METHOD FOR INTERACTION OF A WIRELESS COMMUNICATION DEVICE WITH AN IDENTIFICATION UNIT

20170280319 · 2017-09-28

Assignee

Inventors

Cpc classification

International classification

Abstract

A method for interaction of a wireless communication device with an identification unit, the wireless communication device being connected with said identification unit, the wireless communication device further operating within a cellular network by means of said identification unit, said identification unit being configured to carry information representing a subscription for operating a wireless communication device in the cellular network, the wireless communication device and the identification unit being adapted to provide each a set of capabilities of operation within the cellular network, includes the steps of: determining a first set of information representing the capabilities of the wireless communication device, determining a second set of information representing the capabilities of the identification unit, analysing the first and the second set of information for differences, carrying out measures for handling of differences, in case differences have been detected at the analysing step.

Claims

1. Method for interaction of a wireless communication device with an identification unit, the wireless communication device being connected with said identification unit (3a), the wireless communication device further operating within a cellular network by means of said identification unit, said identification unit being configured to carry information representing a subscription for operating a wireless communication device in the cellular network, the wireless communication device and the identification unit being adapted to provide each a set of capabilities of operation within the cellular network, wherein the method comprises the steps of: determining a first set of information representing the capabilities of the wireless communication device, determining a second set of information representing the capabilities of the identification unit, analysing the first and the second set of information for differences, carrying out measures for handling of differences, in case differences have been detected at the analysing step.

2. Method according to claim 1, wherein the set of capabilities comprises at least one out of: capability to support a group of radio access technologies, and/or capability to support a set of services within a certain radio access technology.

3. Method according to at least claim 1, wherein the measures for handling of differences comprise an event message on a control interface of the wireless communication device.

4. Method according to claim 1, wherein the measures for handling differences comprise the steps of: determining the availability of at least one additional identification unit configured to be connected with the wireless communication device, in case at least one additional identification unit is determined: disconnecting the connection between the wireless communication device and the first identification unit, connecting the wireless communication device with the determined additional identification unit, repeating said determination and analysing steps.

5. Method according to claim 1, wherein the connection between the identification unit and the wireless communication device is based on a remote subscription unit access protocol.

6. Method according to claim 1, wherein the measures for handling differences comprise for the wireless communication device the steps of: sending a request to a remote provisioning server by means of the subscription of the first identification unit, said request comprising information related to the analysed differences, receiving in response subscription modification records from the remote provisioning server, processing received subscription modification records within identification unit, wherein the subscription modification records being configured to modify the subscription stored within identification unit.

7. Method according to claim 6, wherein the received subscription modification records relate to a subscription modification which is valid for a limited time.

8. Method according to claim 1, wherein in case of detected differences: determining if the identification unit provides a priority related capability, and in case said priority related capability is determined, suppressing measures for handling of differences.

9. Wireless communication device configured to be connected to an identification unit, and to operate within a cellular network by means of said identification unit, the identification unit being configured to carry information representing a subscription for operating a wireless communication device in the cellular network, the wireless communication device further comprising a comparison unit and a control unit, the comparison unit is configured to: determine a first set of information representing the capabilities of the wireless communication device, determine a second set of information representing the capabilities of the identification unit, analysing the first and the second set of information for differences, the control unit is configured to: carry out measures for handling of differences, in case differences have been detected by the comparison unit.

10. Wireless communication device according to claim 9, wherein the control unit is for carrying out said measures configured to determine the availability of at least one additional identification unit configured to be connected with the wireless communication device, in case at least one additional identification unit is determined: disconnect the connection between the wireless communication device and the first identification unit, connect the wireless communication device with the determined additional identification unit, instruct the comparison unit to repeat determination and analysis.

11. Wireless communication device according to claim 9, wherein the control unit is for carrying out said measures configured to: send a request to a remote provisioning server by means of the subscription of the first identification unit, said request comprising information related to the analysed differences, receive in response subscription modification records from the remote provisioning server, provide subscription modification records to identification unit, wherein the subscription modification records being configured to modify the subscription stored within identification unit.

