In-advance eSIM management notification

    公开(公告)号:US10334427B2

    公开(公告)日:2019-06-25

    申请号:US15940804

    申请日:2018-03-29

    Applicant: Apple Inc.

    Inventor: Xiangying Yang

    Abstract: Techniques to manage notifications for state changes of eSIMs of a mobile device are described. Processing circuitry of the mobile device provides a command to the eUICC to delete an eSIM. The eUICC changes the state of the eSIM to a locked state and generates a notification of the forthcoming state change before completion of the transition to the deleted state. The processing circuitry sends the notification to a provisioning server and provides to the eUICC a response indicating successful delivery of the notification, and the eUICC subsequently transitions the eSIM to the deleted state. While the eSIM is in the locked state, applications and files of the eSIM can be unusable. In some embodiments, credentials of the eSIM can be reused to re-authenticate with a wireless network in order to deliver the notification to the provisioning server.

    Enforcing service policies in embedded UICCs

    公开(公告)号:US10264452B2

    公开(公告)日:2019-04-16

    申请号:US15944738

    申请日:2018-04-03

    Applicant: Apple Inc.

    Abstract: The embodiments set forth techniques for an embedded Universal Integrated Circuit Card (eUICC) to conditionally require, when performing management operations in association with electronic Subscriber Identity Modules (eSIMs), human-based authentication. The eUICC receives a request to perform a management operation in association with an eSIM. In response, the eUICC determines whether a policy being enforced by the eUICC indicates that a human-based authentication is required prior to performing the management operation. Next, the eUICC causes the mobile device to prompt a user of the mobile device to carry out the human-based authentication. The management operation is then performed or ignored in accordance with results of the human-based authentication.

    Embedded universal integrated circuit card (eUICC) file system management with profile switching

    公开(公告)号:US10187788B2

    公开(公告)日:2019-01-22

    申请号:US15366737

    申请日:2016-12-01

    Applicant: Apple Inc.

    Inventor: Xiangying Yang

    Abstract: Methods and apparatus for dynamic file system management of an embedded Universal Integrated Circuit Card (eUICC) in response to changes for electronic Subscriber Identity Modules (eSIMs) on the eUICC are disclosed herein. Hardware specific file information, e.g., hardware-based eUICC parameters, which may apply to multiple eSIMs and/or multiple Mobile Network Operators (MNOs), is included in a default eUICC file system. MNO specific information, e.g., MNO-specified parameters, is included in eSIMs. Customized eUICC level files are created, stored, modified and/or replaced based on a combination of default eUICC files and MNO specific information extracted from an eSIM at installation and/or in response to a change of state of the eSIM, such as when enabling, disabling, or updating the eSIM on the eUICC.

    Apparatus and methods for controlled switching of electronic access clients without requiring network access

    公开(公告)号:US10009764B2

    公开(公告)日:2018-06-26

    申请号:US14738792

    申请日:2015-06-12

    Applicant: Apple Inc.

    CPC classification number: H04W12/06 H04B1/3816 H04M1/66 H04W12/00405

    Abstract: Methods and apparatuses for providing controlled switching of electronic access control clients (e.g., electronic Subscriber Identity Modules (eSIMs)) without requiring network access are set forth herein. In one embodiment, a method for swapping of subscriptions and/or profiles for without network supervision that prevents possibly malicious high frequency switching is disclosed. For example, a secure element included in a mobile device can be configured to issue, to a security module included in the mobile device, a request for the security module to carry out an authentication of a user of the mobile device. Upon determining, based on results received from the security module, that the authentication is successful, the secure element can generate one or more credits in accordance with the results, where each credit of the one or more credits can be used to carry out an eSIM management operation within the secure element.

    Enforcing service policies in embedded UICCs

    公开(公告)号:US09942755B2

    公开(公告)日:2018-04-10

    申请号:US14831819

    申请日:2015-08-20

    Applicant: Apple Inc.

