CA2894990A1 - Automatic mobile provisioning system - Google Patents

Automatic mobile provisioning system Download PDF

Info

Publication number
CA2894990A1
CA2894990A1 CA2894990A CA2894990A CA2894990A1 CA 2894990 A1 CA2894990 A1 CA 2894990A1 CA 2894990 A CA2894990 A CA 2894990A CA 2894990 A CA2894990 A CA 2894990A CA 2894990 A1 CA2894990 A1 CA 2894990A1
Authority
CA
Canada
Prior art keywords
deployable
subscriber
customer care
hss
care server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA2894990A
Other languages
French (fr)
Inventor
Yichuang Jin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
STAR SOLUTIONS INTERNATIONAL Inc
Original Assignee
STAR SOLUTIONS INTERNATIONAL Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by STAR SOLUTIONS INTERNATIONAL Inc filed Critical STAR SOLUTIONS INTERNATIONAL Inc
Priority to CA2894990A priority Critical patent/CA2894990A1/en
Publication of CA2894990A1 publication Critical patent/CA2894990A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A system for automatically provisioning deployable mobile networks is provided. The system includes an enhanced customer care server in center, transferrable media carried by subscribers, and a verification module in the deployable. The enhanced customer care server comprises of a computer, a shared encryption key, a private key, and an 10 device. The transferrable media in some embodiments is a QR barcode sticker or mobile device internal storages.
The verification module in the deployable contains a computer, 10 device, a shared decryption key, and a public key. The verification module reads the subscriber information from the transferrable media. It verifies the signing signature and decrypts the subscriber information before porting into the deployable HSS.

