-
21.
公开(公告)号:US09877193B2
公开(公告)日:2018-01-23
申请号:US15076527
申请日:2016-03-21
Applicant: Apple Inc.
Inventor: Li Li , Xiangying Yang , Jerrold Von Hauck , Christopher B. Sharp , Yousuf H. Vaid , Arun G. Mathias , David T. Haggerty , Najeeb M. Abdulrahiman
CPC classification number: H04W12/06 , H04L41/28 , H04L63/083 , H04L63/0838 , H04L63/0853
Abstract: Methods and apparatus for user authentication and human intent verification of administrative operations for eSIMs of an eUICC included in a mobile device are disclosed. Certain administrative operations, such as import, modification, and/or export, of an eSIM and/or for an eUICCs firmware can require user authentication and/or human intent verification before execution of the administrative operations are performed or completed by the mobile device. A user of the mobile device provides information to link an external user account to an eSIM upon (or subsequent to) installation on the eUICC. User credentials, such as a user name and password, and/or information generated therefrom, can be used to authenticate the user with an external server. In response to successful user authentication, the administrative operations are performed. Human intent verification can also be performed in conjunction with user authentication to prevent malware from interfering with eSIM and/or eUICC functions of the mobile device.
-
公开(公告)号:US09843885B2
公开(公告)日:2017-12-12
申请号:US15178727
申请日:2016-06-10
Applicant: Apple Inc.
Inventor: Vikram B. Yerrabommanahalli , Li Li , Arun G. Mathias , Najeeb M. Abdulrahiman , Chandiramohan Vasudevan , Rohan C. Malthankar , Francisco J. Gonzalez , Rafael L. Rivera-Barreto , Jean-Marc Padova
CPC classification number: H04W4/60 , H04L61/106 , H04W8/18 , H04W8/205 , H04W68/005
Abstract: Some embodiments relate to methods for provisioning a secondary wireless device with an eSIM for wireless communication and activating multi-SIM functionality between the secondary wireless device and a primary wireless device having a subscribed SIM. The primary wireless device may act as a proxy in obtaining the eSIM for the secondary wireless device. The primary wireless device may then provide, to the cellular network, identifiers of the SIMs of the primary and secondary wireless devices. The primary wireless device may then request initiation of multi-SIM functionality for the two SIMs, and receive an indication that the multi-SIM functionality has been initiated. As an example, the multi-SIM functionality may be implemented by mapping the SIM of the primary wireless device and the SIM of the secondary wireless device (e.g., the provisioned eSIM) to the same Mobile Directory Number (MDN).
-
公开(公告)号:US09831903B1
公开(公告)日:2017-11-28
申请号:US15222759
申请日:2016-07-28
Applicant: Apple Inc.
Inventor: Avinash Narasimhan , Hemant Purswani , Clark P. Mueller , David T. Haggerty , Li Li , Arun G. Mathias , Najeeb M. Abdulrahiman
IPC: H04B1/3816 , H04L12/24 , H04W4/24
CPC classification number: H04W4/24 , H04L12/1407 , H04L41/0893 , H04M15/66 , H04M15/80 , H04M17/02 , H04M17/023 , H04M17/026 , H04M17/103
Abstract: Methods, devices, and servers for as-needed update of a trusted list are provided herein. An electronic subscriber identity module (eSIM) server receives a request for an eSIM of a particular type from a wireless device. The eSIM server evaluates the particular type and requests an eSIM of the particular type from a second eSIM server, which is not initially trusted by a secure element (SE) of the wireless device. The eSIM server sends a policy update to the wireless device. The wireless device passes the policy update to the SE, for example, a universal integrated circuit card (UICC). The UICC updates the trusted list with an identity of the second eSIM server. When the wireless device downloads a bound profile package (BPP) containing an eSIM from the second eSIM server, the UICC validates the BPP based on the updated trusted list. The eSIM is then installed on the UICC.
-
24.
公开(公告)号:US20160246611A1
公开(公告)日:2016-08-25
申请号:US14872067
申请日:2015-09-30
Applicant: Apple Inc.
Inventor: Li Li , Arun G. Mathias , Jean-Marc Padova , Najeeb M. Abdulrahiman
CPC classification number: G06F9/4408 , G06F21/78 , H04L63/0853 , H04L63/107 , H04W4/025 , H04W4/50 , H04W8/183 , H04W12/08
Abstract: Disclosed herein is a technique for selecting a bootstrap electronic Subscriber Identity Module (eSIM) from among multiple bootstrap eSIMs stored in a secure element of a mobile device. Specifically, the technique involves selecting the bootstrap eSIM based on location information associated with the mobile device. When the mobile device is located at a first location (for example, a first country) a first bootstrap eSIM associated with a Mobile Network Operator (MNO) local to the first country is selected. Similarly, when the mobile device is located at a second location (for example, a second country), a second bootstrap eSIM associated with an MNO local to the second country is selected.
Abstract translation: 这里公开了一种用于从存储在移动设备的安全元件中的多个自举eSIM中选择自举电子订户身份模块(eSIM)的技术。 具体地,该技术涉及基于与移动设备相关联的位置信息来选择引导eSIM。 当移动设备位于第一位置(例如,第一国家)时,选择与第一国家本地的移动网络运营商(MNO)相关联的第一自举eSIM。 类似地,当移动设备位于第二位置(例如,第二国家)时,选择与第二国家本地的MNO相关联的第二引导eSIM。
-
公开(公告)号:US12213212B2
公开(公告)日:2025-01-28
申请号:US18161810
申请日:2023-01-30
Applicant: Apple Inc.
