WO2016075622A1 - Communication avec une pluralité de réseaux cellulaires à l'aide d'un modem cellulaire et de modules d'identité d'abonné virtuels stockés dans une carte de circuit intégré universelle incorporée (euicc) en fonction d'un logiciel - Google Patents
Communication avec une pluralité de réseaux cellulaires à l'aide d'un modem cellulaire et de modules d'identité d'abonné virtuels stockés dans une carte de circuit intégré universelle incorporée (euicc) en fonction d'un logiciel Download PDFInfo
- Publication number
- WO2016075622A1 WO2016075622A1 PCT/IB2015/058681 IB2015058681W WO2016075622A1 WO 2016075622 A1 WO2016075622 A1 WO 2016075622A1 IB 2015058681 W IB2015058681 W IB 2015058681W WO 2016075622 A1 WO2016075622 A1 WO 2016075622A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- software
- euicc
- cellular
- virtual
- core processor
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
Definitions
- Example embodiments of the present invention relate generally to the fields of semiconductors and telecommunications, and more particularly, to the design and implementation of embedded systems within cellular equipment configured to utilize virtualized Subscription Identity Module (SIM) cards to access one or more cellular networks.
- SIM Subscription Identity Module
- the third party entities could be either enterprises or consumers who own these connected devices may be interchangeably referred to herein as the owners of the connected (or loT) devices.
- SIM cards have evolved other the past few years and their form factors will ineluctably change further in the future.
- mini-SIM mini-SIM
- 4FF card nano-SIM
- MFF2M machine-to-machine
- LoT Internet of Things
- GSM Association which is the largest association of mobile operators and related companies, essentially standardized how reprogrammable SIM cards are architected and remotely provisioned.
- GSM Association GSM Association
- virtual SIM card technology lowers the barriers to switching networks and thereby fosters a healthy and competitive telecommunications landscape in which MNOs and MVNOs compete on price, service quality and innovation.
- MNOs stand to enormous benefit from virtual SIM card technology as well.
- the technology may facilitate enhanced distribution because M(V)NO service discovery, selection and provisioning could all take place remotely over the "cloud.” Such a mobile application could then help effectively streamline the redundant Know Your Customer (KYC) procedures currently in effect in many countries.
- KYC Know Your Customer
- this technology can eliminate the costs of procuring, testing, certifying and distributing physical SIM cards by removing the inherent logistical complexities associated with managing physical SIM cards. This will enable MNOs to better focus capital spend and management attention on network capacity, coverage and other differentiated services.
- this technology may reduce the current cost of acquiring and retaining subscribers, potentially improving thus the bottom line for M(V)NOs.
- SIM card technology may provide important environmental benefits by lowering the overall volume of manufactured SIM cards globally. It remains unclear if most of the billions of SIM cards produced each year are still not halogen-free as halogen is toxically corrosive, which therefore has the potential to damage people's health and their environment.
- Example connected devices described herein may comprise secure mobile equipment with various sensors (e.g. gyroscope, accelerometer, camera, thermometer, etc.). These connected devices may remotely communicate with a dedicated backend application running a service specific to the devices' deployment. These connected devices may be configured to communicate with a subscription management platform for provisioning and management of virtual SIM cards.
- sensors e.g. gyroscope, accelerometer, camera, thermometer, etc.
- These connected devices may remotely communicate with a dedicated backend application running a service specific to the devices' deployment.
- These connected devices may be configured to communicate with a subscription management platform for provisioning and management of virtual SIM cards.
- these loT devices are contemplated to operate without an on-site human operator.
- an example of such a device may be able to download and use a plurality of concurrent virtual SIM cards either by itself or via an off- site (remote) human operator.
- Such an loT device may work in conjunction with a subscription management server, and in some embodiments may be connected to one or more backend servers for application specific tasks (loT Applications).
- the subscription management server may be composed of various components facilitating the secure creation, provisioning and management of virtual SIM cards.
- a PCB which contains the main chip that contains all the device's operating system and applications. This chip is referred as to the system-on-chip.
- example embodiments of the present invention describe a system-on-chip from both hardware and software perspectives, as well the
- an apparatus includes a multi-core processor, a software-based embedded Universal Integrated Circuit Card (eUICC), and one or more memories storing computer-executable instructions that, when executed by the multi-core processor, configure the apparatus to communicate with a plurality of cellular networks using one or more virtual subscriber identity module (SIM) cards stored in the software-based eUICC.
- SIM subscriber identity module
- the software- based eUICC comprises an on-die eUICC.
- the cellular modem comprises a virtual cellular modem, while in other embodiments the cellular modem includes a dedicated hardware element.
