System and method for porting a personalized indicium assigned to a mobile communications device
First Claim
1. A method for porting a Personal Information Number (PIN) from a first mobile communications device to a second mobile communications device, the method comprising:
- generating a temporary PIN by said second mobile communications device for registration with a network node;
receiving identity information comprising said PIN from said first mobile communications device by said second mobile communications device via a peer-to-peer communication session, said identity information from said first mobile communications device including a first PIN authentication key and an identifier associated therewith that is mapped to said PIN; and
negotiating by said second mobile communications device with said network node using at least a portion of said received identity information to effectuate reassignment of said PIN to an identifier associated with said second mobile communications device and to effectuate disassociation of said PIN from said identifier associated with said first mobile communications device, wherein negotiating with said network node comprises issuing a command that includes said PIN, said first PIN authentication key and a second PIN authentication key generated by said second mobile communications device.
5 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a scheme is provided for porting a personalized indicium, i.e., a Personal Information Number or PIN, from a first mobile communications device to a second mobile communications device. Upon receiving identity information from the first mobile communications device via a secure peer-to-peer communication session, the second mobile communications device is operable to negotiate with a network node using at least a portion of the received identity information for reassigning the PIN to an identifier associated therewith. Upon successfully porting the PIN to the second mobile communications device, a service provisioning database is accordingly updated.
19 Citations
18 Claims
-
1. A method for porting a Personal Information Number (PIN) from a first mobile communications device to a second mobile communications device, the method comprising:
-
generating a temporary PIN by said second mobile communications device for registration with a network node; receiving identity information comprising said PIN from said first mobile communications device by said second mobile communications device via a peer-to-peer communication session, said identity information from said first mobile communications device including a first PIN authentication key and an identifier associated therewith that is mapped to said PIN; and negotiating by said second mobile communications device with said network node using at least a portion of said received identity information to effectuate reassignment of said PIN to an identifier associated with said second mobile communications device and to effectuate disassociation of said PIN from said identifier associated with said first mobile communications device, wherein negotiating with said network node comprises issuing a command that includes said PIN, said first PIN authentication key and a second PIN authentication key generated by said second mobile communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A mobile communications device, comprising:
-
A processor configured to control at least one of a plurality of subsystems for communicating with a network node; the processor further configured to control at least one of a plurality of subsystems for engaging in a peer-to-peer communication session with another mobile communications device and receiving identity information from said another mobile communications device, said identity information received from said another mobile communication device including a Personal Information Number (PIN) and a first PIN authentication key, wherein said PIN is mapped to an identifier relating to said another mobile communications device; and
wherein said identity information is received by the mobile communications device after the mobile communications device has generated a temporary PIN for registration with the network node; andthe processor further configured to control a at least one of a plurality of subsystems for negotiating with the network node using at least a portion of identity information received from said another mobile communications device for reassigning said PIN to an identifier associated with said mobile communications device and for disassociating said PIN from said identifier associated with said another mobile communications device, wherein negotiating with the network node comprises issuing a command that includes said PIN, said first PIN authentication key and a second PIN authentication key generated by said mobile communications device. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A network node for effectuating the reassignment of a Personal Information Number (PIN) from a first mobile communications device to a second mobile communications device, the network node comprising:
-
means for receiving a command generated by said second mobile communications device, the command including at least identity information associated with said first mobile communications device, said PIN, a first PIN authentication key, and a second PIN authentication key generated by said second mobile communications device, wherein said identity information is received from said first mobile communications device via a peer-to-peer communication session after said second mobile communications device has generated a temporary PIN for registration with the network node, said identity information from said first mobile communications device including the first PIN authentication key and an identifier associated with the first mobile communications device that is mapped to said PIN; means for dissociating said PIN from the identifier associated with said first mobile communications device; and means for mapping said PIN to an identifier associated with said second mobile communications device. - View Dependent Claims (16, 17, 18)
-
Specification