Abstract:
A method in a wireless communications device, including determining (410) whether the device is operating in a network other than a home network, for example, an H-PLMN, of the wireless communications device, determining (450) whether to search for the home network of the wireless communications device when not operating in the home network by comparing network record information associated with the network in which the mobile wireless communications device is operating to reference information. In some embodiments, the wireless communications device indicates (420) that it is operating in a network, e.g., a virtual home network, other than the network, e.g., a roaming network, in which it is operating based on the network record information.
Abstract:
A method in a wireless communications device, including determining (410) whether the device is operating in a network other than a home network, for example, an H-PLMN, of the wireless communications device, determining (450) whether to search for the home network of the wireless communications device when not operating in the home network by comparing network record information associated with the network in which the mobile wireless communications device is operating to reference information. In some embodiments, the wireless communications device indicates (420) that it is operating in a network, e.g., a virtual home network, other than the network, e.g., a roaming network, in which it is operating based on the network record information.
Abstract:
A method and apparatus for modular authentication of a wireless communication device (120) including a portable communication device (210) and a wireless communication module (220) coupleable thereto is disclosed. When the wireless communication module (220) receives information (706) from the portable communication device (210), it determines whether the information received is authentic information (710) and operates together with the portable communication device (210) as a wireless communication device (120) in a communication system (100) in response to the information received being authentic information (720). In addition, a method and apparatus is disclosed for checking subsidy lock in a wireless communication device (120) capable of operating in a communication system (100), the wireless communication device comprising a first module (210), a second module (220) and a subscriber identity module (230) coupled to the first and second modules (210, 220). The first and second modules (210, 220) independently determine whether subsidy lock information stored in the subscriber identity module (230) corresponds to correct subsidy lock information (614, 618), and set a state of the wireless communication device (120) as operable in the communication system (100) in response to determining that the subsidy lock information stored in the subscriber identity module (230) corresponds to the correct subsidy lock information (614, 618).
Abstract:
An encryption code and at least one key are provided to a secure transmission device, via an external keying device, and stored in a volatile memory. A user code, entered via a keypad by a user, is received by the secure transmission device. An encrypted representation of the at least one key, based on the encryption code and the at least one key, is generated and stored in a non-volatile memory. Also, an encrypted representation of the encryption code and the user code, based on the user code, are generated and stored in the non-volatile memory. Upon power down of the secure transmission device, the at least one key and encryption code stored in the volatile memory are erased.
Abstract:
A method and apparatus for modular authentication of a wireless communication device (120) including a portable communication device (210) and a wireless communication module (220) coupleable thereto is disclosed. When the wireless communication module (220) receives information (706) from the portable communication device (210), it determines whether the information received is authentic information (710) and operates together with the portable communication device (210) as a wireless communication device (120) in a communication system (100) in response to the information received being authentic information (720). In addition, a method and apparatus is disclosed for checking subsidy lock in a wireless communication device (120) capable of operating in a communication system (100), the wireless communication device comprising a first module (210), a second module (220) and a subscriber identity module (230) coupled to the first and second modules (210, 220). The first and second modules (210, 220) independently determine whether subsidy lock information stored in the subscriber identity module (230) corresponds to correct subsidy lock information (614, 618), and set a state of the wireless communication device (120) as operable in the communication system (100) in response to determining that the subsidy lock information stored in the subscriber identity module (230) corresponds to the correct subsidy lock information (614, 618).
Abstract:
An encryption code and at least one key are provided to a secure transmission device, via an external keying device (100) and stored in a first volatile memory (102). An encrypted representation of the at least one key, based on the encryption code and the at least one key, is generated and stored in a non-volatile memory (103). Upon power down of the secure transmission device, the encryption code is stored in a second volatile memory (106) and the at least one key and encryption code stored in the first volatile memory (102) are erased.