Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

340 results about "Universal Integrated Circuit Card" patented technology

The universal integrated circuit card (UICC) is the smart card used in mobile terminals in GSM and UMTS networks. The UICC ensures the integrity and security of all kinds of personal data, and it typically holds a few hundred kilobytes.

Electronic access client distribution apparatus and methods

Apparatus and methods for distributing access control clients. In one exemplary embodiment, a network infrastructure is disclosed that enables delivery of electronic subscriber identity modules (eSIMs) to secure elements (e.g., electronic Universal Integrated Circuit Cards (eUICCs), etc.) The network architecture includes one or more of: (i) eSIM appliances, (ii) secure eSIM storages, (iii) eSIM managers, (iv) eUICC appliances, (v) eUICC managers, (vi) service provider consoles, (vii) account managers, (viii) Mobile Network Operator (MNO) systems, (ix) eUICCs that are local to one or more devices, and (x) depots. Moreover, each depot may include: (xi) eSIM inventory managers, (xii) system directory services, (xiii) communications managers, and / or (xiv) pending eSIM storages. Functions of the disclosed infrastructure can be flexibly partitioned and / or adapted such that individual parties can host portions of the infrastructure. Exemplary embodiments of the present invention can provide redundancy, thus ensuring maximal uptime for the overall network (or the portion thereof).
Owner:APPLE INC

Simulacrum of physical security device and methods

A simulacrum security device and methods. In one embodiment, a simulacrum or likeness of a physical security device is provided for use in conjunction with a software emulation of the security device. In one implementation, a “faux SIM card” is provided that does not contain Subscriber Identification Module (SIM) information itself, but instead enables a user to download Electronic SIM (eSIM) information (e.g., from a network or eSIM server) which is loaded into a software emulation of a Universal Integrated Circuit Card (UICC) device. The faux card is printed with an activation code, scan pattern, or other activation or access information. The subscriber purchases the faux card, and enters the activation code into a device; the entered activation code enables the device to log onto a network, and download the appropriate eSIM data. Delivery of eSIM information as enabled by the faux card addresses deficiencies in existing SIM distribution schemes, provides users with an enhanced perception of security, and further addresses various legal requirements.
Owner:APPLE INC

Methods and apparatus for managing data within a secure element

Apparatus and methods for managing and sharing data across multiple access control clients in devices. In one embodiment, the access control clients comprise electronic Subscriber Identity Modules (eSIMs) disposed on a embedded Universal Integrated Circuit Card (eUICC). Each eSIM contains its own data. An Advanced Subscriber Identity Toolkit application maintained within the eUICC facilitates managing and sharing multiple eSIMs' data for various purposes such as sharing phonebook contacts or facilitating automatic switch-over between the multiple eSIMs (such as based on user context).
Owner:APPLE INC

System and method for provisioning over the air of confidential information on mobile communicative devices with non-uicc secure elements

A method for over-the-air (OTA) provisioning a non-Universal Integrated Circuit Card (UICC) type secure element (SE) of a mobile device, including receiving a request to initialize an OTA proxy of a mobile device; initializing the OTA proxy; receiving provisioning data through the OTA proxy; and provisioning the received data into the SE, in which the SE is a non-UICC type SE. A mobile device to provision secure data OTA in a non-UICC type SE including an OTA proxy to connect to a Trusted Service Manager (TSM) system, and to receive provisioning data from the TSM system; a near-field-communication (NFC) enabled chip to conduct a contactless transaction; and a SE to store information provisioned through OTA proxy, in which the SE is a non-UICC type SE.
Owner:MOZIDO CORFIRE - KOREA

Methods and apparatus for providing management capabilities for access control clients

Methods and apparatus for managing access control clients (e.g., electronic Subscriber Identity Modules (eSIMs)). In one embodiment, secure elements (e.g., electronic Universal Integrated Circuit Cards (eUICCs)) and management entities of secure elements are associated with credentials. Post-deployment managerial operations can be executed, by transmitting the requested operation with the appropriate credentials. For example, a device can receive secure software updates to electronic Subscriber Identity Modules (eSIMs), with properly credentialed network entities.
Owner:APPLE INC

Apparatuses, methods and systems for interfacing with a trusted subscription management platform

Apparatuses, methods, and systems are provided for implementing a trusted subscription management platform. The platform allows the remote creation, distribution and management of virtual subscriber identity module cards stored in a plurality of concurrent embedded Universal Integrated Circuit Cards (eUICCs). The eUICCs may be virtualized through a secure software module integrated within a mobile station or in a distant server. These eUICCs may be deployed in both hardware and software instances within the mobile station (or the distant server). In some embodiments, use of the trusted subscription management platform provides a Session Initiation Protocol (SIP) server module that facilitates the transmission of voice and data over Internet protocol services integrated within a phone application of the mobile station.
Owner:GIGSKY

Device and operation method thereof

A device is disclosed. The device includes a communication unit configured to transmit a subscription request to a primary subscriber device and receive a provisioning profile in response to the subscription request and a universal integrated circuit card (UICC) configured to be provisioned based on the received provisioning profile.
Owner:SAMSUNG ELECTRONICS CO LTD

Profile activation system, eUICC and profile activation method of eUICC

InactiveCN103533634AAvoid Cyber ​​RisksTransmissionWireless communicationActivation methodThe Internet
The invention discloses a profile activation system, an eUICC (Embedded Universal Integrated Circuit Card) and a profile activation method of the eUICC, which overcome the defect that Internet of Things equipment cannot access a corresponding network and cannot be connected with other networks possibly even the eUICC activates a profile successfully. The method comprises the steps that at least one connectable network is scanned and obtained when the Internet of Things equipment cannot be connected with the network of an operator corresponding to the profile in an activation state; the eUICC selects a target network from the at least one network, wherein a profile of the operator to which the target network belongs is activatable; and the eUICC activates the profile of the operator to which the target network belongs and activates the profile in the activation state. According to the system, the eUICC and the method, a risk that the Internet of Things equipment cannot be connected to the networks of any other operators possibly when the Internet of Things equipment cannot be connected with the network of the operator with the activated profile is avoided.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Method and apparatus of constructing secure infra-structure for using embedded universal integrated circuit card

Provided are a method and device for building a security-based environment that uses an eUICC. A method of building a trust relationship in an eUICC environment includes transmitting, by a trust requesting object, a trust relationship requesting message including identification information and signature information of the trust requesting object to a trust verifying object, delivering, by the trust verifying object, the trust relationship requesting message to a trust relationship relay object and receiving trust information of the trust requesting object corresponding to the trust relationship requesting message from the trust relationship relay object, and verifying, by the trust verifying object, the signature information of the trust requesting object using the trust information of the trust requesting object.
Owner:SAMSUNG ELECTRONICS CO LTD

Apparatus and Method for Managing Security Domains for a Universal Integrated Circuit Card

A device that incorporates the subject disclosure may perform, for example, generating a security domain root structure for a universal integrated circuit card of an end user device, where the security domain root structure includes a hierarchy of a link provider operator security domain above a mobile network operator trusted security domain, where the link provider operator security domain enables transport management by a link provider operator, and where the mobile network operator trusted security domain enables card content management and subscription eligibility verification by a mobile network operator trusted service manager. Other embodiments are disclosed.
Owner:AT&T INTPROP I LP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products