Patent application number | Description | Published |
20130329586 | IMPROVING RECEPTION BY A WIRELESS COMMUNICATION DEVICE - A method for improving reception by a wireless communication device is provided. The method can include a wireless communication device using a first RF chain to support a connection to a network via a first frequency band. The method can further include the wireless communication device tuning a second RF chain, which is not being actively used for carrier aggregation, to a second frequency band. The method can additionally include the wireless communication device measuring, via the second RF chain, a signal characteristic of the second frequency band. The method can also include the wireless communication device adjusting a configuration of the first RF chain based at least in part on the measured signal characteristic. | 12-12-2013 |
20130331077 | RF CHAIN MANAGEMENT IN A CARRIER AGGREGATION CAPABLE WIRELESS COMMUNICATION DEVICE - A method for managing radio frequency (RF) chains in a carrier aggregation capable wireless communication device is provided. The method can include a wireless communication device using a first RF chain associated with a first component carrier and a second RF chain associated with a second component carrier to support a connection to a network. The method can further include the wireless communication device formatting a deactivation message configured to trigger deactivation of the second component carrier. The method can additionally include the wireless communication device sending the deactivation message to the network to trigger deactivation of the second component carrier. The method can also include the wireless communication device discontinuing usage of the second RF chain to support the connection to the network via the second component carrier after sending the deactivation message. | 12-12-2013 |
20140143826 | POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL - A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities. | 05-22-2014 |
20150222635 | APPARATUS AND METHODS FOR CONTROLLED SWITCHING OF ELECTRONIC ACCESS CLIENTS WITHOUT REQUIRING NETWORK ACCESS - Methods and apparatuses for providing controlled switching of electronic access control clients without requiring network access are set forth herein. In one embodiment, a method for swapping of subscriptions and/or profiles for electronic Subscriber Identity Modules (eSIMs) without network supervision that prevents possibly malicious high frequency switching is disclosed. The disclosed embodiments offer reasonable management capabilities for network operators, without compromising the flexibility of eSIM operation. | 08-06-2015 |
20150289129 | TAMPER PREVENTION FOR ELECTRONIC SUBSCRIBER IDENTITY MODULE (eSIM) TYPE PARAMETERS - Disclosed herein are various techniques for preventing or at least partially securing parameters—e.g., Type parameters—of electronic Subscriber Identity Modules (eSIMs) stored within an embedded Universal Integrated Circuit Card (eUICC) from being inappropriately modified by mobile network operators (MNOs). One embodiment sets forth a technique that involves modifying file access properties of the Type parameters of eSIMs to make the Type parameters readable, but not updatable by the MNOs. Another embodiment sets forth a technique that involves implementing eSIM logical containers that separate the Type parameters from the eSIM data within the eUICC, such that the Type parameters are inaccessible to the MNOs. Yet another embodiment sets forth a technique that involves implementing an Operating System (OS)-based registry that is inaccessible to the MNOs and manages Type parameters for the eSIMs that are stored by the eUICC. | 10-08-2015 |
20150289137 | APPARATUS AND METHODS FOR CONTROLLED SWITCHING OF ELECTRONIC ACCESS CLIENTS WITHOUT REQUIRING NETWORK ACCESS - Methods and apparatuses for providing controlled switching of electronic access control clients (e.g., electronic Subscriber Identity Modules (eSIMs)) without requiring network access are set forth herein. In one embodiment, a method for swapping of subscriptions and/or profiles for without network supervision that prevents possibly malicious high frequency switching is disclosed. For example, a secure element included in a mobile device can be configured to issue, to a security module included in the mobile device, a request for the security module to carry out an authentication of a user of the mobile device. Upon determining, based on results received from the security module, that the authentication is successful, the secure element can generate one or more credits in accordance with the results, where each credit of the one or more credits can be used to carry out an eSIM management operation within the secure element. | 10-08-2015 |
20150341791 | ELECTRONIC SUBSCRIBER IDENTITY MODULE PROVISIONING - A method for preparing an eSIM for provisioning is provided. The method can include a provisioning server encrypting the eSIM with a symmetric key. The method can further include the provisioning server, after determining a target eUICC to which the eSIM is to be provisioned, encrypting the symmetric key with a key encryption key derived based at least in part on a private key associated with the provisioning server and a public key associated with the target eUICC. The method can additionally include the provisioning server formatting an eSIM package including the encrypted eSIM, the encrypted symmetric key, and a public key corresponding to the private key associated with the provisioning server. The method can also include the provisioning server sending the eSIM package to the target eUICC. | 11-26-2015 |
20150347786 | SECURE STORAGE OF AN ELECTRONIC SUBSCRIBER IDENTITY MODULE ON A WIRELESS COMMUNICATION DEVICE - A method for secure storage of an embedded Subscriber Identity Module (eSIM) on a wireless communication device including an embedded Universal Integrated Circuit Card (eUICC) and a memory external to the eUICC is provided. The method can include the eUICC determining that an eSIM package including an eSIM is to be stored on the memory. The method can also include the eUICC, in response to determining that the eSIM package is to be stored on the memory, maintaining a single-use session parameter associated with the eSIM package to enable installation of the eSIM on the eUICC if the eSIM package is later loaded onto the eUICC from the memory. | 12-03-2015 |
20150350879 | ELECTRONIC SUBSCRIBER IDENTITY MODULE APPLICATION IDENTIFIER HANDLING - Embodiments are described for identifying and accessing an electronic subscriber identity module (eSIM) and associated content of the eSIM in a multiple eSIM configuration. An embedded Universal Integrated Circuit Card (eUICC) can include multiple eSIMs, where each eSIM can include its own file structures and applications. Some embodiments include a processor of a mobile device transmitting a special command to the eUICC, including an identification that uniquely identifies an eSIM in the eUICC. After selecting the eSIM, the processor can access file structures and applications of the selected eSIM. The processor can then use existing commands to access content in the selected eSIM. The special command can direct the eUICC to activate or deactivate content associated with the selected eSIM. Other embodiments include an eUICC platform operating system interacting with eSIMs associated with logical channels to facilitate identification and access to file structures and applications of the eSIMs. | 12-03-2015 |