12. Identification unit connected to a wireless communication device configured to carry information representing subscription for operating the wireless communication device in a cellular network, and adapted to provide a set of capabilities of operation within the cellular network, configured to process a subscription modification record received from the wireless communication device.

13. Identification unit according to claim 12, wherein the received subscription modification records relate to a subscription modification which is valid for a limited time.

14. Identification unit according to claim 12, wherein the connection to the wireless communication device is based on the remote subscription unit access protocol.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

[0055] The following description and the annexed drawings set forth in detail certain illustrative aspects and are indicative of but a few of the various ways in which the principles of the embodiments may be employed. Other advantages and novel features will become apparent from the following detailed description when considered in conjunction with the drawings and the disclosed embodiments are intended to include all such aspects and their equivalents.

[0056] FIG. 1 represents an arrangement of devices according to the prior art;

[0057] FIG. 2 represents a similar arrangement of devices according to an embodiment of present invention;

[0058] FIG. 3 represents a sequence diagram of calls according to an embodiment of present invention;

[0059] FIG. 4 shows a flow chart showing a call flow according to an advantageous embodiment of present invention.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

[0060] In the drawings below the same elements have been designated with the same reference numerals in the different drawings. For clarity, only those elements and steps which are useful to the understanding of the present invention have been shown in the drawings and will the described.

[0061] FIG. 1 schematically shows an arrangement of devices according to the prior art depicting one scenario applicable to present invention. It is shown a mobile device 1 capable of operating within a cellular network. The mobile device 1 is equipped with a control unit 5 with access to an identification unit 3. The identification unit 3 is in particular a SIM card, a UICC, a USIM or other variants, which holds the authentication credentials of the cellular network subscriber. When the mobile device 1 registers to the cellular network, the authentication credentials from the identification unit 3 is provided within the registration process.

[0062] The identification unit 3 further holds memory segments, where a couple of additional information elements are stored. Those information elements are in particular configured to comprise the type of the identification unit 3 and potentially further capabilities. The type of identification units comprises in particular a voice capable SIM, a data only SIM, an emergency call only SIM, a Twin-SIM, a SIM capable of supporting certain radio access networks (RAN), of the cellular network etc. Preferably another memory segment is configured to hold the information which of the above variants of identification units is present

[0063] The control unit 5 is configured to control all components of the mobile device 1 and to carry out the wireless transmission and reception tasks with the cellular network. Optionally, the latter operations are conducted by one separate component connected to and controlled by the control unit 5.

[0064] One of the components of the mobile device 1 is a wireless near-field communication interface 4. This is in particular a Bluetooth interface which allows connecting the mobile device 1 to another device comprising a corresponding Bluetooth interface for exchanging data.

[0065] The other device is in the shown arrangement a wireless communication device in the form of a customer application 2, comprising a control unit 8 and a communication unit 7. The customer application 2 is in a preferred embodiment an On-Board-Unit (OBU) of a car, comprising entertainment and navigation capabilities, plus wireless communication capabilities for accessing remote servers, carrying out phone calls etc. Typically the OBU is connected to the user interface 16 of the entertainment unit on the dashboard, in particular a touchscreen, that allows the driver of the car to place or accept voice calls, or initiate other wireless communication related activities.

[0066] The control unit 8 of the customer application 2 comprises in particular three interfaces for exchanging data and commands with other entities. The first interface is the wireless near-field communication interface 12. This is the corresponding interface to the respective component 4 of the mobile device 1, This is in particular a Bluetooth interface which allows setting up a Bluetooth connection 20 with another Bluetooth interface in the proximity. The second interface is an AT command interface 11 which is capable to communicate with another AT command interface 9 of a communication unit 7. The AT command interface 11 sends AT commands 22 that are based on the Hayes AT command set consisting of textual commands for controlling the behavior of a communication unit 7, in particular a modem. Further the AT command set comprises asynchronous events—unsolicited result codes (URCs)—provided from the communication unit 7 to the controlling unit 8.

