Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND SYSTEM OF UNIVERSAL INTEGRATED CIRCUIT CARD (UICC) MANAGEMENT WITHOUT CELLULAR CONNECTIVITY
Document Type and Number:
WIPO Patent Application WO/2023/007453
Kind Code:
A1
Abstract:
The present disclosure provides a method and a system for efficiently managing a Universal Integrated Circuit Card (UICC) associated with a device (104) without cellular connectivity. Particularly, the system and method provide a solution for managing the UICC card through a set of instructions whenever the UICC is not connected to a cellular network, but the device is connected to a Wi-Fi network. Further, the present disclosure enables the user to update the UICC card configuration, issue CAT (Card Application Toolkit) commands to the device, and upgrade the status of carrier-grade applications installed on the device but not limited to the likeThus, the method and the system of the present disclosure can enable to automate the management of the UICC card, thereby facilitating a faster, consistent, and reliable operation that does not require manual intervention.

Inventors:
LANKALAPALLI DHANANJAYA (IN)
MOTE GANESH (IN)
MAHESHWARI SHYAM SUNDER (IN)
Application Number:
PCT/IB2022/057061
Publication Date:
February 02, 2023
Filing Date:
July 29, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
JIO PLATFORMS LTD (IN)
International Classes:
H04W4/60; H04W8/18
Foreign References:
US20160112084A12016-04-21
Attorney, Agent or Firm:
KHURANA & KHURANA, ADVOCATES & IP ATTORNEYS (IN)
Download PDF:
Claims:
We Claim:

A system for managing a Universal Integrated Circuit Card (UICC) of a user device (104) without cellular connectivity, the system comprising: a processor (202); a memory (204) coupled to the processor (202), wherein the memory (204) comprises processor-executable instructions, which on execution, causes the processor to: pull a set of data packets from a carrier server (110); transmit the pulled set of data packets to the UICC card of the user device (104) connected to a Wi-Fi network; update a configuration of the UICC card of the user device (104) based on the pulled set of data packets; and establish a communication between the user device (104) associated with the UICC card and the carrier server (110) based on the transmitted set of data packets.

2. The system as claimed in claim 1, wherein the set of data packets corresponds to

Application Protocol Data Unit (APDU) commands.

3. The system as claimed in claim 1, wherein the set of data packets are generated and hosted in a server application (208) of the carrier server (110).

4. The system as claimed in claim 1, wherein the processor-executable instructions, on execution, causes the processor to connect to the carrier server by passing an Integrated Circuit Card ID (ICCID) to the carrier server.

5. The system as claimed in claim 1, wherein the UICC card stores information that comprises subscriber information, a cipher key, and a user phonebook information associated with a user device.

6. The system as claimed in claim 1, wherein the communication between the user device associated with the UICC card and the carrier server (112) is a (Transport Layer Security) TLS handshake for secure connection.

7. The system as claimed in claim 1, wherein the communication between the user device associated with the UICC card and the carrier server (112) comprises RFM (Remote File Update) actions in a user device associated with the UICC Card and issuing of CAT commands to a user device associated with the UICC Card.

8. A method for managing a Universal Integrated Circuit Card (UICC) of a user device (104) without cellular connectivity, the system comprising: pulling, by a processor (202), the generated set of data packets from a carrier server (110); transmitting, by the processor (202), the pulled set of data packets to the UICC card of the user device (104) connected to a Wi-Fi network; updating, by the processor (202), a configuration of the UICC card of the user device based on the pulled set of data packets; and establishing, by the processor (202), a communication between the user device (104) associated with the UICC card and the carrier server (110) based on the transmitted set of data packets.

9. The method as claimed in claim 8, wherein the set of data packets corresponds to

Application Protocol Data Unit (APDU) commands.

10. The method as claimed in claim 8, wherein the set of data packets are generated and hosted in a server application (208) of the carrier server (110).

11. The method as claimed in claim 8, wherein the processor (202) connects to the carrier server (110) by passing an Integrated Circuit Card ID (ICCID) to the carrier server.

