad, can experience
2/94 the same problem. When these travelers try to use the device with a SIM from an operator without service in the destination country, they must register on the network in Roaming mode, and pay for it more than the local tariffs.
[007] One of the problems we want to solve with this invention is how to avoid roaming charges without having to change the SIM the device is using. One solution to this problem is known as IMSI EXCHANGE (International Mobile Signature Identity). The IMSI EXCHANGE process allows you to exchange remotely, through OTA (over-the-air programming), the MNO credentials (IMSI, MSISDN (Digital Network of Integrated Mobile Station Services), etc.) and the Authentication Key on a roaming SIM , and enable the SIM to be registered on the network as if it were a local subscriber [as described in Telefónica y Giesecke & Devrient Team et al's “Personalization flexible by SIM M2M M2”, Press Release, 14 de November 2011]. However, Telefónica y Giesecke & Devrient's (G&D) solution for the EXCHANGE in “Personalization flexible by the M2M aire de los SIM” (G&D) does not consider the option to exchange MNO credentials that are not in the possession of another SIM provider different from G&D, or when the connectivity of management platforms used by the MNO at the destination is different from that of the MNO Jasper Wireless.
[008] On the other hand, the growth in the number of M2M devices in the coming years is expected to be exponential, and in the M2M market, and effective use should be made of the MSISDN / IMSI resource award, so that they can be used for EXCHANGE. It should be avoided that multiple IMSI or MSISDN are provided in the SIM or the systems, to be used eventually, due to the fact that this prevents them from being used for other purposes as long as.
[009] And effectively, in the M2M world (especially in the automotive sector) the trend is to try to achieve global connectivity solutions, where a certain provider rents connectivity in a region to an MNO
3/94 globally, regardless of where the device will be marketed. The MNO that wins the contract must reach agreements with other MNOs to provide connectivity in those countries where it has no reach. Since the solution must be global, the SIM provided in the devices must always be manufactured by the same provider as the SIM, and with credentials of a predefined MNO, since they will always be manufactured in one place. However, the SIM credentials must be exchanged at the destination, so that no Roaming charges are incurred.
[010] The problem with achieving a global solution (on both M2M and mobile devices) is that each MNO manages network connectivity and resources differently (including the effective administration and award of IMSI and MSISDN) and each MNO uses its own platform (with its own repositories), and that trust different SIM providers. To provide a global connectivity solution, MNO platforms must be integrated to enable the exchange of credentials and to monitor the use of SIMs and their consumption, and to bill the user after the exchange. In addition, given that the authentication keys used by the SIM to register on the network are an important part of the data sent to the SIM during the EXCHANGE, to provide a global solution, the platform that sends data to the SIM during the EXCHANGE must obtain, not only the new IMSI, but also the MNO credentials from the SIM provider that MNO trusts, and send all of this to the SIM in a secure manner.
[011] There are some options available to try to reduce additional costs for roaming on M2M devices or travelers. But none of these solves the problem of how to offer a global connectivity solution;
[012] An option for a user when traveling abroad is to purchase a plurality of additional prepaid SIMs, one for each territory the user visits. The user can replace the original SIM with a SIM suitable for the territory they are visiting. In this way, users can make and
4/94 receive calls or use data services without incurring additional roaming charges. This option is not valid for M2M devices (the UICC on M2M devices is not easily accessible or replaceable, as many M2M devices are located remotely, often hermetically sealed). And for users, this solution has many disadvantages (users must purchase and carry a plurality of different SIM cards. In addition, they must ensure that there is sufficient credit on each SIM card. Finally, when they change their SIM subscription, their number changes; this means that they are no longer accessible under their normal usage number).
[013] Another attempt in the prior art to address the roaming charge problem is multiple IMSI SIMs, which offer the ability to be pre-programmed with a plurality of mobile signature data sets (each of which comprises a IMSI and other network data). These SIMs have processing power and an algorithm to present the correct set of data to the phone, based on the location of that phone. This allows the phone to be presented as a 'local' subscription to the network in question. Many SIM systems with dual or multiple fixed-format IMSI have been sold by companies, such as VeriSign and Gemalto. In such systems, a software element runs on the SIM or handheld (portable), or on an electronic module separately, and makes decisions as to which IMSI to use, given the location and available networks. Such systems (sometimes called Smart SIMs), however, are generally relatively inflexible to changes in network availability over time (for example, a SIM card is usually pre-programmed with a fixed set of IMSI, and new SIMs must be issued if additional IMSI become available - similarly, for their disposal -). Another problem is that the SIM does not have enough knowledge of the network geography and the current commercial category to choose the best network or IMSI to use. Finally, in this solution, IMSI cannot be reused, e.g. eg if the
5/94 users have never used one or more IMSI from the preset set, this IMSI would never be available for use by another and, since the scope of IMSI is very limited, this situation could cause problems due to misuse of IMSI.
[014] An improved system was described in WO 2013/041849 A1, revealing an IMSI Agent adapted to provide the SIM with a portable mobile unit, new identities as needed, where each identity comprises an IMSI. The IMSI agent acts as a central server that changes the new identity used by the subscription based on its current location. The change occurs when a notification is received that informs you that the current subscription location has changed. The most suitable item on the list is chosen according to a set of predefined rules, such as user preferences, location or cost. The IMSI common fund contains a set of IMSI from different MNOs, operating in different countries. The new identity and new rules for choosing the best IMSI are communicated to the device using OTA commands. The SIM could also have a preloaded IMSI list. The SIM can choose to use a specific IMSI from the list of preloaded IMSI, by activating a rule. The mobile device also has a preset number of identities within the SIM. In this case, to choose a new identity, it will be selected from the set of those that are preloaded in the SIM. The choice will depend on parameters such as the type of terminal and other parameters specific to the terminal (such as the operating system, IMEI (International Mobile Equipment Identity), etc.), in addition to the SIM location. If a new identity that adapts to the specificities of the terminal cannot be chosen, then the agent will select the new IMSI identity from a database or common fund, following a set of rules or criteria. The new identity is then sent to the SIM card using OTA commands. The new identity will always be selected from those that offer the best conditions for the user. Although the IMSI agent described solves the problem of avoiding the cost
6/94 roaming, allowing the exchange of the IMSI used by the SIM for another that belongs to the MNO where the SIM is located, does not allow the provision of a global connectivity solution, since the system disclosed in WO 2013 / 041.849 A1 suffers a a number of problems, such as:
[015] Although the IMSI agent described solves the problem of having different IMSI available for EXCHANGE, using an IMSI list, or a common fund, WO 2013/041 849 A1 does not reveal when an IMSI is replaced , or if the IMSI is immediately returned to the common fund for immediate reuse, or if it remains blocked and can no longer be used. Nor does WO 2013/041849 A1 describe how to control when to return to the common fund for billing purposes. In the event that the SIM card does not continue to use IMSI after the identity change, and the IMSI is not returned to the common fund, it will remain blocked and cannot be used by another SIM, so that the resources will be underutilized. If the IMSI is returned to the pool or list immediately, it could be reused again almost immediately, which could cause a customer's billing failure, and among MNOs (who have to pay an MNO to another MNO to exchange using their resource network). For example, if the SIM uses IMSIx and, when it does not continue to use it, it is returned to the common fund. After a while, IMSIx is assigned to SIM2. When billing comes, as the SIM usage fees that MNOs get from their systems are recovered with a certain delay (in the coming months), it could happen that the consumption made by SIM1 has been billed from SIM2.
[016] Furthermore, WO 2013/041 849 A1 does not disclose how the pool is managed and how the MNO loads the IMSI in it, or how long the IMSI stays in the pool. Having a list of IMSI fixed for each MNO in a centralized common fund is a misuse of IMSI. MNOs belonging to IMSI should leave them blocked in the central pool to allow EXCHANGES, and I could not use them for other uses, such as awarding them to physical SIMs. This can cause IMSI to remain in the background
7/94 common for a long period of time without being used, neither for EXCHANGE. This same problem occurs if there is an IMSI set pre-loaded on the SIM. The most effective method would be one that would have an IMSI pool for each MNO and the pool would be self-administered, deciding whether they would like to add an IMSI to the pool, to make it available for EXCHANGE or to remove it from the pool common, so that it could be awarded to the physical SIM, according to the circumstances. This decision can be made based on the expected EXCHANGE forecast.
[017] Finally, the document WO 2013/041 849 A1 does not consider that some of the most important data that the SIM needs to be registered in a network successfully is the authentication key of the MNO (Signature Authentication Key, Ki). The Ki key must be sent to the SIM card during the EXCHANGE, in addition to the IMSI. In effect, authentication keys are not provided on a single platform, but are distributed among different SIM providers. Therefore, to enable the exchange of credentials on a SIM, the platform that sends the data to the SIM for EXCHANGE must obtain information about the new IMSI and, in addition, it must obtain the MNO credential data from the provider in this way. corresponding SIM card. The problem of how to obtain and exchange credentials between SIM providers and SIM is a complex problem, since it requires that the exchange be carried out in an extremely secure manner.
[018] The problem of how to exchange credentials for EXCHANGE between SIM providers and SIM can be solved by the GSMA architecture, shown in Figure 1. The vision of the GSMA (Global System for Mobile Membership) is the ability to provide credentials remotely operator over a SIM. The GSMA architecture is a common, secure, interoperable architecture that allows remote provisioning / re-provisioning over the air of network operator credentials and administration of the new SIM, while retaining the existing security levels provided by the traditional SIM . But this architecture is more focused on this aspect than others, which are necessary to provide a global connectivity solution, such as those that control when credentials are exchanged, and among which actors, or others, such as to allow the effective management of IMSI used for EXCHANGE, or how to invoice or obtain SIM consumption after EXCHANGE.
[019] In addition, work on M2M applications has given rise to the possibility of having a UICC that is embedded in a communication device in such a way that UICC is not easily accessible or replaceable (many M2M devices are located remotely, many hermetically sealed, and its location after sale is not known during production). The ability to exchange network signatures on such devices becomes problematic, thus making new methods necessary to securely and remotely provide access credentials on these Embedded UICCs (eUICC) and to manage signature exchanges from one MNO to another .
[020] Therefore, current solutions allow to reduce additional roaming costs on M2M or mobile devices, but there is a need in the state of the art for a method and system to provide global connectivity to M2M devices or mobile devices manufactured by the same vendor and sold in different countries, regardless of the country where the device will be marketed or used, and allow the end user to be charged according to local rates, regardless of the user's place of residence, and whether the MNO operates in that place or do not.
[021] Summary of the Invention [022] This Invention solves the problems mentioned above and overcomes the working limitations of the prior art explained, revealing a method and system that provide an architecture for:
[023] integrate different MNO platforms to allow the exchange of credentials associated with an MNO that is using a SIM to be registered on the network, to prevent the end user from paying for roaming;
9/94 [024] obtain MNO credentials (for use at the destination) of the corresponding SIM card and send all necessary data to the SIM in a protected and secure mode;
[025] obtain the information to be sent to the SIM for the EXCHANGE of different platforms (such as the IMSI to be used at the destination);
[026] allow reversing the previous credential exchange, as well as the reuse of previous credentials, enabling them for other uses after a while (eg, if the IMSI initially used by SIM is released and, therefore, will not be used by the same SIM after EXCHANGE); also control the IMSI initially dedicated to EXCHANGE at the destination so that they can be used for other purposes, during the time when they are not necessary for EXCHANGE;
[027] control the use, consumption and billing of SIMs, once the exchange has been made and check whether the billing is carried out correctly, in the event that a change of credentials must be reversed, or when multiple changes of credentials occur;
[028] monitor the exchange of credentials to be carried out according to the location of the end user and the commercial agreement signed by the MNOs, selecting the most advantageous, both for the provider and for the end user. [029] The invention has its application in the integration of several and different types of telecommunications networks, including MNO (Mobile Network Operator), MVNE (Mobile Virtual Network Enabler) that provides services to MNO and MVNO (Mobile Network Operator) Mobile Virtual Network). MVNO is a wireless service provider that does not have the wireless network infrastructure over which MVNO provides services to its customers, and therefore MVNO enters into an agreement with an MNO to obtain bulk access to services wholesale pricing network then independently sets retail prices and can employ the services of an MVNE or use its own customer service, its own billing support systems, and its own marketing and sales team sales.
10/94 [030] In the context of the invention, it is assumed that the MNO / MVNO / MVNE that won the provider's contract to provide SIMs to the user's device or mobile terminal, reached an agreement with another MVNO / MVNE / MNO for provide connectivity in countries where the first MNO / MVNO / MVNE has no reach. Each MNO / MVNO / MVNE manages connectivity and network resources using its own platforms (including the allocation of IMSI and MSISDN to SIM, billing, consumption, monitoring, such services are supported on each card, etc.), and rely on their own SIM providers to give them the Authentication Keys that must be included with each SIM to allow the SIM to use network services.
[031] This invention can be applied both to subscribers (travelers) with a mobile terminal as well as to those who use M2M devices (eg, cars, e-books, posters, meters, etc.) when they travel abroad.
[032] In the context of the invention, the following terminology is used in which the GSM standard is also used to describe the proposed method and system: [033] 'Roaming' refers to extending the connectivity of a service to a location that is different from a home location. When a mobile communications device, such as a mobile phone or an M2M device, travels outside the coverage area of its home operator - the 'territory' - the device can still access services using Roaming mechanisms / services. When a mobile phone or M2M device tries to connect to a network, which is not the originating / local network, the roaming object network communicates with the originating network in order to check whether the phone is authorized or not to use the roaming network. The roaming network operator can identify, from the IMSI number stored on the SIM card, that the user is not subscribing to the roaming network and, therefore, will have contact with the user's home network to verify that the user is authorized or not. This communication is possible because there are reciprocity agreements between many of the available network operators.
11/94 [034] GSM authentication is performed using a SIM inserted into the mobile communications device. This manages the connection to the network and contains the network subscription keys. There are two types of authentication, source authentication and roaming authentication. Origin authentication is simple and requires only a key exchange with the origin network to verify the identity of the subscriber. In the case where the communications device is connected to an external network, this process is more complex and is called roaming.
[035] The HLR (Home Location Record) is a central database that contains details of each mobile phone subscriber who is authorized to use a specific network. For each user registered on a specific cellular telecommunications network, there is a record maintained in that network's HLR. The HLR stores details of each Subscription Identity Module (SIM) card issued by the mobile operator (ie MNO, MVNO or MVNE).
[036] The Authentication Center (AUC) is a unit associated with an HLR and provides one or more Authentication trios for an authentication process when an MS (Mobile Station), which may be a mobile device or an M2M device attempts to register on the network. The trio consists of: user authentication request (random 128-bit RAND number); User authentication response (RES, 32-bit number); and a Kc session key (64-bit number). MS uses an encryption Ki key together with Kc for the encryption of the air interface. The trio parameters are thus generated, with the Ki key known in the MS on a SIM because the AUC needs an IMSI as an input to generate the trios.
[037] The UICC (Universal Integrated Circuits Card) is the smart card used in mobile terminals in GSM and UMTS networks. The UICC guarantees the integrity and security of all types of personal data, and usually houses a few hundred kilobytes. With the advent of more services, storage space will need to be more extensive. In a GSM network, the
12/94
UICC contains a SIM application and in a UMTS network, it is the USIM application.
[038] SIM (Subscription Identity Module) is a smart card with subscription data and data processing capabilities. It is a plastic card with built-in electronic circuits, which is inserted into the mobile phone or an M2M device. Each SIM is internally identified by its ICC-ID (Integrated Circuits Card Identifier). ICC-IDs are stored internally on the SIM card, but are also printed on plastic during the personalization process. Each SIM has a unique identifier called the International Mobile Signature Identity (IMSI), which is a primary key for each HLR record. IMSI are used on any mobile network that interconnects with other networks, including CDMA and EVDO networks, as well as GSM networks. The IMSI consists of a set of digits (Mobile Country Code (MCC), Mobile Network Code (MNC) and Mobile Station Identification Number (MSIN) within the network's customer base) that determine who owns the SIM and whether the SIM is using the roaming network or with local subscriptions. SIMs also comprise one or more MSISDN, which are the phone numbers used by mobile phones or M2M devices to make and receive calls, SMS or data packets. Each MSISDN is also a primary key for HLR registration. In short, there is a relationship between HLR, MSISDN, IMSI, ICCID and SIM. The SIM is the physical device that contains an IMSI record. The SIM is identified by the ICCID. The MSISDN is a unique number that identifies the Mobile phone. The IMSI is the unique identifier of the user who signs the network and the HLR is the system that correlates the MSISDN with the IMSI and vice versa. The MSISDN and IMSI identifiers are static data that are provided by the IMSI platforms and are static parts of a subscription. The IMSI / MSISDN pair is associated with only one logical HLR, and an embedded SIM card from a given SIM provider (eUICC). The IMSI EXCHANGE Process changes the MSISDN / IMSI pair that is associated with the built-in SIM card.
13/94 [039] An Integrated Integrated Circuits Universal Card (eUICC) is an embedded SIM, incorporated in a communication device in such a way that the UICC is not easily accessible or replaceable.
[040] Over-the-air programming (OTA) refers to the various methods of data distribution, new software updates and parametric configuration values, and including the update of encryption keys for devices such as cell phones or M2M devices, based on in communications between the mobile operator and the SIM located on the devices.
[041] A first aspect of the present invention relates to a method for administering subscription devices on mobile networks, which comprises the following steps:
[042] on a network originating from a first mobile network operator, obtaining data associated with at least one physical SIM from a subscription device comprising an embedded SIM card, subscription on the originating network;
[043] on a destination network of a second mobile network operator, which travels the subscription device, obtain data, which comprise static data and dynamic data associated with at least one virtual SIM of the device;
[044] obtain dynamic data from a SIM provider platform on which the target network relies, dynamic data comprising a signature authentication key;
[045] store the static data in at least one common warehouse on the destination network, the static data comprising IMSI and MSISDN identities;
[046] for a selected virtual SIM, check in a correlation table of the first mobile network operator if there is an association between the static data for the selected virtual SIM and the data of the physical SIM obtained in the source network.
[047] In a preferred embodiment, when a request for
14/94 an IMSI exchange from the source network to the destination network, in the case where there is no data association with the physical SIM in the correlation table, the present invention allows to obtain the static data of the selected virtual SIM from from the common warehouse of the destination network and associate in the correlation table the data of the selected virtual SIM, the static data obtained and the dynamic data obtained from the SIM provider, with the data of the physical SIM. In addition, the method further comprises;
[048] - eliminate the static data from the selected virtual SIM from the common warehouse of the destination network;
[049] - load the static data and dynamic data from the selected virtual SIM onto the embedded SIM card;
[050] - disable the physical data of the physical SIM on the embedded SIM card, while enabling the static data and dynamic data of the selected virtual SIM.
[051] These static and dynamic virtual data enabled from the selected virtual SIM, together with the physical SIM data, are then used to launch an IMSI exchange.
[052] In a possible realization of the invention, the association between the data of the physical SIM with the data (static and dynamic) of the selected virtual SIM can remain stored in the correlation table during a quarantine period, configurable by the first operator of a network mobile. [053] In a second aspect of the present invention, a system for the administration of subscription devices on mobile networks is disclosed. The system comprises a source network and a destination network, and comprises means for implementing the method described above.
[054] The process according to the previously described aspects of the invention has a number of advantages over the prior art, which can be summarized as follows:
[055] While existing solutions allow you to EXCHANGE credentials on a SIM and use them as if they were local credentials, some problems
15/94 important to enable global connectivity are not resolved. Rather, this invention provides global connectivity to M2M or mobile devices, defining how to obtain dynamic data that comprises the authentication keys that the SIM has to use in order to be registered on the network of a different SIM provider (and also how they are sent the authentication keys to the SIM during the EXCHANGE securely). Dynamic data is provided by a SIM provider and can be exchanged between the SIM provider and a different one, so that the provider's SIM card can be registered on another SIM provider's network.
[056] Furthermore, this invention reveals how to make effective use of IMSI, so that they cannot be blocked for EXCHANGE only.
[057] In addition, this invention allows for global connectivity, providing a system architecture responsible for controlling invoice generation, even after the EXCHANGE occurs (or when the EXCHANGE is reversed).
[058] In addition to interoperability, security aspects are considered in the present invention to integrate platforms from different MNOs and SIM providers, and to exchange information and orders, with the aim of allowing the exchange of SIM credentials and allowing the Source MNO is able to monitor SIM usage and consumption once the switch has been made. In such a way, the integration between different stakeholders is done using a secure environment where only valid data and orders provided by an authorized authority are exchanged.
[059] Furthermore, this invention proposes a process for the exchange of credentials and other data on the SIM, which can be carried out regardless of the type of card and regardless of the MNO platform or the SIM provider on which the MNO relies .
[060] These and other advantages will be evident in the light of the detailed description of the invention.
[061] Description of the drawings [062] In order to assist in understanding the characteristics of the invention, in
16/94 according to a preferred practical implementation of the same and in order to complement this description, the following Figures are adopted as an integral part of it, with an illustrative and not limiting character:
[063] Figure 1 shows a block diagram of the architecture of the GSMA system, as is known in the prior art.
[064] Figure 2 shows a block diagram of the system architecture for the dynamic administration of Signature Devices between Mobile Networks, according to a preferred embodiment of the invention.
[065] Figure 3 shows a message diagram of the communication flow between the mobile networks of the previous system, according to a preferred embodiment of the invention.
[066] Figure 4 shows a message diagram of the communication flow to prepare data from a physical SIM in the source network of the Mobile system illustrated in Figure 2, according to a preferred embodiment of the invention.
[067] Figure 5 shows a message diagram of the communication flow to prepare data from a virtual SIM in the mobile destination network of the system illustrated in Figure 2, according to a preferred embodiment of the invention.
[068] Figure 6 shows a message diagram of the communication flow to prepare the IMSI exchange between the mobile source network and the mobile destination network of the system illustrated in Figure 2, according to a preferred embodiment of the invention.
[069] Figure 7 shows a message diagram of the communication flow to prepare the request for the exchange of IMSI between the mobile source network and the mobile destination network of the system illustrated in Figure 2, according to a preferred embodiment of the Invention .
[070] Figure 8 shows a message diagram of the communication flow to obtain the profile of the mobile network operator from the SIM provider of the mobile network of the system illustrated in Figure 2, according to
17/94 a preferred embodiment of the invention.
