H04W12/43

Electronic subscriber identity module (eSIM) transfer via activation code

A mechanism for sharing electronic subscriber identity module (eSIM) credentials between two mobile communication devices is described. This includes establishing, by a source user equipment (UE) comprising a first of the mobile communication devices, a data connection with a subscription manager data preparation (SMDP+) server associated with eSIM credentials stored at the source UE. The source UE notifies the SMDP+ server of an intent to transfer the eSIM credentials. The source UE receives metadata describing an activation code containing identification data for the eSIM credentials. The source UE forwards the activation code to a destination UE comprising a second of the mobile communication devices. The activation code is forwarded to support a download of the eSIM credentials to the destination UE from the SMDP+ server.

METHOD AND DEVICE FOR PROVIDING DATA SERVICE THROUGH MOBILE COMMUNICATION NETWORK
20170332312 · 2017-11-16 ·

The present disclosure relates to a 5G or pre-5G communication system to be provided to support a higher data transmission rate after a 4G communication system such as LTE. Disclosed is a method and device for providing a data service through a mobile communication network. The method of the present invention comprises the steps of: receiving a connection request message including a device identifier of a terminal which is not subscribed to a mobile communication network; determining, using the device identifier of the terminal, whether the terminal corresponds to a contract for using the mobile communication network; configuring the terminal to perform limited access to the mobile communication network according to the contract when the terminal corresponds to the contract for using the mobile communication network; and transmitting, to the terminal, a connection acceptance message granting the limited access.

LEASED DEVICE OPERATIONS TO A NEARBY DEVICE ON DETECTION OF DEVICE INOPERABILITY
20170316418 · 2017-11-02 ·

There are provided systems and methods for leased device operations to a nearby device on detection of device inoperability. A device may detect that the device is in danger of failure, for example, if a battery is low on the device, the device is damaged, or the device runs out of available memory for storage and/or application execution. On detection of such a condition, the device may determine current processes a user is currently utilizing. The device may the cause another device to be located at or nearby the device, where the other device may be capable of continuing the processes utilized by the user. The device may then cause a token to be generated that identifies the processes and data for the processes. The token may be communicated to the other device so that on failure of the original device, the user may continue the processes.

Addition of secondary endpoint based on message reply

A method for adding an additional endpoint for a service based on a short messaging service (SMS) message may include receiving a request to add a second user equipment (UE) as an additional endpoint for a service associated with a first UE, and generating a transaction identifier in response to receiving the request. The method may include sending a command to provide a short message service (SMS) message to the first UE requesting permission to add the second UE as the additional endpoint, and receiving a message granting permission to add the second UE as the additional endpoint, where the message may include a network identifier assigned to the first UE. The method may include generating credential(s) for authorizing the second UE to access the service, and may then provide the credential(s) to the second UE.

System and method to identify devices in a shared mobile operating plan

A method includes communicating, by an application executed by a processor of a first mobile communication device, with a server system. A first phone number corresponding to the first mobile communication device is determined or verified based on the communicating with the server system, the first phone number corresponding to a particular shared operating plan enabled by a particular mobile operator. A request is transmitted to a computing system corresponding to the particular mobile operator for a second phone number corresponding to a second mobile communication device and corresponding to the particular shared operating plan of the first mobile communication device. The second phone number is received from the computing system. The processor of the first mobile communication device determines user identifying information corresponding to the second phone number based on data accessible via the first mobile communication device, and the user identifying information is provided to a user.

Method and apparatus for setting profile
09800993 · 2017-10-24 · ·

A method and apparatus for setting profiles are provided. The profile setting method includes receiving, from a first terminal, a profile transfer request message that requests transfer of a first profile or portion thereof from a first secure element to a second secure element; configuring a second profile using the first profile or portion thereof; and sending, to a second terminal, the configured second profile.

Apparatus and method for accessing wireless network

A method of using subscriber identification information stored in mobile user equipment (UE) to connect to a communication service over a public wireless network in the UE, establishing a communication link between the UE and a device, generating network access information (NAI) associated with the communication service in the UE, and sending the NAI from the UE to the device via the communication link. The method further comprises connecting the communication service in the device using the NAI and terminating the connection of the communication service in the UE.

Systems for securely connecting to remote networks

Systems enable secure communication links with classified or unclassified networks using a single mobile computing device. In one embodiment, the system includes: a mobile computing device without an integrated data storage device that is configured to interchangeably receive an unclassified or classified data storage device; an encrypter device in signal communication with the mobile computing device; network security device in signal communication with the encrypter device; a classified data storage device loaded with a computer readable code configured for booting the mobile computing device when the classified data storage device is connected to the mobile computing device; and an unclassified data storage device loaded with a computer readable code configured for booting the mobile computing device when the unclassified data storage device is connected to the mobile computing device.

Cellular service account transfer and authentication

Embodiments described herein relate to transfer of credentials between two mobile wireless devices that are within proximity of each other, via a secure local connection, or via a network-based cloud service, where the two mobile wireless devices are not in proximity to each other. Transfer of credentials can include communication between a source device, a target device, and/or one more network-based servers, which can include mobile network operator (MNO) managed servers, such as an entitlement server, a web-sheet server, an authentication server, a provisioning server, a subscription management data preparation (SM-DP+) server, a home subscriber server (HSS), and/or an authentication server, as well as third-party managed servers, such as a cloud service server and/or an identification services server. Authentication can be based at least in part on one or more tokens and/or a trust flag obtained by the source device and provided to the target device.

Cellular service account transfer and authentication

Embodiments described herein relate to transfer of credentials between two mobile wireless devices that are within proximity of each other, via a secure local connection, or via a network-based cloud service, where the two mobile wireless devices are not in proximity to each other. Transfer of credentials can include communication between a source device, a target device, and/or one more network-based servers, which can include mobile network operator (MNO) managed servers, such as an entitlement server, a web-sheet server, an authentication server, a provisioning server, a subscription management data preparation (SM-DP+) server, a home subscriber server (HSS), and/or an authentication server, as well as third-party managed servers, such as a cloud service server and/or an identification services server. Authentication can be based at least in part on one or more tokens and/or a trust flag obtained by the source device and provided to the target device.