APPARATUS AND METHODS FOR STORING ELECTRONIC ACCESS CLIENTS
First Claim
Patent Images
1. Apparatus for storing one or more access data elements, comprising:
- a secure element adapted to store a plurality of user access data elements, each user access data element encrypted for the secure element;
a processor; and
a storage device in data communication with the processor, the storage device comprising computer-executable instructions that are configured to, when executed by the processor;
process a request for one or more access data elements from a peer device in order to verify the peer device;
decrypt the one or more requested access data elements;
re-encrypt the decrypted one or more access data elements for the peer device; and
transfer the re-encrypted one or more data elements to the verified peer device, the transfer causing removal of the one or more access data elements from the secure element.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus and methods for storing and controlling access control clients. In one embodiment, transmitting and receiving devices ensure that only one copy of an eSIM is active at any time. Specifically, each transferred eSIM is encrypted for the destination device; the eSIM from the source device is deleted, deactivated, or otherwise rendered unusable. Various aspects of network infrastructure are also described, including electronic Universal Integrated Circuit Card (eUICC) appliances, and mobile devices. Various scenarios for transfer of eSIMs are also disclosed.
132 Citations
26 Claims
-
1. Apparatus for storing one or more access data elements, comprising:
-
a secure element adapted to store a plurality of user access data elements, each user access data element encrypted for the secure element; a processor; and a storage device in data communication with the processor, the storage device comprising computer-executable instructions that are configured to, when executed by the processor; process a request for one or more access data elements from a peer device in order to verify the peer device; decrypt the one or more requested access data elements; re-encrypt the decrypted one or more access data elements for the peer device; and transfer the re-encrypted one or more data elements to the verified peer device, the transfer causing removal of the one or more access data elements from the secure element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. Apparatus for storing one or more access data elements, comprising:
-
a secure element adapted to store a plurality of user access data elements, each user access data element encrypted for the secure element; a processor; and a storage device in data communication with the processor, the storage device comprising computer-executable instructions that are configured to, when executed by the processor; request one or more access data elements from a verified peer device; receive the one or more requested access data elements from the verified peer device; verify the one or more requested access data elements are encrypted for the secure element; store the one or more encrypted access data elements within the secure element; and decrypt the one or more encrypted access data elements during an authentication protocol. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A method for transferring one or more access data elements, the one or more access data elements having a unique identifier associated therewith, comprising:
-
agreeing to a transfer protocol between a device and a peer device; receiving the one or more access data elements from the secure peer device; verifying the transferred one or more access data elements, the one or more access data elements and unique identifier being encrypted for the device; and
storing the transferred one or more access data elements. - View Dependent Claims (23, 24, 25, 26)
-
Specification