Inventor: Li Li , Najeeb M. Abdulrahiman , Arun G. Mathias
Abstract: Techniques for flexible electronic subscriber identity module (eSIM) deployment to a wireless device by a network server, including generation of multiple eSIMs using an identical eSIM identifier value, such as an identical integrated circuit card identifier (ICCID) value, and subsequent selection of an eSIM based on capabilities of the wireless device. Multiple eSIMs that correspond to different sets of wireless device capabilities are generated without knowledge of the wireless communication standards that a wireless device supports. The multiple eSIMs include a first eSIM that includes fifth generation (5G) wireless communication protocol information and a second eSIM that excludes 5G wireless communication protocol information. The network server selects an eSIM from the multiple eSIMs based on whether the wireless device is 5G capable. After selection and binding of a profile package that includes the eSIM, the remaining eSIMs that use the identical ICCID value are deleted, for security enforcement against cloning.
-
公开(公告)号:US20230322186A1
公开(公告)日:2023-10-12
申请号:US17716843
申请日:2022-04-08
Applicant: Apple Inc.
Inventor: Matthias Lerch , Gordon Y. Scott , Najeeb M. Abdulrahiman , Oren M. Elrad
CPC classification number: B60R25/245 , G07C9/00309 , H04W4/80 , H04W4/40 , G07C2009/00539 , G07C2009/00547
Abstract: An electronic device that at least semi-automatically performs car-key pairing is described. During operation, the electronic device may perform wireless pairing with a second electronic device (e.g., a vehicle), where the wireless pairing establishes a connection between the electronic device and the second electronic device. Moreover, during the wireless pairing, the electronic device may receive information associated with the car-key pairing of the electronic device and the second electronic device. Then, after the wireless pairing is completed, the electronic device may determine that the car-key pairing is supported or available based at least in part on the information. Next, the electronic device may selectively and at least semi-automatically perform the car-key pairing based at least in part on the information, where the car-key pairing enables the electronic device to function as a digital key for the second electronic device using wireless communication via the wireless pairing or another communication protocol.
-
公开(公告)号:US11128478B2
公开(公告)日:2021-09-21
申请号:US16490418
申请日:2018-03-01
Applicant: Apple Inc.
Inventor: Florian Galdo , Arun G. Mathias , Matthias Lerch , Najeeb M. Abdulrahiman , Onur E. Tackin , Yannick Sierra
Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.
-
公开(公告)号:US10904751B2
公开(公告)日:2021-01-26
申请号:US15220614
申请日:2016-07-27
Applicant: APPLE INC.
Inventor: Najeeb M. Abdulrahiman , Thomas F. Pauly , Vikram B. Yerrabommanahalli
Abstract: Described are methods that allow credentials of a first client station to authenticate a second client station. An exemplary method includes associating a first client station with a second client station, the first client station including credential information, the associating authorizing the second client station to use the credential information, transmitting, by the second client station, an association request to a network, the network utilizing the credential information to authorize a connection, the second client station configured to perform a proxy functionality for requests received from the network to be forwarded to the first client station and responses received from the first client station to be forwarded to the network, determining, by the network, whether the credential information received from the second client station is authenticated and establishing a connection between the second client station and the network using the credential information of the first client station.
-
公开(公告)号:US20200052905A1
公开(公告)日:2020-02-13
申请号:US16490418
申请日:2018-03-01
Applicant: Apple Inc.
Inventor: Arun G. Mathias , Florian Galdo , Matthias Lerch , Najeeb M. Abdulrahiman , Onur E. Tackin , Yannick Sierra
Abstract: Techniques are disclosed relating to electronic security, e.g., for authenticating a mobile electronic device to allow access to system functionality (e.g., physical access to the system, starting an engine/motor, etc.). In some embodiments, a system and mobile device exchange public keys of public key pairs during a pairing process. In some embodiments, an asymmetric transaction process includes generating a shared secret using a key derivation function over a key established using a secure key exchange (e.g., elliptic curve Diffie-Hellman), and verifying a signature of the system before transmitting any information identifying the mobile device. In various embodiments, disclosed techniques may increase transaction security and privacy of identifying information.
-
公开(公告)号:US10470016B2
公开(公告)日:2019-11-05
申请号:US16121679
申请日:2018-09-05
Applicant: Apple Inc.
Inventor: Vikram B. Yerrabommanahalli , Li Li , Arun G. Mathias , Najeeb M. Abdulrahiman , Chandiramohan Vasudevan , Rohan C. Malthankar , Francisco J. Gonzalez , Rafael L. Rivera-Barreto , Jean-Marc Padova
Abstract: Some embodiments relate to methods for provisioning a secondary wireless device with an eSIM for wireless communication and activating multi-SIM functionality between the secondary wireless device and a primary wireless device having a subscribed SIM. The primary wireless device may act as a proxy in obtaining the eSIM for the secondary wireless device. The primary wireless device may then provide, to the cellular network, identifiers of the SIMs of the primary and secondary wireless devices. The primary wireless device may then request initiation of multi-SIM functionality for the two SIMs, and receive an indication that the multi-SIM functionality has been initiated. As an example, the multi-SIM functionality may be implemented by mapping the SIM of the primary wireless device and the SIM of the secondary wireless device (e.g., the provisioned eSIM) to the same Mobile Directory Number (MDN).
-
-
-
-
-
-
-
-
-