Methods and systems for identity management in wireless devices
First Claim
1. A method in a wireless communication device initially unauthorized for communication with a network for obtaining persistent soft network subscription credentials from a wireless communication device initially authorized for communication with the network, the method comprising:
- detecting an absence of the soft network subscription credentials in the wireless communication device initially unauthorized for communication with the network;
electronically searching for the wireless communication device initially authorized for communication with the network;
initiating a request for a persistent transfer of the soft network subscription credentials by transmitting an activation request to the wireless communication device initially authorized for communication with the network;
receiving an activation token from the wireless communication device initially authorized for communication with the network in response to the transmitting the activation request; and
upon the wireless communication device initially authorized for communication with the network deactivating its communication authorization, receiving a soft network subscription credentials from the wireless communication device initially authorized for communication with the network.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and devices for allowing a wireless communication device (1301) initially unauthorized for communication with a network to obtain persistent soft network subscription credential information (1303) from a wireless communication device (1401) initially authorized for communication with the network are disclosed. In performing the persistent transfer of the soft network subscription credential information (1303), one of a token management module (1312), a session initiation protocol communication module (1408), or a electronic rights manager (1406) may be used to ensure that only one communication device is capable of communicating with a network at any one time.
25 Citations
35 Claims
-
1. A method in a wireless communication device initially unauthorized for communication with a network for obtaining persistent soft network subscription credentials from a wireless communication device initially authorized for communication with the network, the method comprising:
-
detecting an absence of the soft network subscription credentials in the wireless communication device initially unauthorized for communication with the network; electronically searching for the wireless communication device initially authorized for communication with the network; initiating a request for a persistent transfer of the soft network subscription credentials by transmitting an activation request to the wireless communication device initially authorized for communication with the network; receiving an activation token from the wireless communication device initially authorized for communication with the network in response to the transmitting the activation request; and upon the wireless communication device initially authorized for communication with the network deactivating its communication authorization, receiving a soft network subscription credentials from the wireless communication device initially authorized for communication with the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method in a wireless communication device initially authorized for communication with a network for a transfer of soft network subscription credentials to a wireless communication device initially unauthorized for communication with the network, the method comprising:
-
receiving a request for the soft network subscription credentials, the request comprising an activation request, from the wireless communication device initially unauthorized for communication with the network; transmitting an electronic message comprising the activation request to a service provider; receiving an electronic rights management key from the service provider;
immutably deactivating an authorization for communication with the network;transmitting a soft network subscription credentials to the wireless communication device initially unauthorized for communication with the network. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A soft network subscription credential transfer module in a wireless communication device, comprising:
-
a non-volatile storage device configured to selectively and persistently store soft network subscription credential information; a network subscription credential detector configured to detect a presence of active network subscription credential information in the non-volatile storage device; electronic communication circuitry configured to search for a wireless communication device initially authorized for communication with a network, wherein the electronic communication circuitry is further configured to transmit an activation request to the wireless communication device initially authorized for communication with the network; and an activation module configured to, upon receiving a soft network subscription credentials from the wireless communication device initially authorized for communication with the network, to activate the soft network subscription credential information; wherein the activation module remains active when a communication link between the electronic communication circuitry and the wireless communication device initially authorized for communication with the network is severed. - View Dependent Claims (30, 31, 32)
-
-
33. A soft network subscription credential transfer module in a wireless communication device, comprising:
-
a non-volatile storage device configured to selectively and persistently store soft network subscription credential information; electronic communication circuitry configured to receive requests for soft network subscription credential transfers; and a deactivation module configured to immutably deactivate the soft network subscription credential information; an electronic rights manager configured to receive an electronic rights management key from a service provider, and to forward the electronic rights management key to the wireless communication device initially unauthorized for communication with the network; wherein the electronic communication circuitry is configured to transmit a soft network subscription credentials to a wireless communication device initially unauthorized for communication with a network. - View Dependent Claims (34, 35)
-
Specification