WO2012037167A1 - Activation étendue d'un dispositif sans fil - Google Patents
Activation étendue d'un dispositif sans fil Download PDFInfo
- Publication number
- WO2012037167A1 WO2012037167A1 PCT/US2011/051464 US2011051464W WO2012037167A1 WO 2012037167 A1 WO2012037167 A1 WO 2012037167A1 US 2011051464 W US2011051464 W US 2011051464W WO 2012037167 A1 WO2012037167 A1 WO 2012037167A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- wireless device
- imsi
- wireless network
- wireless
- temporary
- Prior art date
Links
- 230000004913 activation Effects 0.000 title description 91
- 238000001514 detection method Methods 0.000 claims abstract description 137
- 230000004044 response Effects 0.000 claims abstract description 37
- 230000003213 activating effect Effects 0.000 claims abstract description 32
- 238000000034 method Methods 0.000 claims description 140
- 238000004891 communication Methods 0.000 claims description 38
- 238000013103 analytical ultracentrifugation Methods 0.000 claims description 35
- 230000008569 process Effects 0.000 claims description 15
- 230000015654 memory Effects 0.000 claims description 5
- 230000011664 signaling Effects 0.000 claims description 5
- 238000013475 authorization Methods 0.000 claims description 3
- 238000001994 activation Methods 0.000 description 100
- 230000003936 working memory Effects 0.000 description 8
- 238000012790 confirmation Methods 0.000 description 6
- 238000004519 manufacturing process Methods 0.000 description 6
- 230000003993 interaction Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000001413 cellular effect Effects 0.000 description 3
- 230000003247 decreasing effect Effects 0.000 description 3
- 238000009434 installation Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 210000004271 bone marrow stromal cell Anatomy 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000006837 decompression Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
Definitions
- a wireless device In order to operate on a wireless network, a wireless device (e.g., a cellular phone, wireless sensor) generally must be registered on the wireless network.
- a wireless provider To activate the wireless device on the wireless network, a wireless provider generally undertakes a practice referred to herein as "activation,” in which the wireless device is identified to the wireless network using an identifier (such as an international mobile subscriber identifier (IMSI) or similar identifying number, which, in many cases, is encoded on a subscriber identity module (SIM) of the wireless device.
- IMSI international mobile subscriber identifier
- SIM subscriber identity module
- this process involves creating a record for the device.
- the record comprises the identifying number, as well as an addressing number (e.g., a phone number for a wireless phone), such as an international ISDN number
- MSISDN MSISDN
- the wireless network When a new wireless device is purchased, the wireless network must activate the wireless device before the user can use the wireless device on the wireless network.
- a wireless device can be activated.
- the wireless device is preactivated prior to sale of the wireless device to the user. This process may be used most frequently for prepaid wireless phones.
- the device Under a preactivation scheme, the device has installed therein a SIM card that is assigned an activated IMSI before the device is sold. This technique, while technically feasible, has several downsides.
- the IMSI is assigned and activated before the device is sold, there may be an enhanced risk of theft and/or other supply-chain "leakage.”
- this technique may require substantial investment in allocating and/or activating IMSIs early in the supply chain, resulting in inefficiencies (for example, maintain a relatively large stock of activated IMSIs corresponding to devices that may not be sold or used for some time). Further, if the supply chain involves rebranding the devices, some of the allocated and activated IMSIs might never be used.
- preactivation of a SIM card generally requires the assignment of an MSISDN to the SIM (by associating the MSISDN with the IMSI assigned to the SIM).
- Another inefficiency may be the allocation of space in databases of a wireless network with which the wireless device is configured to be used. For example, space in a Home Location Register of the wireless network may be allocated without ever being used.
- the wireless device is activated at the point-of-sale. While this technique may be suitable for applications in which the wireless device is sold at a relatively sophisticated reseller or agent of the wireless provider, it is unavailable in many cases (including, for example, in the case of prepaid phones or phones that are purchased at locations other than dedicated resellers).
- the third option is to sell a wireless device in an unactivated state and require the user to activate the wireless device before use. Because, as noted above, the device is inoperable on the network until activation, the wireless device itself may not be able to be used as the activation vehicle. Hence, the user may have to call the wireless network provider (using a different phone), visit the wireless network provider's website (using a separate computer or some other device), and/or the like. This option may be less than desirable because it imposes an inconvenience on the user, resulting in a competitive disadvantage for the provider in relation to techniques that do not impose similar inconveniences on the user. BRIEF SUMMARY
- a method for activating a wireless device on a wireless network may include receiving an authentication request based on the wireless device attempting to attach to the wireless network.
- the authorization request may specify an international mobile subscriber identity (IMSI).
- the method may include comparing the IMSI to a set of stored blocked IMSIs. Each IMSI of the set of stored blocked IMSIs is prohibited from being used to access the wireless network.
- the method may include, in response to the comparison, determining the wireless device that corresponds to the IMSI is permitted to be attached to the wireless network.
- the method may include, in response to determining the wireless device is permitted to attach to the wireless network, causing authentication of the wireless device.