12. The method as claimed in claim 8, wherein the UICC card stores information that comprises subscriber information, a cipher key, and a user phonebook information associated with a user device.

13. The method as claimed in claim 8, wherein the communication between the user device associated with the UICC card and the carrier server (110) is a (Transport Layer Security) TLS handshake for secure connection.

14. The method as claimed in claim 8, wherein the communication between the user device associated with the UICC card and the carrier server (110) comprises RFM (Remote File Update) actions in a user device associated with the UICC Card and issuing of CAT commands to a user device associated with the UICC Card.

Description:
METHOD AND SYSTEM OF UNIVERSAL INTEGRATED CIRCUIT CARD (UICC) MANAGEMENT WITHOUT CELLULAR CONNECTIVITY

FIELD OF INVENTION

[0001] The embodiments of the present disclosure generally relate to the field of communications technologies, and in particular, to a method for implementing a mechanism to manage a Universal Integrated Circuit Card (UICC) associated with a user device without cellular connectivity.

BACKGROUND OF THE INVENTION

[0002] The following description of related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.

[0003] Mobile handsets are capable of operating in multiple modes of operation.The handset may operate within, for example, a Long-Term Evolution (LTE)network environment orwithin a network communication environment such as a Code Division

Multiple Access (CDMA) network. Existing topologies involving phones capable of operating in an LTE network and a CDMA network have issues.Unscrupulous individuals may misusethese issues caused by the interactions between mobile equipment communicating over the LTE and CDMA networks and a UICCthat enables communicationthrough the mobile equipment.

[0004] The UICC, also known as a SIM card, is a smart card (integrated circuit card) used in mobile terminals in GSM and UMTS networks. The UICC ensures the integrity and security of all kinds of personal data, and it typically holds a few hundred kilobytes. The UICC card is generally a chip inside a mobile terminal. The UICC card is used to store the content of the mobile terminal, such as subscriber information, acipher key, and a user phonebook.The UICC card is provided for a Global System for Mobile Communication (GSM), LTE (4G) and SGnetwork to authenticate an identity of a subscriber and encrypt voice information during a call of the subscriber, and the like.

[0005] When a user carrying a mobile terminal, roams between different regions, the user usually chooses to use a Subscriber Identity Module (SIM) or UICC cardregistered in a roamed-to region to reduce roaming charges. The SIM card is a chip provided with a hardware structure. When the SIM card is replaced, the user needs to insert another SIM card into a reserved position of the terminal. When roaming between different regions, the user needs to replace the SIM card frequently, which causes inconvenience of use and affects user experience.

[0006] Hence, today if there is no cellular connectivity, it is not possible to reach the UICC card. Problems arise when a subscriber fails to latch to a cellular networkdue to corruption in UICC file content. The subscriber may also fail to latch to the cellular networkif he/she is outside his/herhome country without an International Roaming (IR) plan. The subscriber may be in an international network and the subscriber’s UICC card may not have an updated configuration that is essential to latch with the international network. In such scenarios, there is no way to manage the UICC card.

[0007] Further, there may be a need to do a RAM (Remote Application Management) operation such as an Operating System (OS) patch to fix issues on the UICC card. There may also be a need to push an application on the UICC card to enable certain features. As of today, RAM operations are possible only if the device has cellular connectivity. However, the solution provided by the present disclosure may be used to perform RAM operations on the UICC card without cellular connectivity by connecting the device to a Wi-Fi network.

[0008] There is therefore a need in the art to provide a method and a system for implementing a mechanism to manage the UICC card without cellular connectivity.

OBJECTS OF THE PRESENT DISCLOSURE

[0009] Some of the objects of the present disclosure, which at least one embodiment herein satisfy are as listed herein below.

[0010] It is an object of the present disclosure to manage the UICC card even if a subscriber device or terminal doesnot have cellular connectivity.

[0011] It is an object of the present disclosure to enable the use of a carrier application to manage the UICC card which pulls APDU (Script) from a server on Wi-Fi.

[0012] It is an object of the present disclosure to enable management of the UICC card even if the subscriber is outside his home country and wants to buy a roaming plan from his home operator.