[071] Figure 9 shows a message diagram of the communication flow to send EXCHANGE commands in the system illustrated in Figure 2, according to a preferred embodiment of the invention.
[072] Figure 10 shows a communication flow message diagram to obtain data from the use of a SIM during a billing cycle in the system illustrated in Figure 2, according to a preferred embodiment of the invention.
[073] Figure 11 shows a message diagram of the communication flow for billing in the system illustrated in Figure 2, according to a preferred embodiment of the Invention.
[074] Figure 12 shows a message diagram of the communication flow for the request for the IMSI back-EXCHANGE between the mobile networks of the system illustrated in Figure 2, according to a preferred embodiment of the invention.
[075] Figure 13 shows a message diagram of the communication flow between the mobile networks of the system illustrated in Figure 2, when a quarantine period expires, according to a preferred embodiment of the invention.
[076] Figure 14 shows a block diagram of the System architecture for the dynamic administration of Subscription Devices between Mobile Networks in a possible application network scenario, in which the operator of the mobile destination network relies only on its service provider. YES, according to a possible use case of the invention.
[077] Figure 15 shows a message diagram of the communication flow to obtain the profile of the mobile network operator from the SIM provider of the mobile destination network of the system illustrated in Figure 14, through an interface between secure drivers, according to a possible realization of the invention.
[078] Figure 16 shows a message flow message diagram
18/94 communication to obtain the profile of the mobile network operator from the SIM provider of the mobile destination network of the system illustrated in Figure 14, through an interface between the Safe Direction and Data Preparation modules, according to another possible realization of the invention.
[079] Figure 17 shows a message diagram of the communication flow to obtain the profile of the mobile network operator from the SIM provider of the mobile destination network of the system illustrated in Figure 14, through the interface between Data Preparation modules , according to another possible embodiment of the invention.
[080] Figure 18 shows a message diagram of the communication flow to obtain the profile of the mobile network operator from the SIM provider of the mobile destination network of the system illustrated in Figure 14, through the interface between the Data and Safe Direction, according to a possible additional realization of the invention.
[081] Figure 19 shows a block diagram of the System architecture for the dynamic administration of subscription devices between mobile networks in a possible application network scenario, in which the EXCHANGE is requested on a SIM not manufactured by the SIM provider. of the mobile source network according to a possible use case of the invention.
[082] Figure 20 shows a message diagram of the communication flow for the EXCHANGE request to a different SIM, not manufactured by the SIM provider of the mobile source network of the system illustrated in Figure 219, according to a possible realization of the invention.
[083] Figure 21 shows a message diagram of the communication flow to send EXCHANGE commands from a SIM provider other than the mobile destination network of the system illustrated in Figure 19, according to a possible embodiment of the invention.
[084] Figure 22 shows a message diagram of the communication flow to send EXCHANGE commands to a different SIM, not manufactured by the SIM provider of the mobile source network, from the network provider.
19/94 mobile origin of the system illustrated in Figure 19, according to another possible embodiment of the invention.
[085] Figure 23 shows a message diagram of the communication flow to send EXCHANGE commands to a different SIM, not manufactured by the SIM provider of the mobile network of the system illustrated in Figure 19, through an interface between the Secure Drivers, according to a possible further embodiment of the invention.
[086] Figure 24 shows a communication flow message diagram for the Retro-EXCHANGE request to a separate SIM, not manufactured by the SIM provider of the mobile network of the system illustrated in Figure 19, according to a possible carrying out the invention.
[087] Figure 25 shows a block diagram of the system architecture for the dynamic administration of subscription devices between mobile networks in a possible network scenario with multiple mobile target networks, according to another possible use case of the invention.
[088] Figure 26 shows a message diagram of the communication flow for the EXCHANGE request to a second mobile destination network while a first mobile destination network has an EXCHANGE active in the system illustrated in Figure 25, according to a possible carrying out the invention.
[089] Figure 27 shows a block diagram of the system architecture for the dynamic administration of subscription devices between mobile networks in a possible network scenario with multiple mobile target networks, in which the IMSI platform of the first target network mobile requests an EXCHANGE, according to another possible use case of the invention.
[090] Figure 28 shows a message diagram of the communication flow to prepare a physical SIM on the mobile source network when the IMSI platform of the first mobile destination network requests an EXCHANGE on the System of Figure 27, according to a possible carrying out the invention. [091] Figure 29 shows a message flow diagram
20/94 communication to prepare a virtual SIM in the first mobile destination network when the IMSI platform of the first mobile destination network requests an EXCHANGE in the System of Figure 27, according to another possible embodiment of the invention.
[092] Figure 30 shows a message diagram of the communication flow for the EXCHANGE request from the IMSI platform of the first mobile destination network of the system illustrated in Figure 27, according to a further embodiment of the invention.
[093] Figure 31 shows a message diagram of the communication flow to obtain data on the use of SIM during a billing cycle in the system illustrated in Figure 27, according to a preferred embodiment of the invention.
[094] Figure 32 shows a message diagram of the communication flow for billing in the system illustrated in Figure 27, according to a preferred embodiment of the Invention.
[095] Figure 33 shows a message diagram of the communication flow for the request for the IMSI back-EXCHANGE between the mobile networks of the system illustrated in Figure 27, according to a preferred embodiment of the invention.
[096] Figure 34 shows a message diagram of the communication flow between the mobile networks of the system illustrated in Figure 27, when a quarantine period expires, according to a preferred embodiment of the invention.
[097] Preferred mode of the invention [098] The issues defined in this detailed description are provided to assist in an exhaustive understanding of the invention. Consequently, ordinary persons skilled in the art will recognize that the variations, alterations and modifications of the modalities described in this specification can be made without departing from the scope and spirit of the invention. In addition, the description of well-known functions and elements is omitted, for greater
21/94 clarification and conciseness.
[099] Of course, the modalities of the invention can be implemented on a wide variety of architectural platforms, operating systems and servers, devices, systems or applications. Any architectural design or implementation in particular, presented in this specification, is provided for purposes of illustration and understanding only, and is not designed to limit aspects of the invention.
[100] Figure 1 presents the GSMA system architecture, which is a standard subscription management architecture, in which each Mobile Network Operator (MNO) can develop its solutions for remote personalization of its SIM based on the standard. This prior art solution comprises a SIM provided remotely between two operators that may have implemented fundamentally different technical approaches to personalize their SIMs, but based on the standard. The GSMA architecture for the remotely provided SIM has three main actors:
[101] - The Subscription Administrator (SM), who is responsible for the secure processes through which an MNO is able to personalize a SIM or eUICC embedded over the air. The SM generates the SIM profiles in real time, manages and executes the criteria of the mobile operator and ensures the forwarding of the profiles to the embedded SIM.
[102] - The Mobile Network Operator (MNO), which uses SM to manage profiles.
[103] - The embedded SIM card, which is an embedded SIM or an embedded UICC (eUICC), functionally identical to a traditional SIM card, but the embedded SIM, or UICC, may have an associated 'provision profile' in manufacturing with secret keys, which allows the associated subscription administrator to manage the 'operational profiles' on the card.
[104] In order to facilitate a secure and easy method of selecting and installing different mobile operator credentials, the Subscription Administrator (SM) includes two key network elements, which require certification to ensure
22/94 the encryption and secure transport of operator credentials:
[105] Preparation of Subscription Administrator Data (SM-DP): Entity that operators use to securely encrypt their operator credentials, ready for installation over the air within the SIM. The SM-DP securely encrypts the packages to be delivered in the eUICC. SM-DP manages the installation of these profiles in the eUICC.
[106] Secure Routing of the Subscription Administrator (SM-SR): Entity that securely delivers encrypted operator credentials to the SIM and then, once the credentials are installed, remotely administers the SIM in the following (enable, disable and delete credentials as needed during the life of the product). The SM-SR guarantees the safe transport of administration commands, both from the eUICC platform and from the eUICC profile, in order to load, enable, disable and delete profiles in the eUICC.
[107] In order to support eUICC remote provisioning, the following steps in the GSMA architecture, shown in Figure 1, are:
[108] Profile Ordering (ES2): This process covers the different aspects of the exchange of subscription details between a first Mobile Network Operator (MNO1) and the Preparation of Subscription Administrator Data (SM-DP). NO MNO1 provides an order to SM-DP. The order contains production data such as the specification of the MNO Profile, a quantity and an IMSI-Initial, a range of IMSI or a list of IMSI. Then, SM-DP starts production and creates the Profile together with specific data from the Profile, based on the MNO1 specification, combining the profile with specific data, including credentials and keys (which are created in a secure environment). SM-DP addresses the methods that guarantee a Profile created (from a generic Profile) that can be installed only on a specific embedded card (eUICC).
[109] Registration (ES1) in a Secure Routing of the Subscription Administrator (SM-SR): This is a prerequisite for remote administration. In this
23/94 step, the eUICC Manufacturer (EUM) sends a request to a selected SM-SR to register a newly manufactured embedded card (eUICC).
[110] Use of a SIM: In order for the device to be used for communication services, the eUICC must be loaded with at least one Operational Profile (the MNO profile used by default and designated during the manufacture of the SIM).
[111] When the SIM has a Profile enabled, ο MNO1 can use it (ES6) through an interface between eUICC and ο MNO1.
[112] Profile Download and Installation: To download and install a new profile for the eUICC data, ο MNO1 sends a Profile Download request to DP-SM (ES22). The request must include the relevant information to allow identification of the SM-SR and the eUICC. NO MNO1 can also ask SM-DP to enable the Profile once it is downloaded and installed. The SM-DP asks the SM-SR (ES31) to establish a secure transport channel between the eUICC and the SM-SR. This secure transport channel is for protecting Profiles management commands, not the Profile itself. SM-DP initiates the download and installation of the Profile for eUICC using a secure channel between SM-DP and eUICC (ES8), and within the secure transport channel established between SMSR and eUICC (ES5).
[113] Profile Enabling: Once a new profile has been downloaded in a given eUICC, it is possible to switch between two profiles. To do this, the new profile must be enabled, through SM-SR or through SM-DP, and the old one should be disabled. If the request is via SMSR (ES41), the request is sent directly by the MNO to the SM-SR associated with the destination eUICC. Thereafter, SM-SR verifies whether both the currently Enabled Profile and the destination Profile allow Profile switching to occur, and SM-SR issues a Profile Enabling request (ES52) to eUICC. When enabling a profile through the SM-DP (ES23), the request is sent by the MNO to the SM-DP, which sends it to the SM-SR (ES32) associated with the eUICC
Destination 24/94. In this way, the MNO does not have to be linked to the SM-SR and relies on the SM-DP to make the connection.
[114] Disabling Profile: This step allows the Enabled Profile to be disabled and a Proportional Profile to be enabled. Before switching a profile or enabling it, another profile must be disabled. In addition, before deleting a profile, it must be disabled. Profile Disabling can be performed through the SM-SR (ES42) or through the SM-DP (ES24). If the request is made via SM-SR (ES42), the request is sent directly by the MNO to the SMSR associated with the destination eUICC. After that, SM-SR checks whether the Enabled Profile allows the Profile to be disabled and checks whether the Provided Profile allows it to be enabled. As soon as the SM-SR issues a Profile disabling request to the eUICC (ES53), when disabling the profile through the SM-DP (ES24), the request is issued by the MNO to the SM-DP, which sends it to the SM-SR (ES33).
[115] Profile Deletion: The MNO decides that it will no longer use the Profile and decides to permanently delete a Profile in an eUICC. A Profile can only be deleted by its MNO. The deletion of profiles, such as the disabling of profiles, can be requested through SM-SR or SM-DP. If the request is through the SM-SR, the request is issued directly by the MNO to the SM-SR associated with the destination eUICC. If the Destination Profile is enabled, SM-SR initiates the Disable Profile method and sends the request to the eUICC. When disabling a profile using the SM-DP, the request is sent by the MNO to the SM-DP2, which sends it to the SM-SR.
[116] Changing SM-SR (ES7): in this step, someone decides to change the SMSR where an eUICC is registered, from the current - first - SM-SR to a second SM-SR (SM-SR2). Before the method is executed, MNOs with profiles installed on the affected eUICC can request to be informed about the change by the current SM-SR. During this process a new set of shared keys is established between the second SM-SR (SM-SR2) and the SIM, through the secure channel (ES8) provided by the first SM-SR. After this,
25/94 the second SM-SR (SM-SR2) can access the profiles on the SIM directly.
[117] It is within this context that various embodiments of the invention are now presented with reference to FIGs. 2 to 34.
[118] Figure 2 illustrates the global architecture for the integration between two telecommunication systems in different cellular networks: on the left, the originating or home network (400) of the first Mobile Network Operator (MNO1) is shown; on the right, the destination network (300) of the second Mobile Network operator (MNO2) is represented. The home network (400) is where the M2M device, or a traveler's mobile phone, is initially configured. Therefore, MNO1 credentials are initially pre-loaded on the SIM card. The destination network (300) is where the M2M device, or the traveler's mobile phone, will be moved. The MNO2 credentials will be provided dynamically on the SIM when it reaches its destination. After changing the credentials, the SIM should be registered at the destination as if it were a SIM that uses local credentials, and that avoids roaming charges.
[119] Although integration could occur between multiple and distinct types of telecommunication networks, including two or more MNO, MVNO and MVNE, in Figure 2 only two MNOs (MNO1, MNO2) are represented for simplicity.
[120] The MNO1 home network (400) comprises a Home Location Record or HLR (401), a billing module (402), a platform to manage IMSI (100), a physical SIM or a Virtual SIM (503) manufactured by a first SIM provider (ProvedorSIMI) and the platform of the first SIM provider (500).
[121] The MNO2 target network (300) comprises an Originating Location Record or HLR (301), a billing module (302), a platform for administering IMSI (200), a physical SIM or a Virtual SIM (603) manufactured by a second SIM provider (SIM Provider2) and the platform of the second SIM provider (600).
[122] The HLR (401, 301) is a central database that contains the
26/94 details of each mobile phone subscriber that is authorized to use its MNO network: MNO1 and MNO2, respectively.
[123] A physical SIM is a plastic card with built-in electronic circuits, which is inserted in the mobile phone or the M2M device. Each SIM has a unique identifier called an IMSI, which is a primary key for each HLR record. SIMs also comprise one or more MSISDN, which are the phone numbers used by mobile phones or M2M devices to make and receive calls, or SMS, or to transmit and receive data packets. Each MSISDN is also a primary key for HLR registration.
[124] SIM cards are usually ordered (1002, 2002) from specific manufacturers or card providers by MNOs. When SIMs are sent to MNO customers, they usually contain an IMSI by default and MNO credentials that requested their manufacture, which are used to connect to your cellular network (1010, 2010).
[125] SIM credentials contain an IMSI and a unique Ki key that is an individual subscriber authentication key, generated from your IMSI. The Ki key for subscriber authentication is dynamic data, generated on demand and based on IMSI. The IMSI and the key are stored on the physical SIM (1005, 2005) and loaded on the HLR (401, 301). The Ki key is used to authenticate whether an IMSI is authorized or not to use the MNO's network resources. Since the data needed to generate the Ki keys is very sensitive, not all SIM providers have access to the data needed to generate them, due to the fact that these dynamic data were provided only to SIM providers (1001, 2001) with which the MNOs signed an agreement.
[126] A Virtual SIM (503, 603) is a special type of SIM that contains specialized software that allows dynamic modification of the IMSI and the credentials used by the SIM to register on the network, avoiding roaming charges and allowing registration on the network as if it were a local subscription.
27/94
This process is known as EXCHANGE and must be carried out by a SIM provider platform (500, 600) that sends messages or requests to the Virtual SIM software, to execute specific commands.
[127] Both SIM provider platforms (500, 600) comprise: a Secure Routing or SR module (505, 605), a Data Preparation or DP module (502, 602), a platform (507, 607) OTA and two repositories: one of the repositories (501, 601), included in the Data Preparation module, which stores the data for the generation of MNO credentials and Ki keys; the other repository (513, 613) is used to store the keys to encrypt the communication exchanged between the SIM provider platforms (500, 600).
[128] The information that the platforms (500, 600) of SIM providers and the Virtual SIM exchange is especially sensitive, since it may include a new IMSI and Ki key that authorizes the registration (1010, 2010) in the destination network. Therefore, it is vital to encrypt all the information exchanged by the Virtual SIM and the SIM provider platforms (500, 600). The module in charge of encrypting information is the SR (505, 605) and the module in charge of generating the information to be transmitted to the Virtual SIM card by Secure Routing is DP (502, 602). Each communication between the SR and the DP must also be encrypted.
[129] For the communication between the SR and the Virtual SIM, some commands are sent using the OTA platform (507, 607). The OTA commands (1009, 2009) that the SR sends to the Virtual SIM include requests to load and delete the MNO signatures on the SIM, and to switch the active signature.
[130] As mentioned earlier, MNOs only suspend their sensitive data to only certain SIM providers with whom they have signed a contract. Therefore, it may happen that the platform (500) of the first SIM provider, in charge of launching the EXCHANGE in a first SIM, or SIM 1 (503), is not the same SIM provider in which the MNO2 network (300) trusts. , and who provided his credentials. Therefore, the SIM provider does not have all the dynamic data needed to generate MNO2 credentials
28/94 on the destination network (300). In this case, it is necessary for the information to exchange encrypted MNO profiles (010) between the SIM provider (500) platforms and the SIM provider (600). This information is encrypted using the key stored in the key repository (503, 603), where the data required to encode the information exchanged between SIM providers are stored. It may happen that the platform (500) of the SIM1 provider, having the infrastructure to make the EXCHANGE, needs to send commands to load and change signatures (603) on the SIMs, such as a second Virtual SIM, or Virtual SIM2, that have not been registered on the SIM provider's platform (500) and are registered on the SIM2 provider's platform (600). In this case, the SIM1 provider's platform (500) normally sends OTA commands to change the signatures (011) via the SIM2 provider (600), and the SIM2 provider's (600) platform is in charge of sending the corresponding commands to SIM2 Virtual (603).
[131] SIM providers can locate the SIMs to which the EXCHANGE is applied by their MSISDN, not by their IMSI. But given that the range of MSISDN available is limited, the relationship between IMSI and MSISDN is managed dynamically, and only by the IMSI platform (100, 200). Therefore, during the EXCHANGE process, the IMSI platform (100) must tell the SIM provider platform (400) of the SIM on which to perform the EXCHANGE, identifying the same with their MSISDN and IMSI, and the IMSI / MSISDN that SIM will use after EXCHANGE (1008). Some functions performed by the IMSI platform (100, 200) are: choosing which IMSI / MSISDN will be used on the destination network, to maintain a relationship between IMSI / MSISDN on the source and destination networks, billing the customer properly, loading the IMSI on IMSI platforms (100, 200) for EXCHANGE. But the IMSI platforms (100, 200) are also responsible for administering the consumption of SIM in the networks (400, 300) of origin and destination, respectively, and for billing consumption, to control the state of SIM in which the YES, to let go of a certain type of traffic or not, etc. And above all, one of the most important functions
29/94 by the IMSI platforms (100, 200) is the administration of MSISDN and the award of MSISDN to the SIM that will use them. In the M2M world, where the number of devices is high, the award of MSISDN to SIMs must be administered effectively, due to the fact that the range of MSISDN available is much smaller than the number of existing M2M devices. In these situations, IMSI platforms should be able to reassign the MSISDN / IMSI association to another SIM when the previous one will no longer be used. The MSISDN / IMSI pair are static data and are stored in a common warehouse (102, 202) on the IMSI platform.
[132] The IMSI platform of the MNO2 network, or the IMSI2 platform (200), is in charge of administering the IMSI network (300) of the MNO2, while the IMSI platform of the MNO1 network, or the IMSI1 platform ( 100) is in charge of managing the IMSI of the MNO1 network (400). It is assumed that the IMSI2 platform (200) does not have the necessary infrastructure to launch the EXCHANGE and, therefore, only has a common MSISDN2 / IMSI2 warehouse (202) and a SIM2 repository (203). In addition, the IMSI1 platform (100) has all the necessary infrastructure to launch the EXCHANGE. It also has a common warehouse for MSISDN1 / IMSI1 (102), a repository (103) for SIM1, a correlation table between MNOs (107) and a correlation table between the data that SIMs used in the source network and the network (106) of destination, and a module to control under what circumstances the EXCHANGE should be launched (105).
[133] When an MNO asks a SIM provider to manufacture some SIMs, it provides some parameters (1002, 2002), such as IMSI, etc., When SIMs are manufactured and sent to the MNO, the SIM provider generates a file with the association between IMSI and IDICC (International Circuit Card Identifier) designated by the manufacturer. This file is loaded (1003, 2003) by the networks (400,300) of MNO1 and ο MNO2 on each platform (100,200) of the IMSI, and stored in the SIM Inventory (103, 203) of each of the platforms (100, 200) of the IMSI, respectively.
30/94 [134] Before you can use SIMs, an MSISDN (1004, 2004) must be assigned to a SIM and loaded into the HLR (1005, 2005). The relationship between MSISDN, IMSI and the SIM card identification number, or IDICC, is established by the IMSI platform (100, 200), and stored in the SIM inventory (103, 102). The networks (400, 300) of MNO1 and MNO2 can have a preview of the set of IMSI / MSISDN not awarded to any SIM, to load on the IMSI platform and to store in their respective common warehouses, the common warehouse (102) of MNO1 and the common warehouse2 (202) of MNO2, respectively. MSISDN / IMSI not associated with any SIM can be used in the future for the target IMSI platform, which can choose an MSISDN / IMSI during EXCHANGE, but can also be chosen to be assigned to physical SIMs that do not have this information yet .
[135] When ο MNO1 requests an EXCHANGE (1005), the IMSI1 platform (100) launches a request to the IMSI2 platform (200), to request a new unused IMSI / MSISDN (006). The IMSI2 platform (200) obtains an available IMSI / MSISDN from its common warehouse2 (202) and removes it from the common warehouse2 (202), so that it cannot be used again. In the event that the EXCHANGE was launched by MNO2 (300) and IMSI2 platform (200), IMSI1 platform (100) would choose an IMSI / MSISDN available in its common warehouse (102). When the IMSI1 (100) platform receives the selected IMSI / MSISDN, it stores the relationship between the SIM data on the MNO1 (400) network, mentioned here as IMSI1 / MSISDN 1, and on the MNO2 (300) destination network, mentioned here as IMSI2 / MSISDN2, in the table (106) of platform correlation (100) of IMSI1. Then the IMSI1 platform (100) launches the EXCHANGE request (1008) to the SIM provider's platform (500), in order to send the information to the provider's Virtual SIM or Virtual SIM1 (503), by OTA commands (1009) .
