H04W12/30

EHN venue-specific application provisioning

In order to leverage an enterprise-hosted network (EHN) associated with an entity, a communication technique may dynamically customize an application on a portable electronic device. In particular, the portable electronic device may discover and then may connect to the EHN using a quarantine zone that restricts access to the EHN. After providing valid credentials to establish a level of trust with the EHN, the portable electronic device may receive a request for authentication and authorization information. In response to the request, the portable electronic device may provide a credential to the EHN. Next, the portable electronic device may receive provisioning information that customizes the application on the portable electronic device to a venue associated with the entity. The provisioning information may include a connection setting associated with the application on the portable electronic device, which allows the portable electronic device to connect to the EHN outside of the quarantine zone.

Service capability exposure at the user equipment

The present application is directed to an apparatus communicating with a mobile core network. The apparatus includes a non-transitory memory including instructions stored thereon for configuring a service. The apparatus also includes a processor operably coupled to the non-transitory memory configured to execute the instructions of: (i) receiving, from a core network node, first information for accessing a Network Exposure Function (NEF); (ii) receiving a request for the service from an application on user equipment (UE); (iii) creating a request for the service; (iv) using the first information to send the created request to the NEF; (v) receiving a response from the NEF, the response includes a second information; and (vi) sending the second information to the application. The service includes one or more of buffering, background data transfer, communication pattern configuration, sponsored services, reachability, mobile originating/paging-off mode, and value added services. Moreover, the received request includes parameters to configure the service. Further, the second information includes parameters selected from desired time window, desired data transfer size, desire quality of service, indication whether flow is sponsored, maximum cost basis, qualitative measurements and combinations thereof.

Updating a subscriber identity module
11503473 · 2022-11-15 · ·

Updating a subscriber identity module, SIM, on a host device by deriving a pre-shared key by requesting a SIM identifier via communication module of the host device; receiving SIM identifier and deriving an agent identifier from SIM identifier; transmitting agent and SIM identifiers to SIM update server; receiving a random value from SIM update server and supplying it to the SIM to initiate SIM authentication procedure. In reply, receiving an authentication response from the SIM; and deriving pre-shared key from authentication response; transmitting an update request message to SIM update server, wherein the update request message comprises the agent identifier and is encrypted before transmission using the pre-shared key; receiving an update response message from the SIM update server which has update data and is encrypted using pre-shared key; and following decryption of update response message using derived pre-shared key, transmitting update data to communication module.

Method of managing priority in the context of a secure element domain with multiple interfaces, electronic device and communication system

A method of managing priority in an electronic device, wherein the electronic device comprises a contact-less communication domain and a secure element domain, wherein the contact-less communication domain and the secure element domain are connected via a domain interface, and wherein the secure element domain comprises two or more interfaces. The method comprises: i) detecting (by the contact-less communication domain), a radio frequency (RF) field of an external device and, upon detecting said RF field or upon receiving a first command from the external device, ii) sending a priority request via the domain interface to the secure element domain; iii) receiving (by the secure element domain) the priority request and identifying whether the secure element domain is in a processing status, hereby iv) upon identifying that the secure element domain is not in a processing status, approving (by the secure element domain) the requested priority, and starting a transaction (by the contact-less communication domain) in a priority status; and v) upon identifying that the secure element domain is in a processing status, denying (by the secure element domain) the requested priority, and starting a mute status or remaining in a mute status (by the contact-less communication domain), such that the external device cannot detect the contact-less communication domain.

Method of managing priority in the context of a secure element domain with multiple interfaces, electronic device and communication system

A method of managing priority in an electronic device, wherein the electronic device comprises a contact-less communication domain and a secure element domain, wherein the contact-less communication domain and the secure element domain are connected via a domain interface, and wherein the secure element domain comprises two or more interfaces. The method comprises: i) detecting (by the contact-less communication domain), a radio frequency (RF) field of an external device and, upon detecting said RF field or upon receiving a first command from the external device, ii) sending a priority request via the domain interface to the secure element domain; iii) receiving (by the secure element domain) the priority request and identifying whether the secure element domain is in a processing status, hereby iv) upon identifying that the secure element domain is not in a processing status, approving (by the secure element domain) the requested priority, and starting a transaction (by the contact-less communication domain) in a priority status; and v) upon identifying that the secure element domain is in a processing status, denying (by the secure element domain) the requested priority, and starting a mute status or remaining in a mute status (by the contact-less communication domain), such that the external device cannot detect the contact-less communication domain.

MOBILE ENROLLMENT USING A KNOWN BIOMETRIC
20230046836 · 2023-02-16 ·

A system performs mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.

MOBILE ENROLLMENT USING A KNOWN BIOMETRIC
20230046836 · 2023-02-16 ·

A system performs mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.

MOBILE DEVICE CASE FOR SECURED ACCESS AND IMPROVEMENTS
20230052605 · 2023-02-16 ·

Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.

Part 2 of Remote SIM Provisioning of a Subscriber Entity
20220360994 · 2022-11-10 ·

There is provided mechanisms for remote provisioning of a SIM profile to a subscriber entity. A method is performed by a remote SIM provisioning server. The method comprises obtaining a request from an MNO entity for generation of the SIM profile. The method comprises generating the SIM profile. The method comprises providing, to a storage entity, a key-value pair of the SIM profile. The key-value pair comprises a unique identifier comprising at least one profile specific element of the SIM profile as key and binding information of the at least one profile specific element as value. The unique identifier comprising at least one profile specific element of the SIM profile is represented by profile/subscription unique data elements for the SIM profile. The binding information of the at least one profile specific element is represented by an BID of the subscriber entity, ICCID of the SIM profile, IMSI, and an MNO identifier. The method comprises providing, to the subscriber entity requesting download of the SIM profile, the SIM profile.

PART 1 OF REMOTE SIM PROVISIONING OF A SUBSCRIBER ENTITY
20220360970 · 2022-11-10 ·

There is provided mechanisms for remote provisioning of a SIM profile to a subscriber entity. A method is performed by a remote SIM provisioning server. The method includes obtaining a request from an MNO entity for generation of the SIM profile. The method includes generating the SIM profile. The method includes providing, to a storage entity, a key-value pair of the SIM profile. The key-value pair includes a unique identifier including at least one profile specific element of the SIM profile as key and binding information of the at least one profile specific element as value. The unique identifier including at least one profile specific element of the SIM profile is represented by an ICCID of the SIM profile. The binding information of the at least one profile specific element is represented by an EID and profile/subscription unique data elements for the SIM profile.