[0013] It is an object of the present disclosure to enable management of the UICC card even if its configuration is corrupted (wrong configuration). [0014] It is an object of the present disclosure to do RAM (Remote Application Management) and RFM (Remote File Management) operation on the UICC card over Wi-Fi even if the device does not have cellular connectivity.

SUMMARY

[0015] This section is provided to introduce certain objects and aspects of the present invention in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.

[0016] In an aspect, the present disclosure provides a system for managing a Universal Integrated Circuit Card (UICC) of a user device without cellular connectivity. The system pulls a set of data packets from a carrier server. The set of data packets corresponds to Application Protocol Data Unit (APDU) commands. The set of data packets are generated and hosted in a server application (208) of the carrier server. Further, the system transmits the pulled set of data packets to the UICC card of the user device connected to a Wi-Fi network. The system connects to the carrier server by passing an Integrated Circuit Card ID (ICCID) to the carrier server. Further, the system updates a configuration of the UICC card of the user device based on the pulled set of data packets. The UICC card stores information that comprises subscriber information, a cipher key, and a user phonebook information associated with a user device. Furthermore, the system establishes a communication between the user device associated with the UICC card and the carrier server based on the transmitted set of data packets. The communication between the user device associated with the UICC card and the carrier server is a (Transport Layer Security) TLS handshake for secure connection. The UICC card and the carrier server comprises RFM (Remote File Update) or RAM (Remote Application Management)or SIM/USIM Toolkit Commands actions in a user device associated with the UICC Card and issuing of CAT commands to a user device associated with the UICC Card.

[0017] In an aspect, the present disclosure provides a method for managing a Universal Integrated Circuit Card (UICC) of a user device without cellular connectivity. The method includes pulling, by a processor, the generated set of data packets from a carrier server. The set of data packets corresponds to Application Protocol Data Unit (APDU) commands. Further, the method includes transmitting, by the processor, the pulled set of data packets to the UICC card of the user device connected to a Wi-Fi network. The set of data packets are generated and hosted in a server application of the carrier server. Further, the method includes connecting to the carrier server by passing an Integrated Circuit Card ID (ICCID) to the carrier server. Further, the method includes updating, by the processor, a configuration of the UICC card of the user device based on the pulled set of data packets. The UICC card stores information that comprises subscriber information, a cipher key, and a user phonebook information associated with a user device. Furthermore, the method includes establishing, by the processor, a communication between the user device associated with the UICC card and the carrier server based on the transmitted set of data packets. the communication between the user device associated with the UICC card and the carrier server is a (Transport Layer Security) TLS handshake for secure connection. The communication between the user device associated with the UICC card and the carrier server comprises RFM (Remote File Update) or RAM (Remote Application Management) actions in a user device associated with the UICC Card and issuing of CAT commands to a user device associated with the UICC Card.

BRIEF DESCRIPTION OF DRAWINGS

[0018] The accompanying drawings, which are incorporated herein, and constitute a part of this invention, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present invention. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that invention of such drawings includes the invention of electrical components, electronic components or circuitry commonly used to implement such components.

[0019] FIG. 1 illustrates an exemplary network architecture (100) in which or with which proposedsystem (108) of the present disclosure can be implemented, in accordance with an embodiment of the present disclosure.

[0020] FIG. 2 illustrates an exemplary representation (200) of the system (108), in accordance with an embodiment of the present disclosure.

[0021] FIG. 3 illustrates an exemplary method flow diagram (300) depicting a method for management of a UICC card without cellular connectivity, in accordance with an embodiment of the present disclosure.

[0022] FIG. 4 illustrates an exemplary representation (400) of a communication flow diagram, in accordance with an embodiment of the present disclosure. [0023] FIG. 5 illustrates an exemplary representation (500) of an overview of the workability of the system (108) and method, in accordance with an embodiment of the present disclosure.

[0024] FIG. 6 refers to an exemplary computer system (600) in which or with which embodiments of the present invention can be utilized, in accordance with embodiments of the present disclosure.

