Check patentability & draft patents in minutes with Patsnap Eureka AI!

Methods and apparatus for managing data within a secure element

A technology of secure elements and data components, applied in the field of communication systems, can solve the problems of users spending time, not being able to access two SIM cards at the same time, etc.

Active Publication Date: 2015-07-08
APPLE INC
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, dual-SIM phones do not address the fundamental physical limitations of SIM-card devices
For example, information stored on one SIM card cannot be easily merged with information stored on another SIM card
Existing dual SIM devices cannot access the content of both SIM cards at the same time
Finally, accessing the SIM requires a perceptible and non-trivial amount of time for the user; switching between SIMs to transfer information is undesirable and degrades the user experience, and this limitation is present in both traditional and dual-SIM devices. Among those

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and apparatus for managing data within a secure element
  • Methods and apparatus for managing data within a secure element
  • Methods and apparatus for managing data within a secure element

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Referring now to the drawings, wherein like numerals refer to like parts throughout.

[0030] In particular, the present invention provides methods and apparatus for managing and sharing data across multiple user access control clients in a device. In one embodiment, an embedded universal integrated circuit card (eUICC), secure element, or UICC containing a logical entity (e.g., advanced subscriber identity kit) manages data stored across multiple electronic subscriber identity modules (eSIMs) and provides access to permission to access this data. For example, data may consist of User Defined Data (UDD) (eg, user configured settings and data such as phonebook contacts, eSIM usage preferences, etc.), operator specific data, calibration data, etc. The Advanced Subscriber Identity Toolkit provides a secondary permission interface that enables faster access to data stored within the eSIM without compromising the integrity of the eSIM security.

[0031] Other aspects of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Apparatus and methods for managing and sharing data across multiple access control clients in devices are disclosed herein. In one embodiment, the access control clients comprise electronic Subscriber Identity Modules (eSIMs) disposed on an embedded Universal Integrated Circuit Card (eUICC). Each eSIM contains its own data. An Advanced Subscriber Identity Toolkit application maintained within the eUICC facilitates managing and sharing multiple eSIMs' data for various purposes such as sharing phonebook contacts or facilitating automatic switch-over between the multiple eSIMs (such as based on user context).

Description

technical field [0001] The present invention relates generally to the field of communication systems, and more particularly, in one exemplary aspect, to facilitating sharing data among multiple user access clients of one or more mobile devices. Background technique [0002] Access control is required in most prior art radio communication systems for secure communication. For example, a simple access control scheme might include: (i) verifying the identity of communicating parties; and (ii) granting a level of access commensurate with the authenticated identity. In the context of an exemplary cellular system such as the Universal Mobile Telecommunications System (UMTS), access control is governed by an access control client known as a Universal Subscriber Identity Module (USIM), which resides on a physical Universal Integrated Circuit Card (UICC) (also known as "SIM card"). The USIM Access Control Client authenticates users of the UMTS cellular network. After successful au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W88/02
CPCH04W8/183H04W12/08H04W12/086H04W12/45
Inventor 李莉B-H·胡昂A·G·马蒂亚斯J·V·豪克
Owner APPLE INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More