摘要 |
Disclosed are different techniques through for enabling a mobile device to dynamically support different authentication algorithms. A first technique includes a configuration in which an eUICC included in the mobile device implements various authentication algorithms used by MNOs (for example, MNOs which can interact with the mobile device). In detail, this technique involves storing an executable code for each of various authentication algorithms by the eUICC. According to this technique, the eUICC is configured to manage at least one eSIM. Herein, the eSIM includes (i) an identifier corresponding to one of various authentication algorithms implemented by the eUICC, and (ii) authentication parameters used by an MNO corresponding to the eSIM. A second technique includes a configuration in which the eUICC interfacing with the eSIM to extract (i) an executable code for an authentication algorithm used by an MNO corresponding to the eSIM and (ii) authentication parameters matched with the authentication algorithm. |