[0025] The foregoing shall be more apparent from the following more detailed description of the invention.

DETAILED DESCRIPTION OF INVENTION

[0026] In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter can each be used independently of one another or with any combination of other features. An individual feature may not address all of the problems discussed above or might address only some of the problems discussed above. Some of the problems discussed above might not be fully addressed by any of the features described herein.

[0027] The ensuing description provides exemplary embodiments only and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the invention as set forth.

[0028] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.

[0029] Also, it is noted that individual embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination can correspond to a return of the function to the calling function or the main function.

[0030] The word “exemplary” and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive — in a manner similar to the term “comprising” as an open transition word — without precluding any additional or other elements.

[0031] Reference throughout this specification to “one embodiment” or “an embodiment” or “an instance” or “one instance” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases “in one embodiment” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

[0032] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an”, and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items. [0033] The present invention provides a solution to the above-mentioned problems by providing a method and a system for efficiently managing the UICC card without cellular connectivity. Particularly, the system and method provide a solution for managing the UICC card (in a mobile device or terminal) by a set of instructions whenever the UICC card is not connected to a cellular network, but the mobile device or terminal is connected to a Wi-Fi network. Thus, the method and the system of the present disclosure can automate the management of the UICC card, thereby facilitating a faster, consistent, and reliable operation that does not require manual intervention and hence is devoid of the disadvantages associated thereto.

[0034] Referring to FIG. 1 which illustrates an exemplary network architecture (100) in which or with which thesystem (108) of the present disclosure can be implemented, in accordance with an embodiment of the present disclosure. As illustrated, the exemplary architecture (100) includes the system (108) for providing a mechanism to manage a UICC card without cellular connectivity. The system (108) is a part of a user computing device (104). A plurality of users (102-1, 102-2,.... 102-n) (hereinafter interchangeably referred to as subscribers and collectively referred to as 102) is also shown in the figure. Each user (102)may be associated with at least one computing device (104-1, 104-2,.... 104-n) (hereinafter interchangeably referred to as a smart computing device or user device or subscriber device and mobile terminal; and collectively referred to as 104). A UICC card may be associated with the computing device (104). The users (102) may interact with the system (108) by using their respective computing devices (104).The computing device (104) and the system (108) may communicate with each other over a network (106). The system (108) may be associated with a carrier server (110).

[0035] The system (108) may be configured to receive a set of data packets pertaining to a set of Application Protocol Data Unit (APDU) commands to be transferred to the UICC card associated with the computing device (104).In an embodiment, the carrier server (110) generates and hosts the set of APDU commands. The system pulls the set of APDU commands from the carrier server (110) and pushes the set of APDU commands to the computing device (104) associated with the UICC card.

[0036] In an embodiment, the system(108) may be configured to obtain a registration data based on a request from an unregistered user through the computing device (108). In an exemplary embodiment, the UICC card credentials of the user(102) may be generated based on an acknowledgment of the request andverification of the registration data. In another exemplary embodiment, the user (102) may enter the generated UICC card credentials to access the system (108) to obtain the information service associated with a UICC card application.

[0037] In an exemplary embodiment, only an authorized user can gain access to the system (108).

[0038] In an embodiment, theplurality of users (102) can access the UICC cardusing their respective computing devices via a set of instructions residing on any operating system, including but not limited to, Android ™, iOS ™, and the like. In an embodiment, the computing device (104) may include, but not limited to, any electrical, electronic, electromechanical or any equipment or a combination of one or more of the above devices such as mobile phone, smartphone, virtual reality (VR) devices, augmented reality (AR) devices, pager, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other computing device, wherein the computing device may include one or more in-built or externally coupled accessories including, but not limited to, a visual aid device such as camera, audio aid, a microphone, a keyboard, input devices for receiving input from a user such as a touchpad, a touch-enabled screen, electronic pen and the like. It may be appreciated that the computing device (104) may not be restricted to the mentioned devices and various other devices may be used. A smart computing device may be one of the appropriate systems for storing data and other private/sensitive information.