[136] If the EXCHANGE is successful, the IMSI platform (100) is informed by the SIM1 provider's platform (500) about the success of the operation, and the IMSI1 platform also reports (007) to the IMSI2 platform
31/94 (200), to start monitoring the consumption (503) of the Virtual SIM in the network (300) of the MNO2.
[137] But the EXCHANGE cannot be launched for any MNO. Before an EXCHANGE can be launched, a contract must have been signed between ο MNO1 and ο MNO2, and an agreement has been reached on how MNO1 customer consumption will be billed on MNO2 network (300), and when MNO2 will be paid ο MNO1 for using the service. In table (107) of MNO correlations, ο MNO1 stores the list of countries in which ο MNO1 has signed an agreement with some MNO2, and the list of MNO2 with which it has been signed. In addition, ο MNO1 (400) can configure under which circumstances the EXCHANGE will be launched, and according to which agreement, in the EXCHANGE Rules table (105). The EXCHANGE can be launched manually (1005), or automatically, when one of the conditions of the set of rules in table (105) of EXCHANGE Rules is fulfilled. This table is used to configure if the EXCHANGE will be launched, for example, when the SIM is registered in the network of a given MNO, if the destination is known, or when a period of time has come to an end, if it is known that it will take some time that the SIM reaches its destination, or if the EXCHANGE is launched when the SIM registers in the network of one MNO and not in another, when the SIM reaches a certain country.
[138] In addition, the relationship between the SIM data used in the source network (400) and the destination network (300) is stored for billing purposes in the correlation table (106). This data association is also used in case of a request for a back-EXCHANGE, when the SIM returns to the country of origin. In a retro-EXCHANGE request, the Virtual SIM credentials will change again, so that Virtual SIM (503) can register on the MNO1 network with its old credentials and IMS11.
[139] The relationship between IMSI1 and IMSI2 remains in the correlation table (106) for a certain time, called the quarantine period. During this time, after a back-EXCHANGE, if there is an EXCHANGE request to change the Virtual SIM credentials (503) by the MNO2 credentials
32/94 (300), it is also not necessary to request a new IMSI2 / MSISDN2 from the IMSI2 platform (200), but the relationship in the correlation table (106) can be reused.
[140] The quarantine period is a prefixed period, during which the IMSI of both source and destination networks (400, 300) are blocked and cannot be reused for other purposes. During quarantine, although, for example, a virtual SIM1 back-EXCHANGE (503) was performed with IMSI1, and IMSI2 was not used by any SIM to connect to the MNO2 network, IMSI2 is blocked , since during the quarantine period the IMSI2 platform (200) and the MNO2 billing system (302) can collect any consumption from IMSI2 from previous months, which must be associated with the IMS11 currently used by the Virtual SIM1 card.
[141] After the quarantine period, the IMSI relationship is removed from the correlation table (106). In the event that a back-EXCHANGE request has been made, IMSI2 is returned to the common warehouse2 (202) and deleted from HLR2 (301) (2006), and can be reused again for the IMSI2 platform (202). If there has been no back-EXCHANGE request, and the quarantine period is over, it is assumed that there will no longer be a back-EXCHANGE and that Virtual SIM1 (503) will remain on the MNO2 operator's network indefinitely, whereby IMSI1 can be reused on the IMSI1 platform (100), and will be returned to the common warehouse (102) and will be deleted (1006) from HLR1 (401). In this case, if a retro-EXCHANGE is requested after the quarantine period has expired, the request is treated as a new EXCHANGE request, and the IMSI from the MNO1 network (400), associated after the EXCHANGE, will not necessarily be the same that initially had the SIM in its network (400) of origin.
[142] In addition, if ο MNO2 wants to launch an EXCHANGE or a retro-EXCHANGE request (2005), the IMSI2 platform (200) would not be able to do this directly, as it does not have the necessary infrastructure, but would redirect the request (007 ) to the IMSI1 platform (100) which is in charge of
33/94 orchestrate the request.
[143] Finally, if during the EXCHANGE, the network (300) of destination of the MNO2 or the network (400) of origin of the MNO1 wants to see the use of services performed by the SIM in the network of other MNOs, according to which the YES whether in EXCHANGE or not, a request is redirected to its own IMSI platform (1020, 2020) to obtain consumption data from its own platform, or the request (020) is redirected to another IMSI platform from others MNO where the SIM is currently registered.
[144] A similar flow for billing is followed, if during EXCHANGE, the MNO1 Billing system (402) or the MNO2 Billing system (302) wants to get a SIM billing, if a request is redirected to the platform (1020, 2020) of the IMSI that receives the invoice for the SIM (1030, 2030) during the period in which the SIM is not in EXCHANGE and / or if the request (030) is redirected to the billing system of an MNO where the SIM is currently registered in order to obtain billing data from its own IMSI platform, or from an external system such as MSC (Mobile Switching Center), SMSC (Short Message Service Center), etc.
[145] Figure 3 details the main steps in the general case process for managing subscriber devices between ο MNO1 and ο MNO2, following the same nomenclature as in Figure 2 and assuming that the source network (400) of MNO1 makes the request of EXCHANGE through the platform (100) of the IMSI1 and the platform (500) of the SIM provider. EXCHANGE is done on Virtual SIM1 (503) and the destination network (300) of MNO2 trusts SIM provider 1; therefore, its platform, the SIM provider's platform (500), already has the MNO2 credentials and therefore no data exchange is required between the SIM provider's platform (500) and the provider's platform2 (600). YES. The left side of Figure 3 shows the following steps during the IMSI EXCHANGE process for the MNO1 platforms on the source network (400) and the right side of Figure 3 shows the following steps for the MNO2 platforms on the destination network (300) . These general steps in the process are;
34/94 [146] Initial Stage (31a, 31b): The data initially assigned to the Virtual SIM1 (503) and which allows the SIM to be used on the MNO1's source network (400) is loaded (31a) on the platform (100 ) of IMSI1. In parallel, on the MNO2 target network (300), some IMSI / MSISDN not associated with any SIM on the MNO2 network are loaded (31b) on the IMSI2 platform (200). These IMSI / MSISDN will be assigned to the SIM during the EXCHANGE, so that this SIM can connect to the MNO2 network (300). These steps (31a, 31b) for preparing IMSI1 and IMSI2, respectively, on the MNO1 IMSI1 platform (100) and the MNO2 IMSI2 platform (200) are further described in Figures 4 and 5, respectively.
[147] EXCHANGE preparation stage (32): The parameters needed to launch the EXCHANGE are configured on the IMSI1 platform (100), for example, under what circumstances the EXCHANGE will be carried out and what MNO may imply. These settings must be notified and accepted by the destination of the MNO2, so that the IMSI2 platform (200) can be informed about this to establish an agreement. This EXCHANGE Preparation Stage (32) is described in greater detail in Figure 6 and simultaneously involves both IMSI platforms (100, 200).
[148] Step (33) of using SIM1 in the MNO1 source network (400): Before the EXCHANGE1, Virtual SIM1 (503) can be used normally in the MNO1 network (400). This process is not further detailed in depth, as it is not relevant to the present description of the invention.
[149] EXCHANGE request step (34): The traveler or the M2M device containing a SIM1 travels to the MNO2 network (300). The SIM is registered in the MNO2 destination network (300). An EXCHANGE operation is launched manually by the source network (400), or automatically by the MNO1 IMS11 platform (100) when the EXCHANGE Rules module (105) is activated. The IMSI1 platform (100) initiates a dialogue (34) with the IMSI2 platform (200) to obtain the IMSI / MSISDN that SIM will use on the destination network (300). It also initiates a dialogue (34a) with the SIM1 provider's platform (500) to obtain
35/94 the profile of the MN02 and (34b) launch the EXCHANGE by OTA commands. EXCHANGE Request Step (34) is described in more detail in Figure 7 and involves both IMSI platforms (100, 200) simultaneously. In order to be able to perform the EXCHANGE, in addition to obtaining the IMSI and MSISDN that the SIM will use on the MNO2 network (300), the MNO2 credentials must also be obtained. In this case, the SIM provider's platform (500) can obtain data from its own platform, explained in more detail in Figure 8. Soon all information, MNO2 credentials, MSISDN2 and IMSI2 are sent using OTA commands to the Virtual SIM1 (503), as further described in Figure 9, through the platform (500) of the SIM provider. After that, the Virtual SIM1 can be successfully registered and attached (34c) to the MNO2 network (300).
[150] Step (35) of using SIM1 on the MNO2 destination network (300): After the EXCHANGE, the Virtual SIM1 (503) can be used on the MNO2 destination network (300) without being charged for roaming. This process is not further detailed in depth, as it is not relevant to the present description of the invention.
[151] SIM data acquisition step (36): During the time that the traveler or M2M device is on the target network (300) of the MNO2, the traveler or owner of the M2M device can access their data consumption, described further in detail in Figure 10. This implies a set of interactions between the IMSI1 platform (100) and the IMSI2 platform (200) to obtain SIM1 consumption data on the destination network (300) and on the network (400) of origin, and to calculate the actual consumption of the device before, during and after the EXCHANGE, and to show the data to the user.
[152] Billing step (37): During the time that the traveler or the M2M device is on the MNO2 network (300), the traveler or the owner of the M2M device can access their invoices, described further in detail in the Figure 11. This implies a set of interactions between the IMSI1 platform (100), the IMSI2 platform (200) and the Billing system.
36/94
ΜΝ01 (402) and the MNO2 Billing system (302), to obtain SIM1 billing data, both in the destination network (300) and in the origin network (400), in order to calculate the effective cost of the device before, during and after the EXCHANGE, and to show the data to the user.
[153] Retro-EXCHANGE request step (38): At a certain point, the traveler or the M2M device containing a SIM1 returns and registers with the MNO1 network (400). An operation to reverse the EXCHANGE is launched manually by MNO1 (400), or automatically by the IMSI1 platform (100), when an EXCHANGE Rule (105) is activated. The IMSI1 platform (100) initiates a dialogue with the IMSI2 platform (200) and the SIM1 provider's platform (500), to launch the retro-EXCHANGE, or to reverse the EXCHANGE (38 '). This process is described in more detail in Figure 12 and involves both IMSI platforms (100, 200) simultaneously. To be able to perform the back-EXCHANGE, in addition to obtaining the IMSI and MSISDN that the SIM will use on the MNO1 network (400), the MNO1 credentials must also be obtained (38a). In this case, the SIM provider's platform can obtain data from its own platform, explained in more detail in Figure 8. Therefore, all information, MNO1 credentials, MSISDN1 and IMSI1, is sent using OTA commands (38b ) to Virtual SIM1 (503), as also described in Figure 9, through the platform (500) of the SIM provider. After that, the Virtual SIM1 can be registered and attached to the MNO1 network (400) successfully (38c).
[154] Quarantine period verification step (39): When the quarantine period has passed, IMSI1 platform (100) lets IMSI2 platform (200) know about it, as described in detail in Figure 13. If a request to reverse the EXCHANGE has not occurred, the EXCHANGE is considered permanent, and it is assumed that the Virtual SIM1 (503) remains indefinitely on the MNO2 network (300), whereby SIM MSISDN1 / IMSI1 will no longer be used in network (400) of origin, and MSISDN1 / IMSI1 can be returned to the common warehouse of MNO1, common warehouse (102), in order to be reused (39a). In addition, when the
37/94 quarantine, if there was a back-EXCHANGE request, no more SIM1 consumption will arrive on the MNO2 network (300) and, therefore, the MSISDN2 / IMSI2 of the SIM used on the destination network (300) can be returned to the common warehouse of MNO2, common warehouse2 (202), in order to be reused (39b). When the quarantine period expires, if there is an EXCHANGE or back-EXCHANGE request, it will not be possible to recover the same IMS11 / IMSI2 relationship used initially, so a new EXCHANGE sequence has to start.
[155] The steps for Virtual SIM1 (503) to be used on the MNO1 network (400) are described in Figure 4. Before the process can begin, a contract must be signed between ο MNO1 (400) and the provider (500) of SIM, to manufacture the SIM. At that moment, ο MNO1 provides (4A) the necessary data for the generation of the Ki keys and the MNO1 profile to the SIM provider (500). Ki keys allow SIMs to authenticate and be authorized to use the MNO1 network (400). These data are usually stored in a module of the platform (500) of the SIM provider, called Data Preparation (502). After a while, ο MNO1 from (4B) to the SIM provider (500) an order to manufacture some SIMs with certain characteristics and a specific range of IMSI. During the manufacturing process (4C), the signature data, IMSI, Ki, etc., which allow the SIM to attach to the MNO1 network (300), are stored on the SIM. Two encryption keys, the storage chavel, or SK1, and the SIMIMI key, are stored on the SIM anyway. SK1 is a key used to encrypt all data exchanged between the SP1 and DP1 modules of the SIM provider's platform (500). This storage key is unique, generated for each MNO. There is another, ChaveMestral, which is a SIM provider key (500), used to generate the SIMIMI Key. SIMSkey is a personalized key for each SIM and is generated from some of the data that uniquely identifies a SIM, such as IMSI. The ChaveSIMI is used to encrypt all communication between the Virtual SIM1 (503) and the provider's platform (500)
38/94
YES. Using this key, the SIM can verify that all data and orders are actually sent by the SIM provider (500), which is the one who manufactured it.
[156] Unlike the static data (IMSI / MSISDN) that cannot be exchanged between a SIM provider and a different one, but stored in the SIM provider's common warehouse on the source network, the SK, KEY and KEY keys are given dynamic, since they are exchanged between SIM providers (instead of being stored in a common warehouse). Unlike the subscriber authentication Ki key, which is generated on demand, the Storage Key, SK, and Chavemestra are generated respectively for an MNO and a SIM provider, regardless of the SIM card. SIMKey and Ki depend on IMSI.
[157] Once SIMs are manufactured, the SIM provider returns a file (4D) that contains the relationship between IDICC and IMSI, among other things, to MNO1 (400). This file is loaded (4E) on the IMSI1 platform (100) by MNO1 (400) and the data is stored in the SIM Inventory (103). Before SIMs can be used, they must have an MSISDN. To this end, the MNO loads a file with the association between MSISDN1 and IMSI1 (4F) on the IMSI1 platform (100). Associations between MSISDN1 and IMSI1 are also stored in SIM inventory (103). Therefore, the IMSI1 platform (100) proves (4G) whether the data corresponds to physical SIM or not. It proves it due to the fact that the process to provide IMSI / MSISDN for EXCHANGE to the platform is very similar to the one shown in Figure 5. If the data correspond to physical SIM, the IMSI1 platform (4H) load the SIM data (Ki and IMSI / MSISDN keys) in the HLR (401) of MNO1. From that moment on, the Virtual SIM1 card will be authorized to use the MNO1 network. If the IMSI1 / MSISDN1 data does not correspond (4J) to any physical SIM, they are stored in the common warehouse (102), so that they can be used during EXCHANGE.
[158] Figure 5 describes the steps required to load IMSI2 /
39/94
MSISDN2 on the IMSI2 platform (200). IMSI2 / MSISDN2 will be used by Virtual SIM1 (503) to attach to the network (300) of MNO2, the destination network, once the EXCHANGE has been carried out. Before the process can begin, a contract must be signed between ο MNO2 and a SIM provider to manufacture the SIM. The process starts when the MNO2 network (300) provides the necessary data for the generation of the Ki keys and the MNO2 profile to a SIM provider. Ki Keys allow SIMs to authenticate and be authorized to use the MNO2 network (300). If ο MNO2 (300) signed a contract with the SIM provider (500), ο MNO2 provides the MNO2 data (5A) to the SIM provider (500); otherwise, if ο MNO2 (300) signed a contract with SIM2 provider2 (600), ο MNO2 provides the data (5A ’) to SIM2 provider (600). In the general case, the contract is assumed to have been signed between ο MNO2 (300) and the SIM provider (500), and then flow 5A is followed. In other cases, such as those shown in Figures 14 and 19, the contract will be signed with SIM2 provider2 (600) and therefore flow 5A 'is valid. When some time has passed, and ο MNO2 and the other MNOs signed an agreement for the SIM EXCHANGE, the MNO2 network (300) loads a file (5B) with the association between IMSI2 and MSISDN2 on the platform (200) of the IMSI2. The IMSI2 platform (200) notes that the data does not correspond to physical SIM (5C), since its data has not yet been stored in the SIM Inventory2 (203) and therefore the IMSI2 platform (200) has stored the data ( 5D) in the common warehouse2 (202) so that they can be used during EXCHANGE.
[159] Figure 6 illustrates the steps required to launch an EXCHANGE between the IMSI1 platform (100) of the MNO1 source network (400) and the IMSI2 platform (200) of the MNO2 target network (300). Once MNO1 and ο MNO2 have signed an agreement to allow EXCHANGE, both MNO1 and ο MNO2 have to determine under what circumstances the EXCHANGE can be launched (6A, 6B) on their respective IMSI1 platform (100) and platform (200) of IMSI2. For example, ο MNO1 and ο MNO2 can configure the tariff to
40/94 apply, to which services are able to access SIMs (voice, SMS and / or data packets), etc., SIMs usually have access to the same services on the source (400) or home network, and the destination network (300), but the fare is usually different. The tariff will depend on the agreements reached by MNO1 and ο MNO2 to bill the customer, and the service cost between ο MNO1 and ο MNO2. After finishing the individual configurations on each IMSI platform, the IMSI1 platform (100) launches a request (6C) for the correlation with the IMSI2 platform (200), which must be accepted (6D) by this platform (200) of the IMSI2. With flow 6C, the IMS11 platform (100) is authenticating itself, and some encryption credentials and keys, to encrypt communications between platforms, can be sent, so that the IMSI2 platform (200) can recognize and validate this correlation. In this way, the IMSI2 platform (200) only accepts requests from the IMS11 platform (100) that are authenticated in a certain way. In flow 6D, the IMSI2 platform (200) also authenticates itself with its response, so that the IMSI1 platform (100) can recognize the responses from the IMSI2 platform (200). When the IMSI1 platform (100) receives a positive confirmation (6D) for the correlation, the IMS11 platform (100) stores a relationship in the MNO correlation table (107) (6E). This list will serve the IMSI platform (100, 200) to know which platform sends requests to which, according to which MNO is the destination network. In addition, ο MNO1 also configures on the platform (500) of the SIM provider which agreements between the MNOs were reached for the EXCHANGE (6F). The platform (500) of the SIM provider proves if it is the provider of the SIM of the MNO2 and, therefore, already has the data to generate the credentials or the profile of the MNO2 (6G). In the event that the SIM provider's platform (500) has no data for generating the MNO2 profile or credentials, contact the SIM provider that has this data, in this example, the provider2 (600), and makes a request for your keys to exchange information safely (6H). Both provider platforms
41/94 SIM, SIM provider (500) and SIM provider2 (600), exchange keys (61) to encrypt information and to exchange it safely. No information on MNO credentials and Ki keys is exchanged, as this information is customized for each SIM and depends on the SIM parameters. In Flow 61, SIM providers' platforms exchange the Platform Storage key, SK1, and the Platform2 Storage key, SK2. SK1 is used to encrypt all information exchanged between DP1 (502) and SR1 (505), and SK2 is used to encrypt all information exchanged between DP2 (602) and SR2 (605). In flow 6I, the SIM providers' platforms, the SIM provider (500) and the SIM provider2 (600), also exchange the ChaveMestral key, MK1, from the platform, and the ChaveMestra2 key, MK2, from platform2. The MasterKey is used to generate the SIMKey, and the Master Key is used to generate the SIMKey2. The ChaveSIM key is generated individually for each SIM, using the Master key from your IMSI, and is used to encrypt all the information exchanged between the SIM and the SR1 (505), by the ChaveSIMI key, and to encrypt all the information exchanged between SIM and SR2 (605) using the SIMS2 key. Flows H and I are not necessary in the general case, shown in Figure 3, where the SIM1 provider (500) has both profiles of the two operators, ο MNO1 (400) and ο MNO2 (300), but are necessary in some cases , such as the use cases shown in Figures 14 and 19. Finally, if the EXCHANGE is launched automatically, the MNO of the source network (400) is configured on the IMSI1 platform (100) under which circumstances the EXCHANGE will occur. For example, you can configure whether the rule for EXCHANGE is activated when the SIM is attached to the network in one country and not another, or when a certain period of time has elapsed, etc.
