Method for transmitting a sim application of a first terminal to a second terminal

ABSTRACT

A method for transmitting a SIM application of a first terminal to a second terminal, the SIM application being stored in a secure element included in the first terminal, with access to the SIM application being locked by a PIN code. The method includes exporting the SIM application from the first terminal to a distant site, by including the PIN code as well as a remote loading code. A user of the second terminal is asked to enter the remote loading code in the second terminal. In the event the remote loading code entered by the user matches the remote loading code that has been exported, the installation of the SIM application in a secure element of the second terminal is authorized. Otherwise, the SIM application is not installed in the secure element of the second terminal.

This disclosure is a national phase of PCT/EP2011/071660, a continuationof U.S. application Ser. No. 13/312,309, filed Dec. 6, 2011, and claimspriority of European Application No. 10306359.0, filed Dec. 6, 2010, thedisclosures of which are hereby incorporated by reference.

The present invention concerns a method for transmitting a Simapplication of a first terminal to a second terminal.

A Sim application is typically installed in a secure element like aUICC. The secure element is installed, fixedly or not, in a terminal,like for example a mobile phone. In some cases, the terminals areconstituted by machines that communicate with other machines for M2M(Machine to Machine) applications.

A UICC (Universal Integrated Circuit Card) can be in the format of asmart card, or may be in any other format such as for example but notlimited to a packaged chip as described in PCT/SE2008/050380, or anyother format. It can be used in mobile terminals in GSM and UMTSnetworks for instance. The UICC ensures network authentication,integrity and security of all kinds of personal data.

In a GSM network, the UICC contains mainly a SIM application and in aUMTS network it is the USIM application. A UICC may contain severalother applications, making it possible for the same smart card to giveaccess to both GSM and UMTS networks, and also provide storage of aphone book and other applications. It is also possible to access a GSMnetwork using an USIM application and it is possible to access UMTSnetworks using a SIM application with mobile terminals prepared forthis. With the UMTS release 5 and later stage network like LTE, a newapplication, the IP multimedia Services Identity Module (ISIM) isrequired for services in the IMS (IP Multimedia Subsystem). Thetelephone book is a separate application and not part of eithersubscription information module.

In a CDMA network, the UICC contains a CSIM application, in addition to3GPP USIM and SIM applications. A card with all three features is calleda removable user identity card, or R-UIM. Thus, the R-UIM card can beinserted into CDMA, GSM, or UMTS handsets, and will work in all threecases.

In 2G networks, the SIM card and SIM application were bound together, sothat “SIM card” could mean the physical card, or any physical card withthe SIM application.

The UICC smart card consists of a CPU, ROM, RAM, EEPROM and I/Ocircuits. Early versions consisted of the whole full-size (85×54 mm,ISO/IEC 7810 ID-1) smart card. Soon the race for smaller telephonescalled for a smaller version of the card.

Since the card slot is standardized, a subscriber can easily move theirwireless account and phone number from one handset to another. This willalso transfer their phone book and text messages. Similarly, usually asubscriber can change carriers by inserting a new carrier's UICC cardinto their existing handset. However, it is not always possible becausesome carriers (e.g. in U.S.) SIM-LOCK the phones that they sell, thuspreventing competitor carriers' cards being used.

The integration of the ETSI framework and the Application managementframework of Global Platform is standardized in the UICC configuration.

UICCs are standardized by 3GPP and ETSI.

A UICC can normally be removed from a mobile terminal, for example whenthe user wants to change his mobile terminal. After having inserted hisUICC in his new terminal, the user will still have access to hisapplications, contacts and credentials (network operator).

It is also known to solder or weld the UICC in a terminal, in order toget it dependent of this terminal. This is done in M2M (Machine toMachine) applications. The same objective is reached when a chip (asecure element) containing the SIM or USIM applications and files iscontained in the terminal. The chip is for example soldered to themother-board of the terminal or machine and constitutes an e-UICC.

Soldered UICCs (e-UICCs) contain the same applications than the chipscomprised in UICCs. A parallel can be done for UICCs that are nottotally linked to devices but that are removable with difficulty becausethey are not intended to be removed, located in terminals that aredistant or deeply integrated in machines. A special form factor of theUICC (very small for example and therefore not easy to handle) can alsobe a reason to consider it as in fact integrated in a terminal. The sameapplies when a UICC is integrated in a machine that is not intended tobe opened.

In the next description, welded UICCs or chips containing or designed tocontain the same applications than UICCs will generally be calledembedded UICCs (e-UICCs) or embedded secure elements (in contrast toremovable UICCs or removable secure elements). This will also apply toUICCs or secure elements that are removable with difficulty.

The present invention concerns the authentication of the end user of aterminal during SIM application transfer. In a given context, an entireSim application (meaning personal data, file system, Java applicationslike bank applications for example, and secrets) is stored in anembedded UICC comprised in a first terminal (for example soldered in afirst mobile phone) and a user wishes to transfer this entire Simapplication in another embedded UICC comprised in a second terminal (forexample constituted by a second mobile terminal). This can happen when auser changes his mobile phone but does not want to lose theapplications, contacts and personal data such as photographs, videos orsongs stored in the UICC of his first mobile phone.

Such a problem does not occur when the Sim application is stored in aSim card that can be removed from a mobile phone and inserted in anotherone since when a secure element like a UICC is soldered onto the mobilephone, it is not possible to physically change the secure element,containing the SIM application, from a mobile phone to another one.

