Methods and apparatus of over-the-air programming of a wireless unit
First Claim
1. A method, comprising:
- sending, by a communication system including a processor, an identifier that is associated with the communication system and that is directed to a service provider system via a network;
receiving, by the communication system, a verification number from the service provider system based on the identifier;
generating, by the communication system, a trial verification number based on a key;
andin response to receiving the verification number from the service provider system and determining that the trial verification number is at least similar to the verification number, modifying, by the communication system, information in a storage element of the communication system to facilitate activating the communication system for use on the network.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and apparatus for facilitating secure over-the-air (OTA) programming are presented herein. A device can store a key, which can be based on a key algorithm (K-algorithm) and an identifier associated with the device. The device can receive information such as parameter(s) and a verification number from a communications system. The verification number can be generated by using an authorization algorithm (A-algorithm) based on the parameter(s) and a K-algorithm input. The device can generate a trial verification number by using the A-algorithm with the parameter(s) and the key as trial inputs. The device can compare the verification number to the trial verification number, and in response to the verification number being at least similar to the trial verification number, the device can use the parameter(s) for programming of the device.
86 Citations
20 Claims
-
1. A method, comprising:
-
sending, by a communication system including a processor, an identifier that is associated with the communication system and that is directed to a service provider system via a network; receiving, by the communication system, a verification number from the service provider system based on the identifier; generating, by the communication system, a trial verification number based on a key; and in response to receiving the verification number from the service provider system and determining that the trial verification number is at least similar to the verification number, modifying, by the communication system, information in a storage element of the communication system to facilitate activating the communication system for use on the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-readable storage medium comprising computer executable components that, in response to execution, cause a computing system including a processor to perform operations, comprising:
-
sending an identifier associated with a device directed to service equipment; receiving a verification number from the service equipment based on the identifier; creating a trial verification number based on a key; and in response to determining that the trial verification number is at least similar to the verification number, modifying a memory of the device to facilitate activating the device on the network. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A system, comprising:
-
a memory that stores computer-executable instructions; and a processor, communicatively coupled to the memory, that facilitates execution of the computer-executable instructions to at least; direct, via a wireless network, a wireless communication including an identifier representing the system towards a service system associated with a wireless service; receive, via the wireless network based on the identifier, another communication from the service system including a verification number; create a trial verification number based on a key; determine whether the verification number is at least similar to the trial verification number; and in response to a determination that the verification number is at least proximate in value to the trial verification number, modify the memory to facilitate an activation of the system on the wireless network. - View Dependent Claims (19, 20)
-
Specification