Security Controls for Profile Policy Rules
A configuration file, policy technology, applied in security devices, computer security devices, electrical components, etc., can solve problems such as fraud
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] Representative applications of devices, systems and methods according to embodiments described herein are provided in this section. These examples are provided only to add context and facilitate understanding of the described embodiments. It will thus be apparent to those skilled in the art that the described embodiments of the invention may be practiced without some or all of these specific details. In other instances, well known process steps have not been described in detail in order to avoid unnecessarily obscuring the described embodiments of the invention. Other applications are also possible, such that the following examples should not be considered limiting.
[0028] profile policy
[0029] As mentioned above, in some cases the MNO establishes policies for determining the actions to be taken on the profile in response to the occurrence of a particular event. Policy principles are reflected in a set of rules governing the behavior of the SE (eg eUICC) and / or...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