The general process to achieve this operation of transfer of the Simapplication could normally be the following:

-   -   The secure element packages the installed SIM in a way it can be        reinstalled on another secure element. This packaging must be        secured, meaning, ciphered in order that only the targeted        secure element is able to read it, and signed in order to ensure        that the package comes from the initial secure element;    -   The packaged SIM is uploaded to a secure vault on the cloud        (Internet). This operation may be required in the case the        targeted secure element is not known at the packaging time;    -   The packaged SIM is downloaded to the targeted new secure        element;    -   The targeted secure element performs security checking and then        can install the downloaded packaged SIM.

The result is that the initial complete Sim has been transferred inanother secure element, with the whole user environment.

A similar method is disclosed in US2005/0266883 from Nokia Corporation.

When initiating the initial transfer from initial secure element up tothe secure vault, we can imagine that the end user is entering a PINcode to authenticate himself and confirm the operation. But a problemoccurs when it is desired to transfer the packaged SIM again from securevault to the targeted secure element: How to be sure that the request iscoming from the same end user? There is no possibility to enter againthe PIN code as it is part of the SIM application and it is necessary tobe sure of the identity of the end user before installing the SIM in thetargeted new secure element. This problem could lead to the fact thatthe subscription carried with the SIM could be installed and reused byanother user.

In order to avoid this problem, it could be possible to first installthe SIM in the targeted secure element and then to request for PINauthentication. However, the drawback is that installation of the Simhas been made and the authentication is not strong since, for a PIN codeon 4 digits, after maximum 10.000 trials, a dishonest person could findthe correct PIN code and use the Sim application of another user (andconsequently his subscription).

The present invention has the purpose to solve this problem.

In this respect, the present invention proposes a method fortransmitting a Sim application of a first terminal to a second terminal,the Sim application being stored in a secure element included in thefirst terminal, the access to the Sim application being locked by a Pincode. According to this invention, the method consists in:

i—exporting the Sim application from the first terminal to a distantsite, by including the Pin code as well as a remote loading code;ii—ask to the user of the second terminal to enter the remote loadingcode in the second terminal;iii—in the event the remote loading code entered by the user matches theremote loading code that has been exported, authorizing the installationof the Sim application in a secure element of the second terminal, andotherwise, do not install the Sim application in the secure element ofthe second terminal.

Advantageously, the match of the remote loading codes is checked at thelevel of the distant site and the match launches the downloading of theSim application to the secure element of the second terminal and theinstallation.

Alternatively, the match of the remote loading codes is checked at thelevel of the second terminal, after the Sim application has beendownloaded to the secure element of the second terminal, the matchlaunching the installation of the Sim application in the secure elementof the second terminal.

The remote loading code is preferably ciphered.

In a preferred embodiment, the remote loading code is a pass phrase.

Other features of the improvement will emerge from a reading of thefollowing description of a preferred embodiment given by way ofnon-limiting illustrative example.

The present invention proposes to request the end-user to enter a remoteloading code in addition to the PIN code to confirm the export of theSIM application to a distant site (the secure vault). The remote loadingcode can for example be a pass phrase.

This pass phrase is ciphered and included in the secure packaged SIMthat is uploaded to the secure vault on the cloud. Thus, the securevault stores the packaged Sim (the subscription comprised in the secureelement, the PIN code, the environment, the authentication secrets, theapplicative keys (Security Domain), the different keys of the differentapplications, the PKI keys, the different applications (NFC, bank, . . .), the ISD (Issuer Security Domain), the file system, . . . ) and theremote loading code in a unique package that can be later downloaded toa new secure element.

Before installing this package to the new secure element, the user ofthe second terminal comprising the secure element is asked to enter theremote loading code in the second terminal.

If the remote loading code entered by said user matches the remoteloading code that has been exported, the installation of the Simapplication in the secure element of the second terminal is authorized.Otherwise, the installation is not done.

Two different ways of operating can be used: the first one consists inchecking the match of the remote loading codes at the level of thesecure vault. If the codes match, the Sim application is downloaded tothe secure element and then executed.

The second one consists in checking the match of the remote loadingcodes at the level of the second terminal, after having downloaded theSim application in the secure element of the second terminal. If thecodes match, the Sim application is installed in the secure element ofthe second terminal.

After having been installed, the Sim application can be launched by theuser by entering his PIN code.

In a preferred embodiment, the remote loading code is enciphered. In thefirst embodiment, the secure vault un-ciphers the pass phrase containedin the packaged SIM. In the second embodiment, the secure element doesthis un-ciphering.

The invention permits to enhance the overall security of transfer of theSim application since it ensures that the SIM application is exportedand imported by the same end-user.

The end-user is typically the owner of a terminal, like for example amobile phone. In M2M applications, the end-user is the installer, forexample the electrical installer of an electrical machine.

1. Method for transmitting a SIM application of a first terminal to asecond terminal, said SIM application being stored in a secure elementincluded in the first terminal, the access to said SIM application beinglocked by a PIN code, comprising: i—exporting said SIM application fromsaid first terminal to a distant site, by including said PIN code aswell as a remote loading code; ii—ask the user of said second terminalto enter said remote loading code in said second terminal; iii—in theevent the remote loading code entered by said user matches the remoteloading code that has been exported, authorizing the installation ofsaid SIM application in a secure element of said second terminal, andotherwise, do not install said SIM application in said secure element ofsaid second terminal.
 2. Method according to claim 1, wherein the matchof said remote loading codes is checked at the level of said distantsite and said match launches the downloading of said SIM application tothe secure element of said second terminal and said installation. 3.Method according to claim 1, wherein the match of said remote loadingcode is checked at the level of said second terminal, after said SIMapplication has been downloaded to said secure element of said secondterminal, said match launching the installation of said SIM applicationin the secure element of said second terminal.
 4. Method according toclaim 1, wherein said remote loading code is ciphered.
 5. Methodaccording to claim 1, wherein said remote loading code is a pass phrase.6. Method according to claim 1, wherein said terminal is a machine.