[0067] The third interface is the RSA interface 13, where RSA stands for Remote SIM Access. With the RSA interface 13 the customer application 2 allows for the embedded communication unit 7 using an identification unit 3 which is not physically connected to the customer application 2, but which is connected by means of a host device communicating via a wireless near-field communication interface 12 with the customer appliance. The communication takes place via the SIM Access Protocol (SAP), with the host device (the mobile device 1) acting as SAP-server and the customer application 2, resp. the communication unit 7 acting as SAP client. The SAP allows for the SAP client to access via the available bearer—in the shown embodiment via the Bluetooth connection 20—the SAP server and asking for the data from the SAP server. The communication unit 7 itself is not equipped with a Bluetooth interface, therefore has to route the request to the SAP server via a transparent RSA channel 21 from a RSA interface to of the communication unit 7 to the customer application 2 and via the Bluetooth connection 20 to the SAP server. The customer application 2 sets up the Bluetooth connection 20 by searching for another device with active Bluetooth interface in the proximity. Upon detection of such devices nearby identification keys are exchanged and the Bluetooth connection 20 is set up.

[0068] The SAP server acts as identification unit reader and assists the SAP client in accessing and controlling the identification unit 3.

[0069] The communication unit 7 optionally comprises a local identification unit 6, which is ignored in the event of availability and successful connection of an identification unit 3 via RSA. This is local identification unit 6 in particular an identification unit with only basic capabilities. In particular a pure emergency call SIM card, allowing only access to one predefined number of the PSAP. In this case it is advantageous to use an identification unit 3 of a mobile device 1 brought by the driver into the car for other types of communication, in particular regular voice calls or data connections to remote servers, in particular in the internet.

[0070] FIG. 2 shows the situation in a similar arrangement, representing an embodiment according to present invention. Basically the arrangement is the same except the fact that now two Bluetooth capable mobile devices 1a and 1b are present. Some of the components of the displayed units are omitted out of simplicity reasons. Insofar the internal structure of these units complements the internal structure displayed in FIG. 1.

[0071] The mobile devices 1a and 1b are each equipped with an identification unit 3a, 3b and a control unit 5a, 5b. In this setting, when setting up the Bluetooth connection 20 through the Bluetooth interface of the customer application 2 it is effectively a question of random, with which mobile device 1a, 1b the Bluetooth connection 20 is established.

[0072] This can have major impact on the handling of the customer application 2 in the following, as it is very likely that both identification units 3a, 3b comprise different capabilities, and it is not visible for the user, which identification unit 3a, 3b is currently active. The different capabilities cause problems in the handling of the customer application 2, if for one identification unit 3a, 3b a certain capability is missing that the driver expects. This is in particular true in the case of a data-only SIM card, which preferably is used in tablet devices 1b, but the driver wants to launch a voice call with the OBU.

[0073] In order to avoid in such or similar situations a user feedback which is most probably not indicative for the root cause of the failed communication attempt, the communication unit 7 is additionally equipped with a comparison unit 16. This comparison unit 15 is configured to carry out checks in terms of capabilities of the communication unit 7 itself and the identification unit 3, which is currently connected via the SAP protocol 20 and the transparent RSA channel 21. Should the comparison unit 15 figure out a material mismatch in the capabilities of the connected identification unit 3 and the communication unit 7, it sends a notification, e.g. by a unsolicited result code via the AT command channel 22, to the customer applications control unit 8, which then in response preferably takes appropriate measures.

[0074] Such measures are in particular, depending on the type of mismatch and other measures, to carry out a search for another mobile device 1a, 1b incorporating an identification unit 3a, 3b with other capabilities. Another solution is a visual and/or acoustical notification through the user interface 18 of the customer application 2 informing about the mismatch. This prevents the user from re-trying in vain a request for e.g. a voice call, and as such polluting the cellular network with futile request.

[0075] In conjunction with such notification for the user it is further foreseen another measure. According to that if the user agrees, it is carried out a request tor a remote provisioning to subscribe to and download the missing capabilities from a remote provisioning server. This results in an in particular temporary update of the identification unit 3 providing a capability which as originally not present.

[0076] This is preferable for situations, when the user is connecting his mobile device 1, together with the incorporated identification unit 3, with a customer device 2, which is only temporary in use, in particular a rental car. Here a detected difference in capabilities particularly consist of the supported RANs, in particular if the communication unit 7 of the customer application 2 is configured to support LTE/4G RANs, while the identification unit 3 is only limited to 2G and 3G RAN (probably alike the mobile device 1).

