Abstract:
Embodiments provided herein determine if an electronic subscriber identity module (eSIM) associated with a requested service can be installed in a secure element (SE) housed in a wireless device. Before requesting deployment of an eSIM suitable for the requested service from an eSIM delivery server, a carrier server asks that an original equipment manufacturer (OEM) server validate that an eSIM corresponding to a customer request should be deployed. The OEM server obtains information about the wireless device and information about the SE. When the carrier server requests validation, the OEM server evaluates the wireless device information and/or the SE information. If the OEM server indicates that deployment of the eSIM should proceed, the OEM server also indicates the eSIM type that is compatible with the wireless device and with the SE housed in the device.
Abstract:
A method is performed by a set of one or more servers and includes receiving, from a first user equipment (UE) to be activated with a cellular carrier for a user, and at the set of one or more servers, information identifying a second UE of the user and authentication information for authenticating the user with the cellular carrier. The method further includes authenticating the user using the authentication information; transmitting a password to the second UE at least partly in response to authenticating the user; receiving, from the first UE and at the set of one or more servers, the password; validating the password received from the first UE; and initiating a transfer of an embedded subscriber identity module (eSIM) subscription, from the second UE to the first UE, at least partly in response to validating the password.
Abstract:
Methods, devices, and servers for as-needed update of a trusted list are provided herein. An electronic subscriber identity module (eSIM) server receives a request for an eSIM of a particular type from a wireless device. The eSIM server evaluates the particular type and requests an eSIM of the particular type from a second eSIM server, which is not initially trusted by a secure element (SE) of the wireless device. The eSIM server sends a policy update to the wireless device. The wireless device passes the policy update to the SE, for example, a universal integrated circuit card (UICC). The UICC updates the trusted list with an identity of the second eSIM server. When the wireless device downloads a bound profile package (BPP) containing an eSIM from the second eSIM server, the UICC validates the BPP based on the updated trusted list. The eSIM is then installed on the UICC.
Abstract:
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs).
Abstract:
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs).
Abstract:
A baseband processor includes a memory and is configured to transmit, to a cellular carrier, a request to activate the UE with the cellular carrier. The baseband processor is also configured to, in response to receiving an authentication request for authenticating a user of the UE, transmit, to the cellular carrier, information identifying another UE and authentication information for authenticating the user; obtain verification information transmitted to the other UE; transmit the verification information to the cellular carrier; and after transmitting the verification information to the cellular carrier, receive an embedded subscriber identity module (eSIM) subscription transferred from the other UE.
Abstract:
A method is performed by a set of one or more servers and includes receiving, from a first user equipment (UE) to be activated with a cellular carrier for a user, and at the set of one or more servers, information identifying a second UE of the user and authentication information for authenticating the user with the cellular carrier. The method further includes authenticating the user using the authentication information; transmitting a password to the second UE at least partly in response to authenticating the user; receiving, from the first UE and at the set of one or more servers, the password; validating the password received from the first UE; and initiating a transfer of an embedded subscriber identity module (eSIM) subscription, from the second UE to the first UE, at least partly in response to validating the password
Abstract:
This Application sets forth techniques for provisioning and activating electronic subscriber identity modules (eSIMs) for mobile wireless devices. An eSIM is reserved during a sales order process and later activated during device activation after receipt by a user. An option for eSIM installation in place of (or in addition to) physical SIM installation is provided when purchasing the mobile wireless device. The reserved eSIM can replace a previous SIM/eSIM or be a new eSIM. During device activation, installation and activation of the eSIM occurs. Activation of the eSIM can occur before or after deactivation of a transferred SIM/eSIM. The mobile wireless device accounts for propagation delay of eSIM activation through MNO servers by disabling and re-enabling the eSIM until initial attachment to an MNO cellular wireless network succeeds or a maximum number of retry attempts is reached.
Abstract:
Representative embodiments described herein set forth techniques for provisioning bootstrap electronic Subscriber Identity Modules (eSIMs) to mobile devices. According to some embodiments, a mobile device can be configured to issue, to an eSIM selection server, a bootstrap eSIM request that includes (i) metadata associated with the mobile device, and (ii) metadata associated with an electronic Universal Integrated Circuit Card (eUICC) included in the mobile device. In turn, the eSIM selection server selects and binds a particular bootstrap eSIM to the mobile device, and provides information to the mobile device that enables the mobile device to obtain the particular bootstrap eSIM from one or more eSIM servers. When the mobile device obtains the particular bootstrap eSIM, the mobile device can interface with a mobile network operator (MNO) and obtain a complete eSIM that enables the mobile device to access services provided by the MNO.
Abstract:
A user equipment (UE) is configured to transmit, to a cellular carrier, a request to activate the UE with the cellular carrier. The UE is also configured to, in response to receiving an authentication request for authenticating a user of the UE, transmit, to the cellular carrier, information identifying another UE and authentication information for authenticating the user ; prompt the user, via a display of the UE, to provide, to an input system of the UE, verification information transmitted to the other UE; transmit, to the cellular carrier, the verification information; and in response to validation of the verification information by the cellular carrier, receive an embedded subscriber identity module (eSIM) subscription transferred from the other UE.