TECHNIQUES FOR DYNAMICALLY SUPPORTING DIFFERENT AUTHENTICATION ALGORITHMS
    35.
    发明公开
    TECHNIQUES FOR DYNAMICALLY SUPPORTING DIFFERENT AUTHENTICATION ALGORITHMS 审中-公开
    技术革命动态UNTERSTÜTZUNGVON UNTERSCHIEDLICHEN AUTHENTIFIZIERUNGSALGORITHMEN

    公开(公告)号:EP3059923A1

    公开(公告)日:2016-08-24

    申请号:EP16152557.1

    申请日:2016-01-25

    Applicant: APPLE INC.

    Abstract: Disclosed herein are different techniques for enabling a mobile device to dynamically support different authentication algorithms. A first technique involves configuring an eUICC included in the mobile device to implement various authentication algorithms that are utilized by MNOs (e.g., MNOs with which the mobile device can interact). Specifically, this technique involves the eUICC storing executable code for each of the various authentication algorithms. According to this technique, the eUICC is configured to manage at least one eSIM, where the eSIM includes (i) an identifier that corresponds to one of the various authentication algorithms implemented by the eUICC, and (ii) authentication parameters that are compatible with the authentication algorithm. A second technique involves configuring the eUICC to interface with an eSIM to extract (i) executable code for an authentication algorithm used by an MNO that corresponds to the eSIM, and (ii) authentication parameters that are compatible with the authentication algorithm.

    Abstract translation: 这里公开了使移动设备能够动态地支持不同认证算法的不同技术。 第一技术涉及配置包括在移动设备中的eUICC以实现由MNO(例如,移动设备可以与之交互的MNO)利用的各种认证算法。 具体地说,这种技术涉及用于各种认证算法中的每一种的可执行代码的eUICC。 根据该技术,eUICC被配置为管理至少一个eSIM,其中eSIM包括(i)对应于由eUICC实现的各种认证算法之一的标识符,以及(ii)与 认证算法。 第二种技术涉及配置eUICC与eSIM接口,以提取(i)与eSIM相对应的MNO使用的认证算法的可执行代码,以及(ii)与认证算法兼容的认证参数。

    POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL
    36.
    发明公开
    POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL 审中-公开
    对访问控制管理基于策略的方法

    公开(公告)号:EP2923478A1

    公开(公告)日:2015-09-30

    申请号:EP13802185.2

    申请日:2013-11-20

    Applicant: Apple Inc.

    Abstract: A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities.

Patent Agency Ranking