摘要:
Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.
摘要:
A method for handling an ATTACH reject message with packet radio service mobility management reject cause number (#14 cause) at a user equipment (UE) is provided. The method includes receiving, at the UE, an ATTACH accept message for a network service on a public land mobile network (PLMN) from a first network entity, wherein the PLMN is in a “forbidden PLMNs for general packet radio service (GPRS) service” list, detecting, by the UE, that the UE's evolved universal terrestrial radio access (E-UTRA) capability is disabled, and enabling, by the UE, the UE's E-UTRA capability and removing the PLMN from the “forbidden PLMNs for GPRS service” list.
摘要:
A method of managing identities for use in a mobile telecommunications device in a telecommunications network has the following features. The identity management process is triggered and one or more parameters of a currently available mobile telecommunications network detected. An identity database is searched—each record in the identity database comprises an identity and additional identity information for each identity. The additional identity information includes the one or more parameters. The identity management process involves selecting an identity when a first record comprising the one or more parameters detected is found in said searching and modifying an active identity of the mobile telecommunications device to be the selected identity when the active identity is not already the selected identity. This process can be carried out by a subscriber information module of a mobile telecommunications device.
摘要:
A system for utilizing a SIM device for connecting and subscribing to a local network of local mobile server systems on an ad hoc basis is provided. The system includes a SIM device that has computer readable medium storing instructions that cause the SIM device to store credential data including an authentication key from the local mobile server systems on an ad hoc basis after the SIM device has left the manufacturer. A local network of a local mobile server systems allows a SIM device to connect and subscribe to the local network of local mobile service systems on an ad hoc basis. At the local network of local mobile service systems a subscription request is received and credential data from the local network to the SIM device is transmitted on an ad hoc basis after the SIM device has left the manufacturer.
摘要:
A mobile device includes multiple subscriber identification module (SIM) cards. When a user of the mobile device requests to call a phone number, the mobile device determines a mobile telecommunications service provider of the phone number, based on service provider information received for the phone number from a service mapping server. The mobile device selects for the call a SIM card from the multiple SIM cards that is associated with the determined service provider of the phone number. The mobile device places the call to the phone number using the selected SIM card.
摘要:
An approach is provided for improving reception availability for multi-subscriber identity module (SIM) devices. The approach involves determining network access information for one or more applications resident on a device having two or more subscriber identity modules, wherein the network access information specifies, at least in part, one or more network access schedules, which of the two or more subscriber identity modules to use for establishing one or more network connections for the one or more applications, or a combination thereof. The approach also involves processing and/or facilitating a processing of the network access information to determine a coordinated network access schedule for the one or more applications. The approach further involves determining to use the coordinated network access schedule in place of the one or more network schedules to cause, at least in part, an establishment of the one or more network connections.
摘要:
The invention provides for docking short-range wireless communication tags, which may be Radio Frequency Identification (RFID) or near Field Communication (NFC) smart cards, onto a mobile terminal having a corresponding short-range wireless communication reader device, such as an RFID reader or a NFC reader. Docking of the tag to the mobile terminal may take the form of attaching or otherwise affixing the tag to the mobile terminal via a tag holding mechanism, such that the reader device may periodically read the tag and also provide for interrogation and reading of other external short-range wireless communication tags and devices in the proximity of the mobile terminal when the reader device is not communicating with the docked tag.
摘要:
The invention provides for docking short-range wireless communication tags, such as Radio Frequency Identification (RFID) or near Field Communication (NFC) smart cards onto a mobile terminal having a corresponding short-range wireless communication reader device, such as an RFID reader or a NFC reader. Docking of the tag to the mobile terminal may take the form of attaching or otherwise affixing the tag to the mobile terminal via a tag holding mechanism, such that the reader device may periodically read the tag and also provide for interrogation and reading of other external short-range wireless communication tags and devices in the proximity of the mobile terminal when the reader device is not communicating with the docked tag
摘要:
The object of the invention is a method and arrangement including equipment, with which it is possible to add right of use into a SIM card located in a cellular terminal of a cellular network. According to the invention the addition is made with the aid of a prepayment terminal according to the invention, and the possessor of the terminal pays in a desired manner the provided addition of right of use to the legal person, who acts as the intermediary. The cellular network operator bills the legal person, who provided the addition, by an amount corresponding to the added right of use.
摘要:
A method for loading or reloading a SIM card (7) for a mobile device (6). The SIM card (7) has an electronic chip with a storage device (11). In the storage device (11) a monetary sum (28) is stored, and decreases as the mobile telephone is used. For loading or reloading the monetary sum, a prepayable value card (13) is purchased. The value card (13) has a code field (14) covered by a removable opaque layer (22). Upon removal of the layer (22), a code (15) becomes visible. The holder of the SIM card and the value card calls a service number using a communication apparatus (6, 8). The caller is thereby connected to a data base (17) in which all codes assigned to value cards (13) and the sum of money associated with each code are stored. The caller is prompted to enter the code (15) on the calling communication apparatus. The code (15) entered is compared with the codes stored in the data base (6, 8). If the entered code (15) is found in the data base, a short message containing the value of the monetary sum (28) to be loaded or reloaded is prepared and temporarily stored in a short message service center (18, 19). The monetary sum (28) and the code (15) are marked in the data base (17) as used or cancelled. The next time the SIM card (7) is inserted in any mobile telephone (6) and a connection is established with the communication network (9), the SIM card (7) to be loaded or reloaded is loaded or reloaded with the temporarily stored monetary amount (28) via of the prepared short message (20).