WO2021114009A1 - Universal integrated circuit card (uicc) activation - Google Patents

Universal integrated circuit card (uicc) activation Download PDF

Info

Publication number
WO2021114009A1
WO2021114009A1 PCT/CN2019/123933 CN2019123933W WO2021114009A1 WO 2021114009 A1 WO2021114009 A1 WO 2021114009A1 CN 2019123933 W CN2019123933 W CN 2019123933W WO 2021114009 A1 WO2021114009 A1 WO 2021114009A1
Authority
WO
WIPO (PCT)
Prior art keywords
security code
uicc
integrated circuit
pin
circuit card
Prior art date
Application number
PCT/CN2019/123933
Other languages
French (fr)
Inventor
Yun Peng
Jian Li
Meng Liu
Jingnan QU
Wei He
Original Assignee
Qualcomm Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Incorporated filed Critical Qualcomm Incorporated
Priority to PCT/CN2019/123933 priority Critical patent/WO2021114009A1/en
Priority to CN201980102828.9A priority patent/CN114788321A/en
Publication of WO2021114009A1 publication Critical patent/WO2021114009A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present disclosure generally relates to methods and systems for accessing network services on a wireless device. More specifically, the present disclosure relates to registering, to a network, a blocked universal integrated circuit card (UICC) of a device.
  • UICC universal integrated circuit card
  • Some designs of mobile communications/wireless devices include a single universal integrated circuit card (UICC) , multiple universal integrated circuit cards, or multiple subscriber identity module (SIM) cards.
  • the cards store user identity information for multiple subscriptions that enable users to access multiple separate mobile telephony networks.
  • Some of the UICCs e.g., embedded UICCs (eUICCs)
  • eUICCs embedded UICCs
  • a UICC may be removable or implemented within memory of mobile communications devices.
  • the information stored in a UICC may enable mobile communications devices to communicate with a variety of different types of mobile telephony networks.
  • mobile telephony networks include third generation (3G) , fourth generation (4G) , long term evolution (LTE) , fifth generation (5G) , time division multiple access (TDMA) , code division multiple access (CDMA) , CDMA 2000, wideband CDMA (WCDMA) , global system for mobile communications (GSM) , single-carrier radio transmission technology (1xRTT) , and universal mobile telecommunications systems (UMTS) .
  • Each subscription enabled by a UICC or SIM may utilize a particular radio access technology (RAT) to communicate with its respective network.
  • RAT radio access technology
  • a method for registering, to a network, a blocked universal integrated circuit card (UICC) of a device includes determining whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded. The method also includes determining whether a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded. The method further includes verifying the second security code when it is determined that the second security code is disabled.
  • UICC universal integrated circuit card
  • the apparatus includes means for determining whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded.
  • the apparatus also includes means for determining whether a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded.
  • the apparatus further includes means for verifying the second security code when it is determined that the second security code is disabled.
  • the apparatus includes a memory and a communication interface coupled to the UICC of the device.
  • the apparatus also includes at least one processor coupled to the memory and the communication interface of the UICC of the device.
  • the at least one processor is configured to determine whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded.
  • the at least one processor is also configured to determine a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded.
  • the at least one processor is further configured to verify the second security code when it is determined that the second security code is disabled.
  • FIGURE 1 shows a wireless device communicating with a wireless communications system.
  • FIGURE 2 shows a block diagram of the wireless device in FIGURE 1, according to an aspect of the present disclosure.
  • FIGURE 3 is a process flow diagram of a method for registering, to a network, a blocked universal integrated circuit card (UICC) of a device, according to aspects of the present disclosure.
  • UICC universal integrated circuit card
  • FIGURE 4 is a process flow diagram of another method for registering, to a network, a blocked universal integrated circuit card (UICC) of a device, according to aspects of the present disclosure.
  • UICC universal integrated circuit card
  • FIGURE 5 is a component block diagram of a wireless device suitable for implementing the method for registering, to a network, a blocked universal integrated circuit card (UICC) of a device, according to aspects of the present disclosure.
  • UICC universal integrated circuit card
  • FIGURE 6 is a block diagram showing an exemplary wireless communications system in which a configuration of the disclosure may be advantageously employed.
  • SIM subscriber identification module
  • USIM universal subscriber identity module
  • UICC user identity module
  • RUIM removable user identity module
  • SIMs may store network specific information used to authenticate and identify subscribers on the network, the most important of which are the integrated circuit card identifier (ICCID) , international mobile subscriber identity (IMSI) , authentication key (Ki) , and local area identity (LAI) .
  • the SIM may also store other carrier specific data, such as short message service center (SMSC) numbers, service provider names (SPNs) , service dialing numbers (SDNs) , and value added service (VAS) applications.
  • SMSC short message service center
  • SPNs service provider names
  • SDNs service dialing numbers
  • VAS value added service
  • a USIM and a RUIM may be modules in UMTS and CDMA networks, respectively, which provide equivalent functions to a SIM in a GSM network.
  • SIM, ” “USIM, ” and “RUIM” may be used interchangeably to refer to a general module that is not restricted to a particular standard or technology.
  • SIM may also be used as a shorthand reference to a communications network associated with a particular SIM, because the information stored in a SIM enables the wireless device to establish a communications link with a particular network.
  • the SIM and the communications network, as well as the services and subscriptions supported by that network, correlate to one another.
  • universal integrated circuit card smart card, ” “SIM card, ” “universal integrated circuit card, ” and “UICC” are used interchangeably to refer to a memory chip or integrated circuit used to provide a SIM, a USIM, and/or a RUIM, to a wireless device in order to store the described provisioning and/or other data.
  • Various UICCs may have storage capabilities ranging from two to three kilobytes to up to one gigabyte of information.
  • a UICC securely stores a service-subscriber key for identification purposes on mobile telephony devices (e.g., mobile phones and computers) .
  • the UICC allows users to change phones by simply removing the UICC from one mobile phone and inserting it into another mobile phone or broadband telephony device.
  • the UICC includes its unique serial number, international mobile subscriber identifier (IMSI) of the mobile device, security authentication and ciphering information, temporary information related to the local network, a list of the services the user has access to, and two passwords (apersonal identification number (PIN) for normal use and a personal/PIN unblocking key or personal unlock key (PUK) for unlocking) .
  • IMSI international mobile subscriber identifier
  • the PIN may be a four to eight digit passcode for authenticating a user to a subsystem (e.g., a SIM or UICC) .
  • a subsystem e.g., a SIM or UICC
  • the PUK is a unique code that is linked to the UICC of the wireless device and is usually eight digits long.
  • the PUK is specified to lock the UICC after a user exceeds a pre-determined number of attempts for entering a wrong passcode or PIN. For example, after exceeding the pre-determined number of unsuccessful attempts, the wireless device will become locked or access to the UICC will be blocked.
  • the PUK which is linked to the UICC, can be used to unlock or unblock access to the UICC of the wireless device.
  • a first PIN (e.g., PIN1) can be defined to control normal use of the mobile phone or wireless device.
  • a second PIN e.g., PIN2
  • PUK1 and PUK2 can reset the PIN1 and PIN2, respectively.
  • a wireless device may fail to register a network for the UICC based on an indication of a condition of a first security code (e.g., a PUK) and/or a second security code (e.g., a PIN) .
  • a processor e.g., a baseband processor
  • AID initial select application identifier
  • a state or an indication of the condition of the PIN1 can also be changed from PIN1 disabled to PIN1 blocked when a maximum retry count for entering a first security code (e.g., a PUK) to unlock the PIN1 is exceeded.
  • a first security code e.g., a PUK
  • the indication of the condition of the PIN1 is changed from PIN1 disabled to PIN1 blocked.
  • the processor of the wireless device indicates a failure in a PIN verification phase of the initialization process of the UICC.
  • the processor of the wireless device fails to verify the PIN or fails to pass the verify PIN procedure, initialization of the universal integrated circuit card is paused or stopped. Accordingly, a subscription associated with the second security code is delayed or not activated. This implies that there is no indication that the subscription is ready to be connected to a network. For example, without the subscription ready indication, the wireless device cannot trigger attach procedures and cannot register a network for the UICC.
  • This state or indication of a condition associated with the various security codes usually matches the actual condition of the various security codes. However, some access conditions and their respective indications when attempting to register the network for the UICC do not match.
  • some UICCs may indicate that one of their PINs (e.g., PIN1) is blocked due to exceeding a maximum retry count for entering a PUK to unlock the UICC.
  • these UICCs may indicate that the PIN1 is disabled.
  • a wireless device or chipset-based device is not able to register a network for these UICCs.
  • the indication that the PIN1 is blocked coupled with the indication that the PIN1 is disabled may not match the actual condition of the security codes. This mismatch can be exploited to register the UICC to the network.
  • the PIN1 When the PIN1 is enabled, however, the number of retries to enter the PUK is not exceeded or is not zero. Otherwise, the state or indication of the PIN1 is changed from PIN1 disabled to PIN1 blocked when the maximum retry count for entering the first security code (e.g., PUK) to unlock the PIN1 is exceeded.