- the cellular modem comprises a software- based modulator-demodulator device which allows communication by the connected device over a cellular network.
- the apparatus may include a virtual bus system configured to transmit communications between a plurality of multi-core processor applications using a high-level programming interface.
- the one or more memories further store computer- executable instructions that, when executed by the multi-core processor, cause the integrated circuit chip to self-provision virtual SIM cards accessible over-the-air by cellular network operators.
- the computer-executable instructions when executed by the multi-core processor, cause the apparatus to self-provision virtual SIM cards accessible over-the-air by cellular network operators using a local certificate stored in the software- based eUICC. Additionally or alternatively, the apparatus is assigned a unique random cryptographic key only known by a remote server upon registration of said chip.
- the one or more memories further store computer- executable instructions that, when executed by the multi-core processor, cause the apparatus to dynamically switch cellular networks without human intervention.
- a method for performance by a device having an integrated circuit chip including a multi-core processor, a cellular modem, and a software-based embedded Universal Integrated Circuit Card (eUICC), and one or more memories.
- the method includes communicating, using the cellular modem, with a plurality of cellular networks using one or more virtual subscriber identity module (SIM) cards stored in the software- based eUICC.
- SIM virtual subscriber identity module
- the software- based eUICC comprises an on-die eUICC.
- the cellular modem comprises a virtual cellular modem, while in other embodiments the cellular modem includes a dedicated hardware element.
- the cellular modem comprises a software- based modulator-demodulator device which allows communication by the connected device over a cellular network.
- the method may include transmitting, by a virtual bus system, communications between a plurality of multi-core processor applications using a high-level programming interface.
- the method further includes self-provisioning virtual SIM cards accessible over-the-air by cellular network operators.
- the self-provisioning of the virtual SIM cards accessible over-the-air by cellular network operators uses a local certificate stored in the software-based eUICC.
- said integrated circuit chip may be assigned a unique random cryptographic key only known by a remote server upon registration of said chip.
- the method further includes dynamically switching between cellular networks without human intervention.
- an apparatus in yet another example embodiment, includes an integrated circuit chip including a multi-core processor, a software-based embedded Universal Integrated Circuit Card (eUICC), and one or more memories.
- the apparatus further includes means for communicating with a plurality of cellular networks using one or more virtual subscriber identity module (SIM) cards stored in the software-based eUICC.
- SIM virtual subscriber identity module
- the software- based eUICC comprises an on-die eUICC.
- the means for communicating with the plurality of cellular networks comprises a cellular modem, which in some embodiments may comprise a virtual cellular modem, while in other embodiments may comprise a dedicated hardware element.
- the virtual modem comprises a software- based modulator- demodulator device which allows communication by the connected device over a cellular network.
- the apparatus may include means for transmitting communications between a plurality of multi-core processor applications using a high- level programming interface.
- the apparatus further includes means for self-provisioning virtual SIM cards accessible over-the-air by cellular network operators.
- the self-provisioning of the virtual SIM cards accessible over-the-air by cellular network operators uses a local certificate stored in the software-based eUICC.
- said integrated circuit chip may be assigned a unique random cryptographic key only known by a remote server upon registration of said chip.
- the apparatus further includes means for dynamically switching between cellular networks without human intervention.
- FIG. 1 provides a high-level system overview of an end-to-end virtual SIM platform, in accordance with example embodiments described herein;
- FIG. 2 illustrates a hardware component block diagram of the S2oC, in accordance with example embodiments described herein;
- FIG. 3 illustrates the core software stack of S2oC, in accordance with example embodiments described herein;
- FIG. 4 illustrates the software architecture of the on-die eUICC, in accordance with example embodiments described herein;
- FIG. 5 illustrates a procedure for communication with the virtual modem, in accordance with example embodiments described herein;
- FIG. 6 illustrates a procedure for an automated network switching, in accordance with example embodiments described herein.
- FIG. 7 illustrates a sequence flow for an automated network, in accordance with example embodiments described herein.
- each software operation described herein may be implemented by various means, such as hardware, firmware, processor, circuitry, and/or other devices associated with execution of software including one or more computer program instructions.
- one or more of the procedures described herein may be embodied by computer program instructions.
- the computer program instructions which embody the described procedures may be stored by a memory of an apparatus and executed by a processor of the apparatus.
- any such computer program instructions may be loaded onto a computer or other
- programmable apparatus e.g., hardware
- a computer-readable memory e.g., a computer-readable storage medium
- the computer program instructions may also be stored in a computer-readable memory (e.g., a computer-readable storage medium) that may direct a computer or other programmable apparatus to operate in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture, the execution of which implements the specified functions.
- instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operations to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the computer program instructions executed on the computer or other programmable apparatus cause the performance of operations for implementing the specified functions.
- FIG. 1 a high-level system overview of an end-to-end virtual SIM platform is illustrated.
- a single device that may itself be a connected device such as a smartphone, laptop, tablet, drone, vehicle, thermostat, watch, or the like
- a virtual SIM card management platform (referred to herein as an MNOHub server) facilitates the provisioning (e.g., purchase, activation, deactivation, and deletion, or the like) of the virtual SIM cards.
- the virtual SIM card management platform further communicates with a variety of MNOs or MVNOs associated with several of the networks available to the device and that offer the various virtual SIM cards for sale.
- example embodiments include apparatuses, systems and a set of methods for virtualizing physical SIM cards using a plurality of concurrent eUICCs (embodied in software and/or hardware).
- example embodiments may comprise connected devices such as loT devices.
- alternative embodiments utilizing virtual SIM cards may be mobile stations that may comprise cellular telephones or which may otherwise be operated by users, as disclosed in U.S. Non-Provisional Patent Application No. 14/856,974, filed September 17, 2015, the entire contents of which are incorporated herein by reference.
- example mobile stations or connected devices may comprise a "SIM-less" System-on-Chip (S2oC) with integrated reprogrammable cellular network connectivity, although particular examples of S2oC architecture are described below in connection with connected devices that may, for instance, comprise loT devices.
- SIM-less System-on-Chip
- An example connected device may generally have multiple sensors attached as peripherals (e.g., a camera, a gyroscope, etc.) and may further include network access capabilities.
- peripherals e.g., a camera, a gyroscope, etc.
- the owner Upon purchase of the connected device, the owner is required to have identity verification performed before the device is activated, due to KYC procedures enforced by a cellular platform operator. In one example, the owner can present his state or national ID card at the point of sale. The merchant can then use a dashboard connected to the virtual SIM card management platform to activate both the account and the device, as described in greater detail in U.S. Non-Provisional Patent Application No. 14/856,974, filed September 17, 2015.
- example embodiments contemplated herein may instead pre-install a trusted proxy client 302 into the connected device, as shown in FIG. 3.
- the trusted proxy client 302 can exchange data with the MNOHUB server through HTTPS and/or secure socket connections.
- the trusted proxy client 302 allows the connected device to download additional virtual SIM cards and other items (e.g. prepaid plans, software for
- loT Applications 304 or the like from a trusted virtual store associated with the MNOHUB server.
- the trusted virtual store may be a digital marketplace where virtual SIM cards are displayed for purchase based on the MNOs' campaign requirements. These campaign requirements may include images, profile data (IMSIs, static/dynamic Kis, binaries of applets, GSM file definition), unit price, discounts, eligibility, location, effective date, expiration date, etc. While devices that provide a trusted Ul client may provide visual indicators of current local signal strengths, embodiments for connected devices such as loT devices will often not rely upon a trusted Ul client, and thus may not provide a user interface for active user network selection.
- such embodiments may provide the connected device with a list of the available virtual SIM cards from the MNOHUB server, and the connected device may use filters based on location, current local signal strengths, or the like to identify a virtual SIM card (and corresponding network) to utilize.
- the filtering process may generally rely on the multi-active mode of the connected device, which can provide the signal strengths for all nearby cell towers.
- the signal information is more specifically provided by a trusted baseband client of the connected device based on its low-level implementation of digital signal processing (e.g., GSM stack) and access to a virtual modem (discussed below) and an RF antenna.
- the trusted virtual store determines if the item is free of charge (e.g. $0) or not. If the item is not free of charge, the trusted virtual store uses the billing information (prepaid credits, credit card on file, etc.) associated with an owner of the connected device to charge for the transaction. Upon success of the transaction, it carries on the default procedure for installing a free item. This procedure allows download of the .sim file by the trusted proxy client 302 in similar fashion as described in connection with the downloading of a .sim file by a trusted Ul client in U.S. Non-Provisional Patent Application No. 14/856,974, filed September 17, 2015.
- the file may then be unarchived locally in a directory including all the assets and metadata of said virtual SIM card.
- Network attributes are then parsed from the directory files and passed to the trusted baseband client.
- the trusted proxy client 302 then triggers a proxy procedure by which the MNOHUB server sends personalization commands to a profile manager.
- These commands may, for instance, be coded as Application Protocol Data Units (APDUs), according to the message format defined in ISO 7816-4.
- APDUs Application Protocol Data Units
- the trusted proxy client 302 may be an Android application using SEEK's SmartCard API which implements GSMA's Open Mobile API specifications. It may also be a Java ME or any client application provided it has the corresponding Application Programming Interfaces (APIs) used by its Android counterpart.
