Abstract:
Apparatuses, systems, and methods for a wireless device to perform simultaneous uplink activity for multiple RATs in the same carrier using frequency division multiplexing. The wireless device may establish a first wireless link with a first base station according to a first radio access technology (RAT) and a second wireless link with a second base station according to a second RAT. The first base station may provide a first cell operating in a first system bandwidth and the second base station may provide a second cell operating in a second system bandwidth. The wireless device may determine whether the wireless device has uplink activity scheduled according to both the first RAT and the second RAT. If so, the wireless device may perform uplink activity for both the first RAT and the second RAT in the first system bandwidth using frequency division multiplexing.
Abstract:
Representative embodiments set forth techniques for enabling a mobile device to be a member of various trust circles. According to some embodiments, an embedded Universal Integrated Circuit Card (eUICC) included in the mobile device can be configured to store, for each trust circle of which the eUICC is a member, at least one digital certificate associated with a Certificate Authority (CA) that serves as a root of the trust circle. In this manner, the at least one digital certificate for each trust circle enables the eUICC to participate as a member of the trust circle. According to some embodiments, the eUICC can be pre-configured to include digital certificates that establish membership to trust circles that the mobile device may encounter during operation. Moreover, the eUICC can also be updated to modify the different trust circles, which can further enable the functionality of the mobile device to evolve throughout its operation.
Abstract:
A method for establishing a secure communication channel between an off-card entity and an embedded Universal Integrated Circuit Card (eUICC) is provided. The method involves establishing symmetric keys that are ephemeral in scope. Specifically, an off-card entity, and each eUICC in a set of eUICCs managed by the off-card entity, possess long-term Public Key Infrastructure (PKI) information. When a secure communication channel is to be established between the off-card entity and an eUICC, the eUICC and the off-card entity can authenticate one another in accordance with the respectively-possessed PKI information (e.g., verifying public keys). After authentication, the off-card entity and the eUICC establish a shared session-based symmetric key for implementing the secure communication channel. Specifically, the shared session-based symmetric key is generated according to whether perfect or half forward security is desired. Once the shared session-based symmetric key is established, the off-card entity and the eUICC can securely communicate information.
Abstract:
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs).
Abstract:
Disclosed herein are various techniques for preventing or at least partially securing parameters—e.g., Type parameters—of electronic Subscriber Identity Modules (eSIMs) stored within an embedded Universal Integrated Circuit Card (eUICC) from being inappropriately modified by mobile network operators (MNOs). One embodiment sets forth a technique that involves modifying file access properties of the Type parameters of eSIMs to make the Type parameters readable, but not updatable by the MNOs. Another embodiment sets forth a technique that involves implementing eSIM logical containers that separate the Type parameters from the eSIM data within the eUICC, such that the Type parameters are inaccessible to the MNOs. Yet another embodiment sets forth a technique that involves implementing an Operating System (OS)-based registry that is inaccessible to the MNOs and manages Type parameters for the eSIMs that are stored by the eUICC.
Abstract:
Disclosed herein are various techniques for preventing or at least partially securing parameters—e.g., Type parameters—of electronic Subscriber Identity Modules (eSIMs) stored within an embedded Universal Integrated Circuit Card (eUICC) from being inappropriately modified by mobile network operators (MNOs). One embodiment sets forth a technique that involves modifying file access properties of the Type parameters of eSIMs to make the Type parameters readable, but not updatable by the MNOs. Another embodiment sets forth a technique that involves implementing eSIM logical containers that separate the Type parameters from the eSIM data within the eUICC, such that the Type parameters are inaccessible to the MNOs. Yet another embodiment sets forth a technique that involves implementing an Operating System (OS)-based registry that is inaccessible to the MNOs and manages Type parameters for the eSIMs that are stored by the eUICC.
Abstract:
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs).
Abstract:
A method for managing radio frequency (RF) chains in a carrier aggregation capable wireless communication device is provided. The method can include a wireless communication device using a first RF chain associated with a first component carrier and a second RF chain associated with a second component carrier to support a connection to a network. The method can further include the wireless communication device formatting a deactivation message configured to trigger deactivation of the second component carrier. The method can additionally include the wireless communication device sending the deactivation message to the network to trigger deactivation of the second component carrier. The method can also include the wireless communication device discontinuing usage of the second RF chain to support the connection to the network via the second component carrier after sending the deactivation message.
Abstract:
A mobile network operator (MNO) uses a provisioning server to update or install profile content in a profile or electronic subscriber identity module (eSIM). In an exemplary embodiment, the profile is present on a secure element such as an embedded universal integrated circuit card (eUICC) in a wireless device. One or more MNOs use the provisioning server to perform profile content management on profiles in the eUICC. In some embodiments, an MNO has a trust relationship with the provisioning server. In some other embodiments, the MNO does not have a trust relationship with the provisioning server and protects payload targeted for an MNO-associated profile using an over the air (OTA) key.
Abstract:
Embodiments described herein relate to eligibility checking for transfer of one or more electronic subscriber identity modules (eSIMs) between two mobile wireless devices. Eligibility to transfer an eSIM to an eUICC of a target device can depend on whether the eUICC of the target device satisfies certain security requirements for the eSIMs to be transferred. The mobile wireless devices can obtain a transfer eligibility result based on communication with one or more network-based servers that can determine compatibility for eSIM transfer.