H04W12/43

METHODS FOR SHARING A VIRTUAL SIM CARD
20210360387 · 2021-11-18 ·

A method for virtual subscriber identity module (SIM) sharing. The method can include a service provider receiving a request including service details from a first UE. The service provider can verify the request and then generate a first SIM over-the-air (OTA) message. The first virtual SIM-OTA message can be sent to the first UE and causes the first UE to dynamically provision a virtual SIM. The service provider can also generate and transmit a first unique identifier to the first UE. The method can further include the service provider receiving a second unique identifier from a second UE. After determining the first unique identifier matches the second unique identifier, the service provider can generate and transmit a second SIM-OTA message to the second UE. The service provider can then provide the service to the first UE and second UE according to the service details.

SECURE RE-USE OF SIM SECURITY PARAMETERS BETWEEN DIFFERENT PARTIES
20220014927 · 2022-01-13 · ·

Various arrangements for using a subscriber identification module (SIM) card for authentication on a wireless network are detailed herein. A DKi (delta Ki) value can be stored by a SIM card. The SIM card can calculate a FKi (full Ki) value using the DKi value and a BKi value. The SIM card can be used to attach to the wireless network, wherein the SIM card is installed within a wireless device. The SIM card can receive a challenge from the wireless network. The SIM card can calculate an answer to the challenge using the FKi value. The answer can then be transmitted to the wireless network.

SECURE RE-USE OF SIM SECURITY PARAMETERS BETWEEN DIFFERENT PARTIES
20220014927 · 2022-01-13 · ·

Various arrangements for using a subscriber identification module (SIM) card for authentication on a wireless network are detailed herein. A DKi (delta Ki) value can be stored by a SIM card. The SIM card can calculate a FKi (full Ki) value using the DKi value and a BKi value. The SIM card can be used to attach to the wireless network, wherein the SIM card is installed within a wireless device. The SIM card can receive a challenge from the wireless network. The SIM card can calculate an answer to the challenge using the FKi value. The answer can then be transmitted to the wireless network.

Device and method for transmitting electronic key thereof

A method for transmitting an electronic key of a device is provided. The method includes transmitting a user command for providing an electronic key to another device, providing a User Interface (UI) for setting a use condition of the electronic key when the user command is received, and transmitting the use condition information set through the UI to the other device together with the electronic key.

Device and method for transmitting electronic key thereof

A method for transmitting an electronic key of a device is provided. The method includes transmitting a user command for providing an electronic key to another device, providing a User Interface (UI) for setting a use condition of the electronic key when the user command is received, and transmitting the use condition information set through the UI to the other device together with the electronic key.

NON-3GPP DEVICE ACCESS TO CORE NETWORK
20230328524 · 2023-10-12 ·

A non-SI device (120) is arranged for wireless communication (130) and cooperates with an SI device (110) having access to a subscriber identity. The non-SI device has a transceiver (121) to communicate in a local network and a processor (122) to establish an association with the SI. A non-SI public key is provided to the SI device via a first communication channel. A verification code is shared with the SI device via a second communication channel. The channels are different and include an out-of-band channel (140). Proof of possession of a non-SI private key is provided to the SI device via the first or the second communication channel. From the SI device, security data is received that is related to the SI and is computed using the non-SI public key. The security data reliably enables the non-SI device to access the core network via the local network and a gateway between the local network and the core network.

METHOD AND SYSTEM FOR ALLOCATING SIM CARD RESOURCE, TERMINAL DEVICE AND STORAGE MEDIUM
20210345092 · 2021-11-04 ·

The present application relates to the technical field of allocating the SIM resource, and provides a method and a system for allocating a SIM card resource, a terminal device and a storage medium, including acquiring a SIM card resource allocation request of a requesting terminal, and determining candidate SIM card resource sharing information corresponding to the SIM card resource allocation request; determining a target SIM card resource sharing information from the candidate SIM card resource sharing information, and acquiring a target terminal corresponding to the target SIM card resource sharing information; establishing a SIM card resource transmission channel between the target terminal and the requesting terminal; and allocating a SIM card resource corresponding to the target terminal to the requesting terminal through the SIM card resource transmission channel. The present application avoids the waste of SIM card resource by reallocating SIM card resource.

METHOD AND DEVICE FOR VERIFYING USER IDENTIFICATION CARD, ELECTRONIC DEVICE AND STORAGE MEDIUM
20210345107 · 2021-11-04 ·

The present application relates to the technical field of communication technology, and provides a method and a device for verifying a user identification card, an electronic device and a storage medium. The method includes: receiving a sharing request of the user identification card sent by a first communication device; sending a query request to at least one second communication device according to the sharing request of the user identification card; receiving the first query information sent by the second communication device; and comparing the first query information with the sharing information of the user identification card and/or preset condition information, to obtain a verification result of the user identification card. The method realizes that the automatic verification of the authenticity of the sharing information of the user identification card and the validity of the user identification card.

Secure re-use of SIM security parameters
11166163 · 2021-11-02 · ·

Various arrangements for using a SIM card across multiple wireless networks are presented. A DKi value may be stored by the SIM card. The SIM card may calculated a FKi value using the DKi value and a stored BKi value. The SIM card can attach to a guest wireless network. A challenge may be received by the SIM card from the guest wireless network. The SIM card may calculate an answer to the challenge using the FKi value. The answer may be transmitted to the wireless network. In response to the answer being correct, the wireless device having the SIM card installed is successfully authenticated to use the wireless network.

Secure re-use of SIM security parameters
11166163 · 2021-11-02 · ·

Various arrangements for using a SIM card across multiple wireless networks are presented. A DKi value may be stored by the SIM card. The SIM card may calculated a FKi value using the DKi value and a stored BKi value. The SIM card can attach to a guest wireless network. A challenge may be received by the SIM card from the guest wireless network. The SIM card may calculate an answer to the challenge using the FKi value. The answer may be transmitted to the wireless network. In response to the answer being correct, the wireless device having the SIM card installed is successfully authenticated to use the wireless network.