SIMULACRUM OF PHYSICAL SECURITY DEVICE AND METHODS
First Claim
1. A method for provisioning user access data, the method comprising:
- providing apparatus comprising a computer-readable identifier;
utilizing the apparatus to obtain the identifier;
using the identifier to identify user access data; and
providing the user access data to a user device, the access data allowing for said user device to access a service.
1 Assignment
0 Petitions
Accused Products
Abstract
A simulacrum security device and methods. In one embodiment, a simulacrum or likeness of a physical security device is provided for use in conjunction with a software emulation of the security device. In one implementation, a “faux SIM card” is provided that does not contain Subscriber Identification Module (SIM) information itself, but instead enables a user to download Electronic SIM (eSIM) information (e.g., from a network or eSIM server) which is loaded into a software emulation of a Universal Integrated Circuit Card (UICC) device. The faux card is printed with an activation code, scan pattern, or other activation or access information. The subscriber purchases the faux card, and enters the activation code into a device; the entered activation code enables the device to log onto a network, and download the appropriate eSIM data. Delivery of eSIM information as enabled by the faux card addresses deficiencies in existing SIM distribution schemes, provides users with an enhanced perception of security, and further addresses various legal requirements.
115 Citations
20 Claims
-
1. A method for provisioning user access data, the method comprising:
-
providing apparatus comprising a computer-readable identifier; utilizing the apparatus to obtain the identifier; using the identifier to identify user access data; and providing the user access data to a user device, the access data allowing for said user device to access a service. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for provisioning user access data, the method comprising:
-
generating an identifier associated with a user access data; embedding the identifier within a simulacrum; receiving a user device request for user access data associated with the identifier; and providing the user access data to the user device. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
-
a network interface; a processor; and a storage device in data communication with the processor, the storage device comprising computer-executable instructions, the computer-executable instructions configured to, when executed by the processor; request user access data associated with a identifier; wherein the request causes verification of the identifier, and wherein successful verification of the identifier causes the retrieval of the user access data associated with the identifier; and
stores the user access data; andwherein the stored user access data configures the network interface for operation. - View Dependent Claims (13, 14, 15)
-
-
16. A method for provisioning user access data, the method comprising:
-
providing a simulacrum, the simulacrum having at least one identifier embedded therein, the identifier being uniquely associated with user access data; and receiving a request for the user access data associated with the identifier; establishing a secure session; providing the user access data over the established secure session; and wherein the simulacrum ensures that only a single user is in possession of the at least one identifier. - View Dependent Claims (17, 18, 19, 20)
-
Specification