- APIs Application Programming Interfaces
- the trusted proxy client 302 is granted access to the eUICC and has access control rules set up enabling it to securely and confidentially communicate with a profile manager. As previously described, the trusted proxy client 302 provides a proxy functionality facilitating communication between the MNOHUB server and a profile manager for installing, deleting or updating virtual SIM cards.
- Authentication prior to the connected device using the trusted proxy client 302 is at least password-based.
- another mode of authentication may utilize a local certificate stored in the eUICC (which may, in some embodiments, be managed by an identity manager, in a similar fashion as virtual SIM cards are managed by the profile manager). This facilitates the secure self-provisioning of virtual SIM cards.
- authentication for an loT Application 304 involves the use of identity framework 310 (e.g., a series of APIs that enable communication with the identity manager) to provide the loT Application 304 with the ability for self-authentication via a local certificate managed by the identity manager.
- identity framework 310 e.g., a series of APIs that enable communication with the identity manager
- the MNOHUB server and a profile manager may use a mutual authentication procedure to create a secure communication channel (e.g. SCP 02 or SCP 03) before the profile manager can confidently execute a transaction.
- a secure communication channel e.g. SCP 02 or SCP 03
- the transaction is an installation.
- the profile manager associated with a connected device may be hosted on a hardware or hardware-based eUICC (although a software implementation of an eUICC for a connected device is also contemplated in some embodiments).
- FIG. 4 illustrates an example software architecture of an on-die eUICC, which is similar to the architecture described in connection with FIGS. 4A and 4B of U.S. Non-Provisional Patent Application No.
- an identity manager 402 is also deployed in the eUICC.
- the identity manager functionality may be integrated directly into the profile manager.
- the identity manager 402 provides an authentication service to all loT
- the MNOHUB server is the only entity capable of exchanging data with them as a mutual-authentication procedure is always required before any transaction (CREATE
- PROFILE INSTALL PROFILE, DELETE PROFILE, etc.
- an access control mechanism e.g., PKCS#15
- PKCS#15 an access control mechanism within the operating system of the connected device to prevent an unauthorized application to "brute force" attack the profile manager or other resident applets managed within the eUICCs.
- a dashboard allows the owner of the connected device to launch campaigns for one or a plurality of connected devices.
- the trusted proxy client 302 is programmed to "CALL HOME" at a given period of time to retrieve updates.
- the MNOHUB server can proactively request that the trusted proxy client 302 receive updates (i.e., push sessions). Automated network switching could then occur based on various heuristics built-into the connected device, as illustrated in FIGS. 6 and 7.
- FIG. 2 a hardware component block diagram of an example S2oC architecture is illustrated.
- the example S2oC architecture in FIG. 2 illustrates an integrated circuit that integrates all components of a computer system into a single die.
- the die is a small block of semiconducting material (using nm manufacturing process) produced from a wafer diced into small pieces. Each die contains a copy of the integrated circuit.
- the die contains a multi-core processor 202, a cellular modem (shown in FIGS. 2 and 3 as virtual cellular modem (VCM) 204 and VCM 306, respectively, although in some embodiments it should be understood that the cellular modem may include its own dedicated hardware element) and virtual subscribed identity modules (SIMs) for cellular connectivity.
- VCM virtual cellular modem
- SIMs virtual subscribed identity modules
- the virtual SIM cards are contained in an on-die eUICC (e.g., on-die hardware-based eUICC 206 and/or on-die software- based eUICC 208) connected to the multi-core processor 202 via the VCM 204.
- on-die eUICC e.g., on-die hardware-based eUICC 206 and/or on-die software- based eUICC 208
- hardware-based eUICC 206 includes a dedicated physical element electrically connected to the multi-core processor 202
- software-based eUICC 208 includes only a logical connection to the multi-core processor 202. It should be understood, of course, that some alternative embodiments may utilize an off-die cellular modem and/or off-die eUICC.
- the multi-core processor 202 may, in some embodiments, include a central processing unit and a program read-only memory for storing instructions for the functions to be executed by the multi-core processor.
- the VCM 204 may be integrated within the multi-core processor 202 and, as noted above, the VCM 204 is connected to the eUICC.
- the trusted baseband client of the S2oC architecture manages the VCM 204, which provides the logic for the master layer.
- the eUICC hosts the profile manager, which provides the logic for the slave layer.
- the VCM 204 is described as a software-based modulator-demodulator (modem) device which allows communication of the connected device over a cellular network. As such, the VCM 204 uses a special driver that allows this communication.