[160] Figure 7 illustrates the steps to request an EXCHANGE on Virtual SIM1 (503). To perform an EXCHANGE, the MNO profile in which the SIM is located must be loaded into the SIM. An EXCHANGE process cannot be carried out if there has been a previous and successful EXCHANGE request, and the corresponding Retro-EXCHANGE operation has not been carried out, as shown in
42/94
Figure 12. It is possible to launch two EXCHANGE requests consecutively, with a back-EXCHANGE in the middle, however. This case is explained in the case of multiple destinations, shown in Figure 25. The EXCHANGE process can be activated manually, or automatically by the IMSI1 platform (100). It is automatically launched when one of the EXCHANGE Rules (105) is satisfied and when, for example, the SIM is registered in a country or MNO that matches an entry in this table, or when the time period defined in one of the rules has reached your end. The EXCHANGE request starts when ο MNO1 (400) launches an EXCHANGE request to the IMSI1 platform (100). The IMS11 platform (100) checks whether or not a previous EXCHANGE request has been made with the same parameters and, if so, tries to retrieve the IMSI2 / MSISDN2 data that SIM used before correlation table (106) (7A ). It also uses this same table and the MNO correlation table (107) to find on the network that the MNO is SIM in, and how to send requests to your IMSI platform (7B). In case there has been no previous EXCHANGE request with the same parameters (7C), or if there has been, but the data has been deleted because the quarantine period has expired, the IMSI2 / MSISDN2 data is not in the table ( 106) of correlation. In this case, the IMS11 platform (100) launches a request (7D) to the IMSI2 platform (200) to obtain the same. The IMSI2 platform (200) seeks an MSISDN2 / IMSI2 available and not associated with any SIM yet in its common warehouse2 (202). Return them (7G) to the IMSI1 platform (100), but before returning them, delete them from the common warehouse2 (202), so that they can no longer be used (7E). Therefore, it loads them (7F) in its HLR2 (301), so that MSISDN2 / IMSI2 can be authorized to use the MNO2 network (300) when the EXCHANGE occurs. When the IMS11 platform (100) receives IMSI2 / MSISDN2, it stores this relationship in the correlation table (106), so that it is available for invoicing, and to be able to be reused in EXCHANGE / Retro-EXCHANGE. All communication between the IMSI1 and IMSI2 platforms (100, 200) is properly encrypted according to the parameters exchanged for
43/94 both platforms, as shown in Figure 6, and retrieved from the MNO correlation table (107). Encryption of this information is necessary so that both platforms can recognize and validate that requests arrive from an authorized source for this. When the IMSI1 platform (100) already has the IMSI2 / MSISDN2 data, it searches for it (7I) in the correlation table (106). Then it sends a request to the platform (500) of the SIM provider, to send OTA commands to SIM1 Virtual, to make the EXCHANGE (7Γ). And then it sends the same to IMSI1 / MSISDN1 currently used by SIM to be able to locate it, and the data from the new IMSI2 / MSISDN2, to be loaded into SIM, as parameters. To be able to EXCHANGE, the SIM provider's platform (500) must also obtain other information about the MNO whose subscription you want to load. In this case, the MNO2 subscription wants to be activated. The platform (500) of the SIM provider must check whether it has this information or not (71 ”). If the platform (500) of the SIM provider is also the provider for MNO2, it can obtain data from its own platform (7L), as explained in more detail in Figure 8. If the platform of the SIM1 provider is not a provider YES for ο MNO2, the data must be obtained from the platform (600) of the SIM provider2, which returns the data (7J). The process (7J) for obtaining the MNO2 profile from SIM provider2 (600) is a complex process that requires the exchange of information between both SIM provider platforms, and which is explained in more detail in Figures 15 to 18. After obtaining the data, MNO2 profile and MSISDN2 / IMSI2, SIM provider 1 (500) sends OTA commands to Virtual SIM 1 (503) using an encrypted channel through the OTA1 (7M) platform. When SIM1 Virtual (503) receives the data and data is downloaded to SIM1 Virtual (503), the data is decrypted and loaded into it, and the data for the new subscription is activated (7N). Then the SIM is restarted and registered on the MNO2 network (300) using the new subscription. The HLR (301) of MNO2 successfully checks the SIM registration (70). Steps 7M, 7N and 70 are explained more fully in Figure 9. If the registration on the network (300) of MNO2 was successful (70), Virtual SIM1 (503)
44/94 informs about the success of the operation (7P) to the SIM provider platform from which it received the EXCHANGE request. In this case, the SIM informs the platform (500) of the SIM provider, which, in turn, informs about the success of the operation (7Q) to the platform (100) of the IMSI1, from which it received the EXCHANGE request. At that moment, the IMSI1 platform (100) changes the status of the SIM (7R) and deactivates it, so as not to allow the consumption of the SIM, and stops its billing. It also reports on the success of the operation (7S) to the IMSI2 platform (200), so that you can carry out the appropriate actions, such as changing the SIM status, or activating it to allow SIM consumption and start billing.
[161] Figure 8 shows the process steps described to obtain the MNO profile data, whose signature will change, to send them to SIM1 Virtual (503) for EXCHANGE or retroCHANGE. In this case, the profile data, which can be that of the MNO2 network (300) in the case of EXCHANGE, or that of the MNO1 network (400) in the case of a back-EXCHANGE request, are obtained for the platform (500) of the SIM Provider. Some of the steps described in Figure 8 are part, respectively, of Figure 7 and 12. The process begins when the SR1 module (505) makes a request to the DP1 module (502) of the SIM provider platform, to obtain the MNO profile. whose signature will change (8A). DP1 searches for it in its own repository (501) of MNO profiles. After obtaining this information, it is sent to the SR1 (505) encrypted (8B) with the SK1 storage key, used to secure the communication between the SR and the DP. The SR1 establishes an encrypted communication channel (8C) with the Virtual SIM1 (503) using the SIMSIMI key and the new signature information is sent as parameters (8D) of the OTA commands generated using the OTA1 platform (507). Flows 8C and 8D are explained in more detail in Figure 9.
[162] Figure 9 describes the process steps for sending OTA commands to the Virtual SIM for EXCHANGE, or back-EXCHANGE. Some of the steps are also part of Figure 7 and 12. The process begins when the SIM Provider DP1 module (502) obtains the MNO profile whose signature will change
45/94 (9Α), which can be the profile of MN02 in the case of an EXCHANGE request, or the profile of MNO1 in the case of back-EXCHANGE. According to the case, these data can be retrieved from another SIM provider platform, as explained in Figures 15 to 18. After obtaining the MNO profile, the SR1 (505) is sent encryption with the SK1 Storage key, so that the communication between the SR and the DP can be secure. The SR1 (505) sets up an encrypted communication channel with the Virtual SIM1 (503) using the SIMIMI Key. Then, it sends this information as OTA command parameters (9B) generated by the OTA1 platform (507). The ChaveSIMI is a key generated from the Chavemestral key, which is a platform of keys generated by the SIM provider and individualized for each MNO. This key is generated individually for each card and usually depends on your IMSI. Both keys, the Storage key and the Keystroke, are provided to the Virtual SIM1 (503) during its manufacturing process. Therefore, when the SIM receives the encrypted information, it is able to decipher it (9C), and verifies that the commands to change the EXCHANGE effectively come from an authorized source to do so. Once the card hosts the commands, it loads the data from the new subscription and activates it with the primary subscription. Then, the SIM restarts and tries to register in the indicated network, using the data from the new subscription, which can be from MNO2 in the case of an EXCHANGE request, or from MNO1 in the case of a back-EXCHANGE request. This record is usually validated by the corresponding MNO1 HLR1 (401) in a back-EXCHANGE request, and by MNO2 HLR2 (301) in an EXCHANGE request. The corresponding HLR verifies whether the IMSI with which the SIM is being connected is valid or not, and whether the Ki used for the registrant (9D) is correct or not. These two data are included in the data sent to the SIM during the EXCHANGE. Before sending the data through the SIM provider platform, the IMSI platform also uploads it to the HLR, whereby the registration and validation process is normally successful.
[163] When ο MNO1 (400) wants to obtain the use of Virtual SIM1 (503)
46/94 during a given billing cycle, which may be the current cycle or not, the process shown in Figure 10 is followed. The MNO1 network (400) asks the IMSI1 platform (100) to consume the SIM (10A) . The IMSI1 platform (100) verifies whether the SIM was EXCHANGED or not during the cycle (10B). If the SIM was not in EXCHANGE, the SIM consumption during this cycle is only that performed (10G) on the IMSI1 platform, which is returned (10H) to the MNO1 network (400). If the SIM was in EXCHANGE, or is currently in EXCHANGE, the IMSI1 platform (100) looks for the IMSI list in the correlation table (106), to find out which IMSI / SIM is using the destination network (300), and which network is registered (10C). It also looks for how to send a request to the MNO target platform (10C) in the MNO correlation table (107). The IMSI1 platform (100) makes a request (10D) to the IMSI2 platform (200), which obtains the SIM consumption (10D1) during this EXCHANGE cycle, and returns it (10E) to the IMSI1 platform (100). The IMSI1 platform (100) also proves whether the EXCHANGE lasted the entire cycle (10F) or not. If the EXCHANGE lasted the entire cycle, the SIM consumption is only that performed on the IMSI2 platform (200), which is returned (10H) to the MNO1 network (400). If the EXCHANGE did not last the entire cycle (10F), the IMSI1 platform (100) adds the SIM consumption on the IMSI2 platform (200), plus its consumption (10M) on the IMSI1 platform and returns the result (10H) to the MNO1 (400).
[164] Figure 11 shows the following steps when the MNO1 billing system (402) wants to bill a Virtual SIM1 (503) during a given billing cycle, which may be the current cycle or not. First, when a billing cycle (11) begins, the MNO1 billing system (402) requests the consumption (11A1) of its own SIM, those with an IMSI1, to the IMSI1 platform (100). You also get consumption not invoiced by the IMSI1 platform (100) from external systems (11A2), such as SMS consumption, or voice call consumption from SMSC, Short Message Service Center, and / or the MSC , mobile switching center. Therefore, it calculates the cost per use of SIMs with IMS11 and the cost per service (11C3)
47/94 using information (11A3) from both. Second, the MNO1 billing system (402) requests the cost (11B1) of some IMSI2 from the MNO2 billing system (302). The MNO1 billing system (402) knows what is the relationship between the IMSI by searching it in the correlation table (106) and, therefore, can easily know which IMSI2 are / have been or have been used during SIM EXCHANGE coincidences with a specific IMSI1. The MNO2 billing system (302) makes a request to the IMSI2 platform (200) to obtain the consumption (11B2) of the IMSI2. It also obtains (11B4) the consumption not invoiced by the IMSI2 platform (200) from other external systems. Then it uses both data to calculate (11B3) the cost per use of SIM and the cost per service with IMSI2. The MNO1 billing system (402) initiates billing (11C). If the SIM is no longer in EXCHANGE (11 D), or was in EXCHANGE and the quarantine period has expired (11E1), the cost (11E2) of the SIM is only that carried out on the MNO1 network (400), since, due to the fact that the quarantine period has expired, all costs that the SIM had incurred in the MNO2 network (300) have already been billed. If the SIM is no longer EXCHANGE (11 d), or has been EXCHANGE and the quarantine period has expired (11E1), the SIM cost is the cost (11D4) of the consumptions you made on the MNO network (400), plus the consumption that had been made in the MNO2 network (300) and that has not yet been billed. To find out what consumption has been made on the MNO2 network, the MNO1 billing system (402) performs pairing (11D2) between the IMSI2 (200) and IMSI1 (100) platforms, looking for (11D5) in the table (106 ) correlation of the IMS11 platform (100). If the SIM is in EXCHANGE (11 D), and the EXCHANGE started in the middle of the billing cycle (11D1), the SIM cost is the cost (11D4) of the consumptions made in the MNO1 network (400), plus consumption that had been carried out on the MNO2 network (300). To find out what consumptions were made on the MNO2 network (300), the MNO1 billing system (402) performs the pairing (11D2) between the IMSI2 (200) and IMSI1 platforms, looking for (11D5) in the table (106) correlation level (100) of IMSI1. If the SIM is in EXCHANGE (11 D), and the EXCHANGE has not started
48/94 in the middle of the billing cycle (11D1), means that the SIM was only used in the MNO2 network (300), therefore its costs are only the cost (11D6) of the consumption you made in the MNO2 network (300). To find out what consumptions were made on the MNO2 network (300), the MNO1 billing system (402) performs the pairing (11D3) between the IMSI2 (200) and IMSI1 (100) platforms, looking for (11D5) in the table (106) correlation of the platform (100) of IMSI1. Finally, check whether the quarantine period has ended or not (11F1). If it has run out, then the EXCHANGE is permanent and the SIM is transferred (11F2) to the MNO2 network (300), and from that moment, the MNO2 Billing system (302) starts billing it to the end customer.
[165] Figure 12 illustrates the steps or process for reversing an EXCHANGE, or Retro-EXCHANGE, on Virtual SIM1 (503). To perform a REPLACEMENT, the original MNO profile that the SIM used to have must be loaded back into the SIM. A retro-EXCHANGE cannot be carried out if the quarantine period has expired, or if a previous and successful EXCHANGE request has not occurred. The back-EXCHANGE process can be activated manually or automatically by the IMSI1 platform (100). It is automatically launched when one of the EXCHANGE Rules, configured in the EXCHANGE Rules table (105), is satisfied and when, for example, the SIM is registered in a country or MNO that matches an entry in this table, or when the period of time defined in one of the rules has come to an end. The Retro-EXCHANGE request starts when ο MNO1 (400) launches a retro-EXCHANGE request (12A) to the IMSI1 platform (100). The platform verifies whether a previous EXCHANGE request was made or not. And if so, try to recover the data from IMSI1 / MSISDN1 (12B), which SIM used initially, from the correlation table (106). The IMSI1 platform (100) also uses this same table and the MNO correlation table (107) to find out which MNO network the SIM is in, and how to send requests to your IMSI platform (12B). The IMSI1 platform (100) also sends a request to the SIM provider's platform (500) to send OTA commands
49/94 to SIM1 Virtual, to reverse the EXCHANGE (12C). And the IMS11 platform (100) sends to the SIM provider platform (500) the IMSI2 / MSISDN2 currently used by the SIM to locate it, and the data from the new IMS11 / MSISDN1 to be loaded on the SIM, as parameters. To be able to EXCHANGE, the SIM provider's platform (500) must also obtain other information about the MNO whose subscription you want to load. In this case, the MNO1 signature that you want to activate, therefore, can be retrieved from its own platform (12D), explained in more detail in Figure 8. After obtaining the data, the MNO1 profile and the MSISDN1 / IMSI1, the platform (500) from the SIM provider sends the OTA commands to the Virtual SIM1 (503) using an encrypted channel, through the OTA1 platform (12E). When the data is downloaded to SIM1 (503), it is deciphered and loaded on it, and the data of the new subscription is activated (12F). Then the SIM is restarted and registered on the MNO1 network (400) using the new subscription. The HLR of MNO1 (401) successfully checks the SIM (12G) register. The processes 12E, 12F and 12G are explained more fully in Figure 9. If the registration in the network (400) of MNO1 is successful (12G), SIM1 Virtual (503) informs about the success of the operation to the platform of the provider of the YES, since you received the EXCHANGE request (12H). In this case, the SIM informs the platform (500) of the SIM provider. The platform (500) of the SIM provider informs about the success of the operation to the platform (100) of IMSI1, from which it received the request (12M) to reverse the EXCHANGE. At that moment, the IMSI1 platform (100) changes the SIM status and activates it to allow the consumption of the SIM, and its billing begins (12J). It also reports on the success of the operation (12K) to the IMSI2 platform (200), so that you can carry out the appropriate actions, such as changing the SIM status, or deactivating it, so as not to allow the consumption of the SIM and stop its use. billing.
[166] Figure 13 illustrates the sequence of steps activated when the quarantine period ends. When the IMSI1 platform (100) notices that the quarantine period has expired for a SIM (13A), it informs about this to the platform that corresponds to the network where the SIM is, or was in EXCHANGE, and
50/94 in this case the IMSI1 platform (100) informs (13C) the IMSI2 platform (200). The IMS11 platform (100) knows which network and platform the SIM is / was in, retrieving the information from the correlation table (106) and the MNO correlation table (107). The IMSI1 platform (100) also reports (13B) to the MNO1 Invoicing system (402). The IMSI1 platform (100) waits for the billing cycle (13A1) after the quarantine ends, before starting any process related to the quarantine, to prevent any consumption made in the source network from being properly invoiced. When the billing cycle ends after the quarantine period, the IMSI1 platform (100) also checks (13D) if there was a request to reverse the EXCHANGE, or a retro-EXCHANGE, or if the SIM is still in EXCHANGE. If the SIM is still in EXCHANGE and the EXCHANGE has not been reversed, the EXCHANGE becomes permanent and the Virtual SIM1 (503) remains indefinitely on the MNO2 network (300) and is transferred to MNO2. Therefore, the IMSI1 platform (100) eliminates (13E) the relationship between IMSI2 and IMSI1 in the correlation table (106). As the SIM has belonged to MNO2 since that moment, and since MSISDN1 / IMS11 will no longer be used by SIM1 in the network (400) of origin, they are returned (13G) to the common warehouse (102), in order to be reused, as explained in the corresponding step (39a) of Figure 3, and discharged (13F) of the HLR (401) of MNO1, so that MSISDN1 / IMSI1 can be reused as shown in Figure 9. In addition, when the platform (200) das IMSI2 receives the notification of the quarantine time exhaustion (13C), informs (13H) the MNO2 Billing system (302), so that you can take the same into account when you bill the SIM. The IMSI2 platform (200) waits for the billing cycle after the quarantine ends, before starting any process related to the quarantine, to prevent any consumption made on the destination network (300) from not being properly invoiced (13A2). When the billing cycle ends after the quarantine period has ended, the IMSI2 platform (200) also checks (13K) if there was a request to reverse the EXCHANGE, or a back-EXCHANGE. If there was a request for a Retro-Exchange, the
51/94 IMSI2 platform (200) knows that SIM 1 consumption will no longer arrive on the MNO2 network and, therefore, MSISDN2 / IMSI2 will no longer be used by SIM1 on the destination network (300), so they are returned (13M ) to the common warehouse2 (202), in order to be reused as explained in the corresponding step (39b) of Figure 3, and discharged (13L) of HLR 301) of MNO2, so that they can be reused as shown in Figure 9. When If the quarantine period ends, if there is an EXCHANGE or retro-EXCHANGE request, the IMS11 / IMSI2 relationship used initially cannot be recovered, so a new EXCHANGE sequence should be started.
[167] Figure 14 details the main steps of a variant of the general case process described above and shown in Figure 3. In this case, it is assumed that the MNO1 network (400) carries out the EXCHANGE request via the platform ( 100) of IMS11 and the platform (500) of the SIM provider. EXCHANGE is done on Virtual SIM1 (503). In contrast to the general case of Figure 3, in the case of use of Figure 14, the MNO2 network (300) does not trust the same SIM provider as the MNO1 network (400). The MNO2 network (300) trusts SIM provider2 (600) and, therefore, its platform, the SIM provider2 platform (600), already has MNO2 credentials. The steps in Figure 14 are very similar to those shown in the general case of Figure 3. The left side of Figure 14 shows the following steps during the EXCHANGE process by the platforms of the network (400) of origin of MNO1, and on the right side of Figure 14, the following steps are illustrated by the platforms of the target network (300) of the MNO2. All steps in Figure 14 are:
[168] Initial Stage (141a, 141b): The initial data, IMSI, MSISDN, ..., provided in the Virtual SIM 1 (503) are loaded on the IMSI1 platform (100), as shown in Figure 4. In parallel , the data, the IMSI / MSISDN, which the SIM has to use for registration on the MNO2 network (300), is loaded onto the IMSI2 platform (200), as shown in Figure 5. These data have to be used during the EXCHANGE.
52/94 [169] EXCHANGE preparation step (142): The parameters needed to launch the EXCHANGE are configured on the IMSI1 platform (100), and the IMSI2 platform (200) is informed of this, as described in Figure 6.
[170] Step (143) of using SIM1 on the source network (400): Before the EXCHANGE, Virtual SIM1 (503) can be used normally on the MNO1 network (400).
[171] EXCHANGE request step (144): When Virtual SIM1 (503) registers with the MNO2 destination network (300), an EXCHANGE operation is launched by the IMSI1 platform (100), as described in Figure 7 The IMS11 platform (100) initiates a dialogue with the IMSI2 platform (200) to obtain the IMSI2 and MSISDN2 that SIM will use on the MNO2 network (300) after the EXCHANGE. The IMSI1 platform (100) also initiates a dialogue with the SIM1 provider's platform (500), so that the SIM provider's platform (500) obtains (1442) the MNO2 credentials from the provider2 platform (600) SIM, and send all information using OTA commands (1443) to Virtual SIM1 (503). After that, the Virtual SIM1 can be successfully registered on the MNO2 network (1445).
[172] Step (145) of using SIM1 and the destination network (300): After the EXCHANGE, the Virtual SIM1 (503) can be used on the MNO2 network (300) without roaming charges.
[173] SIM data acquisition step (146): As long as the SIM is registered in the MNO2 network (300), it is possible to access its consumption data, as described in detail in Figure 10.
[174] Billing Step (147): As long as the traveler, or the M2M device, is on the MNO2 network (300), the traveler, or the owner of the M2M device, can access their invoices, as described in Figure 11.
[175] Retro-EXCHANGE request step (148): At a certain point, the traveler, or the M2M device, which contains a SIM1, returns and registers with the MNO1 network (400). An operation to reverse the EXCHANGE is launched
53/94 manually by MNO1 (400), or automatically by the IMSI1 platform (100). To be able to perform the back-EXCHANGE, MNO2 credentials must be obtained (1441) from the SIM1 provider's platform (500), as explained in Figure 8. Therefore, all the necessary information is sent using OTA commands (1443) to the Virtual SIM1 (503), as also described in Figure 9. After that, Virtual SIM1 can be successfully registered and attached to the network (400) of MNO1 (1446).
[176] Quarantine period verification step (149): When the quarantine period has passed, IMS11 platform (100) lets IMSI2 platform (200) know about it, as described in Figure 13, and is decided whether IMSI1 / IMSI2 will be reused again or not (1491, 1492).
[177] Contrary to the general case, shown in Figure 3, and this case in Figure 14, is how MNO2 credentials are obtained in the step to obtain MNO2 credentials (1442). In this case, since ο MNO2 only trusts SIM provider2, the MNO2 network (300) only provides its credentials to the SIM provider2 platform (600). The SIM provider's platform (500) does not have all the data needed for the EXCHANGE, especially the MNO2 credentials, when the SIM provider's platform (500) will send the OTA commands to the SIM. Therefore, the SIM provider's platform (500) must obtain the necessary data from the SIM provider2 platform (600).
[178] The process described in step (1442) for the exchange of credentials between SIM provider platforms can be implemented with different options, as shown in Figures 15, 16, 17 and 18. These implementation alternatives represent the different types of relations between the SR and DP module of the SIM provider platforms. The alternatives are also modeled according to the standard GSMA architecture shown in Figure 1.
