H04W12/30

MANAGING A SUBSCRIPTION IDENTIFIER ASSOCIATED WITH A DEVICE
20230007491 · 2023-01-05 ·

A system is disclosed for managing a communication network subscription identifier associated with a device. The system comprises a Core Network node configured to provide a subscription identifier for the device to a Device Management node with management responsibility for the device. The system further comprises a Verification node configured to receive from the Device Management node the subscription identifier and a characteristic of the device, and to bind the subscription identifier to the characteristic such that the subscription identifier is uniquely associated with the characteristic. The system further comprises a Network Access node configured to obtain the subscription identifier from the device. The Verification node, Network Access node and Core Network node are configured to cooperate to verify that the device from which the Network Access node obtained the subscription identifier is in possession of the characteristic that is bound to the subscription identifier.

METHOD AND SYSTEM FOR PROVIDING COMMUNICATION SERVICES USING A PLURALITY OF REMOTE SUBSCRIBER IDENTITY MODULES

A method and a wireless communication device for providing communication service to devices connected to the wireless communication device. By establishing a starter wireless carrier connection using a starter SIM from a plurality of local SIMs, the wireless communication device establishes one or more logical data connections with one or more SIM banks. Remote-SIMs are selected from the one or more SIM banks and used to establish further wireless carrier connections to allow communication service to be provided to the devices over wireless carrier connections.

Mobile communication terminal and control method therefor
11570599 · 2023-01-31 · ·

A mobile communication terminal A performs near field communication with another mobile communication terminal B by a near field communication unit and obtains a communication distance with another mobile communication terminal B. An information acquisition unit acquires information on another mobile communication terminal B, information on the mobile communication terminal A, or both of the information when the communication distance to the other mobile communication terminal B is equal to or more than a threshold. An abnormality determination unit determines an abnormal state of the mobile communication terminal A based on information (position information, wearing information, or the like) acquired by the information acquisition unit. When the abnormality determination unit determines that the mobile communication terminal A is in the abnormal state, a lock unit locks the mobile communication terminal A, the other mobile communication terminal B or both of those mobile communication terminals.

Mobile communication terminal and control method therefor
11570599 · 2023-01-31 · ·

A mobile communication terminal A performs near field communication with another mobile communication terminal B by a near field communication unit and obtains a communication distance with another mobile communication terminal B. An information acquisition unit acquires information on another mobile communication terminal B, information on the mobile communication terminal A, or both of the information when the communication distance to the other mobile communication terminal B is equal to or more than a threshold. An abnormality determination unit determines an abnormal state of the mobile communication terminal A based on information (position information, wearing information, or the like) acquired by the information acquisition unit. When the abnormality determination unit determines that the mobile communication terminal A is in the abnormal state, a lock unit locks the mobile communication terminal A, the other mobile communication terminal B or both of those mobile communication terminals.

Flexible electronic subscriber identity module deployment
11570612 · 2023-01-31 · ·

Techniques for flexible electronic subscriber identity module (eSIM) deployment to a wireless device by a network server, including generation of multiple eSIMs using an identical eSIM identifier value, such as an identical integrated circuit card identifier (ICCID) value, and subsequent selection of an eSIM based on capabilities of the wireless device. Multiple eSIMs that correspond to different sets of wireless device capabilities are generated without knowledge of the wireless communication standards that a wireless device supports. The multiple eSIMs include a first eSIM that includes fifth generation (5G) wireless communication protocol information and a second eSIM that excludes 5G wireless communication protocol information. The network server selects an eSIM from the multiple eSIMs based on whether the wireless device is 5G capable. After selection and binding of a profile package that includes the eSIM, the remaining eSIMs that use the identical ICCID value are deleted, for security enforcement against cloning.

Mobile enrollment using a known biometric
11716330 · 2023-08-01 · ·

A system performs mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.

Mobile enrollment using a known biometric
11716330 · 2023-08-01 · ·

A system performs mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.

Digital Contact Data Management and Distribution Systems and Methods
20230027966 · 2023-01-26 ·

Applications for creating, managing, and distributing digital contact data over large networks. Applications configured for implementation with electronic devices having touch-sensitive surfaces with displays, particularly mobile devices. Applications implemented with predictive keyboards for efficient, error-free searching of digital contact data and profiles. Applications for quickly sharing and distributing digital contact data over large networks via simple gestures over touch-sensitive surfaces.

Digital Contact Data Management and Distribution Systems and Methods
20230027966 · 2023-01-26 ·

Applications for creating, managing, and distributing digital contact data over large networks. Applications configured for implementation with electronic devices having touch-sensitive surfaces with displays, particularly mobile devices. Applications implemented with predictive keyboards for efficient, error-free searching of digital contact data and profiles. Applications for quickly sharing and distributing digital contact data over large networks via simple gestures over touch-sensitive surfaces.

5G Network Slice Device Security Protection
20230232236 · 2023-07-20 ·

A method of user equipment (UE) implemented network slice security protection is disclosed. The method comprises the UE receiving a request to initialize an application, querying a UE Route Selection Policy (URSP) stored on the UE, and receiving traffic descriptors and security descriptors in response to the querying. The traffic descriptors identify a network slice for the application. The security descriptors comprise a security flag and a virtualization container ID. The method also comprises the UE initiating the application within a virtualization container corresponding to the virtualization container ID based on the security flag indicating that the network slice is secure and binding traffic for the application in the virtualization container to a PDU session based on the traffic descriptors. The method further comprises communicating, by the application executing within the virtualization container, with a core network over the PDU session via the network slice bound to the virtualization container.