- the VCM Interpreter processes all commands originating from the multi-core processor 202. In its most basic form, the VCM 204 supports standard AT style commands as specified in ETSI GSM 07.07 / 3GPP TS 27.007 for controlling a GSM phone or modem. However, in some embodiments the VCM 204 also includes special purpose commands used in a different operation mode.
- the S2oC architecture integrates the modem functionality into an application processor of the multi-core processor, in which case an improved communication protocol is introduced to maximize the benefits of the integration.
- the modem functionality may be executed by a baseband processor of the multi-core processor.
- the VCM 's software may be based on the trusted baseband client, which is running in one single multi-core processor 202 using a real-time OS stack.
- the trusted baseband client is optimized so it can run in parallel with the trusted proxy client 302 while sharing computing processing resources.
- the multi-SIM, multi-band nature of the VCM 204 allows the connected device to run - in parallel - various communication sessions through multiple cell towers and networks.
- the dynamic measurement of various signal strengths also allows fetching of the optimal virtual SIM card from the trusted virtual store.
- VCM communication protocol is described as providing a higher-level abstraction of AT commands.
- AT commands have been used since 1981 and still consist of a series of short text strings which are combined together to produce complete commands for operations such as dialing, hanging up, and changing the parameters of a connection.
- RIL Radio Interface Layer
- many vendors have introduced advanced proprietary features that extend basic AT commands.
- RIL Radio Interface Layer
- an OEM would provide a library (ril.so) that implements such interface.
- the multi-core processor could send ISO 7816-4 APDU commands to the eUICC via the VCM 204 using AT+CSIM structured commands.
- solicited_call (int virtualSIMCardID, BYTE* toMSISDN, int length);
- readlMSI int virtualSIMCardID
- exchangeAPDU int virtualSIMCardID, BYTE* commandAPDU, int length
- the VCM 204 could be running a Java Card Connected Edition Virtual Machine (VM) and hence the trusted baseband client could also be a Java application.
- VM Java Card Connected Edition Virtual Machine
- the Java Card Connected Edition features a new VM and an enhanced execution environment with network-oriented features.
- Applications can be developed as classic card applets requested by ISO 7816 APDU commands or as servlets using HTTP to support web- based schemes of communication with the eUICC.
- An IntentService-like mechanism as described in the Android framework is used where all the (asynchronous) messages between the multi-core processor applications (including the trusted proxy client 302) and the VCM 204 are abstracted.
- the VCM 204 may expose its services with an API.
- the API could be defined in a .vcml file.
- the .vcml file is essentially an interface file with all methods (functions) of the VCM described. If implemented in the C language, it could be a .h (header) file.
- the Android framework would use Java Native Interface (JNI) to communicate with the VCM 204.
- JNI Java Native Interface
- the virtual bus system 308 may be configured to be aware of all attached and running OS instances (Android OS, Baseband OS). The virtual bus system 308 can then forward messages by identifying the sender OS and the recipient OS. All running OS instances are attached to the virtual bus system 308 and permanently listen to messages. Accordingly, in some implementations, all major components may be virtualized.
- the "SIM-less mode" potentially allows therefore a complete virtualization of the application, baseband and eUICC software all running in one single processor. Such integration could improve the time-to-market for connected devices while optimizing the
- the VCML (Virtual Cellular Modem Language) file lists all services the VCM 204 can provide. For security purposes, only authorized applications can access the VCM framework. In some embodiments, this security measure is further enforced by not exposing the framework in the Android public APIs.
- the authorized multi-core processor applications will then bind to the Service and implements the APIs.
- the VCM 204 can also handle basic AT commands through a pass-through mode.
- FIG. 5 an example routing procedure is described for VCM-based communication.
- the operations described in FIG. 5 may, for instance, be performed by the connected device (e.g., an loT device) and may utilize the multi-core processor 202 and/or the other elements described above in association with FIGS. 2 and 3.
- the virtual bus system 308 may receive communications from one or more attached components of the S2oC.
- the VCM 306 may determine whether the communication is an AT command or not. In an instance in which the communication is an AT command, the command may be forwarded using a pass- through mode of operation in operation 506, in which case the procedure advances to operation 512, where the AT command is subsequently processed.
- the procedure advances to operation 508, in which it is determined whether the communication is a service call. If not, then the procedure returns to operation 502. If so, however, then the procedure advances to operation 510, in which the service call is translated into one or more AT commands. Subsequently, the procedure advances to operation 512, in which the one or more AT commands are processed.
- the trusted baseband client of a connected device selects a first network associated with MNO 1.
- the trusted baseband client determines that the signal from the first network is weak, and therefore performs a network scan to identify another network with a stronger signal, such as a second network associated with MNO 2.
