Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure soft sim credential transfer

A technology of software and certificates, applied in the direction of security devices, electrical components, network data management, etc., can solve problems such as surprisingly high costs

Inactive Publication Date: 2010-03-03
TELEFON AB LM ERICSSON (PUBL)
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] While SIM cards may be suitable for high-end or sophisticated mobile devices such as mobile phones, personal data assistants, etc., the costs associated with SIM cards may be prohibitively high for simple and / or low-cost mobile devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure soft sim credential transfer
  • Secure soft sim credential transfer
  • Secure soft sim credential transfer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] figure 1 An exemplary communication network 10 according to the present invention is shown. The communication network 10 includes two or more mobile devices, indicated generally by reference numeral 20 . Mobile devices 20 communicate with each other via communication channel 30 . The communication channel 30 may be established using any type of wired or wireless connection including local connections such as Bluetooth or USB connections as well as network based connections such as cellular or Internet connections.

[0012] The present invention securely transfers a Software SIM Credential (SSIM) from the SIM unit 22A in the transmitting mobile device 20A to the SIM unit 22B in the target mobile device 20B via the communication channel 30, while ensuring that at any given moment the mobile device Only one in 20 holds a valid and active SSIM. The SIM unit 22 contains protected memory in combination with a processor that provides a protected environment for executing so...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method and apparatus described herein transfers soft SIM credentials from a transferring mobile device to a target mobile device while ensuring that only one mobile device contains active soft SIMcredentials at a time. Broadly, a transferring mobile device securely transfers the soft SIM credentials to a target mobile device either directly or via a network server. Before the target mobile device receives or activates the soft SIM credentials, the transferring mobile device deactivates the soft SIM credentials to ensure that only one mobile device contains the active soft SIM credentials.

Description

Background technique [0001] The present invention relates generally to Subscriber Identity Modules (SIMs), and more particularly to secure delivery of Software SIMs (soft SIMs). [0002] Typically, wireless communication standards such as GSM and UMTS require mobile devices to contain a SIM on an integrated circuit card, referred to herein as a SIM card. The SIM card securely stores SIM subscription credentials (eg, corresponding to the mobile device user's service subscriber key) and performs security-sensitive tasks. SIM cards allow users to change mobile devices by removing the SIM card from one mobile device and inserting it into another mobile device. [0003] Currently, communication networks can update SIM cards using any of a number of different over-the-air techniques or protocols. For example, the communication network may contain or interface with a central database of backup personal information for multiple SIM cards. The network device may, upon request, trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/20G06F21/60G06F21/62H04W12/06
CPCH04W8/205H04W12/06H04W12/04H04W12/43H04W12/35
Inventor C·格尔曼
Owner TELEFON AB LM ERICSSON (PUBL)