Methods and devices for performing a mobile network switch

    公开(公告)号:US10231127B2

    公开(公告)日:2019-03-12

    申请号:US14911087

    申请日:2014-08-08

    摘要: A method of performing a switch from a first mobile network to a second mobile network by a mobile terminal comprising a secure element comprises the steps of: (a) requesting attachment to the first mobile network using a first identification data element, preferably a first IMSI, of a first subscription profile; (b) requesting attachment to the second mobile network using a second identification data element, preferably a second IMSI, of a second subscription profile; and (c) requesting attachment to the first mobile network. The second mobile network or another mobile network uses a confirmation data element, wherein the confirmation data element has the same format as the first and the second identification data element and is configured such that the attachment request is forwarded to a subscription management server in order to inform the subscription management server whether the attachment to the second mobile network was successful.

    Methods and devices for performing a mobile network switch

    公开(公告)号:US09794775B2

    公开(公告)日:2017-10-17

    申请号:US14910992

    申请日:2014-08-08

    摘要: A method of performing a switch from a first mobile network to a second mobile network by a mobile terminal comprising a secure element includes the steps of: (a) attaching to the first mobile network using a first attachment message containing a first identification data element, preferably a first IMSI, of a first subscription profile; and (b) attaching to the second mobile network by an attachment process including a second attachment message containing a second identification data element, preferably a second IMSI, of a second subscription profile. The second mobile network is configured to monitor at least parts of the attachment process, to determine the second identification data element contained therein and to forward this information to a subscription management server in order to confirm the successful attachment of the secure element to the second mobile network.

    Methods and devices for OTA subscription management
    3.
    发明授权
    Methods and devices for OTA subscription management 有权
    OTA订阅管理的方法和设备

    公开(公告)号:US09521543B2

    公开(公告)日:2016-12-13

    申请号:US14654073

    申请日:2013-12-17

    摘要: A method of providing a secure element of a mobile terminal with a subscription profile in which the mobile terminal is configured to communicate with a cellular communications network and the subscription profile comprises a network specific portion related to the cellular communications network or a different cellular communications network as well as a hardware specific portion related to the hardware of the mobile terminal and/or the secure element. The method comprises the steps of: assembling the subscription profile, wherein the network specific portion of the subscription profile is provided by a first server and the hardware specific portion of the subscription profile is provided by a second server; and providing the subscription profile over-the-air to the secure element. A corresponding secure element, mobile terminal and subscription management backend system involves features of the method.

    摘要翻译: 一种向移动终端提供具有订阅简档的安全元件的方法,其中移动终端被配置为与蜂窝通信网络通信,并且订阅简档包括与蜂窝通信网络或不同的蜂窝通信网络有关的网络特定部分 以及与移动终端和/或安全元件的硬件相关的硬件特定部分。 该方法包括以下步骤:组合订阅简档,其中订阅简档的网络特定部分由第一服务器提供,并且订阅简档的硬件特定部分由第二服务器提供; 以及将所述订阅简档提供给所述安全元件。 相应的安全元件,移动终端和订阅管理后端系统涉及该方法的特征。

    Mobile device management
    4.
    发明授权

    公开(公告)号:US09794773B2

    公开(公告)日:2017-10-17

    申请号:US14813476

    申请日:2015-07-30

    发明人: Thomas Larsson

    IPC分类号: H04W8/18 H04W48/18 H04W48/16

    CPC分类号: H04W8/183 H04W48/16 H04W48/18

    摘要: A method for managing, e.g. subscriptions on a security element of, a mobile device comprises the steps of recognizing a new network and initiating a management step. In order to recognize the new network, information about a network selected by the mobile device is captured. Then, the captured information is evaluated in order to recognize the new network. Further, it is determined whether the captured information satisfies a specified stability condition. If this is the case, the management step is initiated.

    Method and System for Updating a Firmware of a Security Module
    5.
    发明申请
    Method and System for Updating a Firmware of a Security Module 审中-公开
    更新安全模块固件的方法和系统

    公开(公告)号:US20150220319A1

    公开(公告)日:2015-08-06

    申请号:US14424310

    申请日:2013-07-23

    IPC分类号: G06F9/445 G06F21/64 G06F21/57

    摘要: A method for updating a firmware of a security module in equipment comprises a device and the security module arranged such that data can be exchanged between the security module and the device. A first message is received by the security module and indicates the availability of a firmware update provided by a provider and wherein the first message contains a transaction number individual for the security module. A second message is transferred from the equipment to the provider and the firmware update is requested from the provider. The second message contains the individual transaction number to enable the provider to conduct an identification of the security module. The firmware update is transferred from the provider to the equipment based on the individual transaction number, and is stored in a memory of the device. The firmware is unpacked by a boot loader of the equipment or the security module.

    摘要翻译: 用于更新设备中的安全模块的固件的方法包括:设备和安全模块,其被布置成可以在安全模块和设备之间交换数据。 安全模块接收到第一消息,并且指示由提供商提供的固件更新的可用性,并且其中第一消息包含用于安全模块的交易号个人。 第二条消息从设备传送到提供商,并从提供商请求固件更新。 第二个消息包含单个交易号码,以使提供商能够进行安全模块的标识。 固件更新根据个人交易号从供应商传送到设备,并存储在设备的存储器中。 固件由设备或安全模块的引导加载程序解压缩。

    Method and secure element for using a network

    公开(公告)号:US10554670B2

    公开(公告)日:2020-02-04

    申请号:US15324328

    申请日:2015-06-15

    发明人: Thomas Larsson

    摘要: A method for using a network and a secure element, whereby the secure element of a device receives a request for usages data from the device. The secure element sends the usage data to the device in response to the request. The usage data enable the device to use the network. The secure element applies a timer to measure a delay time. The device shall only use the network, after the delay time has expired. The secure element prevents the usage of the network by the device until the delay time has expired.