- the trusted baseband client fetches a new virtual SIM card associated with MNO 2, which can be installed by the connected device to facilitate access to the second network having the stronger signal.
- the trusted baseband client is switches its connection to the second network, which is associated with MNO 2.
- FIG. 7 an example procedure is provided that illustrates a sequence flow for an automated network switching procedure.
- the operations described in FIG. 7 may, for instance, be performed by the connected device (e.g., an loT device) and may utilize the multi-core processor 202 and/or the other elements described above in association with FIGS. 2 and 3.
- the connected device polls for a list of neighboring towers to determine signal strengths associated with a plurality of MNO networks.
- the connected device determines whether a currently installed virtual SIM card is associated with the best network (e.g., the network having the strongest signal strength, cheapest cost, or the like).
- the procedure advances to operation 712 to switch to the best network.
- the procedure advances to operation 708, in which it is determined whether the connected device can purchase a virtual SIM card associated with the best network.
- the procedure returns to operation 702 to identify another network to evaluate. If so, however, then the procedure advances to operation 710, in which the connected device purchases a new SIM card associated with the best network. Subsequently, the procedure advances to operation 712, in which the connected device switches to the best network.
- example embodiments include apparatuses, systems and a set of methods for configuring a "SIM-less" System-on-Chip (S2oC) with integrated reprogrammable cellular network connectivity.
- SIM-less System-on-Chip
- S2oC System-on-Chip
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
L'invention concerne des appareils, des procédés et des systèmes pour configurer un système sur puce « sans module d'identité d'abonné (SIM) » (S2oC) avec une connectivité de réseau cellulaire reprogrammable intégrée. Des cartes de module d'identité d'abonné (SIM) distribuées numériquement peuvent être distribuées numériquement par un serveur à distance et téléchargées et gérées par le S2oC. Un contenant de carte SIM virtuelle peut être conditionné dans le S2oC et héberge un gestionnaire d'identité utilisé par une pluralité d'applications résidant dans le processeur multicœur du S2oC. Un modem virtuel ayant un protocole de communication personnalisé permet aux applications de processeur multicœur d'échanger des données avec le contenant de carte SIM virtuelle.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP15798244.8A EP3257281A1 (fr) | 2014-11-11 | 2015-11-10 | Communication avec une pluralité de réseaux cellulaires à l'aide d'un modem cellulaire et de modules d'identité d'abonné virtuels stockés dans une carte de circuit intégré universelle incorporée (euicc) en fonction d'un logiciel |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462078006P | 2014-11-11 | 2014-11-11 | |
US62/078,006 | 2014-11-11 | ||
US201562162740P | 2015-05-16 | 2015-05-16 | |
US62/162,740 | 2015-05-16 | ||
US201562171246P | 2015-06-05 | 2015-06-05 | |
US62/171,246 | 2015-06-05 | ||
US14/934,310 US10278062B2 (en) | 2014-09-17 | 2015-11-06 | Apparatuses, methods and systems for implementing a system-on-chip with integrated reprogrammable cellular network connectivity |
US14/934,310 | 2015-11-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016075622A1 true WO2016075622A1 (fr) | 2016-05-19 |
Family
ID=55953802
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2015/058681 WO2016075622A1 (fr) | 2014-11-11 | 2015-11-10 | Communication avec une pluralité de réseaux cellulaires à l'aide d'un modem cellulaire et de modules d'identité d'abonné virtuels stockés dans une carte de circuit intégré universelle incorporée (euicc) en fonction d'un logiciel |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP3257281A1 (fr) |
WO (1) | WO2016075622A1 (fr) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106211367A (zh) * | 2016-06-28 | 2016-12-07 | 深圳市斯凯荣科技有限公司 | 网络切换设备及系统 |
CN107483213A (zh) * | 2017-08-23 | 2017-12-15 | 北京华大智宝电子系统有限公司 | 一种安全认证的方法、相关装置及系统 |