[179] Figure 15 presents an alternative to the process (1442), to obtain
54/94 the MN02 credentials, from the previous Figure 14, and illustrates the steps of the process followed by the SIM provider platform (500) to obtain the MNO2 profile data from the SIM provider2 platform (600) before sending them to the Virtual SIM1 (503) within the OTA commands. In this alternative, the communication between the SIM provider platforms takes place mainly through Secure Routing (SR) modules from both platforms and, although the communication between Data Preparation (DP), or between Data Preparation and Routing Safe, when they do not belong to the same SIM provider platforms, be uncommon, sometimes a DP can send data to another DP without involving the SR. In more detail, the process starts (15A) when SR1 (505) launches a request to obtain the credentials, or profile, from MNO2 to SR2 (605). Since SR2 does not have access to the data, SR2 resends (15B) the request to DP2 (602). DP2 reads data from your repository and encrypts it using the Storage key, SK2, from the SIM provider2, and sends it (15C) to SR2. After that, SR2 sends the data, in the same format in which it received it, SR1 and SR1 sends (15D) the data to DP1, which is the only module that knows how to decipher it (15E), since DP1 is the only one that has SK2 interchanged during the EXCHANGE preparation process shown in Figure 6. An alternative of flows 15C and 15D can be one in which DP2 sends data directly to DP1, omitting SR1 and SR2. DP1 re-encrypts (15F) the information again, but this time using the SIM provider key, the Storage Chavel, or SK1. During processes 15E and 15F, DP1 uses different keys to encrypt and decrypt the information, since the SIM can only decrypt the information using the keys of the SIM provider that manufactured it. Then DP1 sends the encrypted information to SR1 (15G). When SR1 receives the encrypted information, SR1 configures an encrypted communication channel to transmit the information to the SIM from DP1 securely. The transmitted information is encrypted (15M) using the SIMkey, which is a key generated using the Chavemestral and a unique SIM identifier, such as an IMSI. SR1 sends the OTA commands (15J) to perform the EXCHANGE through this
55/94 channel, using the OTA platform (507), to SIM1 Virtual (503). The parameters of the OTA command contain the encrypted data of the new subscription, which must be loaded and enabled / activated in the Virtual SIM (503). Part of flow 15J corresponds to the beginning of the process explained in Figure 9.
[180] Figure 16 shows in more detail another alternative of the alternative process (1442), to obtain the MNO2 credentials, from the previous Figure 14 and illustrates the steps of the process followed by the platform (500) of the SIM provider to obtain the MNO2 profile data from the SIM provider2 platform (600) before sending them to Virtual SIM1 (503) within OTA commands. In this alternative, communication between the SIM provider platforms takes place mainly through the Secure Routing module (SR1) of the first platform (505) and the Data Preparation module (DP2) of the second (602). And although communication between Data Preparations (DP), or between Secure Routes (SR), or between DP1 (502) and SR2 (605) is uncommon, sometimes a DP can send data to another DP without implying to SR. The process starts (16A) when SR1 (505) launches a request, to obtain the credentials or profile of MNO2, DP2 (602). DP2 reads data from your repository and encrypts it using the SIM provider2 Storage key, or SK2. After that, DP2 sends (16B) the data directly to SR1. SR1 sends (16C) the data back to DP1. An alternative to flows 16B and 16C can be one in which DP2 sends data directly to DP1, omitting SR1. DP1 decrypts the data (16D), since it already knows the SK2 key to decrypt the data. DP1 re-encrypts (16E) the information again, but using, this time, the SIM provider key, Storage Chavel, or SK1. Use this key so that the SIM can decipher the information using the keys of the SIM provider that manufactured it. Then DP1 sends the encrypted information to SR1 (16F). When SR1 receives the encrypted information, SR1 configures an encrypted communication channel to transmit the information to the SIM from DP1 securely. The transmitted information is encrypted (16G) using the ChaveSIMI, generated using Chavemestral and a
56/94 unique SIM identifier (such as an IMSI). SR1 sends the OTA commands (16H) to perform the EXCHANGE (16M) through this channel, using the OTA platform (507), to the Virtual SIM 1 (503). Part of the 16M flow corresponds to the beginning of the process explained in Figure 9.
[181] Figure 17 presents an additional alternative, from the process (1442) to obtain the MNO2 credentials, to the previous Figure 14 and illustrates the steps of the process followed by the platform (500) of the SIM provider to obtain the profile data of the SIM MNO2 from the SIM provider2 platform (600), before sending them to Virtual SIM1 (503) within the OTA commands. In this alternative, the communication between the SIM provider platforms takes place mainly through the Data Preparation (DP) modules, from both platforms. Communication between Secure Routes (SR), or between Data Preparation and Secure Routing, when they do not belong to the same SIM provider platform, is not allowed. The process starts when DP1 (502) launches a request, to obtain (17A) the credentials or profile of MNO2, DP2 (602). DP2 reads data from your repository and encrypts it using the SIM provider2 SK2 Storage key. After that, DP2 sends the data (17B) directly to DP1, omitting SR1 and SR2. DP1 decrypts the data (17C), since it already knows the SK2 key (exchanged according to the process illustrated in Figure 6) to decrypt the data. DP1 re-encrypts the information again (17D), but using, this time, the SIM provider key, SK1 (Storage Chavel). Then, DP1 sends the encrypted information (17E) to SR1. When SR1 receives the encrypted information, it configures an encrypted communication channel to transmit the information to the SIM from DP1 securely. The transmitted information is encrypted (17F) using the SIMSkey. SR1 sends the OTA commands (17H) to perform the EXCHANGE (17G) through this channel, using the OTA platform (507), to the Virtual SIM1 (503). Part of the 17H flow corresponds to the beginning of the process explained in Figure 9.
[182] Figure 18 presents an additional alternative, from the process (1442) to obtain MNO2 credentials, to the previous Figure 14 and illustrates the steps of the
57/94 process followed by the SIM provider platform (500) to obtain the MNO2 profile data from the SIM provider2 platform (600), before sending them to Virtual SIM1 (503) within the OTA commands. In this alternative, the communication between the SIM provider platforms takes place mainly through the Data Preparation module of the first platform (DP1) (502) and the Secure Routing module (SR) of the second (SR2) (605). And although communication between Data Preparations (DP), or between Secure Routes (SR), or between DP2 (602) and SR1 (505) is uncommon, sometimes a DP can send data to another DP without implying to SR. The process starts (18A) when DP1 (502) launches a request, to obtain the credentials or profile of MNO2, SR2 (605). SR2 resends the request (18B) directly to DP2 (602). DP2 reads data from your repository and encrypts it (18C) using the SIM provider2 SK2 Storage key. After that, send the data to SR2. SR2 sends data (18D) directly to DP1, omitting SR1. An alternative to streams 18C and 18D would be one in which DP2 will send the data directly to DP1, omitting SR2. DP1 decrypts the data (18E), as you already know which key is SK2 to decrypt the data, as shown in Figure 6. DP1 re-encrypts the information (18F) again, but using, this time, the key of the data provider. YES, SK1 or Storage Chavel. Then DP1 sends the encrypted information (18G) to the SR1. When SR1 receives the encrypted information, it configures an encrypted communication channel to transmit the information to the SIM from DP1 securely. The transmitted information is encrypted using the SIMSkey (18H). SR1 sends the OTA commands (18M) to perform the EXCHANGE (18J), through this channel, using the OTA platform (507) to the Virtual SIM1 (503). Part of flow 18J corresponds to the beginning of the process explained in Figure 9.
[183] Figure 19 details the main steps of another variant of the general case presented in Figure 3. This variant refers to a case in which the EXCHANGE is requested on a SIM not manufactured by the SIM provider of the originating mobile network, for example, a SIM from the SIM provider of the mobile network
58/94 destination, and it is assumed that the MNO1 network (400) performs the EXCHANGE request through the IMS11 platform (100) and the SIM provider platform (500), but the EXCHANGE is done in the Virtual SIM2 (603 ), all the necessary infrastructure for the EXCHANGE belonging to the SIM provider and not to the SIM provider2. In this case, the EXCHANGE is performed on an unusual SIM, SIM2, for example, due to the fact that ο MNO1 has decided to use SIM2 because they are cheaper, or due to other contractual reasons, or due to the special features of the M2M device or mobile, which require the use of a special type of SIM provided by the SIM provider2. Another possibility is that the SIM was manufactured at the request of MNO2, using the usual MNO2 SIM provider, the SIM provider2 (600), but to prove it, the MNO1 infrastructure is required. Therefore, the SIM is initially endowed with MNO1 credentials and, once proven, it is decided to send the SIM back to the MNO2 country, but before returning it and being able to use the SIM at the final destination, MNO2 signatures must be downloaded and enabled on this SIM, SIM2. Although the EXCHANGE takes place on the SIM manufactured by the SIM provider2 (600), the MNO1 credentials could have been given to both the SIM provider (500) and SIM provider2 (600). The MNO2 credentials could also have been given to both the SIM provider (500) and SIM provider2 (600), or even to a third SIM provider, and in this case, the process for obtaining a third party's credentials would be similar to the process outlined in Figures 15 to 18. The steps of this use case variant are very similar to those shown in the general case of Figure 3, section 1.2), but as follows:
[184] Initial steps (191a, 191b): The initial data, IMSI, MSISDN, ..., provided in Virtual SIM 1 (503) are loaded onto the IMSI1 platform (100), as shown in Figure 4. In parallel , the data, the IMSI / MSISDN, which the SIM uses to register on the MNO2 network (300), is loaded onto the IMSI2 platform (200), shown in Figure 5. These data are used during the EXCHANGE process.
[185] EXCHANGE preparation step (192): The necessary parameters
59/94 to launch the EXCHANGE are configured on the IMSI1 platform (100). The IMSI2 platform (200) is informed about this, as shown in Figure 6.
[186] Use of SIM in Origin Stage (193): Before EXCHANGE, Virtual SIM2 (603) can be used normally in the MNO1 network (400).
[187] EXCHANGE request step (194): When Virtual SIM2 (603) registers on the MNO2 network (300), an EXCHANGE operation is launched by the IMSI1 platform (100), as described in Figure 20. A IMS11 platform (100) initiates a dialogue with IMSI2 platform (200) to obtain IMSI2 and MSISdn2 that SIM will use on the MNO2 network (300) after EXCHANGE. The IMSI1 platform (100) also initiates a dialogue (1942) with the SIM1 provider's platform (500), so that the SIM provider's platform obtains the MNO2 credentials, whether from the provider's platform (500) SIM1 or from the SIM provider2 platform (600), as in Figures 15 to 18, and to send all information (1944), using OTA commands, to the Virtual SIM2 (603) through the SIM provider2 platform (600) , as in Figures 21 to 23. This differs from the case shown in Figure 14, in which the SIM1 provider's platform (500) sends the data, IMSI / MSISDN, directly to SIM1; in the present case of Figure 19, the SIM1 provider's platform (500) is not allowed to access SIM2 and therefore needs to send data via the SIM provider2 platform (600). After that, SIM2 Virtual can be successfully registered on the MNO2 network (300) (1945).
[188] Use of SIM2 in Destination Stage (195): After the EXCHANGE, Virtual SIM2 (603) can be used on the MNO2 network (300) without having any roaming charges.
[189] SIM data acquisition step (196): As long as the SIM is registered in the MNO2 network (300), it is possible to access its consumption data, as described in detail in Figure 10.
[190] Billing step (197): As long as the SIM is registered on the MNO2 network (300), you can also access your invoices,
60/94 as described in detail in Figure 11.
[191] Retro-EXCHANGE request step (198): When Virtual SIM2 (603) returns and registers with the MNO1 network (400), a reversed EXCHANGE operation, or retro-EXCHANGE, is launched by the platform (100 ) of IMS 11, as shown in Figure 24. The IMS11 platform (100) initiates a dialogue with the IMSI2 platform (200) to obtain the IMS11 and MSISDN1 that SIM will use on the MNO1 network (400). It also initiates a dialogue (1941) with the SIM1 provider's platform (500), so that the SIM provider's platform obtains the MNO1 credentials, as described in Figure 8. It then sends all the information (1944), using OTA commands , to Virtual SIM2 (603), through the SIM provider2 platform (600), as in Figures 21 to 23. After that, Virtual SIM2 can be successfully registered in the network (400) of MNO1 (1946).
[192] Quarantine period verification step (199): When the quarantine period has elapsed, the IMSI1 platform (100) lets the IMSI2 platform (200) know about it, as described in Figure 13. It is decided whether IMSI1 / IMSI2 will be reused again, or not (1991, 1992).
[193] Contrary to the general case in Figure 3 and the use case described above is how OTA commands are sent to SIM2 Virtual (603) in requests for EXCHANGE (194) and retro-EXCHANGE (198) steps. In this case, the SIM 1 provider did not manufacture the Virtual SIM2, and is also not registered on the SIM provider's platform (500). This implies that if the SIM provider's platform (500) wants to exchange any type of information with the SIM, it should use the keys only known by the SIM provider that manufactured it, the SIM provider2 (600), to encrypt the information . Therefore, the platform (500) of the SIM provider can only send OTA commands to the Virtual SIM2, either through the platform (600) of the SIM provider2, or directly, the keys used by the SIM provider2 are known, or changing the behavior SIM2 so you can expect encrypted information with the SIM1 provider's platform key, instead of being
61/94 encrypted with the SIM2 provider platform keys. The method for exchanging OTA commands is described according to different alternative implementations, respectively presented in Figures 21, 22 and 23, with different options for the relationship between the SR and DP modules of the SIM provider platforms. These alternatives were also modeled according to the architectural pattern proposed by the GSMA architecture in Figure 1.
[194] Figure 20 illustrates the steps when there is an EXCHANGE request on the Virtual SIM2 card (603). The MNO profile where the SIM is located must be loaded at the time of the request, so that the EXCHANGE can be carried out. An EXCHANGE process cannot be carried out if there was a previous EXCHANGE request and no request was made to reverse the EXCHANGE, or Retro-EXCHANGE. An EXCHANGE process can be launched manually or automatically from the IMSI1 platform (100). The EXCHANGE is launched automatically when one of the EXCHANGE Rules (105) is satisfied and the SIM is registered in a country or MNO configured in this EXCHANGE Rules (105) table, or the time set to activate the rule has ended. EXCHANGE starts (19A) when ο MNO1 (400) launches the EXCHANGE request to IMSI1 platform (100). The IMSI1 platform (100) checks whether there has been a previous EXCHANGE request with the same parameters and, if so, tries to retrieve the IMSI2 / MSISDN2 data (19B) that was previously assigned to the SIM from the table (106) of correlation. It also uses this same table and the MNO correlation table (107) to find on the network that the MNO is SIM in, and how to send requests to your IMSI platform. In case there has been no previous EXCHANGE request with the same parameters (19C) or, if there has been, but the data has been deleted because the quarantine period has expired, the IMSI2 / MSISDN2 data is not in the table ( 106) of correlation. In this case, the IMSI1 platform (100) launches a request (19D) to the IMSI2 platform (200) to obtain the same. The IMSI2 platform (200) seeks an MSISDN2 / IMSI2
62/94 available and not yet associated with any SIM in its common warehouse2 (202). The IMSI2 platform (200) returns them (19G) to the IMSI1 platform (100), but before returning them, it deletes them (19E) from the common warehouse (202), so that they cannot be used anymore. Therefore, the IMSI2 platform (200) loads them (19F) on its HLR2 (301) so that MSISDN2 / IMSI2 is authorized to use the MNO2 network (300) when the EXCHANGE occurs. When the IMSI1 platform (100) receives IMSI2 / MSISDN2, it stores this ratio (19H) in the correlation table (106), so that it is available for billing and can be reused in EXCHANGE / Retro-EXCHANGE. All communication between the platforms (100, 200) of IMS11 and IMSI2 is properly encrypted according to the parameters exchanged for both platforms, as shown in Figure 6, and retrieved from the table (107) of MNO correlations. This information is encrypted so that both platforms (100, 200) can recognize and validate that requests arrive from an authorized source. When the IMSI1 platform (100) has already obtained the IMSI2 / MSISDN2 data, the IMS11 platform (100) retrieves it (19X) from the correlation table (106), and launches the request to the provider's platform (500). YES, to send the commands to SIM1 Virtual for EXCHANGE (19J). In the request, the IMS11 / MSISDN1 currently used by the SIM is passed as parameters, so that the SIM provider's platform can locate the SIM. The new IMSI2 / MSISDN2 data to be loaded is also given as parameters. To be able to EXCHANGE, the SIM provider's platform (500) also obtains other information about the MNO whose subscription you want to load. In this case, the MNO2 subscription wants to be activated. The platform (500) of the SIM provider must check whether or not it has this information (19K). If the platform (500) of the SIM provider is the provider of the SIMs of MNO2, you can obtain the data from its own platform (19M), as explained in more detail in Figure 8. If the platform (500) of the SIM1 provider it is not the MNO2 provider, the data is obtained (19L) from the platform (600) of the SIM provider2, which returns the data (19N). O
63/94 process for obtaining the MN02 profile from SIM provider 2 (600) is a complex process that requires the exchange of information between both SIM provider platforms, and which is explained in more detail in Figures 15 to 18. After obtaining MNO2 profile data and MSISDN2 / IMSI2, the SIM provider platform (500) sends OTA commands to SIM2 Virtual (603), but since SIM2 Virtual does not belong to the SIM provider and has not been registered on the platform (500) of the SIM provider, it cannot send the command directly, through the platform (600) of the SIM provider2. The platform (500) of the SIM provider sends the data (190) to be loaded on the SIM to the platform (600) of the SIM provider2, encrypted with the SIM provider key, SK1. The SIM provider2 platform (600) decrypts the information and encrypts it again using its own SK2 and SIMS2 keys. It then sends it to SIM2 Virtual using an encrypted channel (19P) through the OTA2 platform (607). When SIM2 (603) receives data and data is downloaded to SIM2, it is decrypted and loaded into SIM2, and the data for the new subscription is activated (19Q). Then the SIM is restarted and registered on the MNO2 network (300) using the new subscription. The HLR of MNO2 (301) successfully checks the SIM record (19R). Steps 190 to 19T are explained more fully in Figures 21 to 23, according to several alternatives. If the registration on the network (300) of the MNO2 is successful (19R), the SIM2 Virtual (603) reports on the success of the operation to the SIM provider platform, from which it received the EXCHANGE request. In this case, the SIM informs (19S) the platform (600) of the SIM provider2, which, in turn, informs (19T) to the platform (500) of the SIM provider, the platform that originally originated the request. The SIM provider's platform (500) informs about the success of the operation (19U) to the IMSI1 platform (100), from which it received the EXCHANGE request. At that moment, the IMSI1 platform (100) changes the status (19V) of the SIM and deactivates it to prevent the consumption of the SIM, and stops its billing. The IMS11 platform (100) also reports on the success of the operation (19W) to the IMSI2 platform (200), so you can carry out the appropriate actions, such as changing the status of the
64/94
YES, or activate it to allow the consumption of the SIM and to start its billing.
[195] Figure 21 shows a first alternative for the SIM provider 1 platform (500) to be able to send OTA commands to Virtual SIM2 (603). In this case, the sending will be through the platform (600) of the SIM provider2. This alternative is only valid if the commands sent by the SIM provider 1 platform (100) do not follow the same format and / or are incompatible with those that SIM2 Virtual (603) is capable of interpreting, and usually sent by the platform (600 ) of the SIM provider2. In order to set up a communication channel between both SIM provider platforms (500, 600), and between Virtual SIM2 (603) and the SIM provider's platform (500), which is not its manufacturer, both ISP platforms SIM must have exchanged their encryption keys SK1, SK2, Chavemestral and Chavemestra2, as described in Figure 6. During the SIM manufacturing process, any of the SIM2 provider platform (600) modules, usually DP2 (602), it also endows SIM with MNO credentials and SK2 and Chavemestra2 keys. SK2 is the Storage Key that encrypts any communication between DP2 and SR2, and Chavemestra2 is used to generate the SIMS2 Key, to encrypt all communication between SIM and SR2. These two processes of providing the SIM2 Virtual (603) SK2 and Chavemestra2 (20A) are carried out before the residue of the steps / flows of Figure 21. The process to interchange the OTA commands starts when the platform DP1 module (502) (500) the SIM provider has obtained the MNO credentials to load into the SIM from its own platform, as described in Figure 8, or from another SIM provider platform, as described in Figures 15 to 18. The MNO credentials are those belonging to MNO2 in the case of an EXCHANGE request and those belonging to MNO1, in the case of a back-EXCHANGE request. DP1 encrypts the data with the SIM provider's SK1 Storage key, and sends it (20B) to SR1 (505). SR1 sends the encrypted information with the SK1 key, together with the commands to be sent (20C) to the SIM, to the platform (600) of the SIM provider2;
65/94 could be sent to SR2 (605), which would forward them to DP2 (602), or be sent directly to DP2. On the SIM provider2 platform (600), the DP2 module (602) is in charge of deciphering the encrypted information (20D), using the SK1 key, and encrypting it using its own SK2 key, and sending it back to SR2 (20E1). SR2 first understands what the EXCHANGE commands imply and then codes the orders (20E2) with its own commands, so that they can be understood by the SIM. Then the SR2 sets up an encrypted channel (20E3) to communicate with the SIM2 Virtual, using the ChaveSIM2 key, and sends the EXCHANGE commands (20G) to SIM2 (603), encoded with the ChaveSIM2 and SK2 keys, through the platform OTA2 (607) (20F). When the SIM receives the commands, it decrypts them using the SIM2 key and the SK2 key, and executes the appropriate commands to load the data of the new subscription and to activate it (20H), and then restart itself. When it is restarted, it is registered (20M) in the HLR of the corresponding MNO, using the IMSI and Ki data of the new signature. The SIM is usually registered in the MNO2 network (300) in the case of EXCHANGE, or in the MNO1 network (400) in the case of Retro-EXCHANGE. If the SIM successfully registers with the MNO's HLR, the SIM informs (20J) the SIM provider's platform from which it receives the orders, in this case, from the SIM provider2's platform (600), and usually sends the notification the SR2. The platform (600) of the SIM provider2 usually notifies (20K) the platform of the provider that originated the request about the successful operation, the platform (500) of the SIM provider in this case.
[196] Figure 22 shows another alternative so that the SIM provider's platform (500) can send OTA commands to SIM2 Virtual (603). In this case, sending will be done directly by the SIM provider's platform (500), due to the fact that you already know the keys used by the SIM provider2 to communicate with the SIM. This alternative is valid only if the commands sent by the SIM provider's platform (500) follow the same format and are highly compatible with what SIM2 Virtual (603) is capable of interpreting. This variant is only valid if the SIM2 Virtual has been registered
66/94 on both platforms (500, 600) from SIM providers. In order to set up a communication channel between both SIM provider platforms, and between the Virtual SIM2 card (603) and the SIM provider platform (500), which is not its manufacturer, both platforms (500, 600) of providers SIM cards must have exchanged their encryption keys SK1, SK2, Chavemestral and Chavemestra2, as described in Figure 6. During the SIM manufacturing process, any of the SIM2 provider's platform modules (600), usually DP2 (602) , also endows SIM (21A) with MNO credentials and SK2 and Chavemestra2 keys. These two processes were carried out before the residue from the flows in Figure 22.
