H04W8/20

ELECTRONIC SUBSCRIBER IDENTITY MODULE TRANSFER ELIGIBILITY CHECKING
20230013030 · 2023-01-19 ·

Embodiments described herein relate to eligibility checking for transfer of one or more electronic subscriber identity modules (eSIMs) between two mobile wireless devices. Eligibility to transfer an eSIM to an eUICC of a target device can depend on whether the eUICC of the target device satisfies certain security requirements for the eSIMs to be transferred. The mobile wireless devices can obtain a transfer eligibility result based on communication with one or more network-based servers that can determine compatibility for eSIM transfer.

ELECTRONIC SUBSCRIBER IDENTITY MODULE TRANSFER ELIGIBILITY CHECKING
20230013030 · 2023-01-19 ·

Embodiments described herein relate to eligibility checking for transfer of one or more electronic subscriber identity modules (eSIMs) between two mobile wireless devices. Eligibility to transfer an eSIM to an eUICC of a target device can depend on whether the eUICC of the target device satisfies certain security requirements for the eSIMs to be transferred. The mobile wireless devices can obtain a transfer eligibility result based on communication with one or more network-based servers that can determine compatibility for eSIM transfer.

METHOD FOR OBTAINING IDENTIFIER OF TERMINAL DEVICE, APPARATUS, AND SYSTEM
20230013010 · 2023-01-19 ·

A method for obtaining an identifier of a terminal device includes a key management network element receiving, from a first terminal device, a first key request including a first identifier, where the first identifier is an anonymous identifier or a temporary identifier of a second terminal device. The key management network element sends, to a unified data management network element, a first request including the first identifier. The unified data management network element determines a SUPI of the second terminal device based on the first identifier, and sends, to the key management network element, a first response including the SUPI. In response to an authorization check performed on the second terminal device based on the SUPI succeeds, the key management network element sends a first key response to the first terminal device, where the first key response includes a secure communication parameter.

METHOD FOR OBTAINING IDENTIFIER OF TERMINAL DEVICE, APPARATUS, AND SYSTEM
20230013010 · 2023-01-19 ·

A method for obtaining an identifier of a terminal device includes a key management network element receiving, from a first terminal device, a first key request including a first identifier, where the first identifier is an anonymous identifier or a temporary identifier of a second terminal device. The key management network element sends, to a unified data management network element, a first request including the first identifier. The unified data management network element determines a SUPI of the second terminal device based on the first identifier, and sends, to the key management network element, a first response including the SUPI. In response to an authorization check performed on the second terminal device based on the SUPI succeeds, the key management network element sends a first key response to the first terminal device, where the first key response includes a secure communication parameter.

NETWORK ACCESS AND MANAGEMENT VIA WIRELESS ACCESS PROFILES

Communication management hardware controls network access via generation and distribution of wireless access profiles. For example, the communication management hardware receives a network access request from first user equipment to use a network over an open SSID network. In response to detecting that the first user equipment operated by a non-subscriber is not yet authorized to use the network, such as because the first user equipment has not signed up for use of the network, the communication management hardware directs the first user equipment to a portal. The communication management hardware then communicates a wireless access profile to the first user equipment. In one arrangement, the wireless access profile is derived based on input from the first user equipment. The wireless access profile provides the first user equipment wireless access to the network via a secure SSID.

NETWORK ACCESS AND MANAGEMENT VIA WIRELESS ACCESS PROFILES

Communication management hardware controls network access via generation and distribution of wireless access profiles. For example, the communication management hardware receives a network access request from first user equipment to use a network over an open SSID network. In response to detecting that the first user equipment operated by a non-subscriber is not yet authorized to use the network, such as because the first user equipment has not signed up for use of the network, the communication management hardware directs the first user equipment to a portal. The communication management hardware then communicates a wireless access profile to the first user equipment. In one arrangement, the wireless access profile is derived based on input from the first user equipment. The wireless access profile provides the first user equipment wireless access to the network via a secure SSID.

Dynamic user equipment (UE) group creation to coordinate devices

A network function selectively supports a mobile device with network settings appropriate for the device context of the mobile device. The network function obtains a device profile for the mobile device, which identifies multiple device groups, with each device group being associated with a corresponding set of network settings. The network function selects a device group among the device groups in the device profile based on the device context of the mobile device. The network function directs at least one network function in the network to support the mobile device with a set of network settings corresponding to the selected device group.

Dynamic user equipment (UE) group creation to coordinate devices

A network function selectively supports a mobile device with network settings appropriate for the device context of the mobile device. The network function obtains a device profile for the mobile device, which identifies multiple device groups, with each device group being associated with a corresponding set of network settings. The network function selects a device group among the device groups in the device profile based on the device context of the mobile device. The network function directs at least one network function in the network to support the mobile device with a set of network settings corresponding to the selected device group.

Method and system for controlling UICC and EUICC

An electronic device is provided. The electronic device includes a UICC in which a first profile is installed, an eUICC, and a processor electrically connected with the UICC and the eUICC. The processor requests a second profile to be installed in the eUICC from a first server based on the first profile, receives the second profile from a second server associated with the first server, and installs the received second profile in the eUICC. The second profile and the first profile include the same subscriber identification information.

Method and system for controlling UICC and EUICC

An electronic device is provided. The electronic device includes a UICC in which a first profile is installed, an eUICC, and a processor electrically connected with the UICC and the eUICC. The processor requests a second profile to be installed in the eUICC from a first server based on the first profile, receives the second profile from a second server associated with the first server, and installs the received second profile in the eUICC. The second profile and the first profile include the same subscriber identification information.