Mobile communication device profound identity brokering framework
First Claim
1. A method of establishing a wireless communication link by a mobile communication device, comprising:
- receiving a first wireless communication identity from a first server via a wireless identity broker and storing the first wireless communication identity in a first sub-partition of a non-transitory memory of the mobile communication device, wherein the first wireless communication identity comprises a first network access identity associated with a first country, a first list of wireless communication systems to which the mobile communication device is authorized to attach, and a first rule set for prioritizing among the wireless communication systems identified in the first list, and wherein the wireless identity broker mediates transport of the first wireless communication identity to the non-transitory memory;
receiving a second wireless communication identity from a second server via the wireless identity broker and storing the second wireless communication identity in a second sub-partition of the non-transitory memory, wherein the second wireless communication identity comprises a second network access identity associated with a second country, a second list of wireless communication systems to which the mobile communication device is authorized to attach, and a second rule set for prioritizing among the wireless communication systems identified in the second list, wherein at least the first network access identity is different from the second network access identity, and wherein the wireless identity broker mediates transport of the second wireless communication identity to the non-transitory memory;
determining, by an application stored in the non-transitory memory and executable by a processor of the mobile communication device, a country in which the mobile communication device is located; and
based on the country, one of;
deactivating, by the application, the first wireless communication identity in the first sub-partition and activating, by the application, the second wireless communication identity in the second sub-partition, ordeactivating, by the application, the second wireless communication identity in the second sub-partition and activating, by the application the first wireless communication identity in the first sub-partition, wherein the first sub-partition of the non-transitory memory is accessed based on a first sub-key and the second sub-partition of the non-transitory memory is accessed based on a second sub-key, and wherein the mobile communication device establishes a wireless communication link based on an active wireless communication identity and only a single wireless communication identity is active on the mobile communication device at one time.
6 Assignments
0 Petitions
Accused Products
Abstract
A mobile communication device. The device comprises a cellular radio transceiver, a processor, and a memory integral with the device, wherein the memory is apportioned into a plurality of partitions. The device further comprises a first wireless communication identity stored in a first partition of the memory and a second wireless communication identity stored in a second partition of the memory, wherein the second wireless communication identity is different from the first wireless communication identity. The device further comprises an application stored in the memory that, when executed by the processor, detects a triggering event and in response to the triggering event selects one of the wireless communication identities to be an active communication identity of the device, wherein a wireless communication identity comprises a network access identity and a list of wireless communication systems to which the device is authorized to attach.
-
Citations
20 Claims
-
1. A method of establishing a wireless communication link by a mobile communication device, comprising:
-
receiving a first wireless communication identity from a first server via a wireless identity broker and storing the first wireless communication identity in a first sub-partition of a non-transitory memory of the mobile communication device, wherein the first wireless communication identity comprises a first network access identity associated with a first country, a first list of wireless communication systems to which the mobile communication device is authorized to attach, and a first rule set for prioritizing among the wireless communication systems identified in the first list, and wherein the wireless identity broker mediates transport of the first wireless communication identity to the non-transitory memory; receiving a second wireless communication identity from a second server via the wireless identity broker and storing the second wireless communication identity in a second sub-partition of the non-transitory memory, wherein the second wireless communication identity comprises a second network access identity associated with a second country, a second list of wireless communication systems to which the mobile communication device is authorized to attach, and a second rule set for prioritizing among the wireless communication systems identified in the second list, wherein at least the first network access identity is different from the second network access identity, and wherein the wireless identity broker mediates transport of the second wireless communication identity to the non-transitory memory; determining, by an application stored in the non-transitory memory and executable by a processor of the mobile communication device, a country in which the mobile communication device is located; and based on the country, one of; deactivating, by the application, the first wireless communication identity in the first sub-partition and activating, by the application, the second wireless communication identity in the second sub-partition, or deactivating, by the application, the second wireless communication identity in the second sub-partition and activating, by the application the first wireless communication identity in the first sub-partition, wherein the first sub-partition of the non-transitory memory is accessed based on a first sub-key and the second sub-partition of the non-transitory memory is accessed based on a second sub-key, and wherein the mobile communication device establishes a wireless communication link based on an active wireless communication identity and only a single wireless communication identity is active on the mobile communication device at one time. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A mobile communication device, comprising:
-
a cellular radio transceiver; a non-transitory memory integral with the mobile communication device, wherein the memory is apportioned into a plurality of sub-partitions; a first wireless communication identity received from a first server via a wireless identity broker and stored in a first sub-partition of the non-transitory memory, wherein a wireless communication identity comprises a network access identity, a list of wireless communication systems to which the mobile communication device is authorized to attach, and a rule set for prioritizing among the wireless communication systems identified in the list, and wherein the wireless identity broker mediates transport of the first wireless communication identity to the non-transitory memory; a second wireless communication identity received from a second server via the wireless identity broker and stored in a second sub-partition of the non-transitory memory, wherein the second wireless communication identity is different from the first wireless communication identity, and wherein the wireless identity broker mediates transport of the second wireless communication identity to the non-transitory memory; a processor; and an application stored in the non-transitory memory that, when executed by the processor; detects a triggering event, and in response to the triggering event, selects the first wireless communication identity stored in the first sub-partition of the non-transitory memory or the second wireless communication identity stored in the second sub-partition of the non-transitory memory to be an active wireless communication identity of the mobile communication device, wherein the first sub-partition of the non-transitory memory is accessed based on a first sub-key and the second sub-partition of the non-transitory memory is accessed based on a second sub-key, and wherein the mobile communication device establishes a wireless communication link via the cellular radio transceiver based on the active wireless communication identity and only a single wireless communication identity is active on the mobile communication device at one time. - View Dependent Claims (8, 9, 10, 11, 20)
-
-
12. A method of establishing a wireless communication link by a mobile communication device, comprising:
-
receiving a first wireless communication identity from a first server via a wireless identity broker and storing the first wireless communication identity in a first sub-partition of a non-transitory memory of the mobile communication device, wherein the first wireless communication identity comprises a first network access identity, a first list of wireless communication systems to which the mobile communication device is authorized to attach, and a first rule set for prioritizing among the wireless communication systems identified in the first list, and wherein the wireless identity broker mediates transport of the first wireless communication identity to the non-transitory memory; receiving a second wireless communication identity from a second server via the wireless identity broker and storing the second wireless communication identity in a second sub-partition of the non-transitory memory, wherein the second wireless communication identity comprises a second network access identity, a second list of wireless communication systems to which the mobile communication device is authorized to attach, and a second rule set for prioritizing among the wireless communication systems identified in the second list, wherein at least the first wireless communication identity is different from the second wireless communication identity, and wherein the wireless identity broker mediates transport of the second wireless communication identity to the non-transitory memory; receiving, by an application stored in the non-transitory memory and executable by a processor of the mobile communication device, a trigger signal; and based on the trigger signal, one of; deactivating, by the application, the first wireless communication identity in the first sub-partition and activating, by the application, the second wireless communication identity in the second sub-partition, or deactivating, by the application, the second wireless communication identity in the second sub-partition and activating, by the application, the first wireless communication identity in the first sub-partition, wherein the first sub-partition of the non-transitory memory is accessed based on a first sub-key and the second sub-partition of the non-transitory memory is accessed based on a second sub-key, and wherein the mobile communication device establishes a wireless communication link based on an active wireless communication identity and only a single wireless communication identity is active on the mobile communication device at one time. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification