H04W12/43

CELLULAR SERVICE ACCOUNT TRANSFER AND AUTHENTICATION

Embodiments described herein relate to transfer of credentials between two mobile wireless devices that are within proximity of each other, via a secure local connection, or via a network-based cloud service, where the two mobile wireless devices are not in proximity to each other. Transfer of credentials can include communication between a source device, a target device, and/or one more network-based servers, which can include mobile network operator (MNO) managed servers, such as an entitlement server, a web-sheet server, an authentication server, a provisioning server, a subscription management data preparation (SM-DP+ ) server, a home subscriber server (HSS), and/or an authentication server, as well as third-party managed servers, such as a cloud service server and/or an identification services server. Authentication can be based at least in part on one or more tokens and/or a trust flag obtained by the source device and provided to the target device.

CELLULAR SERVICE ACCOUNT TRANSFER AND AUTHENTICATION

Embodiments described herein relate to transfer of credentials between two mobile wireless devices that are within proximity of each other, via a secure local connection, or via a network-based cloud service, where the two mobile wireless devices are not in proximity to each other. Transfer of credentials can include communication between a source device, a target device, and/or one more network-based servers, which can include mobile network operator (MNO) managed servers, such as an entitlement server, a web-sheet server, an authentication server, a provisioning server, a subscription management data preparation (SM-DP+ ) server, a home subscriber server (HSS), and/or an authentication server, as well as third-party managed servers, such as a cloud service server and/or an identification services server. Authentication can be based at least in part on one or more tokens and/or a trust flag obtained by the source device and provided to the target device.

METHOD AND APPARATUS FOR TRANSFERRING NETWORK ACCESS INFORMATION BETWEEN TERMINALS IN MOBILE COMMUNICATION SYSTEM
20230209340 · 2023-06-29 ·

The present disclosure relates to: a communication technique merging IoT technology with a 5G communication system for supporting a data transmission rate higher than that of a 4G system; and a system therefor. The present disclosure may be applied to intelligent services (for example, smart homes, smart buildings, smart cities, smart cars or connected cars, healthcare, digital education, retail business, security- and safety-related services, and the like) on the basis of 5G communication technologies and IoT-related technologies. The present invention proposes a method and an apparatus for enabling convenient device-to-device communication service movement by combining a user's device transfer start terminal and an operator support method even if the user starts a device transfer from any terminal when moving a profile between devices. In particular, according to one embodiment of the present invention, it is possible to provide a method comprising the steps of: receiving an input for moving a first profile installed in a first terminal; determining, in the first terminal, that a communication service provider's device transfer method is an ODSA method by checking profile metadata, a configuration server, or a terminal memory; determining, by ECS, an ECS/DP+ authentication method as a subscriber authentication method for the device transfer, and performing transmission together with ECS generation nonce and SM-DP+ address to the terminal; receiving, by the ECS, authentication result data processed by SM-DP+ from the first terminal, and verifying ECS-generated and delivered nonce included in the data and signature data of an SM-DP+ server through a GSMA Root CI certificate; and if verified, providing an activation code to the terminal and displaying a QR code on the screen of the first terminal.

SHORT RANGE SECURE DATA COMMUNICATION

Systems and methods for transmitting user data among user devices u are disclosed. An example method includes: wirelessly detecting, using a trusted user device, presence of one or more user devices within a predefined proximity to the trusted user device. The trusted device stores a user credential associated with an application installed on the trusted user device. The method further includes: determining that the application is installed on a first user device in the one or more user devices; identifying a user indication to enable the user credential on the first user device; responsive to identifying the user indication, wirelessly transmitting the user credential from the trusted user device to the first user device; and enabling the user credential in the application installed on the first user device.

Context-driven local network services

Various embodiments are generally directed to cooperation among networked devices to obtain and use a multiple-frame screenshot. In one embodiment, an apparatus comprises a processor circuit executing a sequence causing the processor circuit to receive a signal conveying a context data; retrieve an aspect of a current context of the apparatus; compare the aspect to the context data; determine whether a context defined as appropriate exists to engage in interactions with one or more other computing devices through a network based on the comparison, the interactions comprising providing a network service to the one or more other computing devices; and engage in the interactions with one or more computing devices through the network when the appropriate context to engage in the interactions exists. Other embodiments are described and claimed herein.

SYSTEM AND METHOD FOR SECURE RELAYED COMMUNICATIONS FROM AN IMPLANTABLE MEDICAL DEVICE
20230198782 · 2023-06-22 ·

The present invention provides systems and methods for supporting encrypted communications with a medical device, such as an implantable device, through a relay device to a remote server, and may employ cloud computing technologies. An implantable medical device is generally constrained to employ a low power transceiver, which supports short distance digital communications. A relay device, such as a smartphone or WiFi access point, acts as a conduit for the communications to the internet or other network, which need not be private or secure. The medical device supports encrypted secure communications, such as a virtual private network technology. The medical device negotiates a secure channel through a smartphone or router, for example, which provides application support for the communication, but may be isolated from the content.

Portable mobile subscription
09848284 · 2017-12-19 · ·

A network services provider grants a subscription to a user for use of mobile network services to communicate voice, data, and text information with a specific mobile device. Mobile devices store one or more subscriptions, each of which may be activated. An activated subscription stored in the mobile device is now made portable. The user wants to pass the portable subscription from a first mobile device to a second mobile device. The user forms a first communicative relationship between the first mobile device and a second mobile device and receives from the second mobile device identification information associated with the second mobile device. The first mobile device passes the identification information to the network services provider and receives a confirmation. The user forms a second communicative relationship between the first mobile device and the second mobile device, and the second mobile device confirms activation of the portable subscription.

Method and apparatus for access credential provisioning
09843569 · 2017-12-12 · ·

A method and apparatus are provided for access credential provisioning. A method may include receiving, at a first mobile apparatus, information about a second mobile apparatus. The first mobile apparatus may be provisioned with network access credential information to be transferred from the first mobile apparatus to the second mobile apparatus. The method may further include causing the information about the second mobile apparatus to be provided to a provisioning apparatus for the network. The method may additionally include receiving authorization form the provisioning apparatus to transfer the network access credential information from the first mobile apparatus to the second mobile apparatus. The method may also include, in response to receipt of the authorization, causing the network access credential information to be provided to the second mobile apparatus. A corresponding apparatus is also provided.

Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration errors

Aspects of the subject disclosure may include, for example, a system that manages utilization of mobile subscriber identity information including enabling use of such information by different communication devices. The use of the same mobile subscriber identity information by multiple devices can be based on locations and registration error messages, and other mobile subscriber identity information can be assigned to devices based on the locations. Other embodiments are disclosed.

Computing system for privacy-aware sharing management and method of operation thereof
09836620 · 2017-12-05 · ·

A computing system includes a control unit configured to determine a usage context including a capability of a device, a usage time and a device location associated with the device, and a user context of one or more users with access to the device; analyze a privacy risk level of a resource based on a resource content included in the resource, a metadata concerning the resource, a collective input regarding the resource, and the usage context; and generate one or more options for sharing the resource with the device based on the privacy risk level and the usage context.