Apple Invents a Hybrid iDevice Component that handles both Sound Wave Functionality & Wireless Inductive Charging
Apple Lands Exclusive Deal for Digitally Enhanced Harry Potter Series

Apple Invents Tamper Prevention for eSIM (Apple SIM)

10.4 - Patent Application

1AF COVER APPLE SIM

In 2012 we posted a major patent report titled "Major Apple Patent Filing Reveals In-Depth eSIM Solution," which was likely the patent behind the 'Apple SIM" that debuted in the fall of 2014 on the iPad Air 2. It could also play a part of the GSMA eSIM architecture standard that we touched on last summer. It's worth noting today that USPTO published a patent application from Apple's senior iOS engineers that focuses on "Tamper Prevention for Electronic Subscriber Module (eSIM) Type Parameters."

 

Apple's Patent Background

 

Most mobile devices are configured to receive and operate removable Universal Integrated Circuit Cards (UICCs) that enable the mobile devices to access services provided by mobile network operators (MNOs). In particular, each UICC includes at least a microprocessor and a read-only memory (ROM), where the ROM is configured to store different applets and authentication data that the mobile device can utilize to register and interact with the MNOs. Typically, a UICC takes the form of a small removable card (e.g., a SIM card) that is configured to store a single MNO profile and be inserted into a UICC-receiving bay included in a mobile device. In more recent implementations, however, UICCs are being embedded directly into system boards of mobile devices and are configured to store multiple MNO profiles (e.g., electronic SIMs (eSIMs))--e.g., one eSIM for a local MNO, and another eSIM for an international MNO. Notably, these embedded UICCs (eUICCs) provide several advantages over traditional, removable UICCs. For example, some eUICCs include a rewritable memory that can facilitate eSIM updates for accessing extended features provided by MNOs. EUICCs can also eliminate the necessity of including UICC-receiving bays within mobile devices. The implementation of eUICCs therefore not only increases the flexibility of mobile devices, but also simplifies their design and frees up space for other components.

 

Despite the foregoing advantages provided by eUICCs, new challenges continue to arise with respect to maintaining a high level of security and robustness while providing the increased flexibility. Consider, for example, a common scenario that involves a new, out-of-the-box mobile device whose eUICC stores only one eSIM. In this example, the eSIM is associated with a Type parameter that indicates to the eUICC that the eSIM is a bootstrap-type eSIM that can be used to access a limited service provided by an MNO (e.g., a subscription registration service). In turn, the eUICC activates the bootstrap-type eSIM, and, when a user of the mobile device completes the subscription registration service, an operator-type eSIM that enables the mobile device to access standard services provided by the MNO (e.g., voice calls and internet) is downloaded and stored into the eUICC. Consider further that, at a subsequent time, the MNO issues to the eUICC an over-the-air (OTA) update that erroneously updates the Type parameter associated with the operator-type eSIM and causes the operator-type eSIM to become a bootstrap-type eSIM. Consequently, when the mobile device power cycles and interfaces with the eUICC to obtain access to the MNO, only two bootstrap-type eSIMs are identified by the eUICC and the mobile device is prevented from accessing the standard services provided by the MNO. This not only creates confusion for the user, but could potentially send the user back to the registration process that he or she already completed, thereby degrading the user's overall experience.

 

Apple's Invention: Tamper Prevention for Electronic Subscriber Module (eSIM) Type Parameters

 

Apple's invention generally relates to techniques for preventing or at least partially securing Type parameters of electronic Subscriber Identity Modules (eSIMs) stored within an embedded Universal Integrated Circuit Card (eUICC) from being inappropriately modified by mobile network operators (MNOs).

 

One embodiment sets forth a method for protecting a Type parameter of an electronic Subscriber Identity Module (eSIM) that is associated with an MNO. Specifically, the method is implemented at an eUICC that stores the eSIM, and includes the steps of: receiving a request to store the eSIM within a memory that is accessible to the eUICC, and, in response to the request: (1) storing the eSIM into the memory, (2) parsing a file system of the eSIM to identify the Type parameter, and (3) updating a file access property of the Type parameter to prevent the Type parameter from being modified by the MNO.

 

Another embodiment sets forth a different method for protecting a Type parameter of an eSIM that is associated with an MNO. Specifically, the method is implemented at an eUICC that stores the eSIM, and includes the steps of: receiving a request to store the eSIM within a memory that is accessible to the eUICC, and, in response to the request: (1) establishing, within the memory, a logical container for the eSIM, (2) establishing, within the logical container, at least a first logical sub-container and a second logical sub-container, wherein the first logical sub-container is accessible to the MNO and the second logical sub-container is not accessible to the MNO, (3) storing the eSIM into the first logical sub-container, and (4) storing the Type parameter into the second logical sub-container.

 

Yet another embodiment sets forth another method for protecting a Type parameter of an eSIM that is associated with an MNO. Specifically, the method is implemented at an eUICC that stores the eSIM, and includes the steps of: receiving a request to store the eSIM within a memory that is accessible to the eUICC, and, in response to the request: (1) storing the eSIM into the memory, and (2) storing the Type parameter into an Operating System (OS) registry, wherein the OS registry is inaccessible to the MNO.

 

The key patent figure that Apple shows as representing this invention best is patent FIG. 5A which illustrates a block diagram of an operating system (OS)-based registry that can be implemented to prevent or at least partially secure Type parameters of eSIMs from being erroneously updated.

 

2AF ESIM - EUICC

 Patent Credits

 

Apple's patent application 20150289129 was originally filed in Q1 2015. Considering that this is a patent application, the timing of such a product to market is unknown at this time.

 

10. 6  PA - Notice BarPatently Apple presents a detailed summary of patent applications with associated graphics for journalistic news purposes as each such patent application is revealed by the U.S. Patent & Trade Office. Readers are cautioned that the full text of any patent application should be read in its entirety for full and accurate details. About Making Comments on our Site: Patently Apple reserves the right to post, dismiss or edit any comments. Comments are reviewed daily from 5am to 6pm MST and sporadically over the weekend.

 

 

 

 

Comments

The comments to this entry are closed.