Abstract:
Embodiments described herein relate to managing access to 5G cellular baseband resources for 5G-capable wireless devices. A wireless device can monitor application workloads by analyzing communication network performance requirements for a given application in-use or launching for future use along with system-level indications of overall device usage, battery level, and mobility status to determine whether access to 5G cellular baseband resources is recommended for an application. A 5G cellular baseband resource recommendation is provided for an application indicating a level of bandwidth in current use or expected for future use as well as a confidence metric in the bandwidth level indication. The 5G cellular baseband resource recommendation is used with additional device criteria to determine whether access to one or more 5G radio frequency bands is allowed.
Abstract:
This Application describes mechanisms for enterprise remote management of cellular services provided via access credentials, e.g., subscriber identity modules (SIMs) and/or electronic SIMs (eSIMs), for wireless devices. To minimize requirements for user interaction, installation and management of business-supplied cellular service profiles on the wireless device can intercept alert notifications to reduce interruptions and allow for background management of the business-supplied cellular service profiles. Additionally, a business enterprise can use multiple, distinct services to initiate installation of an eSIM to a wireless device. When two different services attempt to install eSIMs on the wireless device in parallel, management software on the wireless device can control an order of installation and disallow duplicate installations of an identical eSIM to the wireless device. The management software can also monitor eSIM installations and manage alert notifications that occur during the eSIM installation process.
Abstract:
The described embodiments set forth techniques for transferring an electronic subscriber identity module (eSIM) with the same integrated circuit card identifier (ICCID) value from a source mobile wireless device to a target mobile wireless device directly with a mobile network operator (MNO) provisioning server. The target mobile wireless device downloads the eSIM from the MNO provisioning server after deletion of the eSIM on the source mobile wireless device and reassignment of the eSIM with the same ICCID value to the target mobile wireless device.
Abstract:
A network component communicating with a user equipment (UE) and a server. The network component receives a first packet from the UE, wherein the first packet indicates to the network component that the network component is to perform operations on behalf of the UE to maintain a persistent connection, receives a second packet from the server and determines whether to transmit a signal to the UE based on the second packet received from the server. A UE having a transceiver and a processor. The UE transmits a first packet to the network component, wherein the first packet indicates to the network component that the network component is to perform operations on behalf of the UE to maintain a persistent connection, identifies an out of service (OOS) event, receives registration information from the network component and registers with the server based on the registration information received from the network component.
Abstract:
Techniques to protect subscriber identity in messages communicated between a user equipment (UE) and a cellular wireless network entity by using multiple ephemeral asymmetric keys are disclosed. The UE determines multiple ephemeral UE public and secret key pairs, while the cellular wireless network entity provides a network public key to the UE. The network public key may be updated over time. Multiple encryption keys based on the multiple ephemeral UE secret keys and the public network key are derived and used to encrypt a subscription permanent identifier (SUPI) to generate multiple subscription concealed identifiers (SUCIs). Each SUCI is used only once for messages communicated to a cellular wireless network and discarded after use. New SUCI are generated when the network public key is updated.
Abstract:
Techniques to manage updates for eSIMs of a secondary wireless device are disclosed. Responsive to a user input, expiration of a timer, receipt of a message from an associated primary wireless device, processing circuitry of the secondary wireless device commands an eUICC to update an eSIM. A secure data connection is established between the eUICC and a network provisioning server, either directly from the secondary wireless device to a cellular wireless network or relayed indirectly via the primary wireless device. The eUICC and the network provisioning server exchange messages in accordance with a BIP process to update the eSIM. The eUICC provides a status to the processing circuitry indicating success or failure for the eSIM update. Upon success, a portion of the secondary wireless device may be placed in a reduced power state. Upon failure, the eSIM update process may repeat up to a maximum number of retries.
Abstract:
Apparatus and methods to support handover of emergency services sessions by network elements and by a wireless device between wireless networks are disclosed. The wireless device indicates an emergency services handover to applicable network elements, including an evolved Packet Data Gateway (ePDG), in one more messages when transferring an established emergency services session from a cellular wireless network to an untrusted non-cellular wireless network. In some embodiments, the wireless device includes a predefined string as part of a set of identification data in an IKE_AUTH request message sent to the ePDG. In some embodiments, the wireless device includes a previously allocated IP address within a payload of the IKE_AUTH request message to indicate handover of an existing session. By providing both the predefined “EMERGENCY” string and the previously allocated IP address, the wireless indicates a handover of an emergency services session between wireless networks.
Abstract:
Apparatus and methods to support location specific control to allow and/or disallow access to services through untrusted wireless networks by a wireless communication device are disclosed. One or more network elements obtain a location of the wireless communication device and selectively allow and/or disallow access to one or more cellular network services and/or one or more access point names (APNs) based on the location of the wireless communication device when connecting through an untrusted wireless network.