-
公开(公告)号:US11129014B2
公开(公告)日:2021-09-21
申请号:US16808012
申请日:2020-03-03
Applicant: Apple Inc.
Inventor: Li Li , Najeeb M. Abdulrahiman , Arun G. Mathias
Abstract: The described embodiments set forth techniques for managing inactive (disabled) electronic subscriber identity modules (eSIMs) on secure elements, e.g., Universal Integrated Circuit Cards (UICCs) and/or embedded UICCs (eUICCs), of a wireless device, including retrieving information from an inactive eSIM, obtaining authentication tokens from an inactive eSIM, authenticating the inactive eSIM with a network-based Mobile Network Operator (MNO) server, retrieving status information for a subscription account associated with the inactive eSIM, and/or performing an account management operation on the inactive eSIM.
-
公开(公告)号:US10917790B2
公开(公告)日:2021-02-09
申请号:US15996324
申请日:2018-06-01
Applicant: Apple Inc.
Inventor: Li Li , Arun G. Mathias , Gokul P. Thirumalai , Najeeb M. Abdulrahiman , Francisco J. Gonzalez , Jonathon Sodos
Abstract: Disclosed herein are techniques for enabling a user to activate a new device with a Mobile Network Operator (MNO) without requiring the user to provide MNO authentication credentials that are easily forgotten. The user activates the new device using credentials from an existing device (associated with the user) that is trusted by the MNO and also using a trust score provided by a third-party server that has knowledge of associations between the user and the existing device. The new device can be a supplemental device, such as a wearable device to a cellular phone, where both devices remain capable of accessing services provided by the MNO after the new device is activated with the MNO. The new device can also be a replacement device, such as a new phone, tablet, or wearable device, where the new device supplants access to services provided by the MNO for an existing device.
-
公开(公告)号:US10574465B2
公开(公告)日:2020-02-25
申请号:US15598232
申请日:2017-05-17
Applicant: Apple Inc.
Inventor: Li Li , Clark P. Mueller , Avinash Narasimhan , Arun G. Mathias , David T. Haggerty , Najeeb M. Abdulrahiman , Jean-Marc Padova
Abstract: Embodiments provided herein determine if an electronic subscriber identity module (eSIM) associated with a requested service can be installed in a secure element (SE) housed in a wireless device. Before requesting deployment of an eSIM suitable for the requested service from an eSIM delivery server, a carrier server asks that an original equipment manufacturer (OEM) server validate that an eSIM corresponding to a customer request should be deployed. The OEM server obtains information about the wireless device and information about the SE. When the carrier server requests validation, the OEM server evaluates the wireless device information and/or the SE information. If the OEM server indicates that deployment of the eSIM should proceed, the OEM server also indicates the eSIM type that is compatible with the wireless device and with the SE housed in the device.
-
公开(公告)号:US10462109B2
公开(公告)日:2019-10-29
申请号:US15274388
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Arun G. Mathias , Thomas A. Dilligan , Matthew C. Lucas , Anush G. Nadathur , Kevin P. McLaughlin
Abstract: A data transfer process can include multiple verification features usable by a “source” device to ensure that a “destination” device is authorized to receive a requested data object. The source device and destination device can communicate via a first communication channel (which can be on a wide-area network) to exchange public keys, then use the public keys to verify their identities and establish a secure session on a second communication channel (which can be a local channel). The data object can be transferred via the secure session. Prior to sending the data object, the source device can perform secondary verification operations (in addition to the key exchange) to confirm the identity of the second device and/or the locality of the connection on the second communication channel.
-
公开(公告)号:US10437202B2
公开(公告)日:2019-10-08
申请号:US14856228
申请日:2015-09-16
Applicant: Apple Inc.
Inventor: Lukas M. Marti , Robert W. Mayor , Arun G. Mathias , Ronald Keryuan Huang
Abstract: An automated environment can include an accessory device that operates according to an automation rule, to take a prescribed action when a triggering condition occurs. A controller device for the automated environment can determine a user's regular routine and can detect when the user is deviating from the regular routine. The controller device can communicate with accessory devices in the automated environment to modify their behavior relative to the automation rules.
-
公开(公告)号:US10416625B2
公开(公告)日:2019-09-17
申请号:US14856265
申请日:2015-09-16
Applicant: Apple Inc.