[0039] In an exemplary embodiment, the network (106) may include, by way of example but not limitation, at least a portion of one or more networks having one or more nodes that transmit, receive, forward, generate, buffer, store, route, switch, process, or a combination thereof, etc. one or more messages, packets, signals, waves, voltage or current levels, some combination thereof, or so forth. The network (106) may include, by way of example but not limitation, one or more of a wireless network, a wired network, an internet, an intranet, a public network, a private network, a packet- switched network, a circuit- switched network, an ad hoc network, an infrastructure network, a public-switched telephone network (PSTN), a cable network, a cellular network, a satellite network, a fiber-optic network, some combination thereof.

[0040] In another exemplary embodiment, the carrier server (110) may include or comprise, by way of example but not limitation, one or more of a stand-alone server, a server blade, a server rack, a bank of servers, a server farm, hardware supporting a part of a cloud service or system, a home server, hardware running a virtualized server, one or more processors executing code to function as a server, one or more machines performing server- side functionality as described herein, at least a portion of any of the above, some combination thereof.

[0041] In an embodiment, the system (108) for managing the UICCcard may include one or more processors coupled with a memory.The memory may store instructions which when executed by the one or more processors may cause the system (108) to perform steps as described hereinabove.

[0042] FIG. 2, with reference to FIG. 1, illustrates an exemplary representation of the system (108), in accordance with an embodiment of the present disclosure. In an aspect, the system (108) may comprise one or more processor(s) (202). The one or more processor(s) (202) may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that process data based on operational instructions. Among other capabilities, the one or more processor(s) (202) may be configured to fetch and execute computer-readable instructions stored in a memory (204) of the system (108). The memory (204) may be configured to store one or more computer-readable instructions or routines in a non-transitory computer-readable storage medium, which may be fetched and executed to create or share data packets over a network service. The memory (204) may comprise any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.

[0043] In an embodiment, the system (108) may include an interface(s) (206). The interface(s) (206) may comprise a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the like. The interface(s) (206) may facilitate communication of the system (108). The interface(s) (206) may also provide a communication pathway for one or more components of the carrier server (110).

[0044] The processing engine(s)(208) may be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processing engine(s) (208). In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing engine(s) (208) may be processorexecutable instructions stored on a non-transitory machine-readable storage medium and the hardware for the processing engine(s) (208) may comprise a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) (208). In such examples, the system (108) may comprise the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to the system (108) and the processing resource. In other examples, the processing engine(s) (208) may be implemented by electronic circuitry.

[0045] As illustrated in Fig. 2, the system may be a part of the computing device (104). The computing device (104) may be communicatively coupled to the carrier server (110) that may have a server application (208). The server application (208) may be responsible for generation and hosting of scripts that may be a set of APDU commands. The scripts generated by the server application (208) may be transmitted to the UICC card (212). The system (108) may be located in the computing device (104) along with a carrier application (210), a UICC card (212), and an Access Control Enforcer (214). The UICC card (212) may house a client application (216). The carrier application (210) may connect to the carrier server (110) to check for scripts, if any available, in the UICC card (212). The carrier application (210)may pass anlntegrated Circuit Card ID (ICCID) of the UICC card (212) to the carrier server (110)to enable the carrier server (110) to identify a client of the UICC card.The Access Control Enforcer (214)may provide secure support to the computing device (104) and the client application (216) on the UICC card.

[0046] FIG. 3 is a flow diagram (300) illustrating a process for management of theUICC card without cellular connectivity, in accordance with an embodiment of the present disclosure. At step 302, the method may include the step of generating and hosting a set of data packets by the carrier server (110). The data packets may pertain to a set of application protocol data unit (APDU) commands to be transferred to the UICC card associated with the computing device (104).The APDU commands may enable the users (102) to establish a communication between the computing device (104) and the carrier server (110). At step 304, the method may include the step of updating the UICC card based on the set of data packets received and then identifying the UICC card of a particular user (102). At step 306, the method may include the step of pullingthe script available and pushingit to the computing device (104) associated with the UICC card. The method may further include at 308, the step of securing the communication between the computing device (104) having the UICC card and the carrier server (110).

