摘要:
A method and apparatus for modular authentication of a wireless communication device (120) including a portable communication device (210) and a wireless communication module (220) coupleable thereto is disclosed. When the wireless communication module (220) receives information (706) from the portable communication device (210), it determines whether the information received is authentic information (710) and operates together with the portable communication device (210) as a wireless communication device (120) in a communication system (100) in response to the information received being authentic information (720). In addition, a method and apparatus is disclosed for checking subsidy lock in a wireless communication device (120) capable of operating in a communication system (100), the wireless communication device comprising a first module (210), a second module (220) and a subscriber identity module (230) coupled to the first and second modules (210, 220). The first and second modules (210, 220) independently determine whether subsidy lock information stored in the subscriber identity module (230) corresponds to correct subsidy lock information (614, 618), and set a state of the wireless communication device (120) as operable in the communication system (100) in response to determining that the subsidy lock information stored in the subscriber identity module (230) corresponds to the correct subsidy lock information (614, 618).
摘要:
A method in a wireless communications device, including determining (410) whether the device is operating in a network other than a home network, for example, an H-PLMN, of the wireless communications device, determining (450) whether to search for the home network of the wireless communications device when not operating in the home network by comparing network record information associated with the network in which the mobile wireless communications device is operating to reference information. In some embodiments, the wireless communications device indicates (420) that it is operating in a network, e.g., a virtual home network, other than the network, e.g., a roaming network, in which it is operating based on the network record information.
摘要:
A method in a communication device (106) comprises registering (202) on a first network (102), identified by a first network ID, stored in the communication device. Then receiving, from the service provider, an acting network ID which identifies a second network (104). Storing the acting network ID on the communication device and reprioritizing the second network, identified by the received acting network ID, as the home network. The communication device then registers on the second network in response to the reprioritizing the second network.
摘要:
A method, telecommunication apparatus, and electronic device for securely using a subscriber identity module are disclosed. A secure memory 308 may store a secure international mobile subscriber identity. A subscriber identity module interface 312 may receive an unlocking international mobile subscriber identity. A processor 304 may erase a cache temporary mobile subscriber identity if the unlocking international mobile subscriber identity does not match the secure international mobile subscriber identity.
摘要:
A method (300, 400) to provide for provisioning and a product. In one embodiment a processor (210) receives a pre-configured data image and writes it to a first area (221) of non-volatile memory (220) using, for example a first writing mode. Thereafter, for example after a power cycle the processor (210) determines whether an update to a second area of the non-volatile memory is required, and if so converts a first data item from the first area into a second data item uniquely associated with the product unit and writes the second data item in a second area (222) using a second writing mode.
摘要:
A method, telecommunication apparatus, and electronic device for securely creating an identity data block are disclosed. A secure memory 208 may store a unique private key 326 associated with a unique public key 328. A processor 204 may generate the identity data block 332 in the secure memory 208 using the unique private key 326. The processor 204 may erase the unique private key 326 from the secure memory 208.
摘要:
A method, telecommunication apparatus, and electronic device for securely creating an identity data block are disclosed. A secure memory 208 may store a unique private key 326 associated with a unique public key 328. A processor 204 may generate the identity data block 332 in the secure memory 208 using the unique private key 326. The processor 204 may erase the unique private key 326 from the secure memory 208.
摘要:
A method, telecommunication apparatus, and electronic device for securely using a subscriber identity module are disclosed. A secure memory 308 may store a secure international mobile subscriber identity. A subscriber identity module interface 312 may receive an unlocking international mobile subscriber identity. A processor 304 may erase a cache temporary mobile subscriber identity if the unlocking international mobile subscriber identity does not match the secure international mobile subscriber identity.
摘要:
A method and system for restricting at least partial usage of a wireless communication device 300, like a mobile telephone, includes a comparison of identification information 308 read from a user configuration module 307 with one or more restricted access identification codes. Where there is a match, some or all usage of the wireless communication 300 device is restricted. A usage restriction module 309 then compares the identification information 308 with one or more restricted access identification codes, which identify one or more networks associated with service providers with which usage of the wireless communication device is restricted. Where there is a match, at least partial use of the wireless communication device 300 is restricted.
摘要:
Techniques are provided for preventing replacement of a one-time-programmable (OTP) component. The OTP component can be part of a wireless device. The wireless device is configured such that programming of a new IMEI code into the OTP component is permitted only when the wireless device is in a secure-mode state. A challenge-response protocol is used to place the wireless device in this secure-mode state.