  • the first security code e.g., PUK
  • Attaining a special status where it is indicated that the PIN1 is blocked and disabled at the same time may be replicated.
  • the special status can be replicated starting with an indication that the PIN1 is disabled followed by attempts to enable the PIN1 using a wrong PIN1 until a number of pre-determined (e.g., three) attempts are exceeded, thereby triggering an indication that the PIN1 is locked.
  • a processor e.g., a baseband processor
  • the PUK which is set to the UICC, can unlock the PIN1. For example, attempts to unlock the PIN1 by inputting the wrong PUK for the pre-determined number of attempts (e.g., 10) causes the special status where it is indicated that PIN1 is blocked and disabled at the same time.
  • aspects of the present disclosure are directed to activating the UICC under the special status where it is indicated that the PIN1 is blocked coupled with the indication that the PIN1 is disabled. Unlike the status only indicating that the PIN1 is blocked and therefore the network cannot be registered, under the special status the network can be registered to the UICC.
  • aspects of the present disclosure are directed to a method for registering a blocked universal integrated circuit card (UICC) of a device (e.g., a wireless device) to a network under the special status.
  • the method includes determining whether a maximum retry count for entering a first security code (e.g., a PUK) to unlock a universal integrated circuit card is exceeded.
  • the method also includes determining whether a second security code (e.g., a PIN) for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded.
  • the method further includes verifying the second security code when it is determined that the second security code is disabled.
  • the wireless device when it is indicated that a first pin (PIN1) is blocked and that the PIN1 is disabled, the wireless device can still register the UICC to the network. For example, the PIN is successfully verified even when it is indicated that that the second security code is disabled and that the maximum retry count for entering the PUK is exceeded. Thus, the access to the network may be granted under the special status and a false unblock PIN is prevented from affecting a status of a PIN.
  • the initialization of the universal integrated circuit card is paused or aborted. As a result, the wireless device or at least a portion of the wireless device associated with the UICC is powered off.
  • post-PIN verification procedures are performed after the PIN is verified, successfully followed by an indication that a subscription associated with the PIN is ready.
  • Post-pin verification procedures could include reading an international mobile subscriber identity (IMSI) as well as other UICC files specified to register to network.
  • IMSI international mobile subscriber identity
  • the post-PIN verification procedures may otherwise be performed when the maximum retry count for entering the first security code is not exceeded.
  • the access to the network may be granted under the special status and a false unblock PIN is prevented from affecting a status of a PIN.
  • FIGURE 1 shows a wireless device 110 that includes the disclosed universal integrated circuit card to be registered to a network.
  • the wireless device 110 communicates with a wireless communications system 120.
  • the wireless device 110 includes a multi-band (e.g., dual-band) concurrent millimeter wave (mmW) transceiver.
  • the wireless communications system 120 may be a 5G system, a long term evolution (LTE) system, a code division multiple access (CDMA) system, a global system for mobile communications (GSM) system, a wireless local area network (WLAN) system, millimeter wave (mmW) technology, or some other wireless system.
  • LTE long term evolution
  • CDMA code division multiple access
  • GSM global system for mobile communications
  • WLAN wireless local area network
  • mmW millimeter wave
  • a CDMA system may implement wideband CDMA (WCDMA) , time division synchronous CDMA (TD-SCDMA) , CDMA2000, or some other version of CDMA.
  • WCDMA wideband CDMA
  • TD-SCDMA time division synchronous CDMA
  • CDMA2000 Code Division synchronous CDMA2000
  • mmW millimeter wave
  • FIGURE 1 shows the wireless communications system 120 including two base stations 130 and 132 and one system controller 140.
  • a wireless system may include any number of base stations and any number of network entities.
  • a wireless device 110 may be referred to as a mobile equipment (ME) , a user equipment (UE) , a mobile station, a terminal, an access terminal, a subscriber unit, a station, etc.
  • the wireless device 110 may also be a cellular phone, a smartphone, a tablet, a wireless modem, a personal digital assistant (PDA) , a handheld device, a laptop computer, a Smartbook, a netbook, a cordless phone, a wireless local loop (WLL) station, a Bluetooth device, etc.
  • the wireless device 110 may be capable of communicating with the wireless communications system 120.
  • the wireless device 110 may also be capable of receiving signals from broadcast stations (e.g., a broadcast station 134) , signals from satellites (e.g., a satellite 150) in one or more global navigation satellite systems (GNSS) , etc.
  • the wireless device 110 may support one or more radio technologies for wireless communications such as 5G, LTE, CDMA2000, WCDMA, TD-SCDMA, GSM, 802.11, etc.
  • the wireless device 110 may support carrier aggregation, which is operation on multiple carriers. Carrier aggregation may also be referred to as multi-carrier operation. According to an aspect of the present disclosure, the wireless device 110 may be able to operate in low-band from 698 to 960 megahertz (MHz) , mid-band from 1475 to 2170 MHz, and/or high-band from 2300 to 2690 MHz, ultra-high band from 3400 to 3800 MHz, and long-term evolution (LTE) in LTE unlicensed bands (LTE-U/LAA) from 5150 MHz to 5950 MHz.
  • LTE long-term evolution
  • Low-band, mid-band, high-band, ultra-high band, and LTE-U refer to five groups of bands (or band groups) , with each band group including a number of frequency bands (or simply, “bands” ) .
  • each band may cover up to 200 MHz and may include one or more carriers.
  • each carrier may cover up to 40 MHz in LTE.
  • LTE Release 11 supports 35 bands, which are referred to as LTE/UMTS bands and are listed in 3GPP TS 36.101.
  • the wireless device 110 may be configured with up to five carriers in one or two bands in LTE Release 11.
  • FIGURE 2 shows a block diagram of the wireless device 110 in FIGURE 1, according to an aspect of the present disclosure.
  • the wireless device 110 may include a universal integrated circuit card (UICC) interface 202, which may receive an embedded UICC (eUICC) 204 that stores profiles associated with one or more subscriptions from network providers.
  • UICC universal integrated circuit card
  • eUICC embedded UICC
  • a UICC used in various examples may include user account information, an international mobile subscriber identity (IMSI) , a set of SIM application toolkit (SAT) commands, and storage space for phone book contacts.
  • the UICC may further store home identifiers (e.g., a system identification number (SID) /network identification number (NID) pair, a home preferred list of mobile networks (HPLMN) code, etc. ) to indicate the network operator providers for each subscription of the UICC.
  • SID system identification number
  • NID network identification number
  • HPLMN home preferred list of mobile networks
  • ICCID integrated circuit card identity
  • SIM serial number may be printed on the UICC for identification.
  • the UICC may be implemented within a portion of memory of the wireless device 110 (e.g., in a memory 214) , and thus need not be a separate or removable circuit, chip, or card.
  • the wireless device 110 may include at least one controller, such as a general processor 206, which may be coupled to a coder/decoder (CODEC) 208.
  • the CODEC 208 may in turn be coupled to a speaker 210 and a microphone 212.
  • the general processor 206 may also be coupled to the memory 214.
  • the memory 214 may be a non-transitory computer-readable storage medium that stores processor-executable instructions.
  • the memory 214 may store an operating system (OS) , as well as user application software and executable instructions.
  • OS operating system
  • the memory 214 may also store locally cached profiles for subscriptions supported by the eUICC 204.
  • the general processor 206 and the memory 214 may each be coupled to at least one baseband processor or baseband modem processor 216.
  • the eUICC 204 in the wireless device 110 may utilize one or more baseband-RF resources.
  • a baseband-RF resource may include the baseband modem processor 216, which may perform baseband/modem functions for communications with and controlling of a radio access technology (RAT) .
  • the baseband-RF resource may include one or more amplifiers and radios, referred to generally as radio frequency (RF) resources (e.g., RF resource 218) .
  • the baseband-RF resources may share the baseband modem processor 216 (e.g., a single device that performs baseband/modem functions for all RATs on the wireless device 110) .
  • each baseband-RF resource may include physically or logically separate baseband processors (e.g., BB1, BB2) .
  • the RF resource 218 may be a transceiver that performs transmit/receive functions for the eUICC 204 on the wireless device 110.
  • the RF resource 218 may include separate transmit and receive circuitry, or may include a transceiver that combines transmitter and receiver functions. In some examples, the RF resource 218 may include multiple receive circuits.
  • the RF resource 218 may be coupled to a wireless antenna (e.g., a wireless antenna 220) .
  • the RF resource 218 may also be coupled to the baseband modem processor 216.
  • the general processor 206, the memory 214, the baseband modem processor (s) 216, and the RF resource 218 may be included in the wireless device 110 as a system-on-chip 250.
  • the eUICC 204 and its corresponding UICC interface 202 may be external to the system-on-chip 250.
  • various input and output devices may be coupled to components on the system-on-chip 250, such as interfaces or controllers.
  • Example user input components suitable for use in the wireless device 110 may include, but are not limited to, a keypad 224, a touchscreen display 226, and the microphone 212.
  • the keypad 224, the touchscreen display 226, the microphone 212, or a combination thereof may perform the function of receiving a request to initiate an outgoing call or for receiving a person identification number.
  • Interfaces may be provided between the various devices and modules to implement functions in the wireless device 110 to enable communications in the wireless device.
  • the eUICC 204, the baseband processor BB1, BB2, the RF resource 218, and the wireless antenna 220 may constitute two or more radio access technologies (RATs) .
