Patent classifications
H04W8/265
Methods and apparatus for correcting error events associated with identity provisioning
Methods and apparatus for correcting error events associated with identity provisioning. In one embodiment, repeated requests for access control clients are responded to with the execution of a provisioning feedback mechanism which is intended to prevent the unintentional (or even intentional) over-consumption or waste of network resources via the delivery of an excessive amount of access control clients. These provisioning feedback mechanisms include rate-limiting algorithms and/or methodologies which place a cost on the user. Apparatus for implementing the aforementioned provisioning feedback mechanisms are also disclosed and include specialized user equipment and/or network side equipment such as a subscriber identity module provisioning server (SPS).
APPARATUS AND METHOD
An apparatus is provided. The apparatus includes a memory storing one or more instructions and a processor. The processor execute the one or more instructions to: receive update information from an external apparatus, the update information corresponding to a network communication; obtain a Subscription Concealed Identifier (SUCI) based on the update information; and transmit the SUCI to the external apparatus.
METHOD FOR ESTABLISHING A BIDIRECTIONAL COMMUNICATION CHANNEL BETWEEN A SERVER AND A SECURE ELEMENT, CORRESPONDING SERVERS AND SECURE ELEMENT
The invention concerns a method for establishing a bidirectional communication channel between a server and a secure element cooperating with a terminal in a cellular telecommunication network for exchanging data and commands, the method comprising: a—Sending a first attachment request signaling message from the terminal to the server, the first message comprising a MCC and a MNC of the server, and at least a part of a unique identifier of the secure element, the server being provisioned with the unique identifier; b—Sending from the server to the secure element, in at least a firstsignaling message: At least a command; A correlation identifier if further messages have to be sent from the secure element to the server; A first payload comprising data; c—Executing at the secure element the command.
MAINTAINING ACCESS TO SERVICES VIA SIM CARD
Implementations of the subject technology provide for storing a temporary certificate on a mobile device for accessing services in association with a primary number. A device determines that a first subscriber identity module (SIM) card, previously used by the device, is not available for use by the device. The device determines that a second SIM card is available for use by the first device within a predetermined time period after the first SIM card is determined to be not available for use by the device. The device confirms that a communication identifier of the first SIM card is strongly tied to a user account associated with the device. The device stores a temporary certificate that attests to continued ownership of the communication identifier by the device and allows the device to access at least one service in association with the communication identifier.
Network address policy information received in a pre-associated state
In some examples, a wireless device includes a communication interface to communicate with a wireless network, and at least one processor configured to, while the wireless device is in a pre-associated state, receive, from an access point (AP), information including a network address policy of the wireless network. The at least one processor is configured to further, in response to the information including the network address policy, use an address of the wireless device according to the network address policy.
Information-processing device and communication system
An in-vehicle mobile station is presented. When a user purchases vehicle including in-vehicle mobile station, s/he operates his/her communication device and in-vehicle mobile station to write a profile in a SIM of in-vehicle mobile station and to activate the SIM. Specifically, the user initially operates communication device to register a profile to be written in the SIM of in-vehicle mobile station, in contract information management device. Subsequently, the user operates in-vehicle mobile station to write the profile registered in contract information management device, in in-vehicle mobile station, and to activate the mobile station.
Network policy configuration
In some examples, a configurator device maps a configuration attribute received from a wireless device to a credential attribute, the credential attribute to be mapped to a network policy. The configurator device sends the credential attribute to the wireless device, the credential attribute useable by the wireless device to access an access point (AP), and useable by the AP to obtain the network policy to apply to a communication of the wireless device.
ACTIVATION OF A RADIO DEVICE FOR CUSTOMER USE
One example device facilitates activation of a radio device includes an electronic processor configured to select the radio device from a plurality of types of unactivated radio devices. Each radio device of the plurality of types of unactivated radio devices may be factory loaded with a global firmware and a global codeplug. The electronic computing device may be configured to determine at least one of a region-specific codeplug version and a region-specific regulatory restriction based on a desired region of operation, and associate the at least one of the region-specific codeplug version and the region-specific regulatory restriction with a unique identifier of the radio device that are configured to be transmitted to the radio device to activate the radio device for communication within the region of operation in response to receiving an indication that the radio device has been powered-up for a first time for operation by a customer.
Discovery of IoT devices
Connecting an IoT device enabling a new function of another IoT device. An IoT hub scans a network segment for presence of an IoT device. Upon detecting the IoT device, a device response pattern is received. The device response pattern is compared with stored response patterns. A matching stored response pattern is selected which has a similarity to the device response pattern. A pattern difference is derived. Related device information is transformed into a device signature for the IoT device. The device signature is transferred to a discovery engine. The device signature is compared to stored signatures and protocol information. A matching stored signature and protocol information is transferred to the IoT hub. The IoT hub compares the new function with functions of other connected IoT devices. Upon finding a matching other IoT device, the other IoT device is offered a usage of the new function and protocol information.
Authorization of a device being equipped with an embedded universal integrated circuit card
A method and device for registering an embedded Universal Integrated Circuit Card (eUICC) for a device and a method and device for controlling authorization of operation of a device being equipped with an eUICC. In an aspect, a method of a service node of registering an eUICC for a device is provided. The method comprises receiving information specifying ownership of the device and an identifier of the device, receiving an identifier of the eUICC and an identifier of the device, and storing the received information, wherein ownership of the device and the identifier of the eUICC being arranged in the device is registered with the service node.