[197] The process for exchanging OTA commands begins after the DP1 module (502) of the SIM provider's platform (500) has obtained the MNO credentials to load into the SIM from its own platform, described in Figure 8, or from another SIM provider platform, described in Figures 15 to 18. MNO credentials are those belonging to MNO2 in the case of an EXCHANGE request and those belonging to MNO1, in the case of a back-EXCHANGE request. DP1 encrypts the data with the storage key SK1 from SIM provider 1 (500) and sends it (21B) to SR1 (505). The SR1 (505) decrypts the information encoded with the SK1 key (21C) and the cipher (21 D) again with the SIM provider2 platform (600) keys, the SK2 and SIMS2 keys. Then the SR1 sets up an encrypted channel to communicate with the SIM2 Virtual using the ChaveSIM2 key, and sends the EXCHANGE commands (21E) to SIM2 (603) encoded with the ChaveSIM2 and SK2 keys, through the OTA1 platform (507). When the SIM receives the commands, it decrypts them using the SIM2 key and the SK2 key, and executes the appropriate commands to load the data of the new subscription and to activate it (21F), and then restart itself.
[198] When it is restarted, it is registered (21G) in the HLR of the corresponding MNO, using the data from the new signature: IMSI and Ki. The SIM is usually registered in the MNO2 network (300) in the case of EXCHANGE, or in the network
67/94 (400) of MNO1, in the case of Retro-EXCHANGE. If the SIM successfully registers with the MNO's HLR, the SIM informs (21H) the SIM provider platform from which it receives the orders; in this case, it usually sends the notification to SR1 (505) from the SIM provider's platform 1 (500).
[199] Figure 23 shows another alternative so that the SIM provider's platform (500) can send OTA commands to SIM2 Virtual (603). In this case, sending will be done directly by the SIM provider's platform (500), using their own keys, instead of encrypting the information with the SIM provider2's keys. This alternative is only valid if the commands sent by the SIM provider platform follow the same format and are extremely compatible with what SIM2 Virtual (603) is capable of interpreting. This variant is more usual than the previous one, described in the previous section and shown in Figure 22, since SIMs are usually registered in only one SIM provider platform. In this variant, it is not only the change of keys that the SIM understands, but also the attachment of the SIM to the SIM provider platform; more specifically, it is to change the SR to which the SIM is attached and the OTA platform from which the SIM can receive commands. Once this change has been made, the SIM will only accept commands received by the platform (500) from the SIM provider, and not from the platform (600) of the SIM provider2, unless a new SR designation is made again. . In order to set up a communication channel between both platforms (500, 600) of SIM providers, and between the SIM2 Virtual card (603) and the platform (500) of the SIM provider, which is not its manufacturer, both provider platforms SIM cards must have exchanged their SK1, SK2, Chavemestral and Chavemestra2 encryption keys, as shown in Figure 6. During the SIM manufacturing process, any of the SIM2 provider platform (600) modules, usually DP2 (602 ), endows SIM (22A) with MNO credentials, and with key SK2 and Chavemestra2. Before starting the exchange of OTA commands, the process for changing the SR to which the SIM is assigned must already have
68/94 occurred: flows from 22B to 22F. This process begins when one of the MNOs, usually ο MNO1, makes a request (22B) to SR1 (505) to change the SR to which SIM2 (603) is assigned. SR1 redirects (22C) the request to SR2 (605). SR2 responds to SR1 by sending (22D) the SIMSkey2 key that SR2 is currently using to exchange information with the SIM. At that moment, the SR1 establishes a secure communication channel (22E), using the SIM2 Key, with the Virtual SIM2 (603). The SR1 changes the fixed keys used by the SIM card and fixes its own keys. It also deletes (22F) the keys set by the previous SIM provider2. The Virtual SIM2 (603) recognizes and validates the person who sent the information to change the keys using the ChaveSIM2 key. The process for exchanging OTA commands begins after the DP1 module (502) of the SIM provider's platform (500) has obtained the MNO credentials to load into the SIM from its own platform, as described in Figure 8, or from another SIM provider platform, as described in Figures 15 to 18. MNO credentials are those belonging to MNO2 in the case of an EXCHANGE request and those belonging to MNO1, in the case of a back-EXCHANGE request. DP1 encrypts the data (22H) with the SIM provider's SK1 Storage key (500) and sends it to SR1 (505). The SR1 is in charge of configuring an encrypted channel to communicate with the SIM2 Virtual using the ChaveSIMI key, and sends the EXCHANGE commands (22M) to SIM2 (603), encoded with the ChaveSIMI and SK1 keys, through the OTA1 platform ( 507). When the SIM receives the commands, it decrypts them using the SIM-Key and the SK1 key, and executes the appropriate commands to load the data (22J) of the new subscription and to activate it, and then restart itself. When it is restarted, it is registered (22K) in the HLR of the corresponding MNO, using the data from the new signature, IMSI and Ki. The SIM is usually registered in the MNO2 network (300) in the case of EXCHANGE, or in the MNO1 network (400) in the case of Retro-EXCHANGE. If registration on the Network is successful and the use of network resources is authorized, the SIM informs (22L) the SIM provider platform from which it received the orders;
69/94 in this case, since SR1.
[200] Figure 24 illustrates the steps or process for reversing an EXCHANGE, or Retro-EXCHANGE, on Virtual SIM2 (603). To perform a REPLACEMENT, the original MNO profile that the SIM used to have must be loaded back into the SIM. A retro-EXCHANGE process cannot be carried out if the quarantine period has expired or if a previous and successful EXCHANGE request has not occurred. The Retro-EXCHANGE process can be activated manually or automatically by the IMSI1 platform (100). It is automatically launched when one of the EXCHANGE Rules (105) is satisfied and when, for example, the SIM is registered in a country or MNO that matches an entry in this table, or when the time period defined in one of the rules has reached your end. The Retro-EXCHANGE request starts when MNO1 (400) launches a retro-EXCHANGE request (23A) to the IMSI1 platform (100). The IMSI1 platform (100) proves whether a previous EXCHANGE request was made or not. And if so, try to retrieve the IMSI1 / MSISDN1 data (23B) that SIM initially used, from the correlation table (106). In order to retrieve the data (23B), it also uses this correlation table (106) and the MNO correlation table (107) to find on the network that the MNO is SIM in, and how to send requests to the IMSI platform. It also sends a request to the SIM provider's platform (500), to send OTA commands (23C) to the Virtual SIM2 (603), to effect the EXCHANGE. And it sends it to IMSI2 / MSISDN2 currently used by the SIM to be able to locate it, and the data of the new IMSI1 / MSISDN1 to be loaded on the SIM, as parameters. To be able to EXCHANGE, the SIM provider's platform must also obtain other information about the MNO whose subscription you want to upload. In this case, the MNO1 signature that you want to activate, therefore, can be retrieved from its own platform (23D), which is explained in more detail in Figure 8. After obtaining the MNO1 profile data and MSISDN1 / IMS11, the platform (500) of the SIM provider sends the OTA commands to the SIM2 Virtual (603), using an encrypted channel, through an OTA platform, but cannot do
70/94 this using your own keys across the platform (500) of the SIM provider, since SIM2 Virtual belongs to SIM provider2 and SIM will not recognize data encrypted with other keys, or other commands not sent by the platform ( 600) from the SIM provider2. For this reason, the SIM provider's platform (500) sends OTA commands (23E) to the SIM provider2 platform (600), encrypted using its SK1 Storage Key. In addition, the SIM provider2 platform decrypts and encrypts the information (23F) again using its own keys, SK2 and SIMS2, and sends it to Virtual SIM2 (603). When data is downloaded to SIM2 (603), it is decrypted and loaded onto SIM2 (23G), and the data for the new subscription is activated. Then the SIM is restarted and registered on the MNO1 (400) network using the new subscription. The HLR of MNO1 (401) successfully checks the SIM record (23H). If the registration on the MNO1 network was successful, the Virtual SIM2 (603) informs about the success of the operation (23X) to the SIM provider platform, from which it received the EXCHANGE request. In this case, the SIM informs the platform (600) of the SIM provider2. The platform (600) of the SIM provider2 informs (23J) to the platform (500) of the SIM provider, which was the one that initially launched the request. In addition, the SIM provider's platform (500) informs the success of the operation (23K) to the IMSI platform (100), from which it received the EXCHANGE request. At that moment, the IMSI1 platform changes the SIM status (23L) and activates it to allow SIM consumption, and starts billing. It also reports on the success of the operation (23M) to the IMSI2 platform (200), so that you can carry out the appropriate actions, such as changing the SIM status, or deactivating it again, so as not to allow SIM consumption, and stop your billing.
[201] Figure 25 illustrates the main steps of another variant of the general case method presented in Figure 3, assuming that an M2M device, or a traveler equipped with a Virtual SIM1, goes from the MNO1 network to the MNO2 network. An EXCHANGE1 request is posted to Virtual SIM1 (503). The EXCHANGE request is made through the IMS11 platform (100) and the platform (500)
71/94 of the SIM provider. Contrary to the general case, in this case, the Virtual SIM1 (503), before returning to the MNO1 network (400), moves from the MNO2 network (300) to a third party network (MNO3) . At that moment, a new TROCA2 request is launched at the Virtual SIM (503), through the IMSI1 platform (100). But in order to perform the EXCHANGE2 operation, the previous EXCHANGE1 operation must be reversed. A request to reverse the EXCHANGE1 operation, Retro-EXCHANGE1, is also launched by the IMS11 platform (100). Finally, SIM1 Virtual returns to the network (400) of origin of MNO1 and a request is activated to revert the EXCHANGE2 operation, the back-EXCHANGE2. The steps in this use case, shown in Figure 25, are very similar to those shown in the general case in Figure 3. The left side of Figure 25 shows the steps performed during EXCHANGE 1 and EXCHANGE 2 by the network platforms (400) of origin of the MNO1. In the central side of Figure 25, the steps performed by the MNO2 platforms, the first destination, are shown. And finally, to the right of Figure 25, the steps taken by the MNO3 platforms, the second destination, during the TROCA2 process. The process steps are:
[202] - Initialization Step (241): The initial data, IMSI, MSISDN, ..., provided in the Virtual SIM1 (503) are loaded (241a) on the IMS11 platform (100), as described in detail in Figure 4 In parallel, the data that the SIM will use to be attached to the MNO2 network (300) and the third party network, MNO3, is loaded on the IMSI2 platform and on the IMSI3 platform (241b), as shown in Figure 5. These data are used during EXCHANGE1 and EXCHANGE2.
[203] - EXCHANGE preparation step (242): The parameters required to launch the EXCHANGE are configured on the IMS11 platform (100), as shown in Figure 6. The IMSI2 platform (200) is informed about this.
[204] - Before EXCHANGE1, Virtual SIM1 can be used (243) normally on the MNO1 network (400).
[205] - EXCHANGE request step (244): When Virtual SIM1 (503) registers on the MNO2 network (300), an EXCHANGE operation, EXCHANGE 1, as
72/94 in Figure 7, is launched by the IMSI1 platform (100). The IMSI1 platform (100) initiates a dialogue (244) with the IMSI2 platform (200), to obtain the IMSI2 and MSISDN2 that SIM will use in the MNO2 network (300) after the EXCHANGE. It also initiates a dialogue with the SIM1 provider's platform (500), so that the SIM provider's platform obtains the MNO2 credentials, respectively, from the SIM1 provider's platform (500), as described in Figure 8, or from the SIM provider2 platform (600), as described in Figures 15 to 18, and to send all information to the Virtual SIM1 using OTA commands (2443), as described in Figure 9. After that, the Virtual SIM2 can be registered in the network (300) of the MNO2 successfully (2445).
[206] - After EXCHANGE1, Virtual SIM1 (503) can be used (245) on the MNO2 network (300), without having any roaming charges. You can also access your consumption data (as described in Figure 10) or your invoices (as described in Figure 11).
[207] - When Virtual SIM1 (503) registers (248) on the MNO3 network, before launching the TROCA2 operation, an operation must be performed to reverse TROCA1, retro-TROCA1. These two consecutive processes of Retro-EXCHANGE and EXCHANGE were merged into only one process, as described later in Figure 26. The IMSI1 platform (100) initiates a dialogue (2410) with the IMSI3 platform, to obtain the IMSI3 and the MSISDN3 that SIM will use on the MNO3 network. It also initiates a dialogue with the platform (500) of the SIM1 provider, so that the platform of the SIM provider obtains the MNO3 credentials, either from the platform (500) of the SIM1 provider, as described in Figure 8, or from the SIM provider3 platform, as described in Figures 15 to 18, and to send all information, using OTA commands, to Virtual SIM1 (503), as described in Figure 9. After that, Virtual SIM1 can be registered on the network of the MNO3 successfully (2445 '). If the EXCHANGE request is successful, the IMS11 platform (100) reports on the success of the operation to both IMSI2 and IMSI3 platforms, so that they can take the appropriate actions. For example, the platform (200) of
73/94
IMSI2 will disable the SIM on the MNO2 network (300) and the IMSI3 platform will activate the SIM on the MNO3 network.
[208] - After requests for EXCHANGE2 and Retro-EXCHANGE1 (2410), Virtual SIM1 (503) can be used (245 ’) on the MNO3 network (300) without having any roaming charges. You can also access your consumption data. The process for obtaining consumption data would be similar to that described in Figure 10. The main difference between them is that, during the consumption cycle, when the EXCHANGE2 process occurs, SIM consumption should be obtained not only from the IMSI3 platform , but that the consumption of the SIM on the platform (200) of the IMSI2 must also be obtained, before the retro-EXCHANGE1, since the retro-EXCHANGE1 process occurs before the EXCHANGE2, and occurs in the same billing cycle.
[209] - After EXCHANGE2, Virtual SIM1 (503) can be used on the MNO3 network (300). You can also access your invoices. The process for obtaining the billing data would be similar to that described in Figure 11. The main difference between them is that, during some billing cycles, from the moment the TROCA2 process takes place, until Q1 quarantine (249 '), the SIM cost should be obtained not only from the MNO3 billing system, but that the SIM cost should also be obtained from the MNO2 network, before the back-EXCHANGE1, from the MNO2 billing system.
[210] - When the Virtual SIM1 (503) comes back and registers on the MNO1 network (400), a reversal of the EXCHANGE2, back-EXCHANGE2 operation, is launched by the IMSI1 platform (100), as described in Figure 12. The IMS11 platform (100) initiates a dialogue with the IMSI3 platform, to obtain the IMS11 and MSISDN1 that SIM will use on the MNO1 network (400). It also initiates a dialogue with the SIM provider platform (500), so that the SIM provider platform (500) obtains the MNO1 credentials, as described in Figure 8. Then it sends all the information, using OTA commands, to SIM1 Virtual (503), as described in Figure 9. After that, the Virtual SIM1 can be registered in the MNO1 network (400) successfully (2446).
[211] - In this multi-destination network scenario of the illustrated use case
74/94 in Figure 25, there are two distinct processes (249, 249 ’) for proving quarantine periods, Q1 and Q2. Q1 is the time when the quarantine period referred to the TR0CA1 operation expires, and Q2 the time when the quarantine period referred to TR0CA2 expires. The IMS11 platform (100) informs the IMSI3 platform about the exhaustion (249) of the Q2 quarantine time. This process of verifying the depletion of Q2 (249) is exactly similar to that described in Figure 13, where it is decided whether IMS11 can be reused or not (2491) and whether IMSI3 can be reused or not (2492 ’). The IMSI1 platform (100) informs the IMSI2 platform (200) about the exhaustion (249 ’) of the Q1 quarantine time. The process of verifying the depletion of Q1 (249 ') is very similar to that described in Figure 13, but with the contrary that subprocesses 13E, 13F and 13G in Figure 13 will never occur, and subprocesses 13M, 13L will always occur , since the EXCHANGE2 and retroCHANGE1 were carried out beforehand, and therefore IMSI2 is always the one that is returned (2494) to the common warehouse2 (202) and can be reused again. The process (249 ’) of Q1 depletion could occur before or after the retroTROCA2 request.
[212] Figure 26 illustrates the steps to request an EXCHANGE on Virtual SIM1 (503), which is already EXCHANGE. The MNO profile loaded on the SIM must be changed, from MNO2 to MNO3. To perform an EXCHANGE, the previous EXCHANGE must be reversed first. But, given that after reversing the EXCHANGE, a new EXCHANGE will be carried out, instead of loading the MNO1 profile into the SIM, the MNO3 will be loaded directly. The MNO1 profile will not be loaded, because MNO1 credentials were loaded on the SIM at the time of leaving the factory, and the SIM will not be registered on this network at that time. The EXCHANGE request starts when ο MNO1 (400) launches an EXCHANGE request (25A) to the IMSI1 platform (100). The IMSI1 platform (100) proves whether a previous EXCHANGE request, with the same parameters, was made or not. If so, try to recover the IMSI2 / MSISDN2 data (25B) and the IMSI3 / MSISDN3 data that SIM used before, from the table (106) of
75/94 correlation. The IMSI1 platform (100) also uses this correlation table (106) and the MNO correlation table (107) to find in the networks (25B) of which MNO, selected from a first destination (destinol) of MNO2 and a second destination (destination2) of MNO3, the SIM is / was, and how to send requests to your IMSI platform. The IMSI2 / MSISDN2 data currently used by SIM will always be retrieved from the correlation table (106), since the EXCHANGE1 process is taking place. However, a previous EXCHANGE2 request may have occurred. In this case, the IMSI1 platform (100) verifies (25C) if a previous EXCHANGE2 request occurred. In the event that a previous EXCHANGE2 request with the same parameters has not occurred, or if it has occurred, but the data has been erased because the quarantine period has expired, the IMSI3 / MSISDN3 data is not in table (106) of correlation. In this case, the IMS11 platform (100) launches a request (25D) to the IMSI3 platform to obtain the same. The IMSI3 platform searches for an MSISDN3 / IMSI3 available and not yet associated with any SIM in its common warehouse3. Returns them (25G) to the IMS11 platform (100), but, before returning them, delete them from the common warehouse (23E) so they can no longer be used. Therefore, the IMSI3 platform loads them (25F) on its HLR3 so that MSISDN3 / IMSI3 is authorized to use the MNO3 network when EXCHANGE2 occurs. When the IMSI1 platform (100) receives IMSI3 / MSISDN3, it stores this ratio (25H) in the correlation table (106), so that it is available for billing and can be reused in the EXCHANGE / Retro-EXCHANGE. All communication between the IMS11 and IMSI3 platforms is properly encrypted according to the parameters retrieved from the MNO correlation table (107), and exchanged between the IMSI platforms in Figure 6. Encryption of this information is necessary so that both platforms can recognize and validate that requests come from an authorized source. When the IMS11 platform (100) already has the IMSI3 / MSISDN3 data, it fetches it (25X) in the correlation table (106). Then it sends a request to the platform (500) of the SIM provider,
76/94 to send OTA commands (25J) to SIM1 Virtual, to perform the EXCHANGE. And it sends it to IMSI2 / MSISDN2 currently used by the SIM to be able to locate it, and the data of the new IMSI3 / MSISDN3 to be loaded on the SIM, as parameters. To be able to EXCHANGE, the SIM provider's platform (500) must also obtain other information about the MNO whose subscription you want to load. In this case, the MNO3 subscription to be activated. The platform (500) of the SIM provider must check whether it has this information or not (25K). If the SIM provider's platform is the MNO3 SIM provider, it can obtain data from its own platform (25M), as explained in more detail in Figure 8. If the SIM1 provider's platform (500) is not the provider MNO3, data must be requested from the MNO3 SIM provider platform (25L). In this case, the SIM provider3 platform will return the data (25N). The process for obtaining the MNO3 profile from the MNO3 SIM provider is a complex process, which is explained in more detail in Figures 15 to 18. After obtaining the MNO3 profile data and MSISDN3 / IMSI3, the platform ( 500) from the SIM provider sends the OTA commands to the Virtual SIM1 (503), using an encrypted channel, through the OTA1 platform (250). When SIM1 (503) receives the data and data is downloaded to SIM1 (503), it is decrypted and loaded into it, and the data for the new subscription is activated (25P). Then the SIM is restarted and registered on the MNO3 network using the new subscription. The HLR of the MNO3 successfully checks the SIM register (25Q). The O, P and Q processes are explained more fully in Figure 9. If the registration on the MNO3 network was successful, the Virtual SIM1 (503) reports on the success of the operation (25R) to the SIM provider platform, since which received the EXCHANGE request. In this case, the SIM informs the platform (500) of the SIM provider, which in turn informs about the success of the operation (25S) to the platform (100) of IMSI1, from which it received the EXCHANGE request. The IMSI1 platform (100) also reports on the success of the operation to both platforms involved in the EXCHANGE. First, the IMSI1 platform (100) informs the IMSI3 platform (25T), for
77/94 that can carry out the appropriate actions, such as changing the SIM status, or activates it to allow the consumption of the SIM and to start its billing. The IMSI1 platform (100) also informs the IMSI2 platform (200) about the success of the operation (25U), and the IMSI2 platform (200) changes the SIM state and disables it, so as not to allow the consumption of the SIM and stop your billing.
[213] Figure 27 illustrates the main steps of another alternative to the general case method shown in Figure 3, but in this case, the MNO2 network (300) is the one that performs the EXCHANGE request through the IMSI2 platform (200) . Since the IMSI2 platform (200) does not have the necessary infrastructure, you must redirect the EXCHANGE request to the IMSI1 platform (100). The EXCHANGE takes place on SIM2 Virtual (603), but is launched through the platform (500) of the SIM provider, which has not registered SIM2 Virtual (603). Therefore, the SIM provider2 platform (600) is used as an intermediary. In this case, to perform the EXCHANGE, the credential to be loaded into the SIM2 Virtual (603) could belong to MNO1, or even belong to a third party (MNO3), who has an agreement with ο MNO1. In this variant, MNO3 credentials could be stored on the MNO1 SIM provider platform, MNO2 or even a third party. In case they are stored on a third party's SIM provider platform, the process for obtaining credentials from a third party would be similar to the process shown in Figures 15 to 18. The steps of this use case, in which the MNO2 network (300) acts as the origin and the network (400) of MNO1 acts as a destination, are shown in Figure 27, in a very similar way to those shown in the general case of Figure 3. The left side of Figure 27 shows the steps taken during the EXCHANGE process by the platforms of the source network, in this case, the network (300) of MNO2, and on the right, the steps performed by the platforms of the destination network, in this case, the network (400) of MNO1. The process steps are:
[214] - The initial data, IMSI, MSISDN, ..., provided in the Virtual SIM2 (603) are loaded (261a1) on the IMSI2 platform (200), described in more detail in Figure 28. In parallel, the data of the IMSI / MSISDN that SIM will use
78/94 to register on the MNO1 network (400) are loaded (261 b1) on the IMSI1 platform (100). These data are used during the EXCHANGE as shown in Figure 29.