[0077] With the remote provisioning request the identification unit 3 receives the missing capability of supporting tie use of the 4G RAN, and during further procedure the customer application 2 allows the use of all its technological features.

[0078] The comparison unit 15 conducts in order to figure out differences of the capabilities of the communication unit 7 and the connected identification unit 3 a request to the communication unit and to the identification unit 3. The requesting to the communication unit 7 does not necessarily be conducted repeatedly, as the capabilities of the communication unit 7 basically remain constant. It is in particular even possible to provide a configuration file which informs about the capabilities. Alternatively internal requests from the comparison unit 15 in the communication unit 7 reveal the capabilities, in particular in terms of supported frequency bands and technology standards, packet switched/circuit switched communication resp. voice/IP based communication etc.

[0079] For determining the capabilities of the identification unit 3 the comparison unit 15 makes use of the SIM Access Protocol. If the capabilities of the communication unit 7 are already known to the comparison unit 15, the determination of the capabilities of the identification unit 3 is preferably optimized by checking if the provided capabilities of the communication unit 7 can be found at the identification unit 3 as well.

[0080] One example of such a determination step, in particular for retrieving the capability to support voice communication is shown in a sequence diagram of FIG. 3. The shown actors are the mobile device 1 acting as SAP server, with a Bluetooth interface 20 supporting the SIM Access Protocol. Further there is the communication unit 7, acting as SAP client, and connected to a customer application 2. Part of the communication unit is additionally the comparison unit 15. Finally there is the user interface (UI) 16 of the OBU of the customer application 2.

[0081] The process starts with a connection request M1 from the customer application 2 to the communication unit 7. Typically it is the customer application 2 which instructs the communication unit 7 to set up a connection to a SAP server. The communication unit 7 consequently launches a connection request message M2 for setting up a SAP connection with a SAP server, in particular a mobile device 1. The mobile device 1 is acting as reader for identification units 3, in particular SIM cards. The mobile device 1 responds to the connection request with a connection response message M3. In practice this connection setup might require more than one message-response event, which is for simplicity reasons omitted here, but is incorporated in the proposed embodiment. The result of the connection attempt is returned to the customer application 2 with another message ConnectResp M4.

[0082] The SAP connection between the communication unit and the mobile device 1 is in the following maintained; regularly the mobile device 1 sends a status update message M5 as part of this connection maintenance task.

[0083] After the SAP connection is set up, the comparison unit 15 is investigating the capabilities of the connected identification unit 3. As stated above, the comparison unit 15 determined the capabilities of the communication unit 7 before, in particular upon powering up. After setting up the connection it is now checking if for the found capabilities of the communication unit 7 corresponding capabilities at the identification unit 3 interfaced by the mobile device 1 are determined.

[0084] For that so called application protocol data unit (APDU) requests are sent to the mobile device 1 on the SAP connection. Such APDU requests are such commands sent to the identification unit 3, in particular such for reading out memory segments of the identification unit 3. Such memory segments in particular hold information elements that indicate the capabilities of the identification unit 3. In the example a first request APDUreq1 M11 is submitted and the corresponding response APQUresp1 M12 is received. From that the comparison unit 15 is able to derive that a certain capability, in this example the capability to execute packet based communication, is available. Preferably this is a request for reading out a memory segment like EF_UST resp. EF_SST, which comprises the (U)SIM-Service table according to standard document 3GPP TB31.102. This allows receiving information about service capabilities of the identification unit resp. the (U)SIM. In particular such a request consists of a request for the content of the service table plus additional requests from other memory segments. In particular for an operator's supported PIMMs the access technologies are determined by a chain of requests including requesting memory segment EF_PLMNwACT. In effect this gives a picture of supported access technologies, in particular if e.g. LTE is supported with this identification unit.

