Abstract:
PROBLEM TO BE SOLVED: To provide an apparatus and a method for efficiently distributing and storing access control clients within a network.SOLUTION: In one embodiment, access clients include electronic subscriber identity modules (eSIMs), and an eSIM distribution network infrastructure is described which enforces eSIM uniqueness and conservation, distributes network traffic to prevent "bottle necking" congestion, and provides reasonable disaster recovery capabilities. In one variant, eSIMs are securely stored at electronic universal integrated circuit card (eUICC) appliances which ensure eSIM uniqueness and conservation. Access to the eUICC appliances is made via multiple eSIM depots, which ensure that network load is distributed. Persistent storage is also described, for among other activities, archiving and backup.
Abstract:
PROBLEM TO BE SOLVED: To provide apparatus and methods for storing and controlling access control clients.SOLUTION: In one embodiment, transmitting and receiving devices ensure that only one copy of an eSIM is active at any time. Specifically, each transferred eSIM is encrypted for the destination device; the eSIM from the source device is deleted, deactivated, or otherwise rendered unusable. Various aspects of network infrastructure are also described, including electronic universal integrated circuit card (eUICC) appliances, and mobile devices. Various scenarios for transfer of eSIMs are also disclosed.
Abstract:
PROBLEM TO BE SOLVED: To provide apparatus and methods for storing and controlling access control clients.SOLUTION: In one embodiment, transmitting and receiving devices ensure that only one copy of an eSIM is active at any time. Specifically, each transferred eSIM is encrypted for the destination device; the eSIM from the source device is deleted, deactivated, or otherwise rendered unusable. Various aspects of network infrastructure are also described, including electronic universal integrated circuit card (eUICC) appliances, and mobile devices. Various scenarios for transfer of eSIMs are also disclosed.
Abstract:
Métodos y un aparato para la distribución a gran escala de clientes de control de acceso electrónico, en un aspecto, se da a conocer un protocolo de software de seguridad estratificado. En una modalidad ejemplar, un software de Tarjeta de Circuitos Integrados Universal electrónica (eUICC) de servidor y eUICC cliente comprenden una llamada "pila" de capas de software. Cada capa de software es responsable de un conjunto de funciones jerárquicas que se negocian con su capa de software de iguales correspondiente. El protocolo de software de seguridad estratificado se configura para la distribución a gran escala de Módulos de Identidad de Suscriptor electrónicos (eSIM).