[215] - The parameters needed to launch the EXCHANGE (262) are configured on the IMSI1 platform (100). The IMSI2 platform (200) is informed about this, as described in Figure 6.
[216] - Before EXCHANGE, Virtual SIM2 (603) can be used normally (263) on the MNO2 network (300).
[217] - When SIM2 Virtual (603) registers on the MNO1 network (400), an EXCHANGE operation is launched by the IMSI1 platform (100), described in Figure 30, due to a request from the platform (200) of the IMSI2 to the IMSI1 platform (100). A dialogue between the two platforms (264b) begins to obtain the IMS11 and MSISDN1 that SIM will use on the MNO1 network (400) after the EXCHANGE. It also initiates a dialog (2641) with the SIM1 provider's platform (500), to obtain the MNO1 credentials from the SIM provider's platform (500), as described in Figure 8, and to send this information, using OTA commands (2644), to Virtual SIM2 (603), using the platform (600) of the SIM provider2. After that, the Virtual SIM2 (603) can be registered in the MNO1 network (400) successfully (2646).
[218] - After the EXCHANGE, the Virtual SIM2 (603) can be used (265) on the MNO1 network (400) without having any roaming charges.
[219] - During the time that the SIM is registered in the MNO1 network (400), it is possible to access the consumption data (266b), described further in Figure 31.
[220] - You can also access your invoices (267b), described in detail in Figure 32.
[221] - When the Virtual SIM2 (603) returns and registers on the MNO2 network (300), a reversed EXCHANGE operation, or retro-EXCHANGE, is launched (268b) by the IMSI1 platform (100), at the request of IMSI1 IMSI2 platform (200), described in Figure 33. IMSI1 platform (100) initiates a dialogue with the
79/94 IMSI2 platform (200) to obtain the IMSI2 and MSISDN2 that SIM will use on the MNO2 network (300). It also initiates a dialogue (2642) with the SIM provider platform (500), so that the SIM provider platform (500) obtains the MNO2 credentials. The SIM provider's platform (500) could obtain the MNO2 credentials, either from its own platform, as described in Figure 8, or from the SIM provider2 platform (600), as described in Figures 15 to 18. Therefore, the SIM provider's platform (500) sends all information using OTA commands (2644) to the Virtual SIM2 (603), through the SIM provider2 platform (600). After that, SIM2 Virtual can be registered in the MNO2 network (300) successfully (2645).
[222] - When the quarantine period has passed, the IMSI2 platform (200) lets the IMS11 platform (200) know about it (269b), described in more detail in Figure 34. It is decided whether IMSI1 / IMSI2 will be reused again, or not (2691, 2692).
[223] Most of the processes in Figure 27 are reflections of processes included in the general case of Figure 3. The difference is that the roles of the different components are altered, although almost all flows are similar. Another difference is that the platform has neither an IMSI2 correlation table nor an MNO correlation table. Therefore, all the processes that should obtain data from the correlation table (106), which contains the relationship between the IMSI used in the source and destination platforms, are always delegated to the IMS11 platform to obtain the data, since this table is only on the IMSI1 platform (100). The IMSI1 platform (100) is therefore the platform that manages at any time which IMSI is currently using SIM, since the IMSI2 platform (200) does not have a correlation table. The IMSI2 platform (200) always has to send requests to the IMSI1 platform (100), using its own IMSI2. The IMSI1 platform (100) is also responsible for deciding whether to search for SIM by IMS11 or IMSI2, depending on whether the EXCHANGE or the BACKCHANGE has been carried out. In addition
80/94 IMSI2 platform (200) does not need to know which network the SIM is in after the EXCHANGE, since it will always be on the MNO1 network (400). Therefore, it will always make the request directly to the IMSI1 platform (100), since it is only allowed to EXCHANGE with the IMSI1 platform. Therefore, it is also not necessary to have an MNO correlation table. If there were a possibility that the IMSI2 platform (200) could perform the EXCHANGE with multiple platforms, the existence of these two tables, the MNO correlation tables and the IMSI correlation tables, and the platform (200) of the IMSI2 would search these tables to find out what the SIM's true identity is, and how to locate it. This case would be the same case previously presented, but with the roles reversed.
[224] The steps for SIM2 Virtual (603) to be used on the MNO2 network (300) are described in Figure 28. This is a reflected process, described in Figure 4, used to prepare Virtual SIM1 (503). Before the process can begin, a contract must be signed between the MNO2 network (300) and the SIM provider2 (600). At that time, ο MNO2 provides the necessary data (27A) for the generation of the Ki keys and the MNO2 profile to the SIM provider2 (600). These data are usually stored in a Data Preparation2 module (602). After a while, ο MNO2 orders (27B) the SIM provider2 to manufacture some SIMs with certain characteristics and a specific range of IMSI. During the manufacturing process (27C), the signature data, IMSI, Ki, etc., which allow the SIM to attach to the MNO2 network (300), are stored on the SIM. Two encrypted keys, SK2 or the storage key and the SIM2 key, are still stored on the SIM. The keys are used to encrypt all data exchanged between SP2 and DP2, and between Virtual SIM2 (603) and SR2. Once the SIMs are manufactured, the SIM provider2 (600) returns a file (27D) that contains the relationship between the IDICC and IMSI, among other things, to the MNO2 network (300). This file is loaded (27E) on the IMSI2 platform (200) by MNO2, and the data is stored in SIM2 Inventory2 (203). Before SIM can be used
81/94 used, must have an MSISDN. To this end, ο MNO2 loads a file (27F), with the association between MSISDN2 and IMSI2, on the IMSI2 platform (200). Associations between MSISDN2 and IMSI2 are also stored in the SIM inventory2. Therefore, the IMSI2 platform (200) proves whether the data correspond to physical SIM or not (27G). If the data corresponds to physical SIM, the platform (200) of the IMSI2 load (27H) the SIM data, the Ki Keys and the IMSI / MSISDN in the HLR (301) of the MNO2. From that point onwards, SIM2 Virtual (603) is authorized to use the MNO2 network. If the IMSI2 / MSISDN2 data does not correspond to any physical SIM (27G), it is stored (27X) in the common warehouse2 (202) and can be used during EXCHANGE.
[225] Figure 29 describes the steps required to load IMS11 / MSISDN1 on the IMSI1 platform (100). IMSI1 / MSISDN1 will be used by Virtual SIM2 (603), to attach to the network (400) of MNO1, the destination network in this case, once the EXCHANGE has been carried out. Before the process can begin, a contract must be signed between ο MNO1 and a SIM provider to manufacture the SIM. The process starts when ο MNO1 provides the necessary data (28A) that will allow SIMs to be authorized to use the MNO1 network (400). If the MNO1 network (400) has signed a contract with the SIM provider (500), the MNO1 network (400) provides the data (28A1) to the SIM provider (500); otherwise, if ο MNO1 signed a contract with SIM2 provider2 (600), MNO1's network (400) provides data (28A2) to SIM2 provider2 (600). When some time has passed, and the EXCHANGE is extremely likely, ο MNO1 loads a file (28B), with the association between IMSI1 and MSISDN1, on the IMSI1 platform (100). The IMSI1 platform proves that the data does not correspond to physical SIM (28C), since their data has not yet been stored in the SIM Inventory (103) and, therefore, stores the data (28D) in the common warehouse (102), so that can be used during EXCHANGE.
[226] Figure 30 illustrates the steps or process for requesting an EXCHANGE
82/94 in SIM2 Virtual (603). An EXCHANGE process can only be activated by the IMSI1 platform (100), as this is the platform that has the necessary infrastructure. If it is desired to launch an EXCHANGE from the IMSI2 platform (200), the IMSI2 platform (200) must make an EXCHANGE request to the IMS11 platform (100) to do this (29A, 29B). The following steps (29C to 29T) are reflective of the steps shown in Figure 7. The EXCHANGE request starts when the MNO2 network (300) launches an EXCHANGE request (29A) to the IMSI2 platform (200), which, for in turn, resends (29B) the request to IMS11 platform (100). The IMSI1 platform (100) verifies whether or not a previous EXCHANGE request was made with the same parameters and, if so, the IMS11 platform (100) tries to recover the IMS11 / MSISDN1 data (29C) that the SIM used before, from the correlation table (106). In the case (29D) that a previous EXCHANGE request with the same parameters has not occurred, or if it has occurred, but the data has been deleted because the quarantine period has expired, the IMS11 / MSISDN1 data is not in the table ( 106) of correlation. In this case, the IMSI1 platform (100) searches for available MSISDN1 / IMSI1, not yet associated with any SIM, in its common warehouse (102), and adds them (29F) to the correlation table (106), but before that , eliminates them (29E) from the common warehouse (102), so they can no longer be used. Therefore, it loads them (29G) in its HLR1 (401) so that MSISDN1 / IMSI1 are authorized to use the MNO1 network (400) when the EXCHANGE occurs. The IMSI1 platform (100) stores this relationship between IMS11 and IMSI2 in the correlation table (106), so that it is available for billing and can be reused in EXCHANGE / Retro-EXCHANGE. When the IMS11 platform (100) already has the IMSI1 / MSISDN1 data, it searches for it (29H) in the correlation table (106). Then the IMSI1 platform (100) sends a request to the SIM provider platform (500), to send OTA commands (29X) to SIM2 Virtual, to perform the EXCHANGE. And it sends it to IMSI2 / MSISDN2 currently used by the SIM to be able to locate it, and the data of the new IMSI1 /
83/94
MSISDN1 to be loaded on the SIM, as parameters. To be able to EXCHANGE, the SIM provider's platform (500) must also obtain other information about the MNO whose subscription you want to load. In this case, the MNO1 subscription to be activated. The SIM provider's platform (500) can obtain the data from its own platform (29J), which is explained in more detail in Figure 8. After obtaining the MNO1 and MSISDN1 / 1MS11 profile data, the platform ( 500) from the SIM provider sends the OTA commands to the SIM2 Virtual (603), but as the SIM2 Virtual does not belong to the SIM provider and has not been registered on the SIM provider's platform (500), it cannot send the command directly, but the SIM provider's platform (500) can do this through the SIM provider2's platform (600). The platform (500) of the SIM provider sends (29K) the data to be loaded on the SIM to the platform (600) of the SIM provider2, encrypted with the SK1 key of the SIM provider. The SIM provider2 platform (600) decrypts the information and encrypts it again using its own SK2 and SIMS2 keys. It then sends it to SIM2 Virtual (603) using an encrypted channel, through the OTA2 platform (29L). When SIM2 (603) receives the data, they are decrypted, using SK2 and SIMS2 key, are loaded into it and the data of the new subscription is activated (29M). Then the SIM is restarted and registered on the MNO1 network (400) using the new subscription. The HLR of MNO1 (401) successfully checks the SIM record (29N). Flows 29K to 29P are explained more fully in Figures 21 to 23, by various implementation options. If registration on the MNO2 network (300) is successful (29N), the Virtual SIM2 (603) informs about the success of the operation (290) to the SIM provider platform, from which it received the EXCHANGE request. In this case, the SIM informs the platform (600) of the SIM provider2, which also informs (29P) to the platform (500) of the SIM provider, which was what actually generated the request. The SIM provider's platform (500) informs about the success of the operation (29Q) to the IMSI1 platform (100), from which it received the EXCHANGE request. At that moment, the IMS11 platform (100) informs the success of the operation (29R) to the IMSI2 platform (200), so that
84/94 can take appropriate actions, such as changing the SIM status, or deactivating it to not allow SIM consumption and stop its billing. When the IMS11 platform (100) receives (29S) from the IMSI2 platform (200) the confirmation of the status change, the IMSI1 platform (100) changes the status of the SIM (29T) and activates it to allow the consumption of the YES, and your billing begins.
[227] When the MNO2 network (300) wants to be able to use Virtual SIM2 (603) during a given billing cycle, which may be the current cycle or not, the process followed, shown in Figure 31, is an identical process as described in Figure 10. The MNO2 network (300) asks the IMSI2 platform (200) to consume the SIM (30A). The IMSI2 platform (200) proves whether the SIM was in EXCHANGE or not during the cycle (30B). If the SIM was not in EXCHANGE, the SIM consumption during this cycle (30G) is only that performed on the IMSI2 platform (200), which is returned (30H) to the MNO2 network (300). If the SIM was in EXCHANGE, or is currently in EXCHANGE, the IMSI2 platform (200) makes a request (30C) directly to the IMSI1 platform (100). The IMSI1 platform (100) seeks the list of IMSI (30D) in the correlation table (106), to know that IMSI1 is using SIM, which initially has an IMSI2, in the MNO1 network (400). The IMSI1 platform (100) obtains the SIM consumption during this EXCHANGE cycle (30D1), and returns it (30E) to the IMSI2 platform (200). The IMSI2 platform (200) also proves whether the EXCHANGE lasted the full cycle (30F) or not. If the EXCHANGE lasted the entire cycle, the SIM consumption is only the fact on the IMSI1 platform (100), which is returned (30H) to the MNO2 network (300). If the EXCHANGE did not last the entire cycle (30F), the IMSI2 platform (200) adds (30M) the consumption of the SIM on the IMSI1 platform (100) plus its consumption on the IMSI2 platform (200), and returns the result ( 30H) to the MNO2 network (300).
[228] Figure 32 shows the following steps when the MNO2 billing system (302) wants to bill (31A) a Virtual SIM2 (603) during a given billing cycle (which may be the current cycle or not). This is a process
85/94 identical to that shown in Figure 11. Firstly, the MNO2 billing system (302) asks for the consumption (31C1) of your SIMs, that is, those with an IMSI2, to the IMSI2 platform (200). It also obtains consumption not invoiced by the IMSI2 platform (200), from external systems (31C2), such as SMS consumption, or voice call consumption, from SMSC and / or MSC. Then, it calculates the cost per use of SIM with IMSI2 and the cost per service (31C3) using both information. Second, the MNO2 billing system (302) asks for the cost (31B1) of some SIMs, which IMSI2 knows are / were or were EXCHANGED, from the MNO1 billing system (403). The MNO1 billing system (403) knows what is the relationship between the IMSI, looking for it in the correlation table (106) and, therefore, can easily know which of the IMSI1 matches a specific one of the IMSI2. The MNO1 billing system (403) makes a request to the IMSI1 platform (100) to obtain the consumption of the IMSI1 (31B2). It also obtains consumption not invoiced by the IMSI1 platform (100), from other external systems (31B4). Then it uses both data to calculate the cost per SIM, using IMSI1 and the cost per service (31B3), and returns it to the MNO2 billing system (31B5). The MNO2 billing system (302) initiates billing (31 D). If the SIM is no longer in EXCHANGE (31D1), or has been in EXCHANGE and the quarantine period has expired (31D2), the SIM cost (31D3) is only the one carried out on the MNO2 network (300), since, due to the quarantine period has expired, all costs that SIM had incurred on the MNO1 network have already been billed. If the SIM is no longer in EXCHANGE (31D1), or has been in EXCHANGE and the quarantine period has expired (31D2), the SIM cost will be the cost of consumptions (31E5) that you made on the MNO2 network (300), more the consumption that had been made in the MNO1 network (400) and that had not yet been billed. To find out what consumption has been made on the MNO1 network (400), the MNO2 billing system (302) performs the pairing of the IMSI2 and the IMSI1 (31E2), searching (31E3) for the MNO1 billing system (402), which searches (31E4) in the table (106) of the correlation of the platform (100) of the IMSI1. If the SIM
86/94 is in EXCHANGE (31D1), and the EXCHANGE started in the middle of the billing cycle (31E1), the cost of the SIM will be the cost of consumption (31E5) that you made in the MNO2 network (300), plus the consumption that had fact on the network (400) of MNO1. To find out what consumption has been made on the MNO1 network (400), the MNO2 billing system (302) performs the pairing of IMSI2 and IMSI1 (31E2), seeking (31E3) to the MNO1 billing system (402), which searches (31E4) in the table (106) of the correlation of the platform (100) of the IMSI1. If the SIM is in EXCHANGE (31D1), and the EXCHANGE did not start in the middle of the billing cycle (31E1), it means that the SIM was only used in the MNO1 network (400), so its costs will only be the cost of consumption ( 31G3) performed on the MNO1 network (400). To find out what consumption has been made on the MNO1 network, the MNO2 billing system (302) performs the matching of the IMSI2 and the IMSI1 (31G1), seeking (31E3) to the MNO1 billing system (402), which seeks ( 31E4) in the correlation table (106) of the IMSI1 platform (100). Finally, check whether the quarantine period has ended or not (31F1). If it is exhausted, then the EXCHANGE is permanent and the SIM is transferred to MNO1 (31F2), and from that moment, the MNO1 Billing system (402) starts billing it to the final customer.
[229] Figure 33 illustrates the steps or the process to reverse an EXCHANGE, or the retro-EXCHANGE, in Virtual SIM2 (603). A back EXCHANGE request can only be launched from the IMSI1 platform (100), as this platform has the necessary infrastructure. If the back-EXCHANGE request wants to be requested from the IMSI2 platform (200), the IMSI2 platform (200) makes a request (32B) to the IMS11 platform (100) to do this. Since flow 32B, the flows in the figure are a reflection of those shown in Figure 12. The back-EXCHANGE request starts when the MNO2 network (300) launches (32A) a back-EXCHANGE request to the IMSI2 platform (200) , which redirects the request (32B) to the IMSI1 platform (100). The IMSI1 platform (100) proves whether a previous EXCHANGE request was made or not; if so, try to recover the data (32C) from IMSI2 /
87/94
MSISDN2 that SIM used initially, and the IMS11 / MSISDN1 data that SIM is currently using, from the correlation table (106). It also sends a request to the SIM provider's platform (500), to send the OTA commands (32D) to the Virtual SIM2 (603), to effect the EXCHANGE. And it sends the IMSI1 / MSISDN1 currently used by the SIM to be able to locate it, and the data of the new IMSI2 / MSISDN2 to be loaded on the SIM, as parameters. In order to be able to EXCHANGE, the SIM provider's platform (500) also obtains other information about the MNO (32E) whose subscription you want to load. In this case, the MNO2 subscription wants to be activated, so check if it can be retrieved from its own platform (32E3), as explained in more detail in Figure 8, or if it can be retrieved (32E1, 31E2) from the platform (600) from SIM provider2. After obtaining MNO2 profile data and MSISDN2 / IMSI2, the SIM provider platform (500) sends OTA commands to Virtual SIM2 (603), using an encrypted channel, through an OTA platform, but cannot do so this using your own keys across the SIM provider's platform (500), given that Virtual SIM2 (603) belongs to SIM provider2 and SIM will not recognize encrypted data with other keys or other commands not sent by the platform (600 ) of the SIM provider2. For this reason, the SIM provider's platform (500) sends OTA commands (32F) to the encrypted SIM provider2 platform (600) using its SK1 Storage Key. The SIM provider2 platform decrypts and encrypts the information again using its own keys, SK2 and SIMS2, and sends it (32G) to Virtual SIM2 (603). When data is downloaded to SIM2 (603), it is deciphered, and loaded into it, and the data for the new subscription is activated (32H). Then the SIM is restarted and registered on the MNO2 network (300) using the new subscription. The HLR of MNO2 (301) successfully checks the SIM register (32X). If the registration on the MNO2 network (300) is successful (32K), the Virtual SIM2 (603) informs about the success of the operation (32J) to the SIM provider platform, from which it received the EXCHANGE request. In this case, the SIM informs the platform (600) of the
88/94 SIM provider2. The platform (600) of the SIM provider2 informs (32K) to the platform (500) of the SIM provider, which was the one that initially launched the request. In addition, the SIM provider's platform (500) informs the success of the operation (32L) to the IMS11 platform (100) from which it received the EXCHANGE request. At that moment, the IMSI1 platform (100) changes the SIM status (32M) and deactivates it, so as not to allow SIM consumption, and stops its billing. It also reports on the success of the operation (32N) to the IMSI2 platform (200), so that you can carry out the appropriate actions, such as changing the SIM status, or activate it again to allow the consumption of the SIM, and to start your billing.
[230] Figure 34 illustrates the sequence of steps activated when the quarantine period ends. This process is identical to that described in Figure 13. When the IMSI2 platform (200) notices that the quarantine period has expired (33A) for a SIM, inform the platform corresponding to the network where the SIM is, or has been in EXCHANGE, in this case, the only platform with which you can EXCHANGE is the IMSI1 platform (100), so you always inform it (33C). The IMSI2 platform (200) also reports (33B) to the MNO2 Billing system (302). The IMSI2 platform (200) waits for the billing cycle after the quarantine ends, before starting any process related to the quarantine, to prevent any consumption made in the originating network from being invoiced properly (33A1). When the billing cycle ends after the quarantine period, the IMSI2 platform (200) also checks if there was a request to reverse the EXCHANGE, or if the SIM is still in EXCHANGE (33D). If the SIM is still in EXCHANGE and the EXCHANGE has not been reversed, the EXCHANGE becomes permanent and the Virtual SIM2 (603) will remain on the MNO1 network (400) indefinitely, and is transferred to MNO1. Since the SIM has belonged to MNO1 since that time, and since MSISDN2 / IMSI2 will no longer be used by the SIM in the originating network, the MSISDN2 / IMSI2 data is returned (33F) to the common warehouse2 (202), and is downloaded ( 33E) from the HLR (301) of the
89/94
ΜΝ02 and reused. In addition, when the IMS11 platform (100) receives notification of quarantine time out (33C), it informs (33G) to the MNO1 Billing system (402), so you can consider it when you bill the SIM. The IMSI1 platform (100) waits for the billing cycle after the quarantine ends, before starting any process related to the quarantine, to prevent any consumption made on the destination network from being properly invoiced (33A2). When the billing cycle ends after the quarantine time has elapsed, the IMSI1 platform (100) also checks (33H) if there was a request to reverse the EXCHANGE, or retroCHANGE. If there is a back-EXCHANGE request, the IMS11 platform (100) knows that no more SIM2 consumption will arrive in the MNO1 network (400) and therefore eliminates (33M) the relationship between IMSI2 and IMS11 in the table (106 ), and, given that MSISDN1 / IMSI1 will no longer be used by SIM2, they are returned (33J) to the common warehouse (102), and are discharged (33K) from MNO1's HLR (401), and reused.
