Abstract:
A method for preparing an eSIM for provisioning is provided. The method can include a provisioning server encrypting the eSIM with a symmetric key. The method can further include the provisioning server, after determining a target eUICC to which the eSIM is to be provisioned, encrypting the symmetric key with a key encryption key derived based at least in part on a private key associated with the provisioning server and a public key associated with the target eUICC. The method can additionally include the provisioning server formatting an eSIM package including the encrypted eSIM, the encrypted symmetric key, and a public key corresponding to the private key associated with the provisioning server. The method can also include the provisioning server sending the eSIM package to the target eUICC.
Abstract:
Provisioning an embedded subscriber identity module (eSIM) in a user equipment (UE) device with personalized subscriber information. A request may be transmitted for personalized subscriber information. The personalized subscriber information may be received. The personalized subscriber information may be installed in an eSIM in the UE device.
Abstract:
A method for preparing an eSIM for provisioning is provided. The method can include a provisioning server encrypting the eSIM with a symmetric key. The method can further include the provisioning server, after determining a target eUICC to which the eSIM is to be provisioned, encrypting the symmetric key with a key encryption key derived based at least in part on a private key associated with the provisioning server and a public key associated with the target eUICC. The method can additionally include the provisioning server formatting an eSIM package including the encrypted eSIM, the encrypted symmetric key, and a public key corresponding to the private key associated with the provisioning server. The method can also include the provisioning server sending the eSIM package to the target eUICC.
Abstract:
Provisioning an embedded subscriber identity module (eSIM) in a user equipment (UE) device with personalized subscriber information. A request may be transmitted for personalized subscriber information. The personalized subscriber information may be received. The personalized subscriber information may be installed in an eSIM in the UE device.
Abstract:
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
Abstract:
Methods and apparatus for the automated updating of forwarding preferences for communications in a telecommunications network. In one embodiment, the network includes a wireless (e.g., cellular) network with user mobile user devices configured to detect a change to their configuration (such as a user changing out SIM cards or virtual access clients). In response, the device causes an update to its associated communication forwarding preferences to reflect the change. If the configuration alteration meets certain criteria (e.g., changes the phone number at which the device may be reached), the device sends a forwarding message instructing a network entity (e.g., routing server) to direct communications addressed to the old phone number to the new phone number. Thus, a user with two or more user profiles (such as two different carrier accounts) may be reached at any number associated with any of the profiles, even if only one profile is currently active.
Abstract:
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs)
Abstract:
A baseband processor includes a memory and is configured to transmit, to a cellular carrier, a request to activate the UE with the cellular carrier. The baseband processor is also configured to, in response to receiving an authentication request for authenticating a user of the UE, transmit, to the cellular carrier, information identifying another UE and authentication information for authenticating the user; obtain verification information transmitted to the other UE; transmit the verification information to the cellular carrier; and after transmitting the verification information to the cellular carrier, receive an embedded subscriber identity module (eSIM) subscription transferred from the other UE.
Abstract:
This Application sets forth techniques for cellular service management for a secondary mobile wireless device assisted by a primary mobile wireless device, including provisioning and management of electronic subscriber identity modules (eSIMs) for a secondary mobile wireless device with user authorization obtained via the primary mobile wireless device.
Abstract:
A method is performed by a set of one or more servers and includes receiving, from a first user equipment (UE) to be activated with a cellular carrier for a user, and at the set of one or more servers, information identifying a second UE of the user and authentication information for authenticating the user with the cellular carrier. The method further includes authenticating the user using the authentication information; transmitting a password to the second UE at least partly in response to authenticating the user; receiving, from the first UE and at the set of one or more servers, the password; validating the password received from the first UE; and initiating a transfer of an embedded subscriber identity module (eSIM) subscription, from the second UE to the first UE, at least partly in response to validating the password