Unlock instant, AI-driven research and patent intelligence for your innovation.

Subscription management

A secure element and service provider technology, applied in the field of methods, secure elements and terminal equipment, can solve problems such as loss, complicated roaming, and insufficient network capacity

Active Publication Date: 2016-06-22
捷德移动安全有限责任公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, this solution has several disadvantages
On the one hand, the solution is complicated by roaming situations and / or simultaneous presence of mobile communication networks based on different technologies
Furthermore, according to this solution, the network operator usually loses the information needed for adjustments which may be necessary due to insufficient network capacity
For example, it is still unclear when and where network operators will run out of capacity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Subscription management
  • Subscription management
  • Subscription management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] figure 1 A mobile terminal device 100, a service provider 300, a mobile network operator 400, 400' and a subscription manager 200 are shown. As known in the prior art, these entities are arranged in and / or are interconnected via at least one network (not shown), eg a telecommunication network and / or an IP-based network.

[0043] The user can use the services of the service provider 300 by means of the mobile terminal 100 . The service provider 300 may provide, for example, music data or video data to be downloaded. This may require the user to install in the terminal device 100 and / or the secure element 10 a special application 20 associated with the service provider. Use of the service may also be limited to installing such applications 20 .

[0044] For example, a smartphone or a tablet computer can be used as terminal 100 . Terminal device 100 includes figure 1 A secure element 10 in the form of a TEE 14 (“Trusted Execution Environment”) is schematically shown i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security element (10) of a mobile device (100) comprises a service-provider network subscription (50) associated with a service provider (300). The security element (10) is arranged such that the service-provider subscription (50) is employable parallel to a user network subscription (40) installed on the security element (10). A service (200) associated with the service provider (300) thus becomes utilizable on the basis of the service-provider subscription (50), independently of a user subscription (40) that might be present on the same security element (10).

Description

technical field [0001] The invention relates to a method, a secure element and a terminal device which each support flexible subscription management. Background technique [0002] Users of mobile terminals, such as mobile radio terminals, smartphones, wearable devices or tablet computers, can access the data communication network of a particular network operator provided they have a user subscription for the network. [0003] For mobile terminals, the user subscription is typically implemented by an application installed on the secure element of the user's mobile terminal, the so-called user subscription application. The application has, for example, the task of securely storing and managing access data necessary for access to the data communication network of the network operator, such as access keys. For example, a (U)SIM mobile radio card can be provided as secure element. [0004] Within a communication system, the network is responsible for checking and controlling an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/18H04W4/60
CPCH04W8/18H04W8/20H04W12/04H04W4/60H04W8/183H04W12/45H04W12/35H04M2203/6063
Inventor F.高拉斯D.艾伯特L.奥斯特林
Owner 捷德移动安全有限责任公司