ENABLING SECURE APPLICATION DISTRIBUTION ON A (E)UICC USING SHORT DISTANCE COMMUNICATION TECHNIQUES
First Claim
1. A method performed in a system comprising a first wireless device, a second wireless device and a network node, for enabling distribution of a first security application comprised in the first wireless device to the second wireless device, the method comprising:
- receiving, in the first wireless device, using a short distance communication technology, a hardware identifier of the second wireless device;
sending, from the first wireless device, the hardware identifier and information identifying the first security application to the network node;
receiving, in the network node, from the first wireless device, the hardware identifier of the second wireless device and the information identifying the security application; and
authorising, in the network node, the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device.
3 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides for methods and devices for enabling distribution of a first security application comprised in the first wireless device to the second wireless device. One method comprises the steps of receiving, in the first wireless device, using a short distance communication technology, a hardware identifier of the second wireless device, sending, from the first wireless device, the hardware identifier and information identifying the first security application to the network node, receiving, in the network node, from the first wireless device, the hardware identifier of the second wireless device and the information identifying the security application and authorising, in the network node, the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device.
39 Citations
40 Claims
-
1. A method performed in a system comprising a first wireless device, a second wireless device and a network node, for enabling distribution of a first security application comprised in the first wireless device to the second wireless device, the method comprising:
-
receiving, in the first wireless device, using a short distance communication technology, a hardware identifier of the second wireless device; sending, from the first wireless device, the hardware identifier and information identifying the first security application to the network node; receiving, in the network node, from the first wireless device, the hardware identifier of the second wireless device and the information identifying the security application; and authorising, in the network node, the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, performed in a first wireless device, of enabling distribution of a first security application comprised in the first wireless device to a second wireless device, the method comprising:
-
receiving, using a short distance communication technology, a hardware identifier of the second wireless device; and sending the hardware identifier and information identifying the first security application to a network node, thereby enabling the network node to authorise the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method performed in a network node of enabling distribution of a first security application comprised in a first wireless device to a second wireless device, the method comprising:
-
receiving, from the first wireless device, a hardware identifier of the second wireless device and information identifying the security application; authorising the second wireless device to receive and/or activate a second security application associated with a security application of the first wireless device. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method, performed in a second wireless device, of enabling distribution of a first security application comprised in a first wireless device to the second wireless device, the method comprising:
-
receiving, using a short distance communication technology, information identifying the first security application of the first wireless device; and sending a hardware identifier of the second wireless device and information identifying the first security application to a network node, thereby enabling the network node to authorise the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device.
-
-
30. A system, comprising a first wireless device, a second wireless device and a network node, for enabling distribution of a first security application comprised in the first wireless device to the second wireless device, comprising:
-
a first wireless device, comprising; communication circuitry for short distance communication; processing circuitry configured to; i. receive, using the communication circuitry, a hardware identifier of the second wireless device; and ii. send, using the communication circuitry, the hardware identifier and information identifying the security application to a network node, thereby enabling the network node to authorise the second wireless device to get access to a second security application associated with the security application of the first wireless device; and a network node, comprising; communication circuitry for short distance communication; processing circuitry configured to; i. receive, using the communication circuitry, from the first wireless device, a hardware identifier of the second wireless device and information identifying the security application; and ii. authorise the second wireless device to access a security application associated with a second security application of the first wireless device; and a second wireless device.
-
-
31. A first wireless device, for enabling distribution of a first security application comprised in the first wireless device to a second wireless device, comprising:
-
communication circuitry for short distance communication; processing circuitry configured to; iii. receive, using the communication circuitry, a hardware identifier of the second wireless device; and iv. send, using the communication circuitry, the hardware identifier and information identifying the security application to a network node, thereby enabling the network node to authorise the second wireless device to get access to a second security application associated with the security application of the first wireless device. - View Dependent Claims (32, 33, 34, 35)
-
-
36. A network node, for enabling distribution of a first security application comprised in a first wireless device to a second wireless device, comprising:
-
communication circuitry for short distance communication; processing circuitry configured to; receive, using the communication circuitry, from the first wireless device, a hardware identifier of the second wireless device and information identifying the security application; and authorise the second wireless device to access a security application associated with a second security application of the first wireless device. - View Dependent Claims (37, 38, 39)
-
-
40. A second wireless device, for enabling distribution of a first security application comprised in a first wireless device to the second wireless device, comprising:
-
communication circuitry for short distance communication; processing circuitry configured to; receive, using a short distance communication technology, information identifying the first security application of the first wireless device; and send a hardware identifier of the second wireless device and information identifying the first security application to a network node, thereby enabling the network node to authorise the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device.
-
Specification