WO2018182897A1 (fr) | 2017-03-28 | 2018-10-04 | Telit Technologies (Cyprus) Ltd. | Sim virtuel avec de multiples profils d'opérateurs de réseau mobile pour fonctionner sur de multiples réseaux ip sans fil |
WO2019219175A1 (fr) * | 2018-05-15 | 2019-11-21 | Huawei Technologies Co., Ltd. | Terminal de communication de module d'identité d'abonné multi-virtuel |
US10516990B2 (en) | 2014-09-17 | 2019-12-24 | Simless, Inc. | Apparatuses, methods and systems for implementing a trusted subscription management platform |
US10631160B2 (en) | 2014-09-17 | 2020-04-21 | Simless, Inc. | Apparatuses, methods and systems for virtualizing a reprogrammable universal integrated circuit chip |
EP3694241A1 (fr) * | 2019-02-05 | 2020-08-12 | Shenzhen Goodix Technology Co., Ltd. | Eu amélioré doté de modules d'identité d'abonnés intégrés (isim) par partage de ressources |
US11172352B2 (en) | 2014-09-17 | 2021-11-09 | Gigsky, Inc. | Apparatuses, methods, and systems for configuring a trusted java card virtual machine using biometric information |
US11606685B2 (en) | 2014-09-17 | 2023-03-14 | Gigsky, Inc. | Apparatuses, methods and systems for implementing a trusted subscription management platform |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110028135A1 (en) * | 2009-07-29 | 2011-02-03 | Prasanna Srinivasan | Virtual sim monitoring mode for mobile handsets |
CN102065582A (zh) * | 2009-11-17 | 2011-05-18 | 美国博通公司 | 一种通信方法和通信系统 |
WO2011106569A2 (fr) * | 2010-02-24 | 2011-09-01 | Qualcomm Incorporated | Procédés et systèmes pour gérer la participation à de multiples réseaux sans fil |
US20140004827A1 (en) * | 2012-06-27 | 2014-01-02 | Rogers Communications Inc. | System and method for remote provisioning of embedded universal integrated circuit cards |
US20140038563A1 (en) * | 2012-03-05 | 2014-02-06 | Rogers Communications Inc. | Radio management method and system using embedded universal integrated circuit card |
US20140075506A1 (en) * | 2012-09-13 | 2014-03-13 | iJet Technologies, Inc. | Extensible and Scalable Distributed Computing and Communication Remote Services Platform for Telemetry Collection Adaptive Data Driven Application Hosting, and Control Services |
WO2014101094A1 (fr) * | 2012-12-28 | 2014-07-03 | Intel Corporation | Module d'identification d'abonné (sim) virtuel |
US20150271662A1 (en) * | 2014-03-21 | 2015-09-24 | T-Mobile Usa, Inc. | Polling by Universal Integrated Circuit Card for Remote Subscription |
-
2015
- 2015-11-10 WO PCT/IB2015/058681 patent/WO2016075622A1/fr active Application Filing
- 2015-11-10 EP EP15798244.8A patent/EP3257281A1/fr active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110028135A1 (en) * | 2009-07-29 | 2011-02-03 | Prasanna Srinivasan | Virtual sim monitoring mode for mobile handsets |
CN102065582A (zh) * | 2009-11-17 | 2011-05-18 | 美国博通公司 | 一种通信方法和通信系统 |
WO2011106569A2 (fr) * | 2010-02-24 | 2011-09-01 | Qualcomm Incorporated | Procédés et systèmes pour gérer la participation à de multiples réseaux sans fil |
US20140038563A1 (en) * | 2012-03-05 | 2014-02-06 | Rogers Communications Inc. | Radio management method and system using embedded universal integrated circuit card |
US20140004827A1 (en) * | 2012-06-27 | 2014-01-02 | Rogers Communications Inc. | System and method for remote provisioning of embedded universal integrated circuit cards |
US20140075506A1 (en) * | 2012-09-13 | 2014-03-13 | iJet Technologies, Inc. | Extensible and Scalable Distributed Computing and Communication Remote Services Platform for Telemetry Collection Adaptive Data Driven Application Hosting, and Control Services |
WO2014101094A1 (fr) * | 2012-12-28 | 2014-07-03 | Intel Corporation | Module d'identification d'abonné (sim) virtuel |
US20150271662A1 (en) * | 2014-03-21 | 2015-09-24 | T-Mobile Usa, Inc. | Polling by Universal Integrated Circuit Card for Remote Subscription |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10516990B2 (en) | 2014-09-17 | 2019-12-24 | Simless, Inc. | Apparatuses, methods and systems for implementing a trusted subscription management platform |
US11606685B2 (en) | 2014-09-17 | 2023-03-14 | Gigsky, Inc. | Apparatuses, methods and systems for implementing a trusted subscription management platform |