  • the wireless device 110 may be a communications device that includes a UICC, baseband processor, and RF resource configured to support two different RATs, such as 5G or LTE and GSM. More RATs may be supported on the wireless device 110 by adding more RF resources, and antennae for connecting to additional mobile networks.
  • the wireless device 110 may include, among other things, additional UICC or SIM cards, UICC or SIM interfaces, multiple RF resources associated with the additional UICC or SIM cards, and additional antennae for supporting subscriptions communications with additional mobile networks.
  • the eUICC 204 may support multiple mobile network operator profiles, or subscription profiles. For example, a user may download multiple profiles onto the eUICC 204. Each profile may store static SIM information that is used to support a subscription with one or more mobile telephony networks. Thus, the eUICC 204 may play the role of multiple SIMs, because each SIM supports one profile.
  • the wireless device 110 may be configured to locally cache one or more subscription profiles associated with or stored in the UICC.
  • the profiles may be cached in the memory 214, part of which may be designated memory for the modem.
  • FIGURE 3 is a process flow diagram of a method 300 for registering a blocked universal integrated circuit card (UICC) of a wireless device to a network, according to aspects of the present disclosure.
  • the wireless device including a subsystem, such as a UICC is powered up.
  • a processor e.g., a baseband processor
  • the wireless device communicates through a UICC interface to obtain basic UICC information including the remaining retries for the PUK.
  • the baseband processor reads a unique serial number or integrated circuit card identifier (ICCID) of the UICC.
  • ICCID integrated circuit card identifier
  • the baseband processor obtains a status of the PIN.
  • the baseband processor obtains an unblock PIN status.
  • the baseband processor obtains the remaining retries for entering a first security code (e.g., a PUK) .
  • the baseband processor determines whether a maximum retry count for entering the PUK to unlock the UICC is exceeded.
  • the baseband processor communicates through the UICC interface to determine whether a second security code (e.g., a PIN) for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded.
  • the baseband processor verifies the second security code (e.g., the PIN) when it is determined that the second security code is disabled. For example, the PIN is successfully verified even when it is indicated that the second security code is disabled and the maximum retry count for entering the PUK is exceeded.
  • access to the network may be granted under the special status and a false unblock PIN is prevented from affecting a status of a PIN.
  • the initialization of the universal integrated circuit card is paused or aborted.
  • the baseband processor determines that the verification of the PIN failed.
  • the wireless device or at least a portion of the wireless device associated with the UICC is powered off at block 324.
  • post-PIN verification procedures are performed by the baseband processor after the PIN is verified successfully followed by an indication that a subscription associated with the PIN is ready.
  • the post-PIN verification procedures at block 320 may otherwise be performed when it is determined (at block 312) that the maximum retry count for entering the first security code is not exceeded.
  • the wireless device triggers attach procedures to register the UICC with the network.
  • the wireless device or at least a portion of the wireless device associated with the UICC is powered off.
  • access to the network may be granted under the special status and a false unblock PIN is prevented from affecting a status of a PIN.
  • FIGURE 4 depicts a simplified flowchart of a method 400 for registering a blocked universal integrated circuit card (UICC) of a device (e.g., a wireless device) to a network.
  • a processor e.g., a baseband processor
  • the wireless device determines whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded.
  • the processor and/or a UICC interface determines whether a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded.
  • the processor verifies the second security code when it is determined that the second security code is disabled.
  • an apparatus for registering a blocked universal integrated circuit card (UICC) of a device to a network may include means for determining whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded, means for determining whether a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded, and/or means for verifying the second security code when it is determined that the second security code is disabled.
  • the determining means, determining means, and/or the verifying means may be the baseband modem processor 216, the general processor 206, and/or the memory 214.
  • the aforementioned means may be any module or apparatus configured to perform the functions recited by the aforementioned means.
  • FIGURE 5 is a component block diagram of a wireless device 500 suitable for implementing the method for activating a blocked universal integrated circuit card (UICC) .
  • Aspects of the present disclosure may be implemented in any of a variety of wireless devices, an example of which (e.g., wireless device 500) is illustrated in FIGURE 5.
  • the wireless device 500 may be similar to the wireless device 110 and may implement the method 300 and the method 400.
  • the wireless device 500 may include a processor 502 coupled to a touchscreen controller 504 and an internal memory 506.
  • the processor 502 may be one or more multi-core integrated circuits designated for general or specific processing tasks.
  • the internal memory 506 may be volatile or non-volatile memory, and may also be secure and/or encrypted memory, or unsecure and/or unencrypted memory, or any combination thereof.
  • the touchscreen controller 504 and the processor 502 may also be coupled to a touchscreen panel 512, such as a resistive-sensing touchscreen, capacitive-sensing touchscreen, infrared sensing touchscreen, etc. Additionally, the display of the wireless device 500 need not have touch screen capability.
  • the wireless device 500 may have one or more cellular network transceivers 508 coupled to the processor 502 and to one or more antennas 510 and configured for sending and receiving cellular communications.
  • the one or more transceivers 508 and the one or more antennas 510 may be used with the above-mentioned circuitry to implement the various example methods described.
  • the wireless device 500 may include one or more UICC or SIM cards 516 coupled to the one or more transceivers 508 and/or the processor 502 and may be configured as described above.
  • the wireless device 500 may also include speakers 514 for providing audio outputs.
  • the wireless device 500 may also include a housing 520, constructed of a plastic, metal, or a combination of materials, for containing all or some of the components discussed herein.
  • the wireless device 500 may include a power source 522 coupled to the processor 502, such as a disposable or rechargeable battery.
  • the rechargeable battery may also be coupled to the peripheral device connection port to receive a charging current from a source external to the wireless device 500.
  • the wireless device 500 may also include a physical button 524 for receiving user inputs.
  • the wireless device 500 may also include a power button 526 for turning the wireless device 500 on and off.
  • FIGURE 6 is a block diagram showing an exemplary wireless communications system in which a configuration of the disclosure may be advantageously employed.
  • FIGURE 6 shows three remote units 620, 630, and 650 and two base stations 640.
  • Remote units 620, 630, and 650 include IC devices 625A, 625B, and 625C that include the disclosed wireless device including the subsystem or universal integrated circuit card. It will be recognized that other devices may also include the disclosed wireless device, such as the base stations, switching devices, and network equipment.
  • FIGURE 6 shows forward link signals 680 from the base station 640 to the remote units 620, 630, and 650 and reverse link signals 690 from the remote units 620, 630, and 650 to base station 640.
  • remote unit 620 is shown as a mobile telephone
  • remote unit 630 is shown as a portable computer
  • remote unit 650 is shown as a fixed location remote unit in a wireless local loop system.
  • a remote unit may be a mobile phone, a hand-held personal communications systems (PCS) unit, a portable data unit such as a personal digital assistant (PDA) , a GPS enabled device, a navigation device, a set top box, a music player, a video player, an entertainment unit, a fixed location data unit such as a meter reading equipment, or other communications device that stores or retrieves data or computer instructions, or combinations thereof.
  • FIGURE 6 illustrates remote units according to the aspects of the disclosure, the disclosure is not limited to these exemplary illustrated units. Aspects of the disclosure may be suitably employed in many devices, which include the wireless device.
  • the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein.
  • a machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein.
  • software codes may be stored in a memory and executed by a processor unit.
  • Memory may be implemented within the processor unit or external to the processor unit.
  • the term “memory” refers to types of long term, short term, volatile, nonvolatile, or other memory and is not to be limited to a particular type of memory or number of memories, or type of media upon which memory is stored.
  • the functions may be stored as one or more instructions or code on a computer-readable medium. Examples include computer-readable media encoded with a data structure and computer-readable media encoded with a computer program.
  • Computer-readable media includes physical computer storage media. A storage medium may be an available medium that can be accessed by a computer.
  • such computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer; disk and disc, as used herein, includes compact disc (CD) , laser disc, optical disc, digital versatile disc (DVD) , floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
  • instructions and/or data may be provided as signals on transmission media included in a communications apparatus.
  • a communications apparatus may include a standard cell circuit having signals indicative of instructions and data. The instructions and data are configured to cause one or more processors to implement the functions outlined in the claims.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • a general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
  • a processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, multiple microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.

