Management of network devices utilizing an authorization token
First Claim
Patent Images
1. A network device comprising:
- a network interface;
a memory including an authorization credential, the memory being configured in a universal integrated circuit card (UICC); and
a processor configured in the UICC to execute functions including;
specifying operation privileges associated with a mobile network operator included in an authorization token, wherein the operation privileges include at least one of loading, deleting, enabling, or disabling a set of data or services of the mobile network operator within the UICC;
commanding a transmission of the authorization token to a device management authority or to the mobile network operator if authorized by the device management authority;
verifying the authorization token received from the mobile network operator using the authorization credential to determine if the mobile network operator is authorized to perform requested operations with the network device; and
enforcing operation privileges contained in the authorization token.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects of the invention may relate to an apparatus, system, and method for the management of network devices utilizing an authorization token. In one embodiment, an authorization token received from a service provider may be verified using an authorization credential to determine if the service provider is authorized to perform requested operations with the network device. Further, operation privileges may be enforced that are contained in the authorization token.
-
Citations
36 Claims
-
1. A network device comprising:
-
a network interface; a memory including an authorization credential, the memory being configured in a universal integrated circuit card (UICC); and a processor configured in the UICC to execute functions including; specifying operation privileges associated with a mobile network operator included in an authorization token, wherein the operation privileges include at least one of loading, deleting, enabling, or disabling a set of data or services of the mobile network operator within the UICC; commanding a transmission of the authorization token to a device management authority or to the mobile network operator if authorized by the device management authority; verifying the authorization token received from the mobile network operator using the authorization credential to determine if the mobile network operator is authorized to perform requested operations with the network device; and enforcing operation privileges contained in the authorization token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method implemented by a network device comprising:
-
specifying operation privileges associated with a mobile network operator included in an authorization token, wherein the operation privileges include at least one of loading, deleting, enabling, or disabling a set of data or services of the mobile network operator within a universal integrated circuit card (UICC) of the network device; commanding, at the UICC of the network device, a transmission of the authorization token to a device management authority or to the mobile network operator if authorized by the device management authority; verifying, at the UICC of the network device, the authorization token received from the mobile network operator using an authorization credential to determine if the mobile network operator is authorized to perform requested operations with the network device; and enforcing, at the UICC of the network device, operation privileges contained in the authorization token. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product executed at a network device comprising:
-
a non-transitory computer-readable medium comprising code for; specifying operation privileges associated with a mobile network operator included in an authorization token, wherein the operation privileges include at least one of loading, deleting, enabling, or disabling a set of data or services of the mobile network operator within a universal integrated circuit card (UICC) of the network device; commanding, at the UICC of the network device, a transmission of the authorization token to a device management authority or to the mobile network operator if authorized by the device management authority; verifying, at the UICC of the network device, the authorization token received from the mobile network operator using an authorization credential to determine if the mobile network operator is authorized to perform requested operations with the network device; and enforcing, at the UICC of the network device, operation privileges contained in the authorization token. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A network device comprising:
-
means for specifying operation privileges associated with a mobile network operator included in an authorization token, wherein the operation privileges include at least one of loading, deleting, enabling, or disabling a set of data or services of the mobile network operator within a universal integrated circuit card (UICC) of the network device; means for commanding, at the UICC of the network device, a transmission of the authorization token to a device management authority or to the mobile network operator if authorized by the device management authority; means for verifying, at the UICC of the network device, the authorization token received from the mobile network operator using an authorization credential to determine if the mobile network operator is authorized to perform requested operations with the network device; and means for enforcing, at the UICC of the network device, operation privileges contained in the authorization token. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36)
-
Specification