Inventor: Lukas M. Marti , Kevin P. McLaughlin , Arun G. Mathias , Ronald Keryuan Huang
Abstract: Automated behaviors in an environment can be implemented based on aggregation of individual user routines. For example, mobile devices used by users in the environment can provide information about the users' behavior patterns to a coordinator device that can be located in the environment. The coordinator device can analyze the information to detect an aggregate pattern that involves multiple mobile devices and/or multiple users. Based on a detected aggregate patterns, the coordinator can identify behaviors to automate.
-
公开(公告)号:US10416205B2
公开(公告)日:2019-09-17
申请号:US14856239
申请日:2015-09-16
Applicant: Apple Inc.
Inventor: Lukas M. Marti , Ronald Keryuan Huang , Arun G. Mathias , Kevin P. McLaughlin
IPC: G01R21/133
Abstract: An automated environment can monitor its resource consumption at the environment level and detect anomalies. Resource consumption can be monitored using a sparse set of sensors that provide information about the total resource consumption of the automated environment. The sensor data can be analyzed together with information about a behavioral routine of users in the automated environment to define a baseline resource consumption pattern. Once a baseline resource consumption pattern is established, anomalies in resource consumption can be detected and reported to users.
-
公开(公告)号:US10397770B2
公开(公告)日:2019-08-27
申请号:US14499002
申请日:2014-09-26
Applicant: Apple Inc.
Inventor: Li Li , Arun G. Mathias
Abstract: Disclosed herein is a technique for mitigating paging collisions in mobile devices. When a new electronic Subscriber Identity Module (eSIM) is to be provisioned on a mobile device, International Mobile Subscriber Identity (IMSI) information associated with each of the SIMs/eSIMs currently installed on the mobile device is obtained and provided to a provisioning server. In turn, the provisioning server utilizes the IMSI information to select a new eSIM associated with an IMSI that is unlikely to result in a paging collision when operated alongside the SIMs/eSIMs installed on the mobile device. The provisioning server provides the new eSIM to the mobile device, whereupon the mobile device installs the eSIM into the embedded Universal Integrated Circuit Card (eUICC) for operation.
-
公开(公告)号:US10356614B2
公开(公告)日:2019-07-16
申请号:US15356398
申请日:2016-11-18
Applicant: Apple Inc.
Inventor: Li Li , Arun G. Mathias
Abstract: A secure element uses a backup context to restore a deleted electronic Subscriber Identity Module (eSIM) without compromising a trust relationship with a mobile network operator (MNO). A backup copy of a data binary large object (data blob) originally used to instantiate the eSIM is retrieved. The secure element determines if the eSIM within the data blob is uniquely associated with the secure element from a previous installation. The secure element examines the data blob to determine an identifier unique to the eSIM. The identifier can be an integrated circuit card identifier (ICC-ID) or a profile identifier. The secure element searches a table of instantiated eSIMs in the secure memory. If the secure element is able to match the recovered eSIM identifier with an entry in the table, then the secure element installs this eSIM in the secure element.
-
公开(公告)号:US10270812B2
公开(公告)日:2019-04-23
申请号:US15609999
申请日:2017-05-31
Applicant: Apple Inc.
Inventor: Prashant H. Vashi , Najeeb M. Abdulrahiman , Rohan C. Malthankar , Arun G. Mathias , Vikram Bhaskara Yerrabommanahalli
Abstract: Methods and apparatus to manage registration for cellular services of a secondary wireless device associated with a primary wireless device are disclosed. The secondary wireless device can detect entering proximity to the primary wireless device and in response to the detecting deactivate a cellular wireless interface of the secondary wireless device to conserve battery power, and provide an indication to the primary wireless device, via a non-cellular wireless interface, to cause the primary wireless device to perform a deregistration of the secondary wireless device for cellular services. The secondary wireless device can establish connections and communicate via non-cellular wireless interfaces while within proximity of the primary wireless device. Upon leaving proximity of the primary wireless device, the secondary wireless device can activate the cellular wireless interface and register for cellular services to permit establishing connections and communicating directly with a cellular wireless network via the cellular wireless interface.
-
-
-
-
-
-
-
-
-