Abstract:
A method performed by a mobile device to register for cellular data connection service provided by a mobile telecommunications service provider. In one embodiment, the mobile device transmits a probe, through a wireless cellular network, to a main Access Point Name (APN), and the probe is configured to determine whether the mobile device has a valid cellular data connection subscription. The mobile device determines, from a response to the probe, that it does not have a valid cellular data connection subscription with the mobile telecommunications service provider. Responsive to that determination, the mobile device connects to a cellular data connection service registration site to allow a user of the mobile device to register for data connection service provided by the mobile telecommunications service provider. The mobile device is limited to accessing the data connection service registration site until the user registers for data connection service.
Abstract:
Apparatus and methods for distributing access control clients. In one exemplary embodiment, a network infrastructure is disclosed that enables delivery of electronic subscriber identity modules (eSIMs) to secure elements (e.g., electronic Universal Integrated Circuit Cards (eUICCs), etc.) The network architecture includes one or more of: (i) eSIM appliances, (ii) secure eSIM storages, (hi) eSIM managers, (iv) eUICC appliances, (v) eUICC managers, (vi) service provider consoles, (vii) account managers, (viii) Mobile Network Operator (MNO) systems, (ix) eUICCs that are local to one or more devices, and (x) depots. Moreover, each depot may include: (xi) eSIM inventory managers, (xii) system directory services, (xiii) communications managers, and/or (xiv) pending eSIM storages. Functions of the disclosed infrastructure can be flexibly partitioned and/or adapted such that individual parties can host portions of the infrastructure. Exemplary embodiments of the present invention can provide redundancy, thus ensuring maximal uptime for the overall network (or the portion thereof).
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
Registering a client computing device (110) for online communication sessions. A registration server (140) receives a message (3) that has a push token that is unique to the client computing device and a phone number of the client computing device from an SMS (Short Message Service) transit device (130), which received an SMS message (1) having the push token from the client computing device (110) and determined the phone number of the client computing device from that SMS message. The registration server (140) associates the push token and the phone number and stores it in a registration data store (150), which is used for inviting users for online communication sessions.
Abstract:
Methods and apparatus for large scale distribution of electronic access control clients, in one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal integrated Circuit Card (eUlCC) and client eUiCC software comprise a so-called "stack" of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eS!Ms).
Abstract:
A method performed by a mobile device to register for cellular data connection service provided by a mobile telecommunications service provider. The mobile device determines that it does not have a valid cellular data connection subscription with the mobile telecommunications service provider. Responsive to that determination, the mobile device connects to a cellular data connection service registration site to allow a user of the mobile device to register for data connection service provided by the mobile telecommunications service provider. The mobile device is limited to accessing the data connection service registration site until the user registers for data connection service.
Abstract:
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can establish a pairing, the existence of which can be verified at a later time and used to create a secure communication session. The accessory can provide an accessory definition record that defines the accessory as a collection of services, each service having one or more characteristics. Within a secure communication session, the controller can interrogate the characteristics to determine accessory state and/or modify the characteristics to instruct the accessory to change its state.
Abstract:
A method performed by a provisioning server, the method including receiving registration data from a client station, transmitting activation data to a telephony service provider, the activation data generated as a function of the registration data, the activation data being used to generate telephony data for the user, the telephony data including access data to utilize a telephony network of the telephony service provider and transmitting the telephony data to the client station, wherein select portions of the telephony data and select portions of the activation data verify the client station as an authenticated device to utilize the telephony network.
Abstract:
Apparatus and methods for maintaining hardware history profiles for a software-based emulator. In one embodiment, the disclosed software-based emulator monitors the history of the actual hardware device in a secondary device history, the history of the emulated hardware is presented within a primary device history. However, the primary device history is linked to the secondary device history, and receives the device wear history therefrom. In another aspect of the present invention, wear-leveling strategies are disclosed for handling various update sizes. Unlike existing solutions which are optimized for a single SIM that receives small data updates; various embodiments of the present invention are suitable for handling varying data sizes.
Abstract:
According to one aspect, a multifunctional computing device having a wireless communications processor (e.g., cellular processor) and an application processor (e.g., general-purpose processor such as a CPU) share a storage device that is associated with or attached to the application processor. An example of such a multifunctional computing device may be a Smartphone device having a cellular phone and handheld computer functionalities. There is no specific storage device directly associated with or attached to the wireless communications processor (hereinafter simply referred to as a wireless processor). Instead, the wireless processor communicates with the application processor via a high speed communications link, such as a USB link, to access code and data stored in the storage device (e.g., flash memory device) associated with the application processor.