Abstract

A method for registering, to a network, a blocked universal integrated circuit card (UICC) of a device is described. The method includes determining whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded. The method also includes determining whether a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded. The method further includes verifying the second security code when it is determined that the second security code is disabled.

Description

UNIVERSAL INTEGRATED CIRCUIT CARD (UICC) ACTIVATION TECHNICAL FIELD
The present disclosure generally relates to methods and systems for accessing network services on a wireless device. More specifically, the present disclosure relates to registering, to a network, a blocked universal integrated circuit card (UICC) of a device.
BACKGROUND
Some designs of mobile communications/wireless devices (e.g., smart phones, tablet computers, and laptop computers) include a single universal integrated circuit card (UICC) , multiple universal integrated circuit cards, or multiple subscriber identity module (SIM) cards. The cards store user identity information for multiple subscriptions that enable users to access multiple separate mobile telephony networks. Some of the UICCs (e.g., embedded UICCs (eUICCs) ) are capable of supporting remote provisioning of network subscription information. A UICC may be removable or implemented within memory of mobile communications devices.
The information stored in a UICC may enable mobile communications devices to communicate with a variety of different types of mobile telephony networks. Examples of mobile telephony networks include third generation (3G) , fourth generation (4G) , long term evolution (LTE) , fifth generation (5G) , time division multiple access (TDMA) , code division multiple access (CDMA) , CDMA 2000, wideband CDMA (WCDMA) , global system for mobile communications (GSM) , single-carrier radio transmission technology (1xRTT) , and universal mobile telecommunications systems (UMTS) . Each subscription enabled by a UICC or SIM may utilize a particular radio access technology (RAT) to communicate with its respective network.
SUMMARY
A method for registering, to a network, a blocked universal integrated circuit card (UICC) of a device is described. The method includes determining whether a  maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded. The method also includes determining whether a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded. The method further includes verifying the second security code when it is determined that the second security code is disabled.
An apparatus for registering, to a network, a blocked universal integrated circuit card (UICC) of a device is described. The apparatus includes means for determining whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded. The apparatus also includes means for determining whether a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded. The apparatus further includes means for verifying the second security code when it is determined that the second security code is disabled.
An apparatus for registering, to a network, a universal integrated circuit card (UICC) of a device is described. The apparatus includes a memory and a communication interface coupled to the UICC of the device. The apparatus also includes at least one processor coupled to the memory and the communication interface of the UICC of the device. The at least one processor is configured to determine whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded. The at least one processor is also configured to determine a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded. The at least one processor is further configured to verify the second security code when it is determined that the second security code is disabled.
This has outlined, rather broadly, the features and technical advantages of the present disclosure in order that the detailed description that follows may be better understood. Additional features and advantages of the present disclosure will be described below. It should be appreciated by those skilled in the art that this present disclosure may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present disclosure. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the  teachings of the present disclosure as set forth in the appended claims. The novel features, which are believed to be characteristic of the present disclosure, both as to its organization and method of operation, together with further objects and advantages, will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present disclosure.
BRIEF DESCRIPTION OF THE DRAWINGS
For a more complete understanding of the present disclosure, reference is now made to the following description taken in conjunction with the accompanying drawings.
FIGURE 1 shows a wireless device communicating with a wireless communications system.
FIGURE 2 shows a block diagram of the wireless device in FIGURE 1, according to an aspect of the present disclosure.
FIGURE 3 is a process flow diagram of a method for registering, to a network, a blocked universal integrated circuit card (UICC) of a device, according to aspects of the present disclosure.
FIGURE 4 is a process flow diagram of another method for registering, to a network, a blocked universal integrated circuit card (UICC) of a device, according to aspects of the present disclosure.
FIGURE 5 is a component block diagram of a wireless device suitable for implementing the method for registering, to a network, a blocked universal integrated circuit card (UICC) of a device, according to aspects of the present disclosure.
FIGURE 6 is a block diagram showing an exemplary wireless communications system in which a configuration of the disclosure may be advantageously employed.
DETAILED DESCRIPTION
The detailed description set forth below, in connection with the appended drawings, is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of the various concepts. However, it will be apparent to those skilled in the art that these concepts may be practiced without these specific details. In some instances, well-known structures and components are shown in block diagram form in order to avoid obscuring such concepts. As described herein, the use of the term “and/or” is intended to represent an “inclusive OR” , and the use of the term “or” is intended to represent an “exclusive OR” .
The terms “subscriber identification module, ” “SIM, ” “universal subscriber identity module, ” “USIM, ” “user identity module, ” “UIM, ” “removable user identity module, ” and “RUIM” are used herein to mean a memory that may be an integrated circuit or embedded into a removable card, which stores an international mobile subscriber identity (IMSI) , related key, and/or other information used to identify and/or authenticate a wireless device on a network. In some networks (e.g., GSM networks) , SIMs may store network specific information used to authenticate and identify subscribers on the network, the most important of which are the integrated circuit card identifier (ICCID) , international mobile subscriber identity (IMSI) , authentication key (Ki) , and local area identity (LAI) . The SIM may also store other carrier specific data, such as short message service center (SMSC) numbers, service provider names (SPNs) , service dialing numbers (SDNs) , and value added service (VAS) applications. In various aspects, a USIM and a RUIM may be modules in UMTS and CDMA networks, respectively, which provide equivalent functions to a SIM in a GSM network. However, the terms “SIM, ” “USIM, ” and “RUIM” may be used interchangeably to refer to a general module that is not restricted to a particular standard or technology.
The term “SIM” may also be used as a shorthand reference to a communications network associated with a particular SIM, because the information stored in a SIM enables the wireless device to establish a communications link with a particular network. Thus, the SIM and the communications network, as well as the services and subscriptions supported by that network, correlate to one another.
The terms “universal integrated circuit card, ” “smart card, ” “SIM card, ” “universal integrated circuit card, ” and “UICC” are used interchangeably to refer to a memory chip or integrated circuit used to provide a SIM, a USIM, and/or a RUIM, to a wireless device in order to store the described provisioning and/or other data. Various UICCs may have storage capabilities ranging from two to three kilobytes to up to one gigabyte of information.
For example, a UICC securely stores a service-subscriber key for identification purposes on mobile telephony devices (e.g., mobile phones and computers) . The UICC allows users to change phones by simply removing the UICC from one mobile phone and inserting it into another mobile phone or broadband telephony device. The UICC includes its unique serial number, international mobile subscriber identifier (IMSI) of the mobile device, security authentication and ciphering information, temporary information related to the local network, a list of the services the user has access to, and two passwords (apersonal identification number (PIN) for normal use and a personal/PIN unblocking key or personal unlock key (PUK) for unlocking) .