[0085] With the next request APDUreq2 M13 it is tried to find out, if the identification unit 3 allows voice communication. In this example this is done by reading out the memory segment EF_LOCI, holding the temporary mobile subscriber identity (TMSI). A TMSI is only available, if the identification unit 3 is able to perform voice communication, otherwise an invalid TMSI with an error code is returned in the response APDUResp2 M14. If this is the case, the comparison unit 15 gets noticed with a message notifyFailure MIS that the capability of the communication unit 7 to carry out voice communication is not supported by the identification unit 3. A call attempt would in effect lead to a call rejection. Hence the comparison unit 15 sends to the customer application 2 another failure message notifyFailure M18. Depending on the configuration the customer application 2 chooses in response to the failure notification M16 to provide a notice to the user, and for that sends a message displayWarning M17 with instruction to the user interface 16 to show a warning to the user indicating the detected situation.

[0086] In response to the message APDUResp2 M14 including the error code the communication unit 7 is sending a request message DisconnectReq M20 for disconnecting the communication unit from the mobile device, and receives as response DisconnectReq M21, indicating the result of the disconnection.

[0087] FIG. 4 shows a flow chart of the general procedure in a preferred embodiment of present invention. It is based on an embodiment comparable with FIG. 1 or 2, that is a customer application 2 with a communication unit 7 in form of an M2M module and a mobile device 1 equipped with an identification unit 3 in form of a SIM card. It starts in step S1 with setting up a connection between the SIM card via RSA with that the M2M module is able to operate within a chosen cellular network.

[0088] As a next step S2, preferably directly after the connection is setup and the M2M module is registered in the cellular network, the capabilities of the M2M module are determined. The result is held in a list L1. Such capabilities encompass in particular the range of RANs that this M2M module is able to access, further voice and data capabilities, is the M2M module prepared for emergency calls etc. The capabilities of the M2M module preferably further encompass information about interfaces to the customer application, in particular if a connection at voice related ports is setup, and thus the customer application is able to carry out voice calls.

[0089] In the next step S3 the capabilities of the SIM card are determined. This happens preferably through APDU requests for reading out the content of certain memory segments of the SIM card. It is further preferably to only check for those capabilities that are present for the M2M module. The results are collected in a list 12.

[0090] In a next step S4 the capabilities of lists L1 and L2 are compared. In the case of only checking in S3 for the SIM card those capabilities that are present in L1, this step in particular means to figure out that at least one capability is not present in the SIM card. It is even preferred in S3 to stop to continue the checks once it is determined that the SIM card does not provide one of the capabilities present in list L1. In the latter case the step S4 only comprises the check if the last checked capability in S3 is present in the SIM card or not.

[0091] Depending on the result of this comparison step S4 it is in S5 branched to the next steps. If no difference is detected, the M2M module is able to operate with the SIM card in S6, as usual.

[0092] Otherwise there have to be taken measures to handle with the incompatibility of the capabilities of SIM card and the M2M module.

[0093] In the shown embodiment the found incompatibility relates to topics, which can be handled with a remote provisioning procedure by accessing a remote provisioning server (RPS) in the cellular network. Therefore in step S7 it has to be checked if the M2M module has access to a remote provisioning server. Additionally it is preferable to check with the user if he is willing to update his SIM card in order to be able to fully use the capabilities of his customer application.

[0094] If the access to the RPS is not available, then as only measure there is the chance to inform the user in step S8, in order that he does not make requests in vain, in particular voice calls with a data only SIM card.

[0095] Otherwise and when the customer agrees, a remote provisioning session is started in step S9. With that the SIM card downloads the required data to update its capabilities. In this particular embodiment the capabilities are only temporary booked and hence available. That is preferable in a situation where the SIM card is accessed via RSA. In particular when the mobile device, the SIM cards is physically connected to, is not capable to support a certain capability, in particular a RAN like LTE, then for the use of the SIM card with this mobile device the downloaded capability is not useful. This is in particular true when the user uses his device not regularly in the car with the envisaged customer application comprising an LTE capable M2M module.

[0096] Afterwards the remote provisioning step has concluded, in step S10 the M2M module operates with the updates SIM card in the cellular network and is able to provide all capabilities it has available.

[0097] From the foregoing it will be apparent that the presented method solves the envisaged goal to overcome the disadvantages of the solutions known in the art, and it provides a flexible mechanism for reliable interaction between a wireless communication device and an identification unit