[231] In all the cases described above, the source MNO, or source network, and the destination MNO, or destination network, were assumed to use different platforms to effectively manage the use of SIM and network resources, for example, the use of IMSI / MSISDN and their assignment to SIM. In addition, it was assumed that the platforms of the first MNO, ο MNO1, have the infrastructure to EXCHANGE the SIMs, but the platforms of the second MNO, MNO2, do not have the infrastructure. Finally, it was assumed that, while ο MNO1 relies on SIM provider, the residue of MNO1, destination MNO2 and / or MNO3, can rely on a SIM provider other than the one supported by NO MNO1.
[232] The present invention has application in different use cases, which can be divided according to two criteria: 1) EXCHANGE length and destinations and 2) EXCHANGE required architecture.
[233] Use cases divided by destination and EXCHANGE duration [234] Temporary EXCHANGE: The case of a person, or traveler with a piece of furniture
90/94 or an M2M device, such as a car or an electronic book, purchased in Spain, for example, or elsewhere. Both the M2M and mobile devices are equipped with an MNO1 SIM, from Spain. The traveler goes to another country, for example, Portugal, where he uses the device, after the EXCHANGE, and where there is support from another MNO, ο MNO2. SIM credentials are changed from MNO1 to MNO2. After that, the traveler returns to Spain and the same credentials as the Spanish MNO1, initially used by the SIM before the EXCHANGE, will be reassigned to the SIM, after a retro-EXCHANGE or reversal of the EXCHANGE. This case is described in the general case of Figure 3.
[235] Permanent exchange: An M2M device, for example, a car, is manufactured in Germany. Your SIM is endowed with the credentials of an MNO1 from Germany, with which the car manufacturer has a contract. The cars are tested at the factory and then sold in several countries, where there are some agreements with other MNOs. The car will remain at the destination indefinitely, so it is necessary to EXCHANGE the SIM when arriving at the destination country, and it is unlikely that the car will return to Germany. The EXCHANGE becomes permanent after a fixed time without a request for exchange, the recovery of the same credentials as MNO1 is disabled, and can be reassigned to a new SIM. Another characteristic that makes this EXCHANGE distinct is that the country where the car will be marketed may be unknown, but it is applicable if the region or time of arrival is well known. In this case, every car sold in the same region can be forced to use the same credentials as an MNO2, regardless of the country. This case also applies to travelers or other M2M devices, such as electronic books, counters, ..., although its application to a traveler is less likely. This case is described in the general case of Figure 3.
[236] Travel to multiple locations. A traveler has a mobile device or an M2M device that contains a SIM from a country MNO1, for example: Spain. The traveler goes to another country, for example, Norway, where he uses the device, after changing SIM credentials, from ο MNO1 in Spain
91/94 to Norway's MNO2. The traveler goes to a third country, for example, Russia, where he uses the device after changing SIM credentials, from ο MN02 to Russia's MNO3. After that, the traveler returns to the country of origin, Spain, and uses the device after reversing the EXCHANGE, and therefore the SIM credentials are changed by those of the MNO1 that the SIM initially used. This case is described in the case of multiple destinations in Figure 25.
[237] 2) Use cases according to the EXCHANGE architecture for integration [238] 2.1) General case: A person, or traveler, with a mobile phone or an M2M device with an MNO1 SIM, for example, Spain . The traveler, or M2M device, travels to another country, for example, Japan. It is desired to use the device, after an EXCHANGE, in the destination country with Japan's MNO2 credentials. Although the SIM provider is the same for ο MNO1 and ο MNO2, so you have both MNO1 credentials from Spain and MNO2 in Japan, the IMSI platforms of MNO1 and MNO2 are not the same. This case is described in the general case of Figure 3.
[239] 2.2) A person, or traveler with a mobile or M2M device equipped with an MNO1 SIM from Spain, but the traveler or ο M2M travels to the United States. After an EXCHANGE, you want to use the device with US MNO2 credentials. The SIM Provider for MNO1 and MNO2 is not the same, unlike the previous case. Therefore, only the MNO2 SIM provider has MNO2 credentials. Communication between both SIM providers is required to exchange MNO2 credentials. This case is described in Figure 14.
[240] 2.3) A person, or traveler with a mobile or M2M device distributed by the MNO1 of one country, for example, Spain, and the traveler, or the M2M device, travels to another country, for example, China, but after an EXCHANGE, you want to use the device with MNO2 credentials in China. This case is described in Figure 19 and there may be two possible sub cases:
92/94 [241] 2.3.1) The SIM included in the mobile, or M2M device, belongs to MNO1, and has been manufactured by the SIM provider2, which is not the usual SIM provider of MNO2, or MNO1. Ο MNO1 decided to use it for contractual reasons, for example, the SIM is cheaper, or, due to the fact that the M2M device, or cell phone, has special features, it must be equipped with a SIM from the SIM provider2.
[242] 2.3.2) The SIM included in the M2M or mobile device was manufactured by MNO1 to respond to a request from MNO2. The usual MNO2 SIM is used to manufacture it. The SIM is manufactured by the SIM provider2. They are initially assigned MNO1 credentials to prove them, but once they have been proven, they are sent to China to be marketed there. There has to be a change of credentials by China's MNO2 credentials before they can be marketed.
[243] In both sub-cases, although the EXCHANGE is carried out on the SIM of the provider 2, all the necessary infrastructure for the EXCHANGE is in the hands of the SIM provider. The SIM provider that has MNO1 credentials could be either the SIM provider or provider2. However, MNO2 credentials can be given to the SIM provider, or provider2, or even to a third party. In this case, the process for obtaining the credentials of a third party would be the same as the process for the SIM provider to obtain the credentials of the SIM provider2.
[244] 2.4) A traveler with a cell phone, or an M2M device equipped with a SIM from a country MNO2, for example, Turkey, and Turkey's MNO2 platform does not have the necessary infrastructure for EXCHANGE on the SIM of the MNO2, and it does so through a request from the MNO2 platform to the MNO1 platform. Different sub-cases can be considered:
[245] 2.4.1) The traveler or the device travels to a different country, for example, Spain. After an EXCHANGE, you want to use the device with MNO1 credentials from Spain. The SIM provider for MNO1 and MNO2 may or may not be the same
93/94 [246] 2.4.2) The traveler travels to a country on an MN03 that has an agreement with ο MNO1 from Spain. After an EXCHANGE, you want to use the device with MNO3 credentials. The EXCHANGE is launched by the MNO1 platform. The SIM provider that has MNO3 credentials could be the same one that has MNO1 or MNO2 credentials, or a third party. In the latter case, the process for obtaining the credentials of a third party would be similar to that followed by the SIM provider to obtain the MNO2 credentials from the SIM provider2.
[247] These two cases are included in the case of Figure 27.
[248] A variant of this fourth case 2.4 would be one in which a Turkish MNO2 SIM is manufactured in an external country, other than Turkey, and is provided with non-MNO2 credentials. In this case, before you can use the SIM, it would be necessary to activate an EXCHANGE request from the MNO2 platform to set the MNO2 credentials. But the MNO2 platform does not have the necessary infrastructure, so you must redirect the request directly to the MNO1 platform. This case is similar to case 2.3.
[249] Another variant of case 2.4 would be one in which ο MNO2 from Turkey wants to EXCHANGE a SIM that does not belong to it, for example, EXCHANGE a SIM from MNO1 or a third party. This EXCHANGE would also be made by requesting the MNO2 platform to the MNO1 platform, since ο MNO2 has no infrastructure for the EXCHANGE. This case is similar to the general case 2.1, of EXCHANGE in SIM of MNO1, or is similar to case 2.3, of EXCHANGE in SIM of a third party.
[250] In case 2.4, if the MNO2 platforms had the necessary infrastructure to EXCHANGE the SIM, the EXCHANGE could be carried out directly by them. There would be no need to redirect the request to the MNO1 platforms.
[251] Note that in this text, the term "comprises" and its derivatives (such as "comprising", etc.) should not be understood in an exclusive sense, that is, these terms should not be interpreted as
94/94 excluding the possibility that what is described and defined may include more elements, stages, etc.
1/4
权利要求:
Claims (14)
[1]
1. Method for administering devices with subscription on mobile networks, the method comprising:
- obtain, on a network (400) originating from a first mobile network operator (MNO1), data associated with at least one physical SIM of a device comprising an embedded SIM card (eUICC), and with a subscription on the network (400 ) of origin, and characterized by additionally comprising:
- obtain, on a destination network (300) from a second mobile network operator (MNO2), to which the device travels, static data and dynamic data associated with at least one virtual SIM (503, 603) of the device;
- obtaining dynamic data, comprising a subscriber authentication key (Ki), from a SIM provider platform (500, 600) on which the destination network (300) is based;
- store the static data, comprising the IMSI and MSISDN identities, of the virtual SIM (503, 603) in at least one common warehouse (202) of the destination network (300);
- for a selected virtual SIM, check in a correlation table (106) of the first mobile network operator (MNO1) if there is an association between the static data obtained from the common store (202) for the selected virtual SIM and the SIM data obtained from the source network (400).
[2]
Method according to claim 1, characterized in that it further comprises whether a request for an IMSI exchange is sent from the source network (400) to the destination network (300), and
- there is no association of data with the physical SIM in the correlation table (106), the steps of:
- obtain the static data of the selected virtual SIM from the common warehouse (202) of the destination network (300)
- associate the obtained static data and the dynamic data obtained
2/4 of the SIM provider platform (500, 600), of the selected virtual SIM, with the physical SIM data in the correlation table (106);
- eliminating the static data of the selected virtual SIM from the common warehouse (202) of the destination network (300);
- upload static data and dynamic data from the selected virtual SIM to the embedded SIM card (eUICC);
- disable the physical SIM data on the embedded SIM card (eUICC) and enable the loaded static data and dynamic data of the selected virtual SIM on the embedded SIM card (eUICC);
- use the data from the physical SIM and the static data and dynamic data enabled from the selected virtual SIM to launch a first IMSI exchange.
[3]
Method according to any one of claims 1 to 2, characterized in that the association between data from the physical SIM with the static data and the dynamic data from the selected virtual SIM remains stored in the correlation table (106) during a quarantine time .
[4]
4. Method, according to claims 2 and 3, characterized in that the data of the physical SIM is eliminated from the correlation table (106) when the quarantine time has expired and no back-EXCHANGE is requested.
[5]
5. Method, according to claims 2 and 3, characterized in that it additionally comprises receiving a notification of the success of the first IMSI exchange launched and, if a reversed EXCHANGE is launched, the retro-EXCHANGE, before the quarantine time is up. runs out, enable physical SIM data on the built-in SIM card (eUICC).
[6]
6. Method, according to claims 2 and 3, characterized in that it additionally comprises receiving a successful notification of the first IMSI exchange launched and, if the quarantine time is up and no reversed EXCHANGE and no back EXCHANGE are launched, store the physical SIM data in a common warehouse (102) of the source network (400),
3/4 to be used on a virtual SIM (503, 603).
[7]
Method according to any one of claims 3 to 4, characterized in that an additional IMSI exchange is launched using the data from the physical SIM and the dynamic data from the selected virtual SIM, if no notification of the success of the first exchange is received IMSI launched before the quarantine time expires.
[8]
8. Method according to claim 3, characterized in that the quarantine time is a preset time, during which the IMSI and MSISDN identifiers are blocked in terms of their reuse for both source networks (400, 300) and destination.
[9]
Method according to any one of claims 1 to 8, characterized in that the dynamic data of the virtual SIM (503) is provided by a first SIM provider platform (500), with support from the source network (400).
[10]
Method according to any one of claims 1 to 9, characterized in that the dynamic data of the virtual SIM (603) is provided by a second SIM provider platform (600), with support from the destination network (300).
[11]
11. System for the administration of subscriber devices on mobile networks, the system comprising:
- a source network (400) from a first mobile network operator (MNO1) and at least one destination network (300) from a second mobile network operator (MNO2), the source network (400) obtaining data associated with at least one physical SIM from a subscriber device, with subscription on the source network (400) and traveling to the destination network (300);
and characterized by additionally understanding:
- a SIM provider platform (500, 600), on which the destination network (300) is supported, and from which the destination network (300) obtains dynamic data, comprising a subscriber authentication key (Ki );
- at least one common warehouse (202) in which the network (300) of
4/4 destination stores static data, which comprises IMSI and MSISDN identities, static data and dynamic data being associated with a virtual SIM (503, 603) of the subscriber device;
- a correlation table (106) of the first mobile network operator (MNO1), which is checked to find, for a selected virtual SIM, whether there is an association between the static data obtained from the common warehouse (202) for the selected virtual SIM and the physical SIM data obtained from the source network (400).
[12]
System according to claim 11, characterized in that the subscriber device is an M2M device.
[13]
System according to claim 11, characterized in that the subscriber device is a mobile terminal.
[14]
System according to any one of claims 11 to 13, characterized in that it additionally comprises a third party network (MNO3), to which the device travels, and to which the original network (400) requests an IMSI exchange.
1/34 (PREVIOUS TECHNIQUE)
2/34
ORIGIN MN01 MNO2 DESTINATION
OTA CONTROLS (011 |
3/34
4/34
5/34
类似技术:
公开号 | 公开日 | 专利标题
BR102015032106A2|2018-04-03|METHOD AND SYSTEM FOR DYNAMIC ADMINISTRATION OF MOBILE NETWORK SUBSCRIBER DEVICES
ES2574421T3|2016-06-17|Global platform for subscriber identity module management
US9661666B2|2017-05-23|Apparatus and methods of identity management in a multi-network system
ES2754216T3|2020-04-16|Provisioning method of a subscriber profile for an insured module
ES2818917T3|2021-04-14|Service sharing system and apparatus
TWI492603B|2015-07-11|Access data provisioning apparatus and methods
US10455385B2|2019-10-22|Provisioning a network subscription
US20160050555A1|2016-02-18|Global platform for managing subscriber identity modules
BR112019016200A2|2020-03-24|METHOD FOR ESTABLISHING A BIDIRECTIONAL COMMUNICATION CHANNEL BETWEEN A SERVER AND A SECURITY ELEMENT, MATCHING SERVERS AND SECURITY ELEMENT
US10292039B2|2019-05-14|Systems and methods for enhanced mobile data roaming and connectivity
WO2016131324A1|2016-08-25|Implementation method and device for reprogrammable sim cards
KR20130000352A|2013-01-02|User equipment with embedded uicc, activating method of user equipment, terminating method of user equipment, user equipment managing server, user equipment ordering method of user equipment managing server, and user equipment activating method of user equipment managing server
KR102111809B1|2020-05-18|Mobile device activation via dynamically selected access network
ES2743576T3|2020-02-19|Procedure and apparatus for managing a profile of a terminal in a wireless communication system
同族专利:
公开号 | 公开日
CL2015003692A1|2016-10-07|
MX2015017678A|2016-08-30|
MX351474B|2017-10-17|
US20160183081A1|2016-06-23|
EP3035724A1|2016-06-22|
US9787343B2|2017-10-10|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

JP2008500756A|2004-05-27|2008-01-10|ノキアコーポレイション|Multi-mode roaming management portable device|
US8478238B2|2005-04-29|2013-07-02|Jasper Wireless, Inc.|Global platform for managing subscriber identity modules|
US8209550B2|2007-04-20|2012-06-26|Telefonaktiebolaget Lm Ericsson |Method and apparatus for protecting SIMLock information in an electronic device|
US20090215449A1|2008-02-26|2009-08-27|Netanel Avner|System and Method for Virtual Roaming of Mobile Communication Devices|
GB0916582D0|2009-09-22|2009-10-28|Software Cellular Network Ltd|Subscriber identification management broker for fixed/mobile networks|
US8874167B2|2009-11-17|2014-10-28|Broadcom Corporation|Method and system for multi-standby operation for a multi-SIM multi-standby communication device|
US9723481B2|2010-10-29|2017-08-01|Apple Inc.|Access data provisioning apparatus and methods|
US20120276872A1|2011-04-28|2012-11-01|Nokia Corporation|Method and apparatus for over-the-air provisioning|
EP2745206A4|2011-08-15|2015-06-17|Roamware Inc|Method and system for providing cloud subscriber identity module |
DE102012018540A1|2012-09-19|2014-03-20|Giesecke & Devrient Gmbh|Subscriber identity module for authenticating a subscriber to a communication network|
NO336691B1|2012-12-14|2015-10-19|Ipco As|Method of Serving Visitor Subscribers in a Mobile Communications System|
US9066330B2|2013-09-30|2015-06-23|Qualcomm Incorporated|Simultaneous voice and data for Dual-SIM-Dual-Standby wireless device|
EP3035724A1|2014-12-19|2016-06-22|Telefónica, S.A.|Method and system for dynamic managing of subscriber devices with multi-imsi sims in mobile networks|CN107360310B|2014-12-12|2019-12-13|华为技术有限公司|mobile terminal and resource management method thereof|
EP3035724A1|2014-12-19|2016-06-22|Telefónica, S.A.|Method and system for dynamic managing of subscriber devices with multi-imsi sims in mobile networks|
US20170118635A1|2015-10-26|2017-04-27|Nokia Solutions And Networks Oy|Key separation for local evolved packet core|
CN105516962B|2015-12-03|2019-03-05|中国联合网络通信集团有限公司|Account-opening method and system based on eUICC|
US9838991B1|2016-08-15|2017-12-05|At&T Intellectual Property I, L.P.|Method and apparatus for managing mobile subscriber identification information according to registration requests|
US9967732B2|2016-08-15|2018-05-08|At&T Intellectual Property I, L.P.|Method and apparatus for managing mobile subscriber identification information according to registration errors|
US9924347B1|2016-09-14|2018-03-20|At&T Intellectual Property I, L.P.|Method and apparatus for reassigning mobile subscriber identification information|
US9843922B1|2016-09-14|2017-12-12|At&T Intellectual Property I, L.P.|Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration errors|
US10015764B2|2016-09-14|2018-07-03|At&T Intellectual Property I, L.P.|Method and apparatus for assigning mobile subscriber identification information to multiple devices|
US9794905B1|2016-09-14|2017-10-17|At&T Mobility Ii Llc|Method and apparatus for assigning mobile subscriber identification information to multiple devices according to location|
US9814010B1|2016-09-14|2017-11-07|At&T Intellectual Property I, L.P.|Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration requests|
US9906943B1|2016-09-29|2018-02-27|At&T Intellectual Property I, L.P.|Method and apparatus for provisioning mobile subscriber identification information to multiple devices and provisioning network elements|
US9918220B1|2016-10-17|2018-03-13|At&T Intellectual Property I, L.P.|Method and apparatus for managing and reusing mobile subscriber identification information to multiple devices|
US10070303B2|2016-11-11|2018-09-04|At&T Intellectual Property I, L.P.|Method and apparatus for provisioning of multiple devices with mobile subscriber identification information|
US10341842B2|2016-12-01|2019-07-02|At&T Intellectual Property I, L.P.|Method and apparatus for using temporary mobile subscriber identification information in a device to provide services for a limited time period|
US10136305B2|2016-12-01|2018-11-20|At&T Intellectual Property I, L.P.|Method and apparatus for using mobile subscriber identification information for multiple device profiles for a device|
US10070407B2|2016-12-01|2018-09-04|At&T Intellectual Property I, L.P.|Method and apparatus for using active and inactive mobile subscriber identification information in a device to provide services for a limited time period|
US10231204B2|2016-12-05|2019-03-12|At&T Intellectual Property I, L.P.|Methods, systems, and devices for registering a communication device utilizing a virtual network|
EP3358867A1|2017-02-03|2018-08-08|Gemalto Sa|Method for managing communication between a server and a user equipment|
EP3457728A1|2017-09-15|2019-03-20|Gemalto Sa|A method for allocating temporarily a subscription to a credential container|
CN106899951A|2017-03-09|2017-06-27|邓生毛|Mobile phone multi-card system and its control method|
CN106973377B|2017-03-28|2019-11-26|联想有限公司|The control method and control device and management equipment and terminal of data communication|
EP3402238A1|2017-05-09|2018-11-14|Giesecke+Devrient Mobile Security GmbH|Efficient user authentications|
CN107343300B|2017-06-28|2020-10-09|歌尔科技有限公司|eSIM card network communication method and device|
CN109587674A|2017-09-28|2019-04-05|展讯通信(上海)有限公司|Cloud SIM method for identifying ID, device and carrier network side apparatus|
US11172360B2|2017-10-13|2021-11-09|Qualcomm Incorporated|Transfer of security protected configuration data from HPLMN|
EP3499926B1|2017-12-14|2020-08-19|Belgacom International Carrier Services|Sms delivery mechanism|
US10321303B1|2017-12-28|2019-06-11|T-Mobile Usa, Inc.|Subscription management service pairing|
US10477384B2|2018-02-28|2019-11-12|T-Mobile Usa, Inc.|ESIM profile state change|
US10911945B1|2018-11-19|2021-02-02|Sprint Spectrum L.P.|Automated eUICC service profile configuration in view of operational issue with respect to eUICC service profile|
CN109511114B|2018-12-13|2021-09-24|北京树米网络科技有限公司|Method and device for configuring seed IMSI/Ki associated key|
CN109819434A|2019-01-11|2019-05-28|深圳市斯凯荣科技有限公司|A kind of card cell system and control method based on eSIM|
US10687204B1|2019-05-20|2020-06-16|T-Mobile Usa, Inc.|Intelligent SIM profile procurement|
US11026081B2|2019-09-13|2021-06-01|T-Mobile Usa, Inc.|RSP platform selection for ESIM profile procurement|
US10939268B1|2019-09-13|2021-03-02|T-Mobile Usa, Inc.|Meta RSP interface platform for eSIM profile distribution|
WO2021110278A1|2019-12-06|2021-06-10|Nokia Technologies Oy|Apparatus, method, and computer program|
法律状态:
2018-04-03| B03A| Publication of a patent application or of a certificate of addition of invention [chapter 3.1 patent gazette]|
2018-12-26| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]|
2020-09-15| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]|
优先权:
申请号 | 申请日 | 专利标题
EP14382542.0|2014-12-19|
EP14382542.0A|EP3035724A1|2014-12-19|2014-12-19|Method and system for dynamic managing of subscriber devices with multi-imsi sims in mobile networks|
[返回顶部]