- Embodiments may include one or more of the following:
- the method may include routing, by the wireless network, the authentication request to a detection device based on the IMSI, wherein the detection device is separate from an HLR of the wireless network.
- Causing authentication of the wireless device may include performing authentication of the wireless device by the detection device, wherein such authentication does not require communication with an authentication center of the wireless network.
- Causing authentication of the wireless device may include transmitting an authentication response comprising security information to a mobile switching center of the wireless network, wherein the mobile switching center services the wireless device.
- the method may include identifying a second IMSI
- the method may include in response to identifying the second IMSI corresponding to the second wireless device that has violated at least the rule of the set of rules, adding the second IMSI to the set of stored blocked IMSIs.
- the rule may define a limit on a number of signaling messages permissible to be received from wireless devices.
- the method may include receiving a command from an administrator, to add a second IMSI to the set of stored blocked IMSIs.
- the method may include in response to receiving the command, adding the second IMSI to the set of stored blocked IMSIs.
- the method may include transmitting provisioning information corresponding to the wireless device to a plurality of AUCs of the wireless network.
- the method may include receiving a response from at least one of the plurality of AUCs.
- Causing authentication of the wireless device may include selecting an AUC from the plurality of AUCs of the wireless network to receive authentication information corresponding to the wireless device based on a response time of the response of the AUC to the transmitted provisioning information.
- Causing authentication of the wireless device may include transmitting the authentication information corresponding to the wireless device to the selected AUC.
- the method may include assigning a temporary mobile subscriber integrated services digital network number (MSISDN) to the wireless device that corresponds to the IMSI, wherein the IMSI is a temporary IMSL
- MSISDN mobile subscriber integrated services digital network number
- the method may include assigning a non-temporary MSISDN and a non-temporary IMSI to the wireless device.
- the method may include after assigning the non-temporary MSISDN and the non-temporary IMSI to the wireless device, transmitting a first message to a home location register (HLR) of the wireless network.
- the first message may be for delivery to the wireless device.
- the method may include receiving a message from the HLR indicating that the wireless device is available to receive the message.
- a detection device for activating a wireless device on a wireless network may include a processor.
- the detection device may include a memory communicatively coupled with and readable by the processor and having stored therein processor-readable instructions .
- the instructions may cause the processor to receive a request from the wireless network for authentication of the wireless device.
- the request may specify an international mobile subscriber identity (IMSI) corresponding to the wireless device.
- IMSI international mobile subscriber identity
- the instructions may cause the processor to compare the IMSI to a set of stored blocked IMSIs. Each IMSI of the set of stored blocked IMSIs may be prohibited from being used to access the wireless network.
- the instructions may cause the processor to, in response to the comparison, determine the wireless device that corresponds to the IMSI is permitted to be attached to the wireless network.
- the instructions may cause the processor to, in response to determining the wireless device is permitted to attach to the wireless network, cause the wireless device to be authenticated.
- a detection apparatus for activating a wireless device on a wireless network may include means for receiving a request from the wireless network for authentication of the wireless device.
- the request may specify an international mobile subscriber identity (IMSI) corresponding to the wireless device.
- IMSI international mobile subscriber identity
- the detection apparatus may include means for comparing the IMSI to a set of stored blocked IMSIs. Each IMSI of the set of stored blocked IMSIs may be prohibited from being used to access the wireless network.
- the detection apparatus may include means for determining, in response to the comparison, the wireless device that corresponds to the IMSI is permitted to be attached to the wireless network.
- the detection apparatus may include means for causing the wireless device to be authenticated in response to determining the wireless device is permitted to attach to the wireless network.
- FIG. 1 illustrates an embodiment of a wireless device in communication with a wireless network.
- FIG. 2 illustrates an embodiment of a wireless network configured to activate a wireless device.
- FIG. 3 illustrates an embodiment of a relationship between a device activation provider and a supply chain, in accordance with various embodiments of the invention.
- FIG. 4 illustrates an embodiment of a method for activating a wireless device.
- FIG. 5 illustrates another embodiment of a method for activating the wireless device.
- FIG. 6 illustrates an embodiment of a method of configuring a wireless network to support wireless device activation.
- FIG. 7 illustrates an embodiment of a method for modifying an IMSI blacklist.
- FIG. 8 illustrates an embodiment of a method for confirming that a wireless device has been activated properly.
- FIG. 9 illustrates an embodiment of a computer system.
- wireless device is used to mean any type of device that operates by access to a wireless network and requires activation to be operable.
- Such devices include wireless phones, as well as connected personal digital assistants, portable email devices, and/or the like.
- such devices may operate on what is sometimes referred to as a "wide area cellular” network, including without limitation a Global System for Mobile telecommunications (“GSM”) network, a code division multiple access (“CDMA”) network, and/or networks operating in accordance with any derivatives thereof (such as General Packet Radio Service (“GPRS”), Enhanced Data rates for GSM Evolution (“EDGE”), CDMA2000, Universal Mobile Telecommunications Standard
- GSM Global System for Mobile telecommunications
- CDMA code division multiple access
- GPRS General Packet Radio Service
- EDGE Enhanced Data rates for GSM Evolution
- CDMA2000 Code division multiple access 2000
- SIM cards may be provided having stored thereon temporary IMSIs. These SIM cards may be sold with a wireless device. These temporary IMSIs may be within a range of IMSIs reserved for use by a detection device.
