Simulacrum of physical security device and methods
First Claim
1. A method for provisioning electronic Subscriber Identity Modules (eSIMs) to user devices, the method comprising:
- at an eSIM provisioning server;
receiving, from a user device, a unique identifier, wherein;
the user device is configured to access a removable apparatus that is configured to be inserted into a receiving bay included in the user device,the removable apparatus includes a computer-readable memory that stores the unique identifier but not an eSIM, andthe unique identifier corresponds to;
(i) a particular eSIM stored within a database that is accessible to the provisioning server, and(ii) the removable apparatus;
identifying, based on the unique identifier, the particular eSIM within the database, wherein the particular eSIM is associated with a particular service provider; and
providing, to the user device, the particular eSIM, wherein the user device stores the particular eSIM into a secure element that is distinct from the removable apparatus and included in the user device, and the particular eSIM enables the user device to operate with the particular service provider.
1 Assignment
0 Petitions
Accused Products
Abstract
A simulacrum security device and methods. In one embodiment, a simulacrum or likeness of a physical security device is provided for use in conjunction with a software emulation of the security device. In one implementation, a “faux SIM card” is provided that does not contain Subscriber Identification Module (SIM) information itself, but instead enables a user to download Electronic SIM (eSIM) information (e.g., from a network or eSIM server) which is loaded into a software emulation of a Universal Integrated Circuit Card (UICC) device. The faux card is printed with an activation code, scan pattern, or other activation or access information. The subscriber purchases the faux card, and enters the activation code into a device; the entered activation code enables the device to log onto a network, and download the appropriate eSIM data. Delivery of eSIM information as enabled by the faux card addresses deficiencies in existing SIM distribution schemes, provides users with an enhanced perception of security, and further addresses various legal requirements.
-
Citations
15 Claims
-
1. A method for provisioning electronic Subscriber Identity Modules (eSIMs) to user devices, the method comprising:
at an eSIM provisioning server; receiving, from a user device, a unique identifier, wherein; the user device is configured to access a removable apparatus that is configured to be inserted into a receiving bay included in the user device, the removable apparatus includes a computer-readable memory that stores the unique identifier but not an eSIM, and the unique identifier corresponds to; (i) a particular eSIM stored within a database that is accessible to the provisioning server, and (ii) the removable apparatus; identifying, based on the unique identifier, the particular eSIM within the database, wherein the particular eSIM is associated with a particular service provider; and providing, to the user device, the particular eSIM, wherein the user device stores the particular eSIM into a secure element that is distinct from the removable apparatus and included in the user device, and the particular eSIM enables the user device to operate with the particular service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. An apparatus, comprising:
-
a network interface; a processor; a bay configured to receive a simulacrum of an identity module for the apparatus, wherein; the simulacrum includes a non-volatile memory that stores a unique identifier that corresponds to (i) an electronic Subscriber Identity Module (eSIM), and (ii) the simulacrum of the identity module for the apparatus, and the eSIM is not stored in the non-volatile memory; a secure element, wherein the secure element includes a memory that is distinct from the non-volatile memory of the simulacrum; and a storage device in data communication with the processor, wherein the storage device stores computer-executable instructions that, when executed by the processor, cause the apparatus to; read the unique identifier from the non-volatile memory; request, from a server, the eSIM associated with the unique identifier; receive, from the server, the eSIM; store the eSIM into the secure element; and using the eSIM, configure the network interface for operation. - View Dependent Claims (9, 10, 11)
-
-
12. A method for provisioning electronic Subscriber Identity Modules (eSIMs) to mobile devices, the method comprising:
at an eSIM provisioning server; receiving, from a mobile device, a request for an eSIM that corresponds to a unique identifier, wherein; the unique identifier is embedded within an identity module that is configured to be inserted into a receiving bay that is included in the mobile device, the eSIM is not embedded within the identity module, and the unique identifier further corresponds to the identity module; establishing a secure session with the mobile device; and providing, to the mobile device, the eSIM, wherein the mobile device stores the eSIM into a secure element that is distinct from the identity module and included in the mobile device, and the eSIM enables the mobile device to operate with a particular service provider. - View Dependent Claims (13, 14, 15)
Specification