Abstract:
This application describes a phased approach to provision eSIM profiles to a wireless device. Credentials are preloaded to an eUICC during manufacture of the eUICC and used subsequently to load eSIM profiles to the eUICC without requiring an active, real-time connection to an MNO provisioning server. Multiple bound profile packages (BPPs) can be pre-generated and encrypted by MNO provisioning servers for an eUICC and transferred to a BPP aggregator server before assembly of the eUICC in a respective wireless device. A local provisioning server in a manufacturing facility mutually authenticates and connects to the BPP aggregator server to download and store one or more of the encrypted BPPs for later installation on the eUICC. The local provisioning server subsequently mutually authenticates and connects to the eUICC to load at least one of the one or more pre-generated, encrypted BPPs to the eUICC during assembly and/or testing of the wireless device.
Abstract:
The described embodiments set forth techniques for managing inactive (disabled) electronic subscriber identity modules (eSIMs) on secure elements, e.g., Universal Integrated Circuit Cards (UICCs) and/or embedded UICCs (eUICCs), of a wireless device, including retrieving information from an inactive eSIM, obtaining authentication tokens from an inactive eSIM, authenticating the inactive eSIM with a network-based Mobile Network Operator (MNO) server, retrieving status information for a subscription account associated with the inactive eSIM, and/or performing an account management operation on the inactive eSIM.
Abstract:
Methods and apparatus to manage registration for cellular services of a secondary wireless device associated with a primary wireless device are disclosed. The secondary wireless device can detect entering proximity to the primary wireless device and in response to the detecting deactivate a cellular wireless interface of the secondary wireless device to conserve battery power, and provide an indication to the primary wireless device, via a non-cellular wireless interface, to cause the primary wireless device to perform a deregistration of the secondary wireless device for cellular services. The secondary wireless device can establish connections and communicate via non-cellular wireless interfaces while within proximity of the primary wireless device. Upon leaving proximity of the primary wireless device, the secondary wireless device can activate the cellular wireless interface and register for cellular services to permit establishing connections and communicating directly with a cellular wireless network via the cellular wireless interface.
Abstract:
Described are methods that allow credentials of a first client station to authenticate a second client station. An exemplary method includes associating a first client station with a second client station, the first client station including credential information, the associating authorizing the second client station to use the credential information, transmitting, by the second client station, an association request to a network, the network utilizing the credential information to authorize a connection, the second client station configured to perform a proxy functionality for requests received from the network to be forwarded to the first client station and responses received from the first client station to be forwarded to the network, determining, by the network, whether the credential information received from the second client station is authenticated and establishing a connection between the second client station and the network using the credential information of the first client station.
Abstract:
This Application sets forth techniques for transfer of a cellular wireless service plan associated with a SIM or an semis between non-linked wireless devices. A target wireless device broadcasts an advertisement beacon requesting transfer of a cellular wireless service plan. After successful authentication with a source wireless device, using a manually entered verification code or a QR verification code, the target wireless device selects a cellular wireless service plan to transfer. The source wireless device obtains a transfer token from an MNO entitlement server for transfer of the selected cellular wireless service plan and provides the transfer token to the target wireless device via a secure, short distance Bluetooth connection or, alternatively, embedded in an encrypted QR code. The target wireless device uses the transfer token to obtain a new eSIM associated with transfer of the cellular wireless service plan.
Abstract:
Apparatus and methods to support access to services of multiple wireless networks by a single-radio, multiple subscriber identity module (SIM)/electronic SIM (eSIM) wireless device are disclosed. To send or receive voice communications for multiple SIMs/eSIMs, when an active voice connection for a first SIM/eSIM uses wireless circuitry to connect to a first cellular wireless network via a first radio access network, the single-radio, multi-SIM/eSIM wireless device uses alternative data transports, such as via a wireless local area network (WLAN) or by tunneling through the first radio access network of the first cellular wireless network to connect to services of additional cellular wireless networks associated with the multiple SIMs/eSIMs.
Abstract:
A device implementing an express credential transaction system includes at least one processor configured to receive an indication that a payment applet for a service provider has been provisioned on a secure element of the device with a first attribute indicating that the payment applet can be utilized for a transaction without authentication associated with the transaction. The processor is configured to set the first attribute of the payment applet to indicate that authentication is required to utilize the payment applet when another payment applet for the service provider provisioned on the secure element of the device has an attribute that indicates the other payment applet can be utilized for the transaction without user authentication. The at least one processor is configured to control whether the user authentication is requested when utilizing the payment applet or the other payment applet, respectively, in transactions.
Abstract:
Embodiments provided herein determine if an electronic subscriber identity module (eSIM) associated with a requested service can be installed in a secure element (SE) housed in a wireless device. Before requesting deployment of an eSIM suitable for the requested service from an eSIM delivery server, a carrier server asks that an original equipment manufacturer (OEM) server validate that an eSIM corresponding to a customer request should be deployed. The OEM server obtains information about the wireless device and information about the SE. When the carrier server requests validation, the OEM server evaluates the wireless device information and/or the SE information. If the OEM server indicates that deployment of the eSIM should proceed, the OEM server also indicates the eSIM type that is compatible with the wireless device and with the SE housed in the device.
Abstract:
Disclosed herein is a technique for updating firmware of an embedded Universal Integrated Circuit Card (eUICC) included in a mobile device. The technique includes the steps of (1) receiving, from a firmware provider, an indication that an updated firmware is available for the eUICC, (2) in response to the indication, providing, to the firmware provider, (i) a unique identifier (ID) associated with the eUICC, and (ii) a nonce value, (3) subsequent to providing, receiving, from the firmware provider, a firmware update package, wherein the firmware update package includes (i) authentication information, and (ii) the updated firmware, (4) subsequent to verifying the authentication information, persisting, to a memory included in the mobile device, a hash value that corresponds to the updated firmware, and (5) installing the updated firmware on the eUICC.
Abstract:
Described are systems and methods for transferring calls between multiple stations. An exemplary system includes a first station and a second station that establishes a first communication session having a first call identification with the first station. The system further includes a third station and a network device that includes stored data indicating a relationship between the first station and the third station, the network device configured to receive the first call identification from the first station and transmit the first call identification to the third station based on the relationship, wherein the third station is configured to receive the first call identification and send an invite to the second station to replace the first communication session with the first station with a second communication session with the third station, the invite including the first call identification and a second call identification that identifies the second communication session.