- a wireless network when a wireless network receives a message requesting to attach to the wireless network (a "registration message") from a wireless device assigned a temporary IMSI number, it may forward this message to a detection device (which may be part of the wireless network or may be operated by a third- party), which selects a temporary MSISDN number for the IMSI.
- the detection device may permit or block activation of a wireless device based on the IMSI of the wireless device's SIM card. If the IMSI of the wireless device (that is, the IMSI of the SIM card of the wireless device) is listed in a blacklist that is accessible to the detection device, activation of the wireless device associated with the IMSI may be blocked. Such a blacklist may be maintained manually and/or automatically. An administrator may add and/or remove IMSIs to and from the blacklist. IMSIs may automatically be added to (and/or removed from) the blacklist based on one or more predefined rules. For example, if a wireless device associated with an IMSI attempts to transmit above a threshold number of messages within a period of time, the IMSI may be added to the blacklist.
- the detection device may provide sufficient signaling support to allow the wireless network to register and manage the wireless device without causing an error to be displayed to the user of the wireless device, thereby possibly resulting in a more satisfying activation experience for the user.
- the detection device upon receiving a registration message may be configured to compare the IMSI of the wireless device with a blacklist of IMSIs. If the IMSI of the wireless device is listed on the blacklist, activation may be blocked. If not, activation may be permitted to be attempted.
- authentication may be conducted by the detection device without accessing an AUC.
- two or more AUCs may be provisioned. The first AUC to complete the provisioning process may be transmitted authentication information linked with a wireless device being activated. By provisioning multiple AUCs, the latency during activation may be decreased because only one AUC may need to respond to the provisioning request and receive the authorization information.
- a profile for the wireless device may be provided by the detection device to the wireless network (and/or more particularly, the appropriate equipment, such as a visitor location register (VLR) and/or visited mobile switching center (MSC)).
- This profile which contains the temporary MSISDN number, provides the wireless device with sufficient access to the wireless network to complete the activation process.
- An MSISDN may refer to a dialable number that a caller may dial to communicate with a wireless device.
- the detection device may be configured to notify an activation system that a wireless device with a temporary IMSI has registered with the network.
- the activation system may assign a non-temporary MSISDN to the wireless device (based, perhaps, on an interaction between the user and the activation system) and/or may assign a non-temporary IMSI number to the SIM card in the wireless device.
- the activation system may also create, in the wireless network (e.g., home location registers, authentication centers, etc.) appropriate records comprising the non-temporary MSISDN and IMSI number.
- the temporary MSISDN then may be returned to the pool for re -use by the detection device in another activation procedure.
- the detection device may not automatically receive an indication of whether the activation process completed properly. For example, once the wireless device has received the non-temporary IMSI and the non-temporary MSISDN, the wireless device may reattach to the wireless network using the non-temporary IMSI and requests to the wireless network involving the wireless device may no longer be routed to the detection device (because the wireless device's IMSI is non- temporary).
- a message such as an SMS text message
- the detection device may determine that activation has been successful. While the following systems and methods discuss the use of IMSIs, it should be understood that similar systems and method may be used with some other form of identifier and the description of IMSIs should not be interpreted as limiting.
- FIG. 1 illustrates an embodiment 100 of a wireless device 105 in communication with a wireless network 110.
- Wireless network 110 may include a signaling system 7 ("SS7") network.
- wireless network 110 may include one or more of a wireless intelligent network (“WIN”), a public switched telephone network (“PSTN”), and/or a data network (such as an Internet Protocol network, which can include the Internet, an Intranet, and/or the like).
- wireless network 110 comprises (and/or provides communication between) base station 115, base station controller (BSC) 120, a mobile switching center (MSC) 125, a home location register (HLR) 130, and an authentication center (AUC) 135.
- BSC base station controller
- MSC mobile switching center
- HLR home location register
- AUC authentication center
- wireless network 110 may include other components, such as a switching service point, intelligent peripheral, etc., and/or or that wireless network 1 10 often will comprise multiple base stations, base station controllers, mobile switching centers, home location registers and/or authentication centers. Likewise, it is possible that two or more of these components might be integrated in a single device.
- wireless device 105 has associated therewith an identification number.
- the identification number may be specific to a wireless device or a SIM card of the wireless device.
- the identification number which may be an IMSI, may not be the same as another IMSI of another wireless device 105 configured to attach to wireless network 110.
- the IMSI may identify wireless device 105 to the network, and/or an addressing number (which may be, but need not necessarily be, an MSISDN), which may be used by wireless network 110 to address wireless device 105 when communicating with wireless device 105.
