Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication

Patent No. US12207094 (titled "Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication") was filed by Nix John A on Jan 18, 2024.

What is this patent about?

’094 is related to the field of embedded universal integrated circuit cards (eUICCs) and their use in wireless communication systems. The background involves the increasing need for remote management of subscriber credentials in machine-to-machine (M2M) and Internet of Things (IoT) devices, where physical SIM card swapping is impractical. Existing eUICC solutions face challenges in securely transferring network access credentials, particularly the pre-shared secret key K, without relying on potentially insecure third-party channels.

The underlying idea behind ’094 is to enhance the security of eUICC-based authentication by employing two-factor authentication and key derivation techniques . The system uses an initial, potentially less secure, connection to authenticate the device and user, then establishes a more secure connection using a derived key. This approach allows for remote key rotation and control over credential usage, even when the initial profile distribution is outside the mobile network operator's direct control.

The claims of ’094 focus on a method comprising generating a first message including an eUICC identity, a nonce, and a first digital signature using a first eUICC private key, sending the first message to a subscription manager system, deriving a second eUICC private key and a corresponding second eUICC public key using a first random number generator and a first set of cryptographic algorithms, storing a subscription manager public key, deriving a profile key using a key exchange algorithm, receiving from the subscription manager system, an encrypted profile comprising a ciphertext including a key K encrypted with a symmetric key, receiving the symmetric key, decrypting at least a portion of the encrypted profile using the profile key, decrypting at least a portion of the ciphertext using the symmetric key, and storing at least the key K in the embedded universal integrated circuit card for use in future communications.

In practice, the invention involves a module with an eUICC first connecting to a network and authenticating using initial credentials. After this initial authentication, the module and the mobile network operator (MNO) engage in a key exchange process, leveraging public-key cryptography and a key derivation algorithm. This process results in both the module and the MNO independently deriving a new shared secret key K, which is then used for subsequent, more secure communication.

This approach differentiates itself from prior solutions by avoiding the need to transmit the secret key K directly, even in encrypted form. Instead, the key is derived independently at both ends, enhancing security and reducing the risk of interception. Furthermore, the two-factor authentication ensures that only authorized users or devices can access the network, even if the initial profile distribution is compromised. This system also allows for periodic key rotation , further strengthening security over time without requiring physical intervention or complete profile replacement.

How does this patent fit in bigger picture?

Technical landscape at the time

In the early 2010s when ’094 was filed, wireless communication systems commonly relied on SIM cards and UICCs for authentication and network access. At a time when M2M communication was emerging, securely provisioning and managing these credentials, especially in remote or sealed devices, was non-trivial. The industry was beginning to explore eUICCs to address these challenges, at a time when standards were still in the requirements definition phase.

Novelty and Inventive Step

The application was rejected in a non-final office action. The claims were rejected under 35 U.S.C. 112(b) as indefinite and also for nonstatutory double patenting. The examiner indicated that the independent claim(s) 1 and their respective dependent claims are allowable if rewritten to overcome the rejections set forth in the office action. The prosecution record describes the examiner's reasoning for allowance.

Claims

This patent contains 22 claims, with claim 1 being the only independent claim. Independent claim 1 is directed to a method for securely provisioning an embedded universal integrated circuit card (eUICC) with a profile, involving key generation, encryption, and decryption steps. The dependent claims generally elaborate on and refine the method of independent claim 1, specifying details such as the source of the subscription manager public key, the type of key exchange algorithm used, the encryption method, authentication procedures, the type of module the eUICC is connected to, and the timing of certain steps.

Key Claim Terms New

Definitions of key terms used in the patent claims.

Term (Source)Support for SpecificationInterpretation
Embedded universal integrated circuit card
(Claim 1)
“With an eUICC, the operation of an UICC can be essentially “virtualized”, such that the data and algorithms within a UICC can be processed in software and distributed through electronic media (such as, but not limited to, a file transfer or file download). An eUICC can also comprise software and/or firmware components to “virtualize” the operation of a physical UICC, such that (i) the data normally recorded in a physical UICC can be recorded in a file with encryption, and (ii) the steps for using the data in the file can be processed by an eUICC.”A virtualized UICC whose data and algorithms can be processed in software and distributed through electronic media.
Key K
(Claim 1)
“A core element of traditional wireless WAN technologies such as 3GPP and ETSI standards over the past 20 years has included the use of a subscriber identity module (SIM) card within 2G networks and a related universal integrated circuit card (UICC) for 3G and 4G networks, including LTE networks. Traditionally, these cards have been supplied by a mobile network operator (MNO) and contain a pre-shared secret key K in addition to a set of parameters for a mobile phone or user equipment to connect with the wireless network operated by the MNO. The pre-shared secret key K is also known as key K in 4G LTE and related networks and key Ki in 3G networks.”A key used for authentication and ciphering of data for a mobile phone or user equipment.
Profile key
(Claim 1)
“The eUICC can include data such as an eUICC identity, an eUICC profile key, and a symmetric ciphering algorithm. The module using the eUICC can decrypt the first portion of ciphertext using the eUICC profile key and the symmetric ciphering algorithm. After completing a step 303, an eUICC 107 operating in a module 101 could read and utilize the eUICC profile key 107b.”A key used by the embedded universal integrated circuit card to decrypt at least a portion of the encrypted profile.
Subscription manager system
(Claim 1)
“The mobile network operator can send the data for a profile to an eUICC subscription manager. The eUICC can communicate in the module with a network application. The network application can communicate with the mobile network operator using a wireless network and a radio within the module. The module can connect with a first network, send the eUICC identity and receive an encrypted profile, and the module can record the encrypted profile in a nonvolatile memory associated with the eUICC.”A system that sends an encrypted profile to the eUICC.
Symmetric key
(Claim 1)
“Continuing with this first embodiment, after successful authentication with the second factor, the mobile network operator can send a symmetric key to the module. The module can receive the symmetric key (and decrypt the symmetric key if encrypted), and subsequently decrypt the second portion of ciphertext in the eUICC profile. The module can convert the second portion of ciphertext into plaintext using the symmetric ciphering algorithm and the received symmetric key.”A key used to decrypt at least a portion of the ciphertext within the encrypted profile.

Litigation Cases New

US Latest litigation cases involving this patent.

Case NumberFiling DateTitle
2:25-cv-00667Jun 27, 2025Network-1 Technologies, Inc. v. SAMSUNG ELECTRONICS CO., LTD. et al

Patent Family

Patent Family

File Wrapper

The dossier documents provide a comprehensive record of the patent's prosecution history - including filings, correspondence, and decisions made by patent offices - and are crucial for understanding the patent's legal journey and any challenges it may have faced during examination.

  • Date

    Description

  • Get instant alerts for new documents

US12207094

NIX JOHN A
Application Number
US18416534
Filing Date
Jan 18, 2024
Status
Granted
Expiry Date
Dec 6, 2033
External Links
Slate, USPTO, Google Patents