[0047] The system and method of the present disclosure may be further described in view of exemplary embodiments. FIG. 4 illustrates an exemplary representation(400) of a communication flow diagramtaking place in the system (108), in accordance with an embodiment of the present disclosure. [0048] As illustrated in the figure, a set of APDU commands may be generated in the carrier server (110) that may have the server application (208). The server application (208) may generate the APDU commands in the form of scripts and may deliver the scripts to the UICC card (212) that may have the client application (214). The client application (214) inside the UICC card (212) may process the scripts to establish a communication between the computing device (104) associated with the UICC card (212) and the carrier server (110) for performing Remote File Update (RFM) actions and issuing CAT commands. The carrier application (210) in the computing device (104) may connect to the carrier server (110) to check for available scripts by passing the ICCID to the carrier server (110). The server application receives the ICCID of the UICC card (212) and uses the ICCID to identify a client name associated with the UICC card.

[0049] If the script is available on the carrier server (110) for the UICC card, then the Carrier Application (210) may pull the script and push to the client application (216) on the UICC card (212). Communication between thecarrier server (110) and the carrier application (210) shall performa(Transport Layer Security) TLS handshake to have a secure connection. The communication between the carrier application (210) and the client application (216) on the UICC card (212) may be secured by Global Platform Secure Element Access Control (GP SEAC) Vl.l specification (ARA Application) but not limited to it.

[0050] FIG. 5 illustrates a block diagrammatic representation (500) of the workability of the system (108) and the method, in accordance with an embodiment of the present disclosure. In an exemplary embodiment, the carrier application (210) signed with a unique key may try to access the UICC cardapplication (216) through its AID (Application ID) on a Secure Element. The Access Control Enforcer (214) may read an Access Rule for the specific AID and Grant accessto the UICC card application (216) according to the access rule or deny access if no rule is found. The carrier application (210) can communicate with the UICC card application (216) if the command APDUs match the filter list (if given) checked by the Access Control Enforcer (214).

[0051] The Access Control Enforcer (214) may read an access rule from an ARA-M according to the applications certificate and AID of the applet to be accessed when a communication channel is opened. Access may either be granted according to access rule or denied if no rule is found.When the communication channel is established all APDU transfersmay be checked against the APDU filter list if available. No access policy may be stored in the ACE itself and all data may be read from the Secure Element, the ARA-M. [0052] The ARA (Access Rule Application) (502) on the secure element may store the Access Rules. The ARA may consist of at least a unique ARA-M (Access Rule Application Master). All Access Rules may be stored in the ARA andmay be accessed by the Access Control Enforcer (214) via the ARA-M.

[0053] In an exemplary embodiment, an algorithm for Applying Rules and Access Rule may include the Access Rule (AR) being stored in the ARA and can be updated over the air with standardized Global Platform Secure Messaging or Remote Applet Management functionality. The AR may consist of a set of data objects (DO). The AR may be identified by the AID of the applet to be accessed (AID-REF-DO) and the hash (SHA-1) of the applications certificate (Hash-REF-DO). The Access Rule DO may contain an APDU access rule (APDU-AR-DO) and/or a NFC (Near Field Communication) access rule (NFC-AR-DO). The APDU-AR-DO may contain either a general flag (allowed / not allowed) or an APDU filter list. An APDU filter may consist of a 4-byte APDU header and a 4-byte APDU filter mask. In an embodiment, the format of rule may be as shown below:

[0054] In an exemplary embodiment, a sample rule may include but not limited tostoringrules in ARA-M (Allow ALL APK to Access ALL AIDs)80 E2 9000 12 F010 E20E E104 4F00 C100 E306 D00101 D10101 (9000).

[0055] If the device doesnot support the ARA Application then the present disclosure may allow the user to use the ARF (Access Rule File) to store the rules.

[0056] If the ARF is also not supported then communication between the device application and thesecure element that is the SIM Card can be done by an AT command or a Carrier Preveledge or other available method.

