System and method of performing integrated mobile number portability and remote SIM provisioning

    公开(公告)号:US11070969B2

    公开(公告)日:2021-07-20

    申请号:US16646971

    申请日:2018-09-12

    Abstract: The present invention discloses a system and method of preforming integrated mobile number portability (MNP) and remote SIM provisioning (RSP). The method includes: receiving, by a recipient BSS, a subscription request comprising an MNP request indicator from a user equipment; requesting, by the recipient BSS, the subscription request to a recipient Subscription Manager-Data Preparation (SM-DP) to initiate the RSP, creating, by the recipient SM-DP, a recipient MNO profile comprising a recipient MSISDN upon confirmation receipt of the Download Order by the recipient BSS, registering, by the recipient SM-DP, an MNP event in a Subscription Manager-discovery Server (SM-DS) to initiate the MNP, retrieving, by the UE, RSP event details from the SM-DS to execute profile download, and executing, by the UE, the MNP event and the RSP by transferring an eUICC functioning from a donor MNO profile to the recipient MNO profile at porting date and time.

    Method of securing unicast message communication in 3GPP based wireless networks

    公开(公告)号:US11032869B2

    公开(公告)日:2021-06-08

    申请号:US16742123

    申请日:2020-01-14

    Abstract: The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE). A method for securing unicast message communication is provided. The method includes sending, by a user equipment (UE), a request-message for resuming radio resource control (RRC) connection to a base station, wherein the request message comprises a first-parameter defining “resume cause”. A response pertaining to at least one of network-release or network-resumption is received by the UE, wherein the response comprises a second parameter defining “resume cause”. Based on a successful-mapping between the first parameter and the second parameter, the response is acknowledged by the UE. However, for example, in case of network-rejection of the request due to network congestion, an RRC reject message comprising a first message authentication code is computed by the base station based on a stored network security context and communicated to the UE. Thereafter, a second message authentication code is mapped by the UE with the first message authentication code.

    Method of secured transmission and reception of discovery message in a D2D communication system

    公开(公告)号:US10728758B2

    公开(公告)日:2020-07-28

    申请号:US15540714

    申请日:2016-01-18

    Abstract: The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE). The various embodiments of the present invention disclose a method of secured transmission and reception of discovery message in device to device (D2D) communication system. According to one embodiment, a transmitting user equipment (UE) receives a ProSe group key (PGK) from a Prose function to perform a D2D communication in a D2D public safety group. The transmitting UE then derives a ProSe traffic key (PTK) using the PGK for transmitting data packets in the D2D communication. Using the PTK, the transmitting UE further derives a Prose integrity protection key (PIK) for securing a discovery message to discover one or more receiving UEs. The transmitting UE transmits the integrity protected discovery message using the derived PIK to the receiving UE. In turn, the receiving UE transmits a response message in a secure manner by deriving a PIK using PGK configured for the receiving UE. The various embodiments of the present invention disclose a method of a terminal. According to one embodiment, the method comprises of deriving a first traffic key and a second traffic key based on a group key, deriving a first security key for securing a discovery message based on the first traffic key and a second security key for securing data packets based on the second traffic key, and transmitting the discovery message generated based on the first security key.

    Automatic self-activation of universal integrated circuit card

    公开(公告)号:US10708768B2

    公开(公告)日:2020-07-07

    申请号:US16464971

    申请日:2017-12-01

    Abstract: Accordingly, embodiments herein provide a method for self-activation of universal integrated circuit card (UICC) in a mobile device. The method includes receiving, by a UICC-activation application installed at the mobile device an input data from a user of the mobile device, wherein the UICC-activation application is associated with an operator of the UICC. The method also includes determining, by the UICC-activation application at the mobile device, whether an electronic-Know Your Customer (e-KYC) procedure needs to be initiated for obtaining a subscription to the UICC in the mobile device based on the input data. Furthermore, the method includes initiating, by the UICC-activation application at the mobile device, the e-KYC procedure with at least one operator server based on the input data and automatically activating the subscription in the UICC of the mobile device based on the e-KYC procedure.

    Method and system for charging information recording in device to device (D2D) communication

    公开(公告)号:US10694046B2

    公开(公告)日:2020-06-23

    申请号:US16252395

    申请日:2019-01-18

    Abstract: Embodiments herein provide a method and system of reporting a charging information for a Device-to-Device (D2D) communication established using a wireless network. The method includes recording by a first electronic device the charging information associated with a D2D communication session. The D2D communication session is established between the first electronic device and a second electronic device. Further, the method includes determining by the first electronic device whether the charging information meets charging criteria during the D2D communication session. The charging criteria are generated by a network node in a secure environment of the first electronic device. Further, the method includes reporting the charging information to the network node in the wireless network in response to determining that the charging information meets the charging criteria.

Patent Agency Ranking