The PIN may be a four to eight digit passcode for authenticating a user to a subsystem (e.g., a SIM or UICC) . For example, the PIN protects the UICC from being stolen. The PUK is a unique code that is linked to the UICC of the wireless device and is usually eight digits long. When a UICC lock is set, the PUK is specified to lock the UICC after a user exceeds a pre-determined number of attempts for entering a wrong passcode or PIN. For example, after exceeding the pre-determined number of unsuccessful attempts, the wireless device will become locked or access to the UICC will be blocked. The PUK, which is linked to the UICC, can be used to unlock or unblock access to the UICC of the wireless device.
The use and content of the UICC can be protected by the PIN. A first PIN (e.g., PIN1) can be defined to control normal use of the mobile phone or wireless device. A second PIN (e.g., PIN2) can be set to allow the use of special functions (e.g., limiting outbound telephone calls to a list of numbers) . A PUK1 and PUK2 (e.g., pin unlock key 1 and pin unlock key 2) can reset the PIN1 and PIN2, respectively.
During an initialization phase of a UICC, a wireless device may fail to register a network for the UICC based on an indication of a condition of a first security code (e.g., a PUK) and/or a second security code (e.g., a PIN) . For example, a processor (e.g., a baseband processor) of the wireless device may indicate that a PIN1 is disabled based on a response from an initial select application identifier (AID) command. Applications residing on a UICC are executed by an external reader, such as a baseband processor, by first selecting the application by an AID and then sending commands to the selected application.
A state or an indication of the condition of the PIN1 can also be changed from PIN1 disabled to PIN1 blocked when a maximum retry count for entering a first security code (e.g., a PUK) to unlock the PIN1 is exceeded. For example, once a response to an “unlock PIN” command indicates that the number of remaining “unlock PIN” attempts using the wrong PUK equals zero, the indication of the condition of the PIN1 is changed from PIN1 disabled to PIN1 blocked. When the PIN1 is blocked, the processor of the wireless device indicates a failure in a PIN verification phase of the initialization process of the UICC.
When the processor of the wireless device fails to verify the PIN or fails to pass the verify PIN procedure, initialization of the universal integrated circuit card is paused or stopped. Accordingly, a subscription associated with the second security code is delayed or not activated. This implies that there is no indication that the subscription is ready to be connected to a network. For example, without the subscription ready indication, the wireless device cannot trigger attach procedures and cannot register a network for the UICC.
This state or indication of a condition associated with the various security codes usually matches the actual condition of the various security codes. However, some access conditions and their respective indications when attempting to register the network for the UICC do not match.
For example, some UICCs may indicate that one of their PINs (e.g., PIN1) is blocked due to exceeding a maximum retry count for entering a PUK to unlock the UICC. At the same time, these UICCs may indicate that the PIN1 is disabled. Under these access conditions where the PIN1 is actually blocked coupled with the PIN1 being  disabled, a wireless device or chipset-based device is not able to register a network for these UICCs. However, the indication that the PIN1 is blocked coupled with the indication that the PIN1 is disabled may not match the actual condition of the security codes. This mismatch can be exploited to register the UICC to the network. When the PIN1 is enabled, however, the number of retries to enter the PUK is not exceeded or is not zero. Otherwise, the state or indication of the PIN1 is changed from PIN1 disabled to PIN1 blocked when the maximum retry count for entering the first security code (e.g., PUK) to unlock the PIN1 is exceeded.
Attaining a special status where it is indicated that the PIN1 is blocked and disabled at the same time may be replicated. The special status can be replicated starting with an indication that the PIN1 is disabled followed by attempts to enable the PIN1 using a wrong PIN1 until a number of pre-determined (e.g., three) attempts are exceeded, thereby triggering an indication that the PIN1 is locked. As noted, a processor (e.g., a baseband processor) of the wireless device may indicate that the PIN1 is disabled based on a response from the initial select application identifier (AID) command. The PUK, which is set to the UICC, can unlock the PIN1. For example, attempts to unlock the PIN1 by inputting the wrong PUK for the pre-determined number of attempts (e.g., 10) causes the special status where it is indicated that PIN1 is blocked and disabled at the same time.
Aspects of the present disclosure are directed to activating the UICC under the special status where it is indicated that the PIN1 is blocked coupled with the indication that the PIN1 is disabled. Unlike the status only indicating that the PIN1 is blocked and therefore the network cannot be registered, under the special status the network can be registered to the UICC.
For example, aspects of the present disclosure are directed to a method for registering a blocked universal integrated circuit card (UICC) of a device (e.g., a wireless device) to a network under the special status. In one aspect, the method includes determining whether a maximum retry count for entering a first security code (e.g., a PUK) to unlock a universal integrated circuit card is exceeded. The method also includes determining whether a second security code (e.g., a PIN) for verifying an identity of a user is enabled when the maximum retry count for entering the first  security code is exceeded. The method further includes verifying the second security code when it is determined that the second security code is disabled.
According to aspects of the present disclosure, when it is indicated that a first pin (PIN1) is blocked and that the PIN1 is disabled, the wireless device can still register the UICC to the network. For example, the PIN is successfully verified even when it is indicated that that the second security code is disabled and that the maximum retry count for entering the PUK is exceeded. Thus, the access to the network may be granted under the special status and a false unblock PIN is prevented from affecting a status of a PIN. However, when it is indicated that the PIN is enabled and the maximum retry count for entering the PUK is exceeded (which means that the PIN verification failed) , the initialization of the universal integrated circuit card is paused or aborted. As a result, the wireless device or at least a portion of the wireless device associated with the UICC is powered off.
In some aspects of the disclosure, post-PIN verification procedures are performed after the PIN is verified, successfully followed by an indication that a subscription associated with the PIN is ready. Post-pin verification procedures could include reading an international mobile subscriber identity (IMSI) as well as other UICC files specified to register to network. The post-PIN verification procedures may otherwise be performed when the maximum retry count for entering the first security code is not exceeded. Thus, the access to the network may be granted under the special status and a false unblock PIN is prevented from affecting a status of a PIN.
FIGURE 1 shows a wireless device 110 that includes the disclosed universal integrated circuit card to be registered to a network. The wireless device 110 communicates with a wireless communications system 120. The wireless device 110 includes a multi-band (e.g., dual-band) concurrent millimeter wave (mmW) transceiver. The wireless communications system 120 may be a 5G system, a long term evolution (LTE) system, a code division multiple access (CDMA) system, a global system for mobile communications (GSM) system, a wireless local area network (WLAN) system, millimeter wave (mmW) technology, or some other wireless system. A CDMA system may implement wideband CDMA (WCDMA) , time division synchronous CDMA (TD-SCDMA) , CDMA2000, or some other version of CDMA. In a millimeter wave (mmW)  system, multiple antennas are used for beamforming (e.g., in the range of 30 GHz, 60 GHz, etc. ) . For simplicity, FIGURE 1 shows the wireless communications system 120 including two  base stations  130 and 132 and one system controller 140. In general, a wireless system may include any number of base stations and any number of network entities.
wireless device 110 may be referred to as a mobile equipment (ME) , a user equipment (UE) , a mobile station, a terminal, an access terminal, a subscriber unit, a station, etc. The wireless device 110 may also be a cellular phone, a smartphone, a tablet, a wireless modem, a personal digital assistant (PDA) , a handheld device, a laptop computer, a Smartbook, a netbook, a cordless phone, a wireless local loop (WLL) station, a Bluetooth device, etc. The wireless device 110 may be capable of communicating with the wireless communications system 120. The wireless device 110 may also be capable of receiving signals from broadcast stations (e.g., a broadcast station 134) , signals from satellites (e.g., a satellite 150) in one or more global navigation satellite systems (GNSS) , etc. The wireless device 110 may support one or more radio technologies for wireless communications such as 5G, LTE, CDMA2000, WCDMA, TD-SCDMA, GSM, 802.11, etc.
