Abstract:
Disclosed are a method, apparatus, and system for authenticating a communication session between a user equipment device (UE) and a communication network. A first authentication of a UE is performed by generating an authentication key, transmitting the authentication key over a first communication link from the UE to a communication network, authenticating the UE using the authentication key, and generating an authentication result indicative of authenticating the UE. A second authentication of the UE is performed to authorize a communication session over a second communication link between the UE and the communication network. The second authentication includes transmitting UE identifying information over the second communication link from the UE to the communication network and authenticating the UE using the UE identifying information and the authentication key. The second communication link is established under an internet protocol. After performing the second authentication, the communication session is authorized.
Abstract:
Examples disclosed herein include methods, systems, and devices to help a UE to securely output a copy of a security key stored on the UE. According to examples, a UE receives a test security key from a provider. Based on the received test security key, the UE computes a test result, and then the UE transmits the computed test result to a network authentication system. The UE receives from the network authentication system a response indicating a match between the computed test result and a test result computed by the network authentication system. Based on the received response indicating the match, the UE outputs a copy of the security key stored in the UE to the provider.
Abstract:
Presently disclosed are systems and methods for wireless communication devices (WCDs) to share relevant performance-metric data with nearby devices having similar configurations. One embodiment takes the form of a method carried out by a WCD. The method includes receiving into a first WCD from a second WCD, via a direct wireless link between the WCDs, data indicating a configuration of the second WCD. The method also includes making a determination as to whether the configuration of the second WCD is at least threshold similar to the configuration of the first WCD and, if so, sharing with the second WCD, via the direct wireless link, performance-metric data for the wireless communication network.
Abstract:
A method and system for enabling MMS message delivery to a recipient device. An MMSC receives and stores MMS message content to be delivered to the recipient device, and the MMSC responsively sends to the recipient device an MMS-notification message carrying an address of the MMS message content stored at the MMSC and then receives a reply indicating that the recipient device received the MMS-notification message. The MMSC then detects that, after the MMSC received the reply, (i) at least a predefined threshold amount of time has passed and (ii) the MMSC has not yet received from the recipient device a request to download the MMS message content. And responsive to at least the detecting, the MMSC then sends to the recipient device a data-service-trigger message that triggers turning on data service of the recipient device, thus enabling MMS-message delivery to the recipient device.
Abstract:
A mechanism to help avoid operational failures with respect to mobile network operator (MNO) service profiles on embedded universal integrated circuit cards (eUICCs). A profile management system or other entity detects operational failures associated with MNO service profiles and responsively provides new MNO service profiles selected to help avoid recurrence of the operational failures. For instance, the profile management system could detect an operational failure that occurred on a given mobile device and could responsively provide a replacement MNO service profile for installation on that device. Further, the profile management system could detect a trend where such failures occur with respect to MNO service profiles from a first source (e.g., first vendor) on eUICCs from a second source (e.g., a second vendor) and could responsively take action to help avoid such a combination of MNO service profile and eUICC, so as to help avoid recurrence of the operational failures.
Abstract:
Disclosed herein are methods and systems for enforcing prepayment based on lack of support of authentication functionality by a particular wireless serving system. In one embodiment, at least one home-core-network entity associated with a home core network of a mobile station receives from a particular wireless serving system a registration request associated with the mobile station. Responsive to receiving the registration request, the at least one home-core-network entity makes a determination as to whether the particular wireless serving system supports authentication functionality. Responsive to the determination being that the particular wireless serving system does not support authentication functionality, the at least one home-core-network entity sends to the particular wireless serving system a registration response that grants the request subject to at least one prepayment requirement.
Abstract:
A method and system for selecting a coverage area in which a given mobile station should operate. The system will receive user ratings of call quality per coverage area. The system will then use the received user ratings as a basis to select a coverage area in which the given mobile station should operate. The system will then cause the given mobile station to operate in the selected coverage area. By using these user ratings as a basis to select a coverage area in which the given mobile station should operate, the system can help improve call quality overall for users, thus increasing user satisfaction with wireless performance.
Abstract:
An eUICC is configured with one or more master delete keys each allowing an associated level of profile-deletion access for deleting one or more profiles from the eUICC, and the eUICC is configured to control profile-deletion access in accordance with the one or more delete keys. For instance, one delete key could allow deletion of any or all profiles on the eUICC including any operational profiles (e.g., MNO profiles) and any non-operational profiles. Whereas, another delete key could allow deletion of any or all operational profiles but not any non-operational profiles. Further, a blockchain protocol could be used to securely convey such a delete key from one party to another, helping to establish chain of custody of the delete key.
Abstract:
A first communication device receives a communication from a second communication device. The communication could be part of the signaling used to establish a call to the second communication device or an audio signal that the second communication device conveys after its user has answered the call and started speaking. Based on the communication from the second communication device, the first communication device provides a user-discernible indication regarding the environment in which the second communication device is being used, such as an indication that the second communication device is being used with a speakerphone. If the second communication device is being used in a vehicle, the first communication device may also provide a user-discernible indication regarding the operational status of the vehicle, such as whether the vehicle is in motion and/or the number of occupants in the vehicle.
Abstract:
Methods and systems for modifying a preferred roaming list (PRL) of a subscriber user equipment (UE) are provided. In a wireless communication system, a first wireless service provider is associated with a first radio access network (RAN) and maintains a subscriber account associated with a given UE. When the first RAN receives a registration request from the UE, the first RAN responsively (i) attempts to authenticate the UE, and (ii) upon a failure to authenticate the UE, the first RAN updates the PRL to then list a second RAN associated with a second wireless service provider as the highest priority network in the PRL.