- an activated wireless device 105 registers with wireless network 110 (e.g., wireless device 105 is powered on, enters the service area, etc.), it sends a message, which is received at the base station controller 120 (usually via the base station 115).
- the message generally will include the IMSI of the SIM card of wireless device 105, either explicitly or implicitly (e.g., the base station controller 120 will be able to ascertain the identification number and associate it with the message, if necessary).
- the MSC 125 (or some other component of wireless network 110) thus identifies the identification number of the wireless device 105 and queries the HLR 130, which returns to the MSC 125 data about the wireless device 105.
- VLR visitor location register
- Such data can include the addressing number of wireless device 105, as well as the capabilities of wireless device 105.
- a security key is used to secure communications between wireless device 105 and the wireless network 110.
- This security key (often implemented as a set of data "triplets" comprising a signed response, session key and a random number) is generated by the authentication center 135, based on a shared secret stored in the wireless device (often referred to as Ki) and in a record in the authentication center 135.
- Ki shared secret stored in the wireless device
- the HLR 130 forwards the query (or at least the wireless device's identification number) to the authentication center 135 as well.
- the authentication center 135 correlates the wireless device's identification number with the shared secret, such that when provided the identification number, the authentication center 135 can generate the security key based on the shared secret for that wireless device and return it to the MSC 125, which can use that data to authenticate the wireless device 105.
- the MSC 125 Once the MSC 125 has obtained the data from the HLR 130 and authenticated wireless device 105 based on the security key, wireless device 105 is operable on wireless network 110. In this typical implementation, however, the activation process populates HLR 130 and authentication center 135 with data about wireless device 105, including the identification number and shared secret.
- neither HLR 130 nor authentication center 135 may contain records corresponding to the identification number of wireless device 105, thereby preventing wireless device 105 from registering with wireless network 110 and thus rendering wireless device 105 at least partially inoperable on wireless network 110.
- FIG. 2 illustrates an embodiment 200 of a wireless network 210 configured to activate wireless device 205.
- Embodiment 200 is similar to embodiment 100 of FIG. 1, and it may operate in similar fashion once wireless device 205 has been activated.
- Embodiment 200 is configured to allow wireless device 205 to perform its own activation.
- embodiment 200 in addition to base station 215, BSC 220, MSC/VLR 225, HLR 230 and AUC 135, embodiment 200 includes a detection device 240 and an activation system 245.
- Detection device 240 can be a device and/or computer system that is configured to perform functions ascribed herein to a detection device.
- detection device 240 may be implemented by a modified HLR; in other cases, detection device 240 may perform only detection services.
- Activation system 245 can be any computer system and/or device that comprises the necessary configuration and/or software to perform the functions described below to activate the wireless device 205 through wireless network 210. In some embodiments, activation system 245 is a single computer; in other
- detection device 240 resides within wireless network 210, while the activation system 245 is outside wireless network 210, although activation system 245 is in communication (either directly or indirectly) with detection device 240, as well as the HLR 230, AUC 235 and/or MSC/VLR 225.
- detection device 240 and/or activation system 245 may be either inside or outside wireless network 210 and/or may be in communication, either through wireless network 210 or otherwise, with various components of the network.
- a mode of operation of embodiment 200, and, in particular, detection device 240 and activation system 245, is described in detail below.
- a set of embodiments provides a detection device that is configured to act as a "quasi-HLR.”
- the detection device (which is not an HLR 130 and generally does not perform the functions of an HLR 130), is configured to be seen by wireless network 210— and, in particular the MSC 225— as the HLR for an unactivated wireless device 205.
- MSC/VLR 225 queries detection device 240, rather than HLR 230, for data about wireless device 205.
- MSC/VLR 225 may query detection device 240 instead of HLR 230 based on a temporary
- IMSI of wireless device 205 may be configured for routing to detection device 240.
- Detection device 240 may contact activation system 245, which is responsible for assigning an addressing number to wireless device 205 and, in some cases, assigning a new, non-temporary (e.g., permanent) identification number (e.g., IMSI) to the SIM in wireless device 205.
- activation system 245 responsible for assigning an addressing number to wireless device 205 and, in some cases, assigning a new, non-temporary (e.g., permanent) identification number (e.g., IMSI) to the SIM in wireless device 205.
- IMSI non-temporary identification number
- activation system 245 may be responsible for updating wireless network 210 to complete activation of wireless device 205, as described in further detail below. In some embodiments, such activation techniques form the basis for a method of
- FIG. 3 illustrates an embodiment 300 of a relationship between activation system 245 and a supply chain (which might also be considered a sales channel) 305.
- Supply chain 305 may involve various numbers of entities; as illustrated, supply chain 305 includes SIM manufacturing process 310, wireless provider 320, distributor 325, and retailer 330.
- a retailer can be any of a variety of entities, with a variety of relationships to a wireless provider 320.
- retailer 330 might be a value-added reseller of wireless devices, while in other cases, retailer 330 might be a big-box electronic store.
- the retailer might be a general merchandise retailer (such as a grocery store, convenience store, kiosk, etc.).
