H04W12/40

Mitigation of cyberattacks on cellular devices

A pause command is sent to a Subscriber Identity Module (SIM) card of a cellular device in response to detecting a cyberattack against the cellular device on the cellular network. To mitigate the cyberattack, the SIM card temporarily disconnects the cellular device from the cellular network for a pause time. The SIM card prohibits the cellular device from connecting to the cellular network during the pause time and automatically allows the cellular device to reconnect to the cellular network after the pause time.

SECURE CHANNEL FORMATION USING EMBEDDED SUBSCRIBER INFORMATION MODULE (ESIM)

Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to form a secure channel, such as between or among a communications device, a client computing resource, and/or an identity verifier. In particular embodiments, a method may include recognizing via a subscriber identifier, a known communications device within a communications network. The method may additionally include issuing an eSIM to the communications device via the communications network in response to recognizing the communications device and relating the eSIM to the subscriber identifier of the communications device. The method may further include, responsive to receipt of one or more signals from a client computing resource, utilizing encryption provided by the eSIM to form a secure channel between or among the communications device and an identity verifier.

Multi Device Broadcast Network For Context And Awareness

Various aspects include methods for supporting context broadcast networking by a device. Aspects provide a cross ecosystem platform that enable seamless user experiences from device centric and fragmented user experiences. Some aspects may include decrypting a broadcast message received from a radio controller if the received broadcast message indicates an account identity value matching a pre-calculated account identity value and is not a duplicate, generating data elements from the decrypted broadcast message, storing the data elements in a data cache; and signaling an interrupt indicating that the data elements are available. Further aspects include a radio controller receiving a first scan interval from a primary host and a second scan interval from a secondary host of the device; scheduling primary host scan windows based on the first scan interval, and cancelling any secondary host second scan windows overlapping any of the scheduled primary host first scan windows.

Multi Device Broadcast Network For Context And Awareness

Various aspects include methods for supporting context broadcast networking by a device. Aspects provide a cross ecosystem platform that enable seamless user experiences from device centric and fragmented user experiences. Some aspects may include decrypting a broadcast message received from a radio controller if the received broadcast message indicates an account identity value matching a pre-calculated account identity value and is not a duplicate, generating data elements from the decrypted broadcast message, storing the data elements in a data cache; and signaling an interrupt indicating that the data elements are available. Further aspects include a radio controller receiving a first scan interval from a primary host and a second scan interval from a secondary host of the device; scheduling primary host scan windows based on the first scan interval, and cancelling any secondary host second scan windows overlapping any of the scheduled primary host first scan windows.

Method and apparatus for managing event in communication system

Disclosed is a terminal including a transceiver; and at least one processor, wherein the at least one processor transmits a first message which makes a request for an event to a subscription relay server, receives event-related information from the subscription relay server in response to the first message, transmits a second message which makes a request for an event to a profile provision server, based on the event-related information, and controls the transceiver to receive information related to event processing from the profile provision server in response to the second message.

Method and apparatus for trusted service management
11588791 · 2023-02-21 · ·

Method and apparatus for trusted service management are disclosed. The method includes obtaining an identification identifier and address information of a computing unit; obtaining a mapping table for the identification identifier and the address information of the computing unit; initiating a trusted service request message to a server that provides trusted service management using the identification identifier of the computing unit; and receiving a corresponding trusted service response message, and transmitting the trusted service response message to the computing unit according to the mapping table. This thereby solves the problem that some terminals cannot carry all services logics for communications between a TSM Agent and a TSM Server.

Technique for obtaining a network access profile
11503474 · 2022-11-15 · ·

Obtaining a communication network access profile for a first security module associated with a first user device. On receipt of a command for associating the first user device with a subscription with an operator including a second user device associated with a second security module, the second user device sends the first user device a message including a contact address of a server configured to provide by downloading an access profile and a datum allowing the server to interrogate a control server to obtain an order for downloading the access profile. This message triggers sending by the first security module a request for obtaining an access profile associated with the subscription, addressed to the contact address and having the datum. On obtaining an order, the access profile is downloaded into the first security module, a confirmation being sent by the first user device to the second user device.

Technique for obtaining a network access profile
11503474 · 2022-11-15 · ·

Obtaining a communication network access profile for a first security module associated with a first user device. On receipt of a command for associating the first user device with a subscription with an operator including a second user device associated with a second security module, the second user device sends the first user device a message including a contact address of a server configured to provide by downloading an access profile and a datum allowing the server to interrogate a control server to obtain an order for downloading the access profile. This message triggers sending by the first security module a request for obtaining an access profile associated with the subscription, addressed to the contact address and having the datum. On obtaining an order, the access profile is downloaded into the first security module, a confirmation being sent by the first user device to the second user device.

MOBILE ENROLLMENT USING A KNOWN BIOMETRIC
20230046836 · 2023-02-16 ·

A system performs mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.

Part 2 of Remote SIM Provisioning of a Subscriber Entity
20220360994 · 2022-11-10 ·

There is provided mechanisms for remote provisioning of a SIM profile to a subscriber entity. A method is performed by a remote SIM provisioning server. The method comprises obtaining a request from an MNO entity for generation of the SIM profile. The method comprises generating the SIM profile. The method comprises providing, to a storage entity, a key-value pair of the SIM profile. The key-value pair comprises a unique identifier comprising at least one profile specific element of the SIM profile as key and binding information of the at least one profile specific element as value. The unique identifier comprising at least one profile specific element of the SIM profile is represented by profile/subscription unique data elements for the SIM profile. The binding information of the at least one profile specific element is represented by an BID of the subscriber entity, ICCID of the SIM profile, IMSI, and an MNO identifier. The method comprises providing, to the subscriber entity requesting download of the SIM profile, the SIM profile.