×

Mobile communication device profound identity brokering framework

  • US 9,560,519 B1
  • Filed: 06/06/2013
  • Issued: 01/31/2017
  • Est. Priority Date: 06/06/2013
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of establishing a wireless communication link by a mobile communication device, comprising:

  • storing a first wireless communication identity in a first sub-partition of a non-transitory memory of the mobile communication device, wherein the first wireless communication identity comprises a first network access identity associated with a first country, a first list of wireless communication systems to which the mobile communication device is authorized to attach, a first rule set for prioritizing among the wireless communication systems identified in the first list, and a first table of device rules;

    storing a second wireless communication identity in a second sub-partition of the non-transitory memory, wherein the second wireless communication identity comprises a second network access identity associated with a second country, a second list of wireless communication systems to which the mobile communication device is authorized to attach, a second rule set for prioritizing among the wireless communication systems identified in the second list, and a second table of device rules, wherein at least the first network access identity is different from the second network access identity, and wherein the mobile communication device establishes a wireless communication link based on an active wireless communication identity and only a single wireless communication identity is active on the mobile communication device at one time;

    determining, by an application stored in the non-transitory memory and executable by a processor of the mobile communication device, a country in which the mobile communication device is located; and

    based on the country, one of deactivating, by the application, the first wireless communication identity in the first sub-partition and activating, by the application, the second wireless communication identity in the second sub-partition, or deactivating, by the application, the second wireless communication identity in the second sub-partition and activating, by the application the first wireless communication identity in the first sub-partition,wherein the first sub-partition of the non-transitory memory is accessed based on a first sub-key and the second sub-partition of the non-transitory memory is accessed based on a second sub-key,wherein the first sub-partition is a first sub-partition of a trusted security zone, and wherein the second sub-partition is a second sub-partition of the trusted security zone, and wherein the trusted security zone provides hardware assisted security.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×