- embodiments of the invention can support retail sales through virtually any type of retailer.
- supply chain 305 may contain none, one, or more of each of these types of entities.
- the wireless provider i.e., the wireless telephone company will provide service for the wireless device once activated
- the wireless provider might not be considered part of the supply chain.
- the wireless devices/SIMs are rebranded before sale to the end user, there may be multiple wireless providers 320 in the supply chain. (It should be noted as well that any two or more of these entities may be consolidated; for example, wireless provider 320 may also act as distributor 325 and/or retailer 330 of wireless devices.)
- SIM manufacturer 310 is at the beginning of the supply chain (although the activation provider might actually be considered the beginning of the supply chain).
- SIM manufacturer 310 is responsible for manufacturing SIMs and/or, more precisely, for encoding the SIMS with identification numbers provided by activation system 245.
- the SIMs then can be provided to wireless provider 320, which distributes them to distributor(s) 325 (and/or directly to retailer(s) 330), either installed in wireless devices or as standalone components to be installed later into wireless devices.
- Retailer 330 after receiving a SIM/wireless device, sells the wireless device to a user, who can then activate the wireless device as described herein.
- activation system 245 (which might be operated by an activation provider, who may be a standalone entity and/or one of the other entities within the supply chain 305, such as the wireless provider 320 and/or SIM manufacturer 310) may be configured to be in communication with one or more other entities in the supply chain.
- activation system 245 might be in communication with these entities through conventional computer communications (such as by way of a business application, such as a supply chain
- Activation system 245 interacts with the SIM manufacturing process to provide a pool of known identification numbers (e.g., IMSI numbers) that can be encoded onto SIMs as temporary identification numbers of unactivated SIMs. SIM manufacturer 310 can then produce SIMs, in conventional fashion, encoded with identification numbers from this pool.
- IMSI numbers e.g., IMSI numbers
- Activation system 245 may also interact with the wireless provider (in addition to interacting with the provider's wireless network to activate wireless devices, as described elsewhere herein) to provide status information about the activation process, for example, by notifying wireless provider 320 of the wireless network of the status of SIMs/identification numbers.
- Activation system 245 may interact as well with distributors 325 and/or retailers 330 to provide such information, to obtain information about sales of SIMs (and/or devices comprising the SIMs), particularly SIMs having temporary identification numbers.
- Activation system 245 may track the progress of the SIM through the supply chain/sales channel, either to maintain information about the status of the IMSIs and to prevent supply chain leakage, and/or to identify an entity responsible for the IMSI. For example, if an IMSI is used in a rebranded wireless device, it can be useful to know the provider of the rebranded service, as there may be a need to apportion fees and/or account for transaction costs associated with the sale of the wireless device.
- activation system 245 may receive status updates when the status of an IMSI changes, including, for example, when a SIM is encoded with the IMSI, when the SIM is installed in a device, when the device is provided to a distributor 325 and/or retailer 330, when the device is purchased by an end user, etc.
- Such updates may be provided by the entity responsible for the status of the IMSI at that time and/or may be propagated up the supply chain to the activation system (or associated computer). Standard supply chain and/or sales channel management techniques,
- activation system 245 may interact with entities in the supply chain to transfer payments in relation to the activation process.
- the activation provider may receive payment from wireless provider 320 (and/or any of the other entities) for providing activation services.
- the activation provider may also make payments to any of these entities, and/or may notify the entities of such payments, amounts owing, etc., via activation system 245 and/or another system in communication therewith.
- a user will be charged a fee for the ability to have input into the selection.
- That fee may be charged by the activation provider, and/or a portion of the fee may be allocated to SIM manufacturer 310, wireless provider 320, distributor(s) 325, and/or retailer(s) 330. Payment of these portions of the fees, and/or accounting therefor, may be performed by activation system 245 (and/or another computer in communication therewith). In other cases, the fee may be charged by wireless provider 320 (or another entity) directly, for example, by adding the fee to the user's invoice for wireless service. In such cases, activation system 245 might notify that entity of the type of input (as described below, for example) provided by the user in selecting the number (e.g., MSISDN) for the wireless device, so that wireless provider 320 (or other entity) can properly bill the user.
- entity of the type of input as described below, for example
- FIG. 4 illustrates an embodiment of a method 400 for activating a wireless device using a detection device.
- Method 400 may be performed using wireless network 210 of FIG. 2.
- Method 400 may also be performed by some other wireless network that has, or is in communication with, a detection device, such as detection device 240 of FIG. 2.
- a detection device such as detection device 240 of FIG. 2.
- Each step of method 400 may be performed by such a detection device, which may comprise one or more computer systems, such as computer system 900 of FIG. 9.
- the detection device may be part of the wireless network or may be in communication with the wireless network but operated by a third-party.
- Means to perform method 400 may include one or more computerized devices, such as the components of the previously detailed systems.
- a detection device may receive an authentication request.
- the authentication request may be in the form of a "send authentication information" message received from an MSC (and/or VLR) that services the wireless device.
