Patent classifications
H04W12/35
Profile handling of a communications device
There is presented mechanisms for profile handling of a communications device (300). A method is performed by a local profile assistant (200a) of a proxy device (200). The method comprises obtaining an indication of handling a profile of the communications device (300). The method comprises establishing a first secure communications link with a local profile assistant of the communications device. The method comprises establishing a second secure communications link with a subscription management entity (430) of the communications device. The method comprises receiving information pertaining to handling of the profile by the local profile assistant of the communications device, the information being received from the subscription management entity over the second secure communications link. The method comprises providing the information to the local profile assistant of the communications device over the first secure communications link.
METHOD AND DEVICE FOR AUTHENTICATING A MOBILE STATION ON AN ALTERNATIVE COMMUNICATIONS NETWORK
A method of authenticating a mobile station on an alternate communications network is disclosed, the mobile station being associated with a default communications network. The mobile station comprises a baseband processor to manage the antenna-related functions and a SIM card to accommodate a default SIM associated with the default communications network for receiving network credentials from the baseband processor. The method comprises providing a SIM card device to intercept communications between the baseband processor and the SIM card, monitoring the network credentials in respect of the network that the mobile station is actively in communication with, determining whether the mobile station needs to switch to an alternate network, and identifying or receiving from a user the alternate network, consulting a SIM bank, comprising at least one alternate SIM, and selecting an alternate SIM having a mobile station identification variable compatible with the alternate network, receiving a network authentication request on the mobile station from the alternate network, and allocating the selected mobile station identification variable to the mobile station so as to identify the user of the mobile station on the alternate network.
METHODS FOR PROVIDING A RESPONSE TO A COMMAND REQUESTING THE EXECUTION OF A PROACTIVE COMMAND
A communication method includes receiving a first message of a Short Message Service containing a first command that requests execution of a proactive command. The first message is decrypted according to protocol SCP80 to extract the first command. The execution of the proactive command is requested in order to obtain a response to the proactive command. A second message of the Short Message Service is transmitted to the remote server and indicates that the response to the proactive command has been obtained. A third message of the Short Message Service is received and contains a second command from the remote server. The third message is decrypted according to the protocol SCP80. A response message is generated as a function of the response and encrypted according to the protocol SCP80 to generate a fourth message of the Short Message Service transmitted to the remote server.
ACCESS DATA PROVISIONING APPARATUS AND METHODS
Methods and apparatus for activating a purchased or previously deployed device by a subscriber. In one embodiment, activation includes authenticating the device to a service provider or carrier, and providing the device with data necessary for enabling the service to the device. In one variant, a user device is activated at a retail store, with the assistance of a carrier representative. In another variant, user equipment is activated via a communications network without the assistance of a representative. In yet another variant, the user equipment is activated via the Internet without the assistance of a representative. The provision of access data includes pre-assigning eSIM from a population of unassigned eSIMs to certain devices for various carrier networks. Alternatively, the eSIM may be assigned on an as-needed basis. Unassigned and/or unused eSIMs can be released (or sold back to the vendor) and/or reused. Solutions for eSIM backup and restoration are also described.
METHOD OF PROVIDING MOBILE COMMUNICATION PROVIDER INFORMATION AND DEVICE FOR PERFORMING THE SAME
A method for providing mobile communication provider information and a device for performing the same are disclosed. A terminal having an eUICC receives data, in which mobile communication provider information is capsulized and included, and stores the received data in the eUICC. Therefore, the mobile communication provider information can be transferred by applying the highest security scheme, and duplication of the eUICC due to the exposure of an authentication key by external hacking attacks can be prevented.
Systems and methods for implementing an airline ticket counter system in a mobile app
The invention is directed to systems and methods for implementing an airline ticket counter system in a mobile app that allows for ticket counters to be re-assignable and re-configurable across employee permission levels and across different airline companies with their own employee access policies.
AUTOMATIC SECURE DATA TRANSFER WITH A MOTOR VEHICLE
In an example, an in-vehicle electronic device to operate in a motor vehicle in an unattended power state may include a wireless interface to communicate with a remote secure network resource; a memory to store one or more values to specify a predefined trigger event for coupling the motor vehicle in the unattended power state to the remote secure network resource; and a processor configured to: recognize an occurrence of a predefined trigger event by checking first data obtained responsive to monitoring the a resource against the one or more values; in responsive to a recognition of the occurrence of a predefined trigger event, identify second data suitable for coupling the in-vehicle electronic device to the remote secure network resource; and establish a communication channel to the remote secure network resource via the wireless interface using the second data, the second communication channel for transmission of third data.
METHOD AND APPARATUS FOR ACCESSING CELLULAR NETWORK FOR SIM PROFILE
The present disclosure relates to a communication technique that combines a 5G communication system for supporting a data rate that is higher than that of a beyond 4G system with IoT technology, and a system thereof. The present disclosure may be applied to intelligent services on the basis of 5G communication technology and IoT related technology, such as smart home, smart building, smart city, smart car or connected car, health care, digital education, retail, security and safety related services. Disclosed is a method for causing a cellular network itself to receive provisioning of a SIM profile to make it possible to use a normal cellular network service.
FACILITATION OF SECURITY FOR ELECTRONIC SUBSCRIBER IDENTITY MODULE FOR 5G OR OTHER NEXT GENERATION NETWORK
Electronic subscriber identity modules (eSIM) can be more susceptible to hackers and more vulnerable than physical subscriber identity modules. The current disclosure discusses systems and methods to facilitate eSIM security by utilizing a management software application (MSA) hosted on a mobile device. This MSA can cross-reference eSIM registration data with mobile device signature data to determine if the correct user identity is associated with mobile device prior to an eSIM being issued to the mobile device. Additionally, various degrees of data flagging can be utilized to allow an end user to properly address an indication of mobile device vulnerability.
METHODS AND SYSTEMS OF USING REMOTE SUBSCRIBER IDENTIFICATION MODULES AT A DEVICE
The present invention discloses methods and systems for communicating at a cellular router between a first wireless communication module and a first subscriber identity module (SIM). The cellular router receives a first request from a first wireless communication module and encapsulates the first request in a first modified request. The cellular router then sends the first modified request to a first SIM card in a first communication apparatus and waits for a first modified reply. While waiting for the first modified reply the cellular router sends at least one halt message to the first wireless communication module after a first time threshold. After receiving the first modified reply, the cellular router decapsulates the first modified reply to retrieve a first reply and sends the first reply to the first wireless communication module where the first modified reply is a reply to the first modified request.