Abstract:
Provisioning an embedded subscriber identity module (eSIM) in a user equipment (UE) device with personalized subscriber information. A request may be transmitted for personalized subscriber information. The personalized subscriber information may be received. The personalized subscriber information may be installed in an eSIM in the UE device.
Abstract:
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
Abstract:
Methods and apparatus for the automated updating of forwarding preferences for communications in a telecommunications network. In one embodiment, the network includes a wireless (e.g., cellular) network with user mobile user devices configured to detect a change to their configuration (such as a user changing out SIM cards or virtual access clients). In response, the device causes an update to its associated communication forwarding preferences to reflect the change. If the configuration alteration meets certain criteria (e.g., changes the phone number at which the device may be reached), the device sends a forwarding message instructing a network entity (e.g., routing server) to direct communications addressed to the old phone number to the new phone number. Thus, a user with two or more user profiles (such as two different carrier accounts) may be reached at any number associated with any of the profiles, even if only one profile is currently active.
Abstract:
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs)
Abstract:
A baseband processor includes a memory and is configured to transmit, to a cellular carrier, a request to activate the UE with the cellular carrier. The baseband processor is also configured to, in response to receiving an authentication request for authenticating a user of the UE, transmit, to the cellular carrier, information identifying another UE and authentication information for authenticating the user; obtain verification information transmitted to the other UE; transmit the verification information to the cellular carrier; and after transmitting the verification information to the cellular carrier, receive an embedded subscriber identity module (eSIM) subscription transferred from the other UE.
Abstract:
This Application sets forth techniques for cellular service management for a secondary mobile wireless device assisted by a primary mobile wireless device, including provisioning and management of electronic subscriber identity modules (eSIMs) for a secondary mobile wireless device with user authorization obtained via the primary mobile wireless device.
Abstract:
A method is performed by a set of one or more servers and includes receiving, from a first user equipment (UE) to be activated with a cellular carrier for a user, and at the set of one or more servers, information identifying a second UE of the user and authentication information for authenticating the user with the cellular carrier. The method further includes authenticating the user using the authentication information; transmitting a password to the second UE at least partly in response to authenticating the user; receiving, from the first UE and at the set of one or more servers, the password; validating the password received from the first UE; and initiating a transfer of an embedded subscriber identity module (eSIM) subscription, from the second UE to the first UE, at least partly in response to validating the password
Abstract:
This Application sets forth techniques for cloud-based cellular service management for a set of associated mobile wireless devices, including maintenance of information for one or more subscriber identity modules (SIMs) and/or electronic SIMs (eSIMs) used by the set of mobile wireless devices.
Abstract:
Recovering a user equipment (UE) from limited service due to misconfiguration may include providing a universal subscriber identity module (USIM) identification data or a USIM authentication data to a wireless network. Failure data associated with failing to authenticate or identify the UE to the wireless network may be decoded. The failure data received from the wireless network. The failure data may be processed to determine a cause for the failure. Based on processing the failure data, it may be determined that the USIM identification data or the USIM authentication data is misconfigured. In response to determining that the USIM identification data or the USIM authentication data is misconfigured, a recovery for identifying or authenticating the UE to the wireless network may be automatically performed.
Abstract:
Some embodiments relate to methods and systems for initiating and transferring cellular subscription service using associated cellular communication devices. Cellular service may be initiated for a first cellular communication device via a second cellular communication device. The first cellular communication device may be provisioned to operate in an independent mode. In other scenarios, cellular service may be transferred from the first cellular communication device operating in independent mode to a third cellular communication device, which may be provisioned to operate in independent mode.