- the authentication request may result from a wireless device initially attempting to attach to a wireless network, such as wireless network 210 of FIG. 2.
- the authentication request may be routed to the detection device based on the IMSI of the wireless device.
- This IMSI may be a temporary IMSI. All requests from wireless devices associated with such temporary IMSIs may be routed by the wireless network to the detection device. For example, a range of IMSIs may be routed by the wireless network to the detection device.
- the authentication request may contain the IMSI of the wireless device attempting to attach to the wireless network.
- the IMSI received as part of the authentication request at step 405 may be compared to a blacklist of IMSIs.
- a blacklist may list one or more IMSIs that are prohibited from being activated for use on the wireless network.
- IMSIs of wireless devices that are known to be stolen may be added to the blacklist. The creation and modification of such a blacklist is described in detail in reference to method 700 of FIG. 7.
- step 400 may proceed to step 415.
- authentication and thus activation of the wireless device, may be blocked by the detection device.
- the wireless device may not be activated for one or more uses on the wireless network.
- the detection device may return one or more messages to the MSC/VLR that indicates that authentication of the wireless device associated with the IMSI is prohibited.
- the detection device returning such messages to the MSC/VLR may not require any interaction with an AUC and/or an HLR to deny authentication.
- method 400 may proceed to step 420.
- the IMSI received as part of the authentication request at step 405 not being present on the blacklist, it may be determined that the wireless device associated with the IMSI (or the SIM associated with the IMSI) is eligible for activation.
- the IMSI received as part of the authentication request is compared to a blacklist of IMSIs, it should be understood that a similar comparison may be conducted to a whitelist of IMSIs. In such a comparison, activation of the IMSI received as part of the authentication request at step 405 may only be permitted if the received IMSI is listed on the whitelist. Activation may be blocked if the IMSI is not listed on the whitelist.
- authentication of the IMSI received by the detection device at step 405 may be performed by the detection device. As such, it may be possible for authentication to be performed by the detection device without interaction with an AUC or HLR.
- the detection device may return one or more messages to the MSC/VLR that indicates the result of the authentication procedure. This authentication performed by the detection device may involve using the encrypted Ki values (or some other encryption values) associated with the temporary IMSI received as part of the authentication request.
- the detection device may receive one or more location update messages from the MSC/CLR associated with the wireless device being activated.
- a temporary MSISDN may be selected from a pool of available MSISDNs and assigned to the temporary IMSI of the wireless device. As such, the wireless device being activated is now associated with a temporary MSISDN. This temporary MSISDN may only be used during activation. As such, once the temporary MSISDN has been used during activation, the temporary MSISDN may be used for activation of another wireless device.
- an insert subscriber data message may be transmitted to the MSC/VLR. This message may identify various services that the wireless device is capable of, such as receiving and/or sending SMS messages, emergency services, placing and/or receiving phone calls, and/or web services.
- the wireless device may be permitted to use the wireless network for the bearer services that were identified in the insert subscriber data message.
- a non-temporary IMSI and a non-temporary MSISDN may be assigned to the wireless device by the detection device.
- the non-temporary MSISDN may be selected from a pool of non-temporary MSISDNs available for assignment.
- a user of the wireless device may be permitted to select a non-temporary MSISDN from the pool. For example, referring to U.S. Patent Application No. 12/197,396 identified in the cross reference section, method 700 of FIG. 7 may be performed to permit a user of the wireless device to select a non-temporary MSISDN.
- the non-temporary IMSI may be provisioned into one or more AUCs of the wireless network. Additionally, at step 445, the non-temporary IMSI and the non-temporary MSISDN may be provisioned into one or more home location registers. As such, in method 400, one or more of the AUCs may be contacted once authentication of the wireless device and the temporary IMSI has been completed. In some embodiments, as described in relation to method 500, authentication may be performed using one or more AUCs.
- a confirmation process may be conducted by the detection device to ensure that the wireless device has been activated properly for use with the non-temporary IMSI and the non-temporary MSISDN. This confirmation process may follow method 800 of FIG. 8.
- FIG. 5 illustrates another embodiment of a method for activating a wireless device.
- Method 500 may be performed using wireless network 210 of FIG. 2.
- Method 500 may also be performed by some other wireless network that has, or is in communication with, a detection device, such as detection device 240 of FIG. 2.
- Each step of method 500 may be performed by a computer system, which may comprise one or more computers, such as computer system 900 of FIG. 9.
- the detection device may be part of the wireless network or may be in communication with the wireless network but operated by a third-party.
- Method 500 may represent an alternate embodiment of method 400.
- a detection device such as: a detection device, components of a wireless network, an activation system (which may or may not be part of the wireless network), and/or other various computerized devices may be used.
- a pool of IMSIs (or other form of identifiers) is maintained, for example, at the activation system.
- the pool might, but need not, comprise consecutively-numbered IMSIs.
- Each of the IMSIs in this pool is known to the activation system, and they are designated by the activation system for use as temporary IMSIs.
- the activation system might also maintain another pool of IMSIs to be used as non-temporary IMSIs, as described in more detail below.