The wireless device 110 may support carrier aggregation, which is operation on multiple carriers. Carrier aggregation may also be referred to as multi-carrier operation. According to an aspect of the present disclosure, the wireless device 110 may be able to operate in low-band from 698 to 960 megahertz (MHz) , mid-band from 1475 to 2170 MHz, and/or high-band from 2300 to 2690 MHz, ultra-high band from 3400 to 3800 MHz, and long-term evolution (LTE) in LTE unlicensed bands (LTE-U/LAA) from 5150 MHz to 5950 MHz. Low-band, mid-band, high-band, ultra-high band, and LTE-U refer to five groups of bands (or band groups) , with each band group including a number of frequency bands (or simply, “bands” ) . For example, in some systems each band may cover up to 200 MHz and may include one or more carriers. For example, each carrier may cover up to 40 MHz in LTE. Of course, the range for each of the bands is merely exemplary and not limiting, and other frequency ranges may be used. LTE Release 11 supports 35 bands, which are referred to as LTE/UMTS bands and are listed in 3GPP TS 36.101. The wireless device 110 may be configured with up to five carriers in one or two bands in LTE Release 11.
FIGURE 2 shows a block diagram of the wireless device 110 in FIGURE 1, according to an aspect of the present disclosure. The wireless device 110 may include a universal integrated circuit card (UICC) interface 202, which may receive an embedded UICC (eUICC) 204 that stores profiles associated with one or more subscriptions from network providers.
A UICC used in various examples may include user account information, an international mobile subscriber identity (IMSI) , a set of SIM application toolkit (SAT) commands, and storage space for phone book contacts. The UICC may further store home identifiers (e.g., a system identification number (SID) /network identification number (NID) pair, a home preferred list of mobile networks (HPLMN) code, etc. ) to indicate the network operator providers for each subscription of the UICC. An integrated circuit card identity (ICCID) SIM serial number may be printed on the UICC for identification. In some aspects, the UICC may be implemented within a portion of memory of the wireless device 110 (e.g., in a memory 214) , and thus need not be a separate or removable circuit, chip, or card.
The wireless device 110 may include at least one controller, such as a general processor 206, which may be coupled to a coder/decoder (CODEC) 208. The CODEC 208 may in turn be coupled to a speaker 210 and a microphone 212. The general processor 206 may also be coupled to the memory 214. The memory 214 may be a non-transitory computer-readable storage medium that stores processor-executable instructions. The memory 214 may store an operating system (OS) , as well as user application software and executable instructions. The memory 214 may also store locally cached profiles for subscriptions supported by the eUICC 204.
The general processor 206 and the memory 214 may each be coupled to at least one baseband processor or baseband modem processor 216. The eUICC 204 in the wireless device 110 may utilize one or more baseband-RF resources. A baseband-RF resource may include the baseband modem processor 216, which may perform baseband/modem functions for communications with and controlling of a radio access technology (RAT) . The baseband-RF resource may include one or more amplifiers and radios, referred to generally as radio frequency (RF) resources (e.g., RF resource 218) . In some examples, the baseband-RF resources may share the baseband modem processor 216 (e.g., a single device that performs baseband/modem functions for all  RATs on the wireless device 110) . In other examples, each baseband-RF resource may include physically or logically separate baseband processors (e.g., BB1, BB2) .
The RF resource 218 may be a transceiver that performs transmit/receive functions for the eUICC 204 on the wireless device 110. The RF resource 218 may include separate transmit and receive circuitry, or may include a transceiver that combines transmitter and receiver functions. In some examples, the RF resource 218 may include multiple receive circuits. The RF resource 218 may be coupled to a wireless antenna (e.g., a wireless antenna 220) . The RF resource 218 may also be coupled to the baseband modem processor 216.
In some examples, the general processor 206, the memory 214, the baseband modem processor (s) 216, and the RF resource 218 may be included in the wireless device 110 as a system-on-chip 250. In some examples, the eUICC 204 and its corresponding UICC interface 202 may be external to the system-on-chip 250. Further, various input and output devices may be coupled to components on the system-on-chip 250, such as interfaces or controllers. Example user input components suitable for use in the wireless device 110 may include, but are not limited to, a keypad 224, a touchscreen display 226, and the microphone 212.
In some examples, the keypad 224, the touchscreen display 226, the microphone 212, or a combination thereof, may perform the function of receiving a request to initiate an outgoing call or for receiving a person identification number. Interfaces may be provided between the various devices and modules to implement functions in the wireless device 110 to enable communications in the wireless device.
Functioning together, the eUICC 204, the baseband processor BB1, BB2, the RF resource 218, and the wireless antenna 220 may constitute two or more radio access technologies (RATs) . For example, the wireless device 110 may be a communications device that includes a UICC, baseband processor, and RF resource configured to support two different RATs, such as 5G or LTE and GSM. More RATs may be supported on the wireless device 110 by adding more RF resources, and antennae for connecting to additional mobile networks.
In some examples (not shown) , the wireless device 110 may include, among other things, additional UICC or SIM cards, UICC or SIM interfaces, multiple RF  resources associated with the additional UICC or SIM cards, and additional antennae for supporting subscriptions communications with additional mobile networks.
The eUICC 204 may support multiple mobile network operator profiles, or subscription profiles. For example, a user may download multiple profiles onto the eUICC 204. Each profile may store static SIM information that is used to support a subscription with one or more mobile telephony networks. Thus, the eUICC 204 may play the role of multiple SIMs, because each SIM supports one profile.
In various examples, the wireless device 110 may be configured to locally cache one or more subscription profiles associated with or stored in the UICC. The profiles may be cached in the memory 214, part of which may be designated memory for the modem.
FIGURE 3 is a process flow diagram of a method 300 for registering a blocked universal integrated circuit card (UICC) of a wireless device to a network, according to aspects of the present disclosure. At block 302, the wireless device including a subsystem, such as a UICC, is powered up. At blocks 304-310 a processor (e.g., a baseband processor) of the wireless device communicates through a UICC interface to obtain basic UICC information including the remaining retries for the PUK.
For example, at block 304, the baseband processor reads a unique serial number or integrated circuit card identifier (ICCID) of the UICC. At block 306, the baseband processor obtains a status of the PIN. At block 308, the baseband processor obtains an unblock PIN status. At block 310, the baseband processor obtains the remaining retries for entering a first security code (e.g., a PUK) .
At block 312, the baseband processor determines whether a maximum retry count for entering the PUK to unlock the UICC is exceeded. At block 314, the baseband processor communicates through the UICC interface to determine whether a second security code (e.g., a PIN) for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded. At block 316, the baseband processor verifies the second security code (e.g., the PIN) when it is determined that the second security code is disabled. For example, the PIN is successfully verified even when it is indicated that the second security code is disabled and the maximum retry count for entering the PUK is exceeded. Thus, access to the  network may be granted under the special status and a false unblock PIN is prevented from affecting a status of a PIN.
At block 318, when it is indicated that the PIN is enabled and the maximum retry count for entering the PUK is exceeded (which means that the PIN verification failed) , the initialization of the universal integrated circuit card is paused or aborted. At this phase the baseband processor determines that the verification of the PIN failed. As a result of aborting the initialization, the wireless device or at least a portion of the wireless device associated with the UICC is powered off at block 324.