US10631160B2 (en) | 2014-09-17 | 2020-04-21 | Simless, Inc. | Apparatuses, methods and systems for virtualizing a reprogrammable universal integrated circuit chip |
US11172352B2 (en) | 2014-09-17 | 2021-11-09 | Gigsky, Inc. | Apparatuses, methods, and systems for configuring a trusted java card virtual machine using biometric information |
CN106211367B (zh) * | 2016-06-28 | 2019-09-20 | 深圳市斯凯荣科技有限公司 | 网络切换设备及系统 |
CN106211367A (zh) * | 2016-06-28 | 2016-12-07 | 深圳市斯凯荣科技有限公司 | 网络切换设备及系统 |
CN110710236A (zh) * | 2017-03-28 | 2020-01-17 | 泰利特科技(塞浦路斯)有限公司 | 用于通过多个无线ip网络进行操作的具有多个移动网络运营商配置文件的虚拟sim |
WO2018182897A1 (fr) | 2017-03-28 | 2018-10-04 | Telit Technologies (Cyprus) Ltd. | Sim virtuel avec de multiples profils d'opérateurs de réseau mobile pour fonctionner sur de multiples réseaux ip sans fil |
CN110710236B (zh) * | 2017-03-28 | 2022-11-08 | 泰利特科技(塞浦路斯)有限公司 | 通信装置、服务器及通过无线电话和ip网络操作的方法 |
EP3603142A4 (fr) * | 2017-03-28 | 2021-01-06 | Telit Technologies (Cyprus) Ltd. | Sim virtuel avec de multiples profils d'opérateurs de réseau mobile pour fonctionner sur de multiples réseaux ip sans fil |
US11259172B2 (en) | 2017-03-28 | 2022-02-22 | Telit Technologies (Cyprus) Ltd. | Virtual SIM with multiple mobile network operator profiles for operating over multiple wireless IP networks |
CN107483213B (zh) * | 2017-08-23 | 2020-02-21 | 北京华大智宝电子系统有限公司 | 一种安全认证的方法、相关装置及系统 |
CN107483213A (zh) * | 2017-08-23 | 2017-12-15 | 北京华大智宝电子系统有限公司 | 一种安全认证的方法、相关装置及系统 |
WO2019219175A1 (fr) * | 2018-05-15 | 2019-11-21 | Huawei Technologies Co., Ltd. | Terminal de communication de module d'identité d'abonné multi-virtuel |
US20210160690A1 (en) * | 2019-02-05 | 2021-05-27 | Shenzhen GOODIX Technology Co., Ltd. | Ue with integrated subscriber identity modules by resource sharing |
WO2020160804A1 (fr) * | 2019-02-05 | 2020-08-13 | Shenzhen GOODIX Technology Co., Ltd. | Ue amélioré avec modules d'identité d'abonné intégrés (isim) par partage de ressources |
EP3694241A1 (fr) * | 2019-02-05 | 2020-08-12 | Shenzhen Goodix Technology Co., Ltd. | Eu amélioré doté de modules d'identité d'abonnés intégrés (isim) par partage de ressources |
US11778456B2 (en) | 2019-02-05 | 2023-10-03 | Shenzhen GOODIX Technology Co., Ltd. | UE with integrated subscriber identity modules by resource sharing |
Also Published As
Publication number | Publication date |
---|---|
EP3257281A1 (fr) | 2017-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11039301B2 (en) | Apparatuses, methods and systems for implementing a system-on-chip with integrated reprogrammable cellular network connectivity | |
US11051160B2 (en) | Apparatuses, methods and systems for implementing a system-on-chip with integrated reprogrammable cellular network connectivity | |
US10516990B2 (en) | Apparatuses, methods and systems for implementing a trusted subscription management platform | |
EP3257281A1 (fr) | Communication avec une pluralité de réseaux cellulaires à l'aide d'un modem cellulaire et de modules d'identité d'abonné virtuels stockés dans une carte de circuit intégré universelle incorporée (euicc) en fonction d'un logiciel | |
US10652731B2 (en) | Method and system for downloading and installing UICC terminal profile on a terminal from a profile manager | |
US9313643B1 (en) | Dynamic subscriber identity module | |
US8943494B2 (en) | Method for installing and managing NFC applications with pictures | |
US11172352B2 (en) | Apparatuses, methods, and systems for configuring a trusted java card virtual machine using biometric information | |
US11606685B2 (en) | Apparatuses, methods and systems for implementing a trusted subscription management platform | |
CN109905237B (zh) | 通过移动站与蜂窝网络通信的方法 | |
US20220086622A1 (en) | Portable secure elements for subscription manager roles | |
CN112740637A (zh) | 用于对安装在智能安全平台中的捆绑包的同时启用进行管理的装置和方法 | |
EP3017394A2 (fr) | Système et procédé de distribution et de transaction intégrées mobiles destinés aux services nfc, et dispositif électronique mobile associé | |
US20240137336A1 (en) | Esim-based card pool system and control method thereof | |
CN117858061A (zh) | 一种eSIM卡管理方法、系统、设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15798244 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2015798244 Country of ref document: EP |