- Maintaining a pool of IMSIs can comprise storing the IMSIs in a database accessible to the activation system, keeping a record of the IMSIs, removing used IMSIs from the pool, adding IMSIs to the pool when necessary, and/or the like.
- the temporary IMSIs in the pool may be provided to SIM manufacturing at step 510, which manufactures SIMs encoded with these temporary IMSIs and/or otherwise provides for each of the temporary IMSIs to be encoded and/or stored on a SIM.
- SIM manufacturing manufactures SIMs encoded with these temporary IMSIs and/or otherwise provides for each of the temporary IMSIs to be encoded and/or stored on a SIM.
- Each temporary IMSI is thereafter assigned to a SIM card for use in a wireless device at step 515, for example, by installing a SIM encoded with the temporary IMSI into the wireless device and/or otherwise packaging the SIM with the wireless device.
- the activation system reserves this temporary IMSI from the pool of available IMSI numbers, so that it cannot be used again at least until recycled.
- the wireless network may be configured to accommodate the activation process.
- One method of configuring the wireless network is described in further detail below with respect to method 600 of FIG. 6.
- a wireless device communicatively coupled with a SIM with one of the temporary IMSIs is detected by the wireless network. For example, this may occur when the wireless device enters a service area of the wireless network or is turned on while within a service area of the wireless network.
- a detection device may receive an authentication request.
- This authentication request may be routed to the detection device by the wireless network.
- the authentication request may be in the form of a "send authentication information" message received from an MSC (and/or VLR) in communication with the wireless device.
- the authentication request may result from the wireless device initially attempting to attach to a wireless network at step 525, such as wireless network 210 of FIG. 2.
- the authentication request may be routed to the detection device based on the temporary IMSI of the wireless device. All requests from such temporary IMSIs may be routed by the wireless network to the detection device. For example, a range of IMSIs designated as temporary may be routed by the wireless network to the detection device.
- the authentication request may contain the IMSI of the wireless device attempting to attach to the wireless network.
- the IMSI received as part of the authentication request at step 530 may be compared to a blacklist of IMSIs by the detection device.
- a blacklist may list one or more IMSIs that are prohibited from being activated for use on the wireless network.
- IMSIs of SIM cards that are known to be stolen may be listed on the blacklist.
- stolen prepaid phones may be prevented from being activated for use on the wireless network. The creation and modification of such a blacklist is described in more detail in reference to method 700 of FIG. 7.
- step 540 authentication, and thus activation of the wireless device, may be blocked by the detection device.
- the wireless device may not be activated for one or more uses on the wireless network. For example, incoming and outgoing calls, text messages, and internet access may be blocked. Some services, such as emergency services, may be enabled.
- the detection device may return one or more messages to the MSC/VLR that indicates that authentication of the wireless device associated with the IMSI is prohibited (such as "No AUC entry"). The detection device returning such messages to the MSC/VLR may not require any interaction with an AUC and/or an HLR.
- method 500 may proceed to step 545.
- the IMSI received as part of the authentication request at step 530 not being present on the blacklist, it may be determined that the IMSI (and, thus, the associated wireless device) is eligible for activation.
- the IMSI received as part of the authentication request by the detection device is compared to a blacklist of IMSIs, it should be understood that a similar comparison may be conducted to a whitelist of IMSIs. In such a comparison, activation of the IMSI received as part of the authentication request at step 530 may only be permitted if the received IMSI is affirmatively listed on the whitelist. Activation may be blocked if the IMSI is not listed on the whitelist. While in method 400 activation was conducted between the detection device and the
- one or more AUCs may be used for authentication.
- AUCs are used for authentication.
- method 500 may be performed with an authentication scheme similar to method 400.
- the detection device may request provisioning with one or more AUCs. This may involve one or more AUC entries being made for the temporary IMSI associated with the wireless device in one or more AUCs.
- the detection device may wait for a response indicating that provisioning has been completed.
- the authentication information may be transmitted to the first AUC that completes provisioning. For example, at step 545, the provisioning request may have been transmitted to multiple AUCs.
- the fastest AUC to respond to the provisioning request of step 545 may receive the authentication information.
- step 550 may be performed following step 535 by transmitting the authentication information to multiple AUCs.
- authentication may be performed by comparing the Ki values from the SIM card against those specified by the SIM card manufacturer, which may already be stored in the AUC.
- the Ki values on the SIM card may be transmitted to multiple AUCs. As such, if one AUC responded to the provisioning request faster, the authentication process can be completed sooner, thereby decreasing latency in activating the wireless device. If a timeout response is received from an AUC, the authentication information may be sent to a different AUC.
- one or more location update messages may be received by the detection device. These locations update messages may be received from the appropriate MSC/VLR and may have been routed to the detection device based on the temporary IMSI. An entry may be added to the VLR for the wireless device.
- a temporary MSISDN may be selected from a pool of available MSISDNs and assigned to the temporary IMSI of the wireless device. As such, the wireless device being activated is now associated with a temporary MSISDN. This temporary MSISDN may be used only during activation. As such, once the temporary MSISDNs have been used during activation, the temporary MSISDN may be used for activation of another wireless device.
