Patent application number | Description | Published |
20120106443 | UNIVERSAL INTEGRATED CIRCUIT CARD ACTIVATION IN A HYBRID NETWORK - A universal integrated circuit card (UICC) may include a universal subscriber identity module (USIM); a code division multiple access (CDMA) subscriber identity module (CSIM); a memory to store instructions; and a processor. The processor may execute instructions to determine a type of wireless access network available to a user equipment (UE) associated with the UICC; perform activation of the UICC using the USIM, in response to detecting a CDMA enhanced High Rate Packet Data (eHRPD) network, a Global System for Mobile Communication (GSM) access network, or a Long Term Evolution (LTE) access network; and perform activation of the UICC using the CSIM, in response to detecting an available CDMA access network other than a CDMA eHRPD access network. | 05-03-2012 |
20120106533 | UNIVERSAL INTEGRATED CIRCUIT CARD UPDATES IN A HYBRID NETWORK - A universal integrated circuit card (UICC) may include a universal subscriber identity module (USIM); a code division multiple access (CDMA) subscriber identity module (CSIM); a memory to store instructions; and a processor. The processor may execute instructions to determine a type of wireless access network available to a user equipment (UE) associated with the UICC; perform updates of the UICC using the USIM, in response to detecting a CDMA enhanced High Rate Packet Data (eHRPD) network, a Global System for Mobile Communication (GSM) access network, or a Long Term Evolution (LTE) access network; and perform updates of the UICC using the CSIM, in response to detecting an available CDMA access network other than a CDMA eHRPD access network. | 05-03-2012 |
20120142368 | OBTAINING LOCATION SERVER ADDRESS ON A MOBILE DEVICE - A mobile device may determine an address of a location server to use for location-based services to the mobile device. In one implementation, a mobile device may retrieve a service list that indicates services available to the mobile device and determine whether location-based services are enabled for the mobile device. The mobile device may additionally retrieve, from a file stored as part of a file structure associated with a smart card of the mobile device, a network address of a location server corresponding to the location-based services. The mobile device may connect to the location server to obtain location-based services from the location server. | 06-07-2012 |
20120252531 | PROVISIONING MOBILE TERMINALS WITH A TRUSTED KEY FOR GENERIC BOOTSTRAP ARCHITECUTRE - Mobile terminals may be authenticated separately from a smart card used by the mobile terminal. In one implementation, a mobile terminal may query a remote server, based on a value identifying the mobile terminal, for security information relating to the mobile terminal, where a copy of the security information is stored in the mobile terminal as part of the manufacture of the mobile terminal. A smart card may receive the security information in response to the query. The security information may be received in an encrypted format that is not accessible by the mobile terminal. The smart card may communicate with the mobile terminal to authenticate the mobile terminal based on the security information received in response to the query and the copy of the security information that is stored in the mobile terminal. | 10-04-2012 |
20130149996 | PUBLIC KEY CRYPTOGRAPHY FOR APPLICATIONS REQUIRING GENERIC BOOTSTRAP ARCHITECTURE - A mobile terminal is configured to store information associated with accessing an application that requires bootstrapping; recognize an invocation of the application; identify a rule, included in the information, associated with accessing the application; determine whether the rule indicates that a user of the mobile terminal is allowed to access the application; determine whether the mobile terminal supports the bootstrapping; and provide access to the application when the rule indicates that the user of the mobile terminal is allowed to access the application and when the mobile terminal supports the bootstrapping. | 06-13-2013 |
20130152178 | SECURE ENTERPRISE SERVICE DELIVERY - A device receives enterprise information associated with enterprises supported by a network, and determines enterprise identifiers for one or more enterprises identified in the enterprise information. The device also receives information associated with devices and subscribers of the network, and determines security key parameters based on the information associated with the devices and the subscribers of the network. The device further generates, based on the security key parameters, a security key for each of the enterprise identifiers. | 06-13-2013 |
20130152208 | SECURITY KEY MANAGEMENT BASED ON SERVICE PACKAGING - A device receives application information associated with applications provided by a network, and determines service package identifiers for one or more applications identified in the application information. The device also receives information associated with devices and subscribers of the network, and determines security key parameters based on the information associated with the devices and the subscribers of the network. The device further generates, based on the security key parameters, a security key for each of the service package identifiers. | 06-13-2013 |
20140044263 | CENTRALIZED KEY GENERATION - A first network device is configured to receive a request for a secret key, generate the secret key, and send the secret key to a second network device, a third network device, and a wireless user device. The second network device may send content, encrypted with the secret key, to the wireless user device. The third network device may send content, encrypted with the secret key, to the wireless user device when the second network device is not sending content to the wireless user device. The wireless user device may use the secret key to decrypt the content received from the second network device or the third network device. | 02-13-2014 |
20140052981 | CENTRALIZED KEY MANAGEMENT - A first network device is configured to receive a first request for a first secret key, generate the first secret key, and send the first secret key to a second network device and a first user device; and is also configured to receive a second request for a second secret key, generate the second secret key, and send the second secret key to a third network device and a second user device. The second network device and the first user device may mutually authenticate each other using the first secret key. The third network device and the second user device may mutually authenticate each other using second secret key. | 02-20-2014 |