[0057] For end-to-end security; there could be TLS security between the device application and the carrier server and one more layer of security between the carrier server and the SIM card by putting secure keys inside the sim card and the carrier server.

[0058] FIG. 6 illustrates an exemplary computer system (600) in which or with which embodiments of the present invention can be utilized in accordance with embodiments of the present disclosure. As shown in FIG. 6, the computer system (600) can include an external storage device (610), a bus (620), a main memory (630), a read-only memory (640), a mass storage device (650), a communication port (660), and a processor (670). A person skilled in the art will appreciate that the computer system may include more than one processor and communication ports. Examples of the processor (670) include, but are not limited to, an Intel® Itanium® or Itanium 2 processors), or AMD® Opteron® or Athlon MP® processor(s), Motorola® lines of processors, FortiSOC™ system on chip processors, or other future processors. The processor (670) may include various modules associated with embodiments of the present disclosure. The communication port (660) can be any of an RS- 232 port for use with a modem-based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. Communication port 660 may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which the computer system (600) connects. The memory (630) can be Random Access Memory (RAM), or any other dynamic storage device commonly known in the art. The Read-only memory (640) can be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chips for storing static information e.g., start-up or BIOS instructions for the processor (670). The mass storage (650) may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), e.g. those available from Seagate (e.g., the Seagate Barracuda 7102 family) or Hitachi (e.g., the Hitachi Deskstar7K1000), one or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g. an array of disks (e.g., SATA arrays), available from various vendors.

[0059] The Bus (620) communicatively couples the processor(s) (670) with the other memory, storage and communication blocks. The bus (620) can be, e.g. a Peripheral Component Interconnect (PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface (SCSI), USB or the like, for connecting expansion cards, drives, and other subsystems as well as other buses, such a front side bus (FSB), which connects the processor (670) to the computer system.

[0060] Optionally, operator and administrative interfaces, e.g. a display, keyboard, and a cursor control device, may also be coupled to the bus (620) to support direct operator interaction with a computer system. Other operator and administrative interfaces can be provided through network connections connected through the communication port (660). The external storage device (610) can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc - Read Only Memory (CD-ROM), Compact Disc -Re- Writable (CD-RW), Digital Video Disk-Read Only Memory (DVD-ROM). Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system limit the scope of the present disclosure.

[0061] Thus, the present disclosure provides a unique and inventive solution for efficiently managing a UICC Card without cellular connectivity through a first set of instructions residing in a server and connected to a network. The proposed solution can be used to update card configuration, issue CAT (Card Application Toolkit) command to the device, and upgrade a status of carrier-grade applications installed on the device but not limited to the like.

[0062] While considerable emphasis has been placed herein on the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the invention. These and other changes in the preferred embodiments of the invention will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter to be implemented merely as illustrative of the invention and not as limitation.

KEY ADVANTAGES

[0063] The present disclosure provides efficient and reliable systems and methods for automatically managing the UICC card associated with a device without cellular connectivity when the device is connected to Wi-Fi.

[0064] The present disclosure provides systems and methods for updating the configuration of the UICC card associated with a device without cellular connectivity, issuing CAT (Card Application Toolkit) commands to the device, and upgrading the status of carriergrade applications installed on the device but not limited to the like.

[0065] Another advantage of the present disclosure is that it provides a solution for managing the UICC card associated with a device without cellular connectivity in an international network. The present disclosure enables a user to update the configuration of the UICC card that is essential for latching on to the international network outside the home country. RESERVATION OF RIGHTS

A portion of the disclosure of this patent document contains material, which is subject to intellectual property rights such as, but are not limited to, copyright, design, trademark, IC layout design, and/or trade dress protection, belonging to Jio Platforms Limited (JPL) or its affiliates (hereinafter referred as owner). The owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights whatsoever. All rights to such intellectual property are fully reserved by the owner. The patent document includes systems and methods as defined in Global Platform Specs for ARA: GPD_SE_Access_Control_vl.l ETSI Specs for AT Command: 127 007 And Javacard Framework Architecture, and the like.