At block 320, post-PIN verification procedures are performed by the baseband processor after the PIN is verified successfully followed by an indication that a subscription associated with the PIN is ready. The post-PIN verification procedures at block 320 may otherwise be performed when it is determined (at block 312) that the maximum retry count for entering the first security code is not exceeded. At block 322, after the subscription ready indication, the wireless device triggers attach procedures to register the UICC with the network. At block 324, the wireless device or at least a portion of the wireless device associated with the UICC is powered off.
Thus, access to the network may be granted under the special status and a false unblock PIN is prevented from affecting a status of a PIN.
FIGURE 4 depicts a simplified flowchart of a method 400 for registering a blocked universal integrated circuit card (UICC) of a device (e.g., a wireless device) to a network. At block 402, a processor (e.g., a baseband processor) of the wireless device determines whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded. At block 404, the processor and/or a UICC interface determines whether a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded. At block 406, the processor verifies the second security code when it is determined that the second security code is disabled.
According to a further aspect of the present disclosure, an apparatus for registering a blocked universal integrated circuit card (UICC) of a device to a network is described. The apparatus may include means for determining whether a maximum retry  count for entering a first security code to unlock a universal integrated circuit card is exceeded, means for determining whether a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded, and/or means for verifying the second security code when it is determined that the second security code is disabled. The determining means, determining means, and/or the verifying means may be the baseband modem processor 216, the general processor 206, and/or the memory 214. In another aspect, the aforementioned means may be any module or apparatus configured to perform the functions recited by the aforementioned means.
FIGURE 5 is a component block diagram of a wireless device 500 suitable for implementing the method for activating a blocked universal integrated circuit card (UICC) . Aspects of the present disclosure may be implemented in any of a variety of wireless devices, an example of which (e.g., wireless device 500) is illustrated in FIGURE 5. The wireless device 500 may be similar to the wireless device 110 and may implement the method 300 and the method 400.
The wireless device 500 may include a processor 502 coupled to a touchscreen controller 504 and an internal memory 506. The processor 502 may be one or more multi-core integrated circuits designated for general or specific processing tasks. The internal memory 506 may be volatile or non-volatile memory, and may also be secure and/or encrypted memory, or unsecure and/or unencrypted memory, or any combination thereof. The touchscreen controller 504 and the processor 502 may also be coupled to a touchscreen panel 512, such as a resistive-sensing touchscreen, capacitive-sensing touchscreen, infrared sensing touchscreen, etc. Additionally, the display of the wireless device 500 need not have touch screen capability.
The wireless device 500 may have one or more cellular network transceivers 508 coupled to the processor 502 and to one or more antennas 510 and configured for sending and receiving cellular communications. The one or more transceivers 508 and the one or more antennas 510 may be used with the above-mentioned circuitry to implement the various example methods described. The wireless device 500 may include one or more UICC or SIM cards 516 coupled to the one or more transceivers 508 and/or the processor 502 and may be configured as described above.
The wireless device 500 may also include speakers 514 for providing audio outputs. The wireless device 500 may also include a housing 520, constructed of a plastic, metal, or a combination of materials, for containing all or some of the components discussed herein. The wireless device 500 may include a power source 522 coupled to the processor 502, such as a disposable or rechargeable battery. The rechargeable battery may also be coupled to the peripheral device connection port to receive a charging current from a source external to the wireless device 500. The wireless device 500 may also include a physical button 524 for receiving user inputs. The wireless device 500 may also include a power button 526 for turning the wireless device 500 on and off.
FIGURE 6 is a block diagram showing an exemplary wireless communications system in which a configuration of the disclosure may be advantageously employed. For purposes of illustration, FIGURE 6 shows three  remote units  620, 630, and 650 and two base stations 640. It will be recognized that wireless communications systems may have many more remote units and base stations.  Remote units  620, 630, and 650 include  IC devices  625A, 625B, and 625C that include the disclosed wireless device including the subsystem or universal integrated circuit card. It will be recognized that other devices may also include the disclosed wireless device, such as the base stations, switching devices, and network equipment. FIGURE 6 shows forward link signals 680 from the base station 640 to the  remote units  620, 630, and 650 and reverse link signals 690 from the  remote units  620, 630, and 650 to base station 640.
In FIGURE 6, remote unit 620 is shown as a mobile telephone, remote unit 630 is shown as a portable computer, and remote unit 650 is shown as a fixed location remote unit in a wireless local loop system. For example, a remote unit may be a mobile phone, a hand-held personal communications systems (PCS) unit, a portable data unit such as a personal digital assistant (PDA) , a GPS enabled device, a navigation device, a set top box, a music player, a video player, an entertainment unit, a fixed location data unit such as a meter reading equipment, or other communications device that stores or retrieves data or computer instructions, or combinations thereof. Although FIGURE 6 illustrates remote units according to the aspects of the disclosure, the disclosure is not limited to these exemplary illustrated units. Aspects of the disclosure may be suitably employed in many devices, which include the wireless device.
For a firmware and/or software implementation, the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. A machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein. For example, software codes may be stored in a memory and executed by a processor unit. Memory may be implemented within the processor unit or external to the processor unit. As used herein, the term “memory” refers to types of long term, short term, volatile, nonvolatile, or other memory and is not to be limited to a particular type of memory or number of memories, or type of media upon which memory is stored.
If implemented in firmware and/or software, the functions may be stored as one or more instructions or code on a computer-readable medium. Examples include computer-readable media encoded with a data structure and computer-readable media encoded with a computer program. Computer-readable media includes physical computer storage media. A storage medium may be an available medium that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer; disk and disc, as used herein, includes compact disc (CD) , laser disc, optical disc, digital versatile disc (DVD) , floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
In addition to storage on computer-readable medium, instructions and/or data may be provided as signals on transmission media included in a communications apparatus. For example, a communications apparatus may include a standard cell circuit having signals indicative of instructions and data. The instructions and data are configured to cause one or more processors to implement the functions outlined in the claims.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with a general-purpose processor, a digital signal processor (DSP) , an application specific integrated  circuit (ASIC) , a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, multiple microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
Although the present disclosure and its advantages have been described in detail, it should be understood that various changes, substitutions, and alterations can be made herein without departing from the technology of the disclosure as defined by the appended claims. For example, relational terms, such as “above” and “below” are used with respect to a substrate or electronic device. Of course, if the substrate or electronic device is inverted, above becomes below, and vice versa. Additionally, if oriented sideways, above and below may refer to sides of a substrate or electronic device. Moreover, the scope of the present application is not intended to be limited to the particular configurations of the process, machine, manufacture, and composition of matter, means, methods, and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding configurations described herein may be utilized according to the present disclosure. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.