Description

Automatic Mobile Provisioning System Technical Field [0001] The technology described herein relates to a cellular network subscriber provisioning for a deployable mobile network. Particular embodiments relate to systems and apparatus for setting up provisioning data for any authorized mobiles to use the service provided by the deployable mobile network.
Background
[0002] The mobile network security has been improved significantly. Staring from 3G UMTS, mobile network performs mutual authentication, i.e. not only mobile handsets are authenticated by mobile networks but also mobile networks are authenticated by mobile handsets. Without knowing mobile subscribers secret information, a mobile network cannot offer services to mobile subscribers.
[0003] A mobile operator employs a centralized Home Subscriber Server (HSS) to program mobile subscriber information. When a mobile accesses the mobile network, HSS
is used to authenticate the mobile to access the mobile network and also used to authenticate the mobile network by the mobile subscriber. A centralized HSS is easy to accommodate frequent updates of mobile subscribers.
[0004] The public safety LTE network consists of a fixed wireless network as well as many independent deployables (see Fig. 1). Each deployable is a complete and independent mobile network. In order for the deployable to offer mobile services to public safety personals, all public safety personals using the deployable require be pre-programmed into the deployable. The public safety personals may be transfers from one area to another and hence use different deployables.
Most likely all the personals will use the public safety fixed mobile network.
Hence all public safety personals needs be programmed not only on the centralized HSS of the fixed mobile network but also on each deployable's HSS. Since subscribers frequently change, it is extremely difficult in synchronizing subscriber infOrmation in centralized HSS and all deployables.
[0005] There is a general desire for simplying subscriber provisioning procedures. Ideally once subscribers are programmed in the centralized HSS, these subscribers can be automatically programmed into deployables.
[0006] The foregoing examples of the related art and limitations related thereto are intended to be illustrative and not exclusive. Other limitations of the related art will become apparent to those of skill in the art upon a reading of the specification and a study of the drawings.
Summary
[0007] The technology described herein provides an automatic provisioning system for deployable mobile networks. Figure 1 shows the public safety mobile networks.
It consists of a fixed mobile network and many complete and independent deployable mobile networks. The fixed mobile network is same as ones used in mobile operators. It comprises of a core network and many radia access networks (RAN). The centralized HSS holds subscribers information and their authentication secrets. Subscriber information is usually provisioned via a Customer Care Server. Deployable is a complete and independent mobile network packaged in a transportable form factor. Each deployable has its own HSS and requires mobile subscribers be provisioned into the HSS again.
[0008] The invention consists of an enhanced customer care server, a standard centralized HSS, subscriber information transferable media, deployable verification module, and the standard HSS
in deployables.
[0009] Particular embodiments provide an enhanced centralized customer care server. A
centralized care server is typically used to configure mobile subscriber information for the centralized HSS. With the enhancement, the same subscriber information is encrypted and signed by the enhanced customer care server. The result is written to a transferable media. Signature is used to prove that the information is trusted and can be used in deployable while the encryption is used to provide protection so that only the deployable who knows decryption key can use the information.
[0010] Certain embodiments also add organization such as country, states or province, municipal and depart such as fire, ambulance, police information into the encrypted subscriber information.
This additional information helps identify subscribers and helps specify filtering in deployables verification module.
[0011] Particular embodiments employ i QR barcode sticker as transferable media. The sticker is attached to the mobile phone. The other embodiments directly employ mobiles' internal storage as transferable media.
[0012] Particular embodiments have a verification module inside the deployable to read subscriber information from transferable media, validate the authentic of the data by verifying the signature, check supported subscriber filters, and to decrypt and port the data into deployable HSS.
[0013] Certain embodiments use already in-service mobile devices to read information from the transferable media, send the data to the deployable to validate the authentic of the data by verifying the signature, check supported subscriber filters, decrypt the data, and port the data into deployable HSS.
Brief Description of Drawings
[0014] Exemplary embodiments are illustrated in referenced figures of the drawings. It is intended that the embodiments and figures disclosed herein are to be considered illustrative rather than restrictive.
[0015] Fig. 1 illustrates the components of the public safety mobile networks combining fixed and deployable networks.
[0016] Fig. 2 illustrates an enhanced customer care server that generates, signs, and put the subscriber information into a transferring media.
[0017] Fig. 3 illustrates the deployable verification module that reads, validates, passes filtering, and ports subscriber data into deployable HSS.
[0018] Fig. 4 is a flowchart illustrating the process that occurs according to one embodiment when a subscriber information is generated.
[0019] Fig 5 is a flowchart illustrating the process that occurs according to one embodiment when a subscriber information is ported into the deployable.
Description
[0020] Throughout the following description, specific details are set forth in order to provide a more thorough understanding to persons skilled in the art. However, well known elements such as mobile network elements defined in 3GPP and 3GPP2 standard bodies may not have been shown or described in detail to avoid unnecessarily obscuring the disclosure.
Accordingly, the description and drawings are to be regarded in an illustrative, rather than a restrictive, sense.
[0021] In embodiments described herein, an enhanced customer care server is used to provision the centralized HSS for the fixed mobile network as a normal customer care server. Figure 2 shows the enhanced customer care server 20. The enhancement 21 is further equipped with a computer module 22, an encryption key 23 and a private key 24 for digital signature. The computer may be part of the normal customer care server. The encryption key and corresponding public key are shared with all deployables. Typically the security portions of of a subscriber information, when presented to the customer care server, are already encrypted so that only the HSS application is able to decrypt and 'use the keys for subscriber authentications and authorizations. After successfully provisioning the centralized HSS, the computer 22 packs the whole subscriber information into a digital packet. Additionally the computer will also add subscriber organization data into the subscriber information. The computer encrypts the digital packet using the encryption key 23 so that only the public safety deployables are able to decrypt the package. The computer further signs the encrypted packet using the private key 24 to prove signed packet's authentic to the deployables.
[0022] The signed digital packet is written into a transferrable media using the 10 device 25 and attached to the corresponding mobile phone. In particular embodiments, the transferrable media is QR barcode stickers. In the other embodiments, the transferrable media is USB flash driver or mobile phones' internal storage. There is no specific requirement on the transferrable media so long as it can be easily attached to the mobile phone and carried by the subscriber.
[0023] When a public safety personal reaches an deployable areas, its mobile may not be provisioned into the deployable. In this case, the public safety personal simply presents its transferrable media to the deployable. The subscriber information will be immediately provisioned into the deployable and its phone is ready to use afterwards. The Fig 3 shows the deployable 30 that has verification module 31. The verification module consists of an 10 device 35, an encryption key 33, a public key 34, and computer 32. The verification module may share the same computer used in the deployable. The verification module uses its 10 device 35 to read the signed digital packet from the transferable media. The module first uses the public key 34 to verify the authentic of a signed packet. Once verified, it uses encryption key 33 to decrypt the digital packet. If there are filters configured, the computer subtracts organization info and exams the filters. If the subscriber information passes the filters, the computer ports the subscriber information into its HSS 36. In certain embodiments, the deployable may use any already provisioned mobile device as the 10 device using its Bluetooth, Near Field Communication, Camera, etc. to read the signed digital packet from the transferrable media.
The provisioned mobile device then sends the signed digital packet to the deployable. The verification, decryption, filtering, and porting procedures happen the same way as using internal 10 device.
[0024] Fig. 4 illustrates the procedure happens in the enhanced customer care server. The server first collects subscriber information and provisions the centralized HSS. It then packs the all subscriber info including additional organization information into a digital packet. It encrypts and signs the packet and then writes into a transferrable media.
[0025] Figure 5 illustrates the procedures that occur in the deployable. The procedures are the reverse of what happens in the enhanced customer care. The signed packet is first read by the deployable, then verified using the signing signature, and decrypted and ported in to the HSS in deployable.

