METHOD AND APPARATUS FOR SELECTING BOOTSTRAP ESIMs
    24.
    发明申请
    METHOD AND APPARATUS FOR SELECTING BOOTSTRAP ESIMs 有权
    选择BOOTSTRAP ESIM的方法和设备

    公开(公告)号:US20160246611A1

    公开(公告)日:2016-08-25

    申请号:US14872067

    申请日:2015-09-30

    Applicant: Apple Inc.

    Abstract: Disclosed herein is a technique for selecting a bootstrap electronic Subscriber Identity Module (eSIM) from among multiple bootstrap eSIMs stored in a secure element of a mobile device. Specifically, the technique involves selecting the bootstrap eSIM based on location information associated with the mobile device. When the mobile device is located at a first location (for example, a first country) a first bootstrap eSIM associated with a Mobile Network Operator (MNO) local to the first country is selected. Similarly, when the mobile device is located at a second location (for example, a second country), a second bootstrap eSIM associated with an MNO local to the second country is selected.

    Abstract translation: 这里公开了一种用于从存储在移动设备的安全元件中的多个自举eSIM中选择自举电子订户身份模块(eSIM)的技术。 具体地,该技术涉及基于与移动设备相关联的位置信息来选择引导eSIM。 当移动设备位于第一位置(例如,第一国家)时,选择与第一国家本地的移动网络运营商(MNO)相关联的第一自举eSIM。 类似地,当移动设备位于第二位置(例如,第二国家)时,选择与第二国家本地的MNO相关联的第二引导eSIM。

    Flexible electronic subscriber identity module deployment

    公开(公告)号:US12213212B2

    公开(公告)日:2025-01-28

    申请号:US18161810

    申请日:2023-01-30

    Applicant: Apple Inc.

    Abstract: Techniques for flexible electronic subscriber identity module (eSIM) deployment to a wireless device by a network server, including generation of multiple eSIMs using an identical eSIM identifier value, such as an identical integrated circuit card identifier (ICCID) value, and subsequent selection of an eSIM based on capabilities of the wireless device. Multiple eSIMs that correspond to different sets of wireless device capabilities are generated without knowledge of the wireless communication standards that a wireless device supports. The multiple eSIMs include a first eSIM that includes fifth generation (5G) wireless communication protocol information and a second eSIM that excludes 5G wireless communication protocol information. The network server selects an eSIM from the multiple eSIMs based on whether the wireless device is 5G capable. After selection and binding of a profile package that includes the eSIM, the remaining eSIMs that use the identical ICCID value are deleted, for security enforcement against cloning.

    Automatic Car-Key Pairing Based on Wireless Pairing

    公开(公告)号:US20230322186A1

    公开(公告)日:2023-10-12

    申请号:US17716843

    申请日:2022-04-08

    Applicant: Apple Inc.

    Abstract: An electronic device that at least semi-automatically performs car-key pairing is described. During operation, the electronic device may perform wireless pairing with a second electronic device (e.g., a vehicle), where the wireless pairing establishes a connection between the electronic device and the second electronic device. Moreover, during the wireless pairing, the electronic device may receive information associated with the car-key pairing of the electronic device and the second electronic device. Then, after the wireless pairing is completed, the electronic device may determine that the car-key pairing is supported or available based at least in part on the information. Next, the electronic device may selectively and at least semi-automatically perform the car-key pairing based at least in part on the information, where the car-key pairing enables the electronic device to function as a digital key for the second electronic device using wireless communication via the wireless pairing or another communication protocol.

    System access using a mobile device

    公开(公告)号:US11128478B2

    公开(公告)日:2021-09-21

    申请号:US16490418

    申请日:2018-03-01

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.

    System and method for using credentials of a first client station to establish a connection between a network and a second client station

    公开(公告)号:US10904751B2

    公开(公告)日:2021-01-26

    申请号:US15220614

    申请日:2016-07-27

    Applicant: APPLE INC.

    Abstract: Described are methods that allow credentials of a first client station to authenticate a second client station. An exemplary method includes associating a first client station with a second client station, the first client station including credential information, the associating authorizing the second client station to use the credential information, transmitting, by the second client station, an association request to a network, the network utilizing the credential information to authorize a connection, the second client station configured to perform a proxy functionality for requests received from the network to be forwarded to the first client station and responses received from the first client station to be forwarded to the network, determining, by the network, whether the credential information received from the second client station is authenticated and establishing a connection between the second client station and the network using the credential information of the first client station.

    SYSTEM ACCESS USING A MOBILE DEVICE
    29.
    发明申请

    公开(公告)号:US20200052905A1

    公开(公告)日:2020-02-13

    申请号:US16490418

    申请日:2018-03-01

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.

Patent Agency Ranking