0% found this document useful (0 votes)
64 views16 pages

Remote Provisioning for eUICC v3.2

The document discusses the global architecture and requirements for eUICC and profiles. It outlines the actors and interactions involved in enabling and disabling profiles on an eUICC device.

Uploaded by

Jose Martín
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views16 pages

Remote Provisioning for eUICC v3.2

The document discusses the global architecture and requirements for eUICC and profiles. It outlines the actors and interactions involved in enabling and disabling profiles on an eUICC device.

Uploaded by

Jose Martín
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

......................................................................................................................

2
............................................................................................................... 4
1.1. Definitions ....................................................................................................................... 4
1.2. Global Architecture of the eUICC ................................................................................... 5
............................................................................................................ 8
2.1. Requirement description ................................................................................................ 8
2.2. Access network requirements ........................................................................................ 8
2.3. Network control requirements ........................................................................................ 8
2.4. USAT Command requirements ...................................................................................... 9
2.5. BIP commands ............................................................................................................. 13
2.6. Security requirements .................................................................................................. 14
2.7. AT commands requirements ........................................................................................ 14
o
o
o
o
o

o
o

o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o

o
o
o
o

.
eUICC

SM-DP 2/MNO 2 SM-DP 1/MNO 1 SM-SR Dispositivo ISD-R

USAT
EnableProfile

EnableProfile

REFRESH

NETWORK ATTACH

Notification

Update SR
database

EnableProfile result
Device
requirements
scope
Notification of disabling







You might also like