Claims (11)

WHAT IS CLAIMED IS:
1. An automatic provisioning system comprising:
an enhanced customer care server;
a transferrable media carried by the subscriber or attached to the subscriber's mobile device;
a verification module in the deployable to automatically verify and port into the deployable HSS.
2. The system of claim 1 wherein the enhanced customer care server consists of computer, a shared encryption key, a private key, and an 10 device.
3. The system of claim 1 wherein the enhanced customer care server, after successfully provisioning the centralized HSS, packs all subscriber information including additional subscriber organization information into a digital packet for easy transferring.
4. The system of claim 1 wherein the enhanced customer care server further encrypts the digital packet using a shared encryption key so that the subscriber information is only accessible to the deployables.
4. The system of claim 1 wherein the enhanced customer care server further signs the encrypted digital packet to prove its authentic to the deployables.
5. The system of claim 1 wherein the enhanced customer care server writes the signed and encrypted digital packet into a transferrable media.
6. The system of claim 1 wherein the transferrable media is easy to carry by human or easy to attach to subscriber mobile devices.
7. The system of claim 1 wherein the transferrable media in certain embodiments is QR
barcode stickers which can be easily stuck into the back of subscriber mobile devices.
8. The system of claim 1 wherein the transferrable media in other embodiments is the USB flash driver or mobile's internal storage.
9. The system of claim 1 wherein the deployable includes the verification module which consists of a 10 device, a computer, a shared encryption key, and a public key.
10. The verification module of claim 9 wherein using the 10 device to read the signed and encrypted digital packet from the transferrable media, verify the authentic by validating the signing signature using the public key, decrypt the packet using the shared encryption key, and port the decrypted subscriber information into the deployable HSS.
11. The verification module of claim 9 wherein the 10 device in certain embodiment is any of in-service mobile devices. The unprovisioned mobile device presents its signed and encrypted subscriber information to an already in-service mobile device via Bluetooth, Near Field Communication, or Camera communication mechanism. The in-service mobile device reads the digital packet and sends to the deployable for verification and porting to the deployable HSS.
CA2894990A 2015-06-23 2015-06-23 Automatic mobile provisioning system Abandoned CA2894990A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA2894990A CA2894990A1 (en) 2015-06-23 2015-06-23 Automatic mobile provisioning system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA2894990A CA2894990A1 (en) 2015-06-23 2015-06-23 Automatic mobile provisioning system

Publications (1)

Publication Number Publication Date
CA2894990A1 true CA2894990A1 (en) 2016-12-23

Family

ID=57575298

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2894990A Abandoned CA2894990A1 (en) 2015-06-23 2015-06-23 Automatic mobile provisioning system

Country Status (1)

Country Link
CA (1) CA2894990A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019118204A1 (en) * 2017-12-15 2019-06-20 Motorola Solutions, Inc. Profiles in deployable wireless communications systems
US10716001B2 (en) 2017-08-14 2020-07-14 Star Solutions International Inc. Self-provisioning of mobile devices in deployable mobile telecommunications networks

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10716001B2 (en) 2017-08-14 2020-07-14 Star Solutions International Inc. Self-provisioning of mobile devices in deployable mobile telecommunications networks
WO2019118204A1 (en) * 2017-12-15 2019-06-20 Motorola Solutions, Inc. Profiles in deployable wireless communications systems
US10721608B2 (en) 2017-12-15 2020-07-21 Motorola Solutions, Inc. Profiles in deployable wireless communications systems
GB2583194A (en) * 2017-12-15 2020-10-21 Motorola Solutions Inc Profiles in deployable wireless communications systems
GB2583194B (en) * 2017-12-15 2021-08-18 Motorola Solutions Inc Profiles in deployable wireless communications systems

Similar Documents

Publication Publication Date Title
US9788209B2 (en) Apparatus and methods for controlling distribution of electronic access clients
JP6262278B2 (en) Method and apparatus for storage and computation of access control client
EP2630816B1 (en) Authentication of access terminal identities in roaming networks
US20180091978A1 (en) Universal Integrated Circuit Card Having A Virtual Subscriber Identity Module Functionality
US10271213B2 (en) Methods and apparatus for providing management capabilities for access control clients
KR101743161B1 (en) Policy-based techniques for managing access control
CN111434087B (en) Method and electronic device for providing communication service
CN103477666B (en) Mobile device is connected, is connected to vehicle and the cloud service of internet
TWI469654B (en) Methods and apparatus for delivering electronic identification components over a wireless network
US9225696B2 (en) Method for different users to securely access their respective partitioned data in an electronic apparatus
TWI507005B (en) Virtual subscriber identity module
EP2887610B1 (en) Binding mobile device secure software components to the SIM
KR102173534B1 (en) Methods for providing information of mobile network operator and apparatus for performing the same
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
US20140171029A1 (en) Method and apparatus for authenticating subscribers to long term evolution telecommunication networks or universal mobile telecommunications system
WO2019109640A1 (en) Method and device for locking sim card
Zhao et al. SecureSIM: rethinking authentication and access control for SIM/eSIM
CA2894990A1 (en) Automatic mobile provisioning system
Vahidian Evolution of the SIM to eSIM
WO2016030832A1 (en) Method and system for mobile data and communication security
TWM464940U (en) Secret protection communication system based on position

Legal Events

Date Code Title Description
FZDE Dead

Effective date: 20180117