H04W12/35

Cellular wireless service preferences transfer

Apparatus and methods to transfer user preferences for cellular wireless service associated credentials transferred from a source device to a target device. Transfer of credentials can include physically moving a physical subscriber identity module (SIM) card between devices, transfer of cellular wireless service from a first SIM card at the source device to a second SIM card at the target device, and/or transfer of cellular wireless services for one or more electronic SIMs (eSIMs) from the source device to the target device. Preferences associated with some or all of the transferred SIMs/eSIMs can be applied at the target device when certain matching criteria are satisfied. Exemplary matching criteria include matching identifiers, such as integrated circuit card identifier (ICCID) values, mobile station international subscriber directory number (MSISDN) values, and/or mappings thereof. Transfer of preferences can occur via a local peer-to-peer connection, a secure cloud-based service, and/or a backup and restore process.

Methods to enable Wi-Fi onboarding of user equipment by utilizing an eSIM

Systems and methods are provided for providing, by a user equipment, a short message service (SMS) message to initiate Wi-Fi onboarding to a mobile network, receiving, by the user equipment, a binary SMS message including a request for a certificate signing request by a server, generating, by the user equipment, the certificate signing request based on the request for the certificate signing request of the binary SMS message, providing, by the user equipment, the certificate signing request to the mobile network, and receiving, by the user equipment, a binary SMS message including Wi-Fi login data based on the certificate signing request provided to the mobile network.

ELECTRONIC DEVICE AND METHOD FOR USING CACHED DATA BASED ON SUBSCRIBER IDENTIFICATION INFORMATION IN ELECTRONIC DEVICE
20230017289 · 2023-01-19 ·

According to various embodiments, an electronic device comprises: a communication circuit; a first subscriber identification module (SIM) comprising subscriber identification circuitry and including information for providing a first communication service; a memory; and at least one processor operatively coupled to the communication circuit, the first SIM, and the memory, wherein the memory can store instructions that when executed, cause the at least one processor to: check whether first SIM (SIM) data cached in the memory being valid in association with the information for providing the first communication service of the first SIM at initialization based on the first SIM; perform initialization associated with the first SIM using the first cached SIM data based on the first cached SIM data being valid; and perform initialization based on the first SIM using the first SIM data associated with the information for providing the first communication service from the first SIM based on the first cached SIM data not being valid.

PROVISIONING A DEVICE IN A NETWORK

In some examples, a headless device that is without an available user interface and that is to be provisioned for access to a network receives information relating to provisioning of the headless device from a network node. The headless device sends, to a mediator device with a user interface, at least a portion of the received information. The headless device receives, from the mediator device, information to proceed with the provisioning of the headless device.

USING ON-DEMAND APPLICATIONS TO PROCESS ENCRYPTED DATA FROM A CONTACTLESS CARD

A device may receive a uniform resource locator (URL) and encrypted data. The device may download a first application from an application server based on the URL. The device may download and execute the first application. The first application may receive the encrypted data.

Method and system for controlling UICC and EUICC

An electronic device is provided. The electronic device includes a UICC in which a first profile is installed, an eUICC, and a processor electrically connected with the UICC and the eUICC. The processor requests a second profile to be installed in the eUICC from a first server based on the first profile, receives the second profile from a second server associated with the first server, and installs the received second profile in the eUICC. The second profile and the first profile include the same subscriber identification information.

Method for a first start-up operation of a secure element which is not fully customized

A method is for a first-time startup of a not fully personalized secure element, which serves for the use of services of a mobile communication network, in a mobile terminal. In the method, the secure element is started and requested to transmit a status message. The secure element transmits a status message in which it is stated whether the secure element: S1) contains only a bootloader but as yet no firmware image for the secure element; S2) contains a firmware image for the secure element but is not yet fully personalized; or S3) is fully personalized. The secure element is accepted in the cases S1), S2) and S3) and rejected in other cases. In the case S1), a download for a firmware image of the secure element is initiated for a first-time startup.

Method and apparatus for installing and managing profile using message service

The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. The disclosure discloses a terminal including a transmission and reception unit and at least one processor. The at least one processor controls the transmission and reception unit so that the transmission and reception unit receives a message such as an SMS, an MMS, or an OTT including event download information from a communication operator server, searches for event download information from the received message such as the SMS, the MMS, or the OTT, transmits the event download information to another terminal if necessary, and receives an event from a profile server with reference to the event download information.

Methods, devices, and computer programs for provisioning or controlling operator profiles in terminals

Methods are disclosed for provisioning and/or controlling operator profiles in terminals, each having an integrated circuit card identified by an integrated circuit card identifier. According to one aspect, a discovery server is configured with an authorization table including associations of integrated circuit card identifier, service provider identifier, and operator identifier(s). The discovery server receives, from a data preparation node, an event registration request that includes a number of elements. The discovery server determines whether the event is authorized. If so, the event is registered. This enables a terminal to seek to retrieve the event, to contact the data preparation node, and to eventually perform the profile operation. Some embodiments enable the network-initiated provisioning and/or controlling of operator profiles in machine-to-machine devices.

Enhanced device updating
11550560 · 2023-01-10 · ·

Systems, methods, and related technologies for device software monitoring and device software updating are described. In certain aspects, a device is selected based on being a smart device and a software version of associated with the software of the device is determined. The device software may then be automatically updated if newer software is available.