Migration of credentials and/or domains between trusted hardware subscription modules

A certificate and destination technology, applied in the direction of electrical components, wireless communication, security devices, etc., can solve problems such as restrictions

Inactive Publication Date: 2013-05-01
INTERDIGITAL PATENT HLDG INC
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This limits the application of scaling security concepts for advan

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Migration of credentials and/or domains between trusted hardware subscription modules
  • Migration of credentials and/or domains between trusted hardware subscription modules
  • Migration of credentials and/or domains between trusted hardware subscription modules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] figure 1 -9 may relate to example embodiments in which the disclosed systems, methods and means may be implemented. However, while the present invention may be described in conjunction with example embodiments, it is not limited thereto and it should be understood that other embodiments may be used, or that modifications and additions may be made to the described embodiments to achieve the same functionality of the present invention, without out of the invention. Furthermore, the figures may illustrate call flows, which are intended to be examples. It should be understood that other embodiments may be used. Additionally, the order of the flows may be changed as appropriate. Also, the flow can be omitted if not needed, and additional flow can be added.

[0023] Systems, methods, and means are disclosed that allow users to migrate certificates from one domain to another. This migration can occur in a system that includes one or more devices with one or more separate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems, methods, and instrumentalities are disclosed that allow a user to initiate migration of a credential from one domain to another domain. A request to initiate a migration of credentials from a first domain to a second domain may be initiated by a user (1a.). A remote owner may receive a message indicating that the migration has been requested. The message received by the remote owner may be an indication that the source and destination devices have performed internal checks and determined that a migration could proceed. The remote owner may evaluate source information received from the source device and destination information received from the destination device (6), (6a.), (6b.). Based on the evaluation of the source information and the destination information, the remote owner may determine that the migration is acceptable. The remote owner may send an indication to proceed with the migration (7), (7a.)

Description

[0001] Cross References to Related Applications [0002] This application is based upon and claims the benefit of US Provisional Patent Application No. 61 / 309,569, filed March 2, 2010, the entire disclosure of which is hereby incorporated by reference. Background technique [0003] In the mobile communications industry today, a wireless device that a user can use to subscribe to a particular network operator's services typically includes a Subscriber Identity Module (SIM) or Universal Integrated Circuit Card (UICC). The SIM / UICC provides a secure execution and storage environment to the wireless device from which authentication algorithms and storage are executed to enable the device to authenticate to the network operator the subscription of the device user with the network operator and to allow the network operator to have certain rights to the device. Form a certificate of control (ie ownership). Unfortunately, this SIM / UICC mechanism is typically limited to use with a sin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W8/20H04W12/08
CPCH04W8/205H04W12/08H04L63/20H04L63/102H04W12/086
Inventor L·古乔内I·查A·施米特A·莱切尔
Owner INTERDIGITAL PATENT HLDG INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products