    Abstract: The embodiments set forth techniques for an embedded Universal Integrated Circuit Card (eUICC) to conditionally require, when performing management operations in association with electronic Subscriber Identity Modules (eSIMs), human-based authentication. The eUICC receives a request to perform a management operation in association with an eSIM. In response, the eUICC determines whether a policy being enforced by the eUICC indicates that a human-based authentication is required prior to performing the management operation. Next, the eUICC causes the mobile device to prompt a user of the mobile device to carry out the human-based authentication. The management operation is then performed or ignored in accordance with results of the human-based authentication.

    ELECTRONIC SUBSCRIBER IDENTITY MODULE APPLICATION IDENTIFIER HANDLING
    18.
    发明申请
    ELECTRONIC SUBSCRIBER IDENTITY MODULE APPLICATION IDENTIFIER HANDLING 有权
    电子订户身份识别模块应用标识符处理

    公开(公告)号:US20150350879A1

    公开(公告)日:2015-12-03

    申请号:US14503048

    申请日:2014-09-30

    Applicant: Apple Inc.

    CPC classification number: H04W8/183 H04W8/205 H04W88/06

    Abstract: Embodiments are described for identifying and accessing an electronic subscriber identity module (eSIM) and associated content of the eSIM in a multiple eSIM configuration. An embedded Universal Integrated Circuit Card (eUICC) can include multiple eSIMs, where each eSIM can include its own file structures and applications. Some embodiments include a processor of a mobile device transmitting a special command to the eUICC, including an identification that uniquely identifies an eSIM in the eUICC. After selecting the eSIM, the processor can access file structures and applications of the selected eSIM. The processor can then use existing commands to access content in the selected eSIM. The special command can direct the eUICC to activate or deactivate content associated with the selected eSIM. Other embodiments include an eUICC platform operating system interacting with eSIMs associated with logical channels to facilitate identification and access to file structures and applications of the eSIMs.

    Abstract translation: 描述了用于在多个eSIM配置中识别和访问电子订户身份模块(eSIM)和eSIM的相关内容的实施例。 嵌入式通用集成电路卡(eUICC)可以包括多个eSIM,每个eSIM可以包括其自己的文件结构和应用程序。 一些实施例包括向eUICC发送特殊命令的移动设备的处理器,包括在eUICC中唯一地标识eSIM的标识。 选择eSIM后,处理器可以访问所选eSIM的文件结构和应用程序。 然后,处理器可以使用现有命令访问所选eSIM中的内容。 特殊命令可以指示eUICC激活或停用与所选eSIM相关联的内容。 其他实施例包括与与逻辑信道相关联的eSIM交互的eUICC平台操作系统,以便于识别和访问eSIM的文件结构和应用。

    Policy-based techniques for managing access control
    19.
    发明授权
    Policy-based techniques for managing access control 有权
    用于管理访问控制的基于策略的技术

    公开(公告)号:US09098714B2

    公开(公告)日:2015-08-04

    申请号:US14085951

    申请日:2013-11-21

    Applicant: Apple Inc.

    CPC classification number: G06F21/604 H04L63/102 H04L63/105 H04L63/20 H04W12/08

    Abstract: A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities.

    Abstract translation: 描述了基于策略的框架。 该基于策略的框架可以用于指定逻辑实体执行与位于电子设备中的安全元件内的访问控制元素(例如电子订户身份模块)相关联的操作的特权。 注意,对于与相同或不同的访问控制元素相关联的不同操作,不同的逻辑实体可以具有不同的权限。 此外,基于策略的框架可以指定在认证期间由逻辑实体使用的凭证的类型,使得不同类型的凭证可以用于不同的操作和/或由不同的逻辑实体使用。 此外,基于策略的框架可以指定在认证期间由逻辑实体使用的安全协议和安全级别,使得不同的安全协议和安全级别可以用于不同的操作和/或不同的逻辑实体。

Patent Agency Ranking