Patent classifications
H04W12/43
NETWORK CONNECTION METHOD AND DEVICE AND READABLE STORAGE MEDIUM
A network connection method, implemented using a first mobile terminal, includes: establishing a first wireless connection to a second mobile terminal; receiving subscriber identity information of a subscriber identity module SIM from the second mobile terminal via the first wireless connection; and establishing a second wireless connection to a network equipment using the subscriber identity information and the first wireless connection, the subscriber identity module SIM is provided in the second mobile terminal for sharing among devices.
APPARATUS AND METHOD FOR ACCESSING WIRELESS NETWORK
A method of using subscriber identification information stored in mobile user equipment (UE) to connect to a communication service over a public wireless network in the UE, establishing a communication link between the UE and a device, generating network access information (NAI) associated with the communication service in the UE, and sending the NAI from the UE to the device via the communication link. The method further comprises connecting the communication service in the device using the NAI and terminating the connection of the communication service in the UE.
SHARING CONTENT WITH PERMISSION CONTROL USING NEAR FIELD COMMUNICATION
A sending device receives a user input indicating that the user wishes to share and open item of content with a receiving device. A near field communication link is opened between the sending device and the receiving device. Metadata for sharing the open data is gathered on the sending device and a permission setting user interface display is displayed, with the user input mechanism that allows a user to set permissions corresponding to the open item. User actuation of the permission setting user input mechanism is received, the permissions are added to the open item, and the metadata is sent to the receiving device over the near field communication link. The metadata includes a location of the open item. The open item can then be accessed by the receiving device, with the permissions applied to the open item.
Non-3GPP device access to core network
A non-SI device (120) is arranged for wireless communication (130) and cooperates with an SI device (110) having access to a subscriber identity. The non-SI device has a transceiver (121) to communicate in a local network and a processor (122) to establish an association with the SI. A non-SI public key is provided to the SI device via a first communication channel. A verification code is shared with the SI device via a second communication channel. The channels are different and include an out-of-band channel (140). Proof of possession of a non-SI private key is provided to the SI device via the first or the second communication channel. From the SI device, security data is received that is related to the SI and is computed using the non-SI public key. The security data reliably enables the non-SI device to access the core network via the local network and a gateway between the local network and the core network.
Communication device and system
To realize more secured Authentication while convenience is secured. There is provided a communication device including a control unit configured to control a process relating to transmission or reception of a first authentication signal and a second authentication signal used for a first authentication process that is authentication between the communication device and another communication device, in which the control unit further controls a second authentication process that is authentication different from the first authentication process and starts a process relating to transmission or reception of signals used for a second authentication process that is authentication different from the first authentication process before transmission or reception of the first authentication signal.
Communication device and system
To realize more secured Authentication while convenience is secured. There is provided a communication device including a control unit configured to control a process relating to transmission or reception of a first authentication signal and a second authentication signal used for a first authentication process that is authentication between the communication device and another communication device, in which the control unit further controls a second authentication process that is authentication different from the first authentication process and starts a process relating to transmission or reception of signals used for a second authentication process that is authentication different from the first authentication process before transmission or reception of the first authentication signal.
Inter-application delegated authentication
Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted application relies on a trusted application executing in the same environment for authentication purposes. The delegated authentication process avoids requiring the user of the untrusted application to provide authentication credentials. The disclosed system for delegating authentication enables any trusted application executing in the same computing environment to authenticate the untrusted application.
VERIFICATION INFORMATION PROCESSING METHOD AND APPARATUS, TERMINAL DEVICE AND STORAGE MEDIUM
The present disclosure relates to a verification information processing method and an apparatus, a terminal device and a storage medium thereof. A verification information processing method applied to a first device includes in response to entering a verification scenario of performing a predetermined function, sending request information to a second device; receiving response information returned based on the request information; and writing verification information carried in the response information into an input position of the verification information; wherein the verification information written into the input position is used to verify whether the first device performs the predetermined function.
SIM CARD SHARING METHOD AND DEVICE, COMMUNICATION DEVICE AND STORAGE MEDIUM
The present disclosure relates to a SIM card sharing method and device, a communication device, and a storage medium. The SIM card sharing method applied to the first device may include: in response to the first device's requirement for obtaining cellular mobile communication, sending share request information to a second device through an interactive channel, where the interactive channel is established between the first device and the second device through a preset connection manner; receiving SIM card information that is returned by the second device based on the share request information; and establishing a cellular mobile communication connection with the base station according to the SIM card information.
Electronic subscriber identity module transfer credential wrapping
Embodiments described herein relate to credential wrapping for secure transfer of electronic SIMs (eSIMs) between wireless devices. Transfer of an eSIM from a source device to a target device includes re-encryption of sensitive eSIM data, e.g., eSIM encryption keys, financial transaction credentials, transit authority credentials, and the like, using new encryption keys that include ephemeral elements applicable to a single, particular transfer session between the source device and the target device. The sensitive eSIM data encrypted with a symmetric key (K.sub.s) is re-wrapped with a new header that includes a version of K.sub.s encrypted with a new key encryption key (KEK) and information to derive KEK by the target device. The re-encrypted sensitive SIM data is formatted with additional eSIM data into a new bound profile package (BPP) to transfer the eSIM from the source device to the target device.