Abstract:
A method for switching a Universal Integrated Circuit Card (UICC) transmission protocol includes: setting an operational mode of the UICC to an ISO 7816-12 USB UICC transmission protocol mode (USB mode); and in response to a user input, enabling the UICC to fallback from the USB mode to an ISO 7816-3 T=0/T=1 transmission protocol mode (ISO mode).
Abstract translation:一种用于切换通用集成电路卡(UICC)传输协议的方法包括:将UICC的操作模式设置为ISO 7816-12 USB UICC传输协议模式(USB模式); 并且响应于用户输入,使UICC从USB模式回退到ISO 7816-3 T = 0 / T = 1传输协议模式(ISO模式)。
Abstract:
Methods, devices, systems, and non-transitory process-readable storage media for using secure elements to authenticate a data source device for providing reporting data to a recipient device via local point-to-point communications. An embodiment method includes operations performed by a secure processor of a recipient device that include generating a random token, a data encryption key, and a control register, encrypting the generated data using a shared encryption algorithm and a secret key associated with a unique identifier of the data source device, decrypting data re-encrypted by the data source device and sent within a response message using the shared encryption algorithm and the secret key, determining whether decrypted data matches the random token, and identifying the data source device is authenticated in response to determining that decrypted data matches the random token. The unique identifier and secret key may be pre-loaded on the recipient device.
Abstract:
A method, an apparatus, and a computer program product are provided. The apparatus may be a UE. The UE has a screen display. The UE displays a first image of a first application on the screen display. The UE receives a selection of a first area of the screen display. The UE retains a first image section of the first image displayed in the first area. The UE receives a second image of a second application. The UE displays the first image section on the screen display at a second area of the screen display. The UE displays the second image in areas of the screen display other than the second area.
Abstract:
Methods, devices, systems, and non-transitory process-readable storage media for using secure elements to authenticate a data source device for providing reporting data to a recipient device via local point-to-point communications. An embodiment method includes operations performed by a secure processor of a recipient device that include generating a random token, a data encryption key, and a control register, encrypting the generated data using a shared encryption algorithm and a secret key associated with a unique identifier of the data source device, decrypting data re-encrypted by the data source device and sent within a response message using the shared encryption algorithm and the secret key, determining whether decrypted data matches the random token, and identifying the data source device is authenticated in response to determining that decrypted data matches the random token. The unique identifier and secret key may be pre-loaded on the recipient device.
Abstract:
A method for multi-Subscriber Identity Module (SIM) operation on a mobile communication device includes: activating, in a first mobile communication device having a local SIM profile, a client module configured to obtain SIM profile information from a SIM profile of a second mobile communication device; sending a short range communication (SRC) signal to the second mobile communication device causing the second mobile communication device to activate a server module configured to share the SIM profile information of the SIM profile for the second mobile communication device with the first communication device; remotely accessing the shared SIM profile information of the shared SIM profile by the first mobile communication device; and operating the first mobile communication device in a multi-SIM mode using SIM profile information of the local SIM profile and the shared SIM profile information.