Claims (20)

  1. A method for registering, to a network, a blocked universal integrated circuit card (UICC) of a device, comprising:
    determining whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded;
    determining whether a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded; and
    verifying the second security code when it is determined that the second security code is disabled.
  2. The method of claim 1, further comprising pausing an initialization of the universal integrated circuit card when the second security code for verifying an identity of the user is enabled.
  3. The method of claim 2, further comprising powering off the device in response to pausing the initialization of the universal integrated circuit card.
  4. The method of claim 1, in which the first security code comprises a personal unlock key (PUK) and the second security code comprises a personal identification number (PIN) .
  5. The method of claim 1, further comprising performing post second security code verification procedures when the second security code is verified successfully followed by an indication that a subscription associated with the second security code is ready.
  6. The method of claim 1, further comprising performing post second security code verification procedures when the maximum retry count for entering the first security code is not exceeded.
  7. The method of claim 1, further comprising performing a personal identification number (PIN) verification procedure after verification of a PIN.
  8. The method of claim 7, further comprising triggering an attach procedure after the PIN verification procedure to register the UICC with the network.
  9. An apparatus for registering, to a network, a blocked universal integrated circuit card (UICC) of a device, comprising:
    means for determining whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded;
    means for determining whether a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded; and
    means for verifying the second security code when it is determined that the second security code is disabled.
  10. The apparatus of claim 9, further comprising means for pausing an initialization of the universal integrated circuit card when the second security code for verifying an identity of the user is enabled.
  11. The apparatus of claim 10, further comprising means for powering off the device in response to pausing the initialization of the universal integrated circuit card.
  12. The apparatus of claim 9, in which the first security code comprises a personal unlock key (PUK) and the second security code comprises a personal identification number (PIN) .
  13. The apparatus of claim 9, further comprising means for performing post second security code verification procedures when the second security code is verified successfully followed by an indication that a subscription associated with the second security code is ready.
  14. The apparatus of claim 9, further comprising means for performing post second security code verification procedures when the maximum retry count for entering the first security code is not exceeded.
  15. The apparatus of claim 9, further comprising means for performing a personal identification number (PIN) verification procedure after verification of a PIN.
  16. The apparatus of claim 15, further comprising means for triggering an attach procedure after the PIN verification procedure to register the UICC with the network.
  17. An apparatus for registering, to a network, a universal integrated circuit card (UICC) of a device, comprising:
    a memory;
    a communication interface coupled to the UICC of the device; and
    at least one processor coupled to the memory and the communication interface of the UICC of the device, the at least one processor configured:
    to determine whether a maximum retry count for entering a first security code to unlock a universal integrated circuit card is exceeded;
    to determine a second security code for verifying an identity of a user is enabled when the maximum retry count for entering the first security code is exceeded; and
    to verify the second security code when it is determined that the second security code is disabled.
  18. The apparatus of claim 17, in which the at least one processor is further configured to perform post second security code verification procedures when the second security code is verified successfully followed by an indication that a subscription associated with the second security code is ready.
  19. The apparatus of claim 17, in which the at least one processor is further configured to perform post second security code verification procedures when the maximum retry count for entering the first security code is not exceeded.
  20. The apparatus of claim 17, in which the at least one processor is further configured:
    to perform a personal identification number (PIN) verification procedure after verification of a PIN; and
    to trigger an attach procedure after the PIN verification procedure to register the UICC with the network.
PCT/CN2019/123933 2019-12-09 2019-12-09 Universal integrated circuit card (uicc) activation WO2021114009A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2019/123933 WO2021114009A1 (en) 2019-12-09 2019-12-09 Universal integrated circuit card (uicc) activation
CN201980102828.9A CN114788321A (en) 2019-12-09 2019-12-09 Universal Integrated Circuit Card (UICC) activation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/123933 WO2021114009A1 (en) 2019-12-09 2019-12-09 Universal integrated circuit card (uicc) activation

Publications (1)

Publication Number Publication Date
WO2021114009A1 true WO2021114009A1 (en) 2021-06-17

Family

ID=76329262

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/123933 WO2021114009A1 (en) 2019-12-09 2019-12-09 Universal integrated circuit card (uicc) activation

Country Status (2)

Country Link
CN (1) CN114788321A (en)
WO (1) WO2021114009A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2845170Y (en) * 2005-11-08 2006-12-06 太思科技股份有限公司 Double IC card system
US20130303123A1 (en) * 2012-05-14 2013-11-14 Uros Oy Security code(s) of apparatus having at least one sim
EP2955948A1 (en) * 2014-06-12 2015-12-16 Uros Technology S.à r.l. Management of subscriber identity modules
US20180198797A1 (en) * 2015-06-30 2018-07-12 Oberthur Technologies Method of managing profiles in a secure element

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616416B (en) * 2009-07-24 2012-08-29 中兴通讯股份有限公司 Method and equipment for authenticating smart card of communication terminal
CN102857902B (en) * 2011-06-30 2017-09-19 上海闻泰电子科技有限公司 Use the method for China Mobile's handset identity UIM cards
CN105790949B (en) * 2015-11-17 2019-09-13 Oppo广东移动通信有限公司 Subscriber identification card unlocking method and subscriber identification card tripper
CN108156601A (en) * 2017-12-08 2018-06-12 京信通信系统(中国)有限公司 A kind of method and device of locking SIM card

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2845170Y (en) * 2005-11-08 2006-12-06 太思科技股份有限公司 Double IC card system
US20130303123A1 (en) * 2012-05-14 2013-11-14 Uros Oy Security code(s) of apparatus having at least one sim
EP2955948A1 (en) * 2014-06-12 2015-12-16 Uros Technology S.à r.l. Management of subscriber identity modules
US20180198797A1 (en) * 2015-06-30 2018-07-12 Oberthur Technologies Method of managing profiles in a secure element

Also Published As

Publication number Publication date
CN114788321A (en) 2022-07-22

Similar Documents

Publication Publication Date Title
US9497705B2 (en) System and methods for using wireless network correlations to acquire service on a multi-SIM device
US10172060B2 (en) Reselection failure detection and prevention in multi-SIM wireless communication devices
US20190159116A1 (en) Network camp on for multi-sim devices
EP3556124B1 (en) Obtaining multiple subscription services from an embedded universal integrated circuit card
US9913212B2 (en) Carrier network access for multi-SIM devices
US10098165B2 (en) Call setup in wireless communication devices
US20180063774A1 (en) Utilizing Network Coverage Information to Perform Public Land Mobile Network Searches
US20170064598A1 (en) Managing Cell Selection In A Dual-Receive Multi-Subscription Multi-Standby Communication Device
US9344877B1 (en) Symmetric equivalent public land mobile network (EPLMN) configurations among subscriptions
WO2016160430A1 (en) Cell acquisition systems and processes for multi-sim devices
US8903372B1 (en) Performing neighbor cell activities in a multi-stack device
US11805397B2 (en) IMEI binding and dynamic IMEI provisioning for wireless devices
WO2020132786A1 (en) Universal integrated circuit card (uicc) initialization for network service access
WO2021114009A1 (en) Universal integrated circuit card (uicc) activation
WO2021056381A1 (en) Universal integrated circuit card (uicc) initialization for network service access
WO2021163947A1 (en) Universal integrated circuit card (uicc) authentication
WO2017166278A1 (en) Checking public land mobile network (plmn) availability in mobile devices
US20230107560A1 (en) Universal integrated circuit card (uicc) service
WO2021151218A1 (en) Universal integrated circuit card (uicc) activation
WO2021092824A1 (en) Universal integrated circuit card (uicc) activation
WO2021142819A1 (en) Universal integrated circuit card (uicc) phone book access
WO2021226768A1 (en) Universal integrated circuit card (uicc) profile management
WO2021179120A1 (en) Apparatus and method to support an increased universal integrated circuit card (uicc) voltage class
WO2021035668A1 (en) Universal integrated circuit card (uicc) logical channel utilization
WO2021092718A1 (en) Universal integrated circuit card (uicc) hardware failure recovery

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19955722

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19955722

Country of ref document: EP

Kind code of ref document: A1