Subscriber identity module virtualization
First Claim
1. A mobile communication device, comprising:
- a radio transceiver;
a non-transitory memory integral with the mobile communication device, wherein the non-transitory memory comprises a secure portion that is apportioned into a plurality of partitions, the secure portion comprising;
a first wireless communication identity stored in a first partition of the plurality of partitions in the secure portion, wherein each wireless communication identity comprises a network access identity, a list of wireless communication systems to which the mobile communication device is authorized to attach, a rule set for prioritizing among the wireless communication systems identified in the list, and a table of device rules;
a second wireless communication identity stored in a second partition of the plurality of partitions, wherein the second wireless communication identity is different from the first wireless communication identity;
a processor communicatively coupled to the non-transitory memory; and
an application stored in the memory that, upon execution by the processor, configures the processor to;
detect a triggering event,in response to the detection of the triggering event, select one of the wireless communication identities stored in at least one of the partitions of the secure portion in the non-transitory memory;
activate the wireless communication identity selected for implementation;
redetermine operational run-time parameters on the mobile communication device based on the activated wireless communication identity;
update user data associated with the activated wireless communication identity;
conduct wireless communication via the radio transceiver based on the redetermined operational run-time parameters; and
operate one or more applications on the mobile communication device using the updated user data associated with the activated wireless communication identity.
6 Assignments
0 Petitions
Accused Products
Abstract
A mobile communication device. The device comprises a first wireless communication identity stored in a first partition of the memory, wherein a wireless communication identity comprises a network access identity, a list of wireless communication systems to which the device is authorized to attach, a rule set for prioritizing among the wireless communication systems identified in the list, and a table of device rules. The device further comprises an application stored in the memory that, when executed by the processor, detects a triggering event and in response to the triggering event changes the active wireless communication identity of the mobile communication device to one of the wireless communication identities stored in the partitions of the memory and applies device rules associated with the wireless communication identity, where the mobile communication device conducts wireless communication via the radio transceiver based on the active communication identity and the associated device rules.
-
Citations
19 Claims
-
1. A mobile communication device, comprising:
-
a radio transceiver; a non-transitory memory integral with the mobile communication device, wherein the non-transitory memory comprises a secure portion that is apportioned into a plurality of partitions, the secure portion comprising; a first wireless communication identity stored in a first partition of the plurality of partitions in the secure portion, wherein each wireless communication identity comprises a network access identity, a list of wireless communication systems to which the mobile communication device is authorized to attach, a rule set for prioritizing among the wireless communication systems identified in the list, and a table of device rules; a second wireless communication identity stored in a second partition of the plurality of partitions, wherein the second wireless communication identity is different from the first wireless communication identity; a processor communicatively coupled to the non-transitory memory; and an application stored in the memory that, upon execution by the processor, configures the processor to; detect a triggering event, in response to the detection of the triggering event, select one of the wireless communication identities stored in at least one of the partitions of the secure portion in the non-transitory memory; activate the wireless communication identity selected for implementation; redetermine operational run-time parameters on the mobile communication device based on the activated wireless communication identity; update user data associated with the activated wireless communication identity; conduct wireless communication via the radio transceiver based on the redetermined operational run-time parameters; and operate one or more applications on the mobile communication device using the updated user data associated with the activated wireless communication identity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 17, 18)
-
-
9. A computer-implemented method for virtualizing a subscriber identity module on a mobile communication device, comprising:
-
allocating, by a processor configured by executing a trusted application on the mobile communication device, a plurality of wireless communication identities into a secure portion of a non-transitory memory of the mobile communication device; storing, by the trusted application, each wireless communication identity of the plurality of wireless communication identities into at least one partition of a plurality of partitions in the secure portion of the mobile communication device; detecting a triggering event on the mobile communication device; dynamically installing, by executing the trusted application, one of the wireless communication identities stored in at least one of the plurality of partitions in response to the triggering event; activating, by the trusted application executing in the secure portion, the wireless communication identity in response to the dynamic installation; redetermining, by the trusted application, operational run-time parameters on the mobile communication device based on activating the wireless communication identity; and updating, by the trusted application, user data associated with the activated wireless communication identity, wherein the mobile communication device is configured to conduct wireless communication via a radio transceiver based on an activation of the wireless communication identity and the redetermined operational run-time parameters, and wherein one or more applications are configured to operate on the mobile communication device using the updated user data associated with the activated wireless communication identity. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 19)
-
Specification