- an insert subscriber data message may be transmitted to the appropriate location
- This message may identify various services that the wireless device is capable of, such as receiving and/or sending SMS messages, emergency services, placing and/or receiving phone calls, and/or web services.
- the wireless device may be permitted to use the wireless network for the bearer services that were identified in the insert subscriber data message.
- a non-temporary IMSI and a non-temporary MSISDN may be assigned to the wireless device by the detection device.
- the non-temporary MSISDN and the non-temporary IMSI may be selected from a pool of non-temporary MSISDNs and a pool of non-temporary IMSIs, respectively, available for assignment.
- a user of the wireless device may be permitted to select a non-temporary MSISDN. For example, referring to U.S. Patent Application No. 12/197,396 identified in the cross reference section, method 700 of FIG. 7 may be performed to permit a user of the wireless device to select a non-temporary MSISDN.
- the non-temporary IMSI may be provisioned into one or more AUCs of the wireless network. Additionally, at step 575, the non-temporary IMSI and the non-temporary MSISDN may be provisioned into one or more home location registers (HLRs). Following the wireless device (more specifically, the SIM card of the wireless device) being assigned a non-temporary IMSI and a non-temporary MSISDN, the temporary IMSI and the temporary MSISDN previously used may be available for activation by another wireless device. For example, the temporary IMSI may be reassigned into another pool of IMSIs that are to be provided to SIM manufacturing. The temporary MSISDN may be assigned to another wireless device for use during the activation process.
- HLRs home location registers
- FIG. 6 illustrates an embodiment of a method 600 of configuring a wireless network to support wireless device activation.
- Method 600 can be implemented as part of method 400, method 500, or as part of some method for performing wireless device activation.
- Method 600 may be performed using wireless network 210 of FIG. 2.
- Method 600 may also be performed by some other wireless network that has, or is in communication with, a detection device, such as detection device 240 of FIG. 2.
- Each step of method 600 may be performed by a computer system, which may comprise one or more computers, such as computer system 900 of FIG. 9.
- Means to perform method 600 may include one or more computerized devices, such as the components of the previously detailed systems.
- the method 600 comprises providing a detection device at step 605.
- Providing a detection device might comprise installing the detection device in a wireless provider's wireless network.
- Providing a detection device might comprise configuring the detection device at step 610.
- Configuration of the detection device can include establishing communication between the detection device and other components in the wireless network, establishing communication between the detection device and the activation system, and/or the like.
- configuring the detection device can also comprise storing in the detection device a pool of temporary MSISDNs that can be used for the activation process, and/or installing, on the detection device, code (e.g., hardware, firmware and/or software instructions) that implements the functionality described herein.
- code e.g., hardware, firmware and/or software instructions
- Method 600 may comprise configuring specific components of the wireless network to operate in accordance with embodiments of the invention.
- an MSC and/or VLR (and/or any other necessary component within the wireless network) is configured to treat the detection device as the HLR for any IMSI that falls within the pool maintained by the activation system at step 615.
- the wireless network will route data related to the wireless device to the detection device, as opposed to the conventional HLR (which, at that point will be unaware of the wireless device, since the wireless device has not been activated).
- Configuration of the wireless network can also include configuration of the one or more authentication centers at step 620.
- Configuration of an authentication center includes, in one aspect, populating the authentication center with security keys for wireless devices identified by the temporary IMSIs (that is, creating records in the authentication center that correlate temporary IMSIs with the shared secrets stored on the SIMs encoded with those temporary IMSIs; these shared secrets then can be used to generate the necessary security keys for the wireless devices, as described above).
- This process may be similar to the configuration of an authentication center under a traditional activation process, except that the temporary IMSI is used instead of a non-temporary IMSI.
- These configuration operations in an embodiment, can be performed automatically (and/or based on user input) by the activation system. In another embodiment, this configuration is performed manually.
- FIG. 7 illustrates an embodiment of a method 700 for modifying an IMSI blacklist.
- Method 700 may be performed in conjunction with wireless network 210 of FIG. 2.
- Method 700 may also be performed by some other wireless network that has, or is in communication with, a detection device, such as detection device 240 of FIG. 2.
- a detection device such as detection device 240 of FIG. 2.
- Each step of method 700 may performed by such a detection device, which may comprise one or more computer systems, such as computer system 900 of FIG. 9.
- the detection device may be part of the wireless network or may be in communication with the wireless network but operated by a third-party.
- Each step of method 700 may be performed by a detection device.
- Various means for performing method 700 include a detection device, which may include one or more computer systems.
- Means to perform method 700 may include one or more computerized devices, such as the components of the previously detailed systems.
- a command may be received from an administrator to add one or more IMSIs to a blacklist. For example, at step 710 if one or more wireless devices and/or SIM cards were stolen, IMSIs associated with those wireless devices and/or SIM cards may be blocked from having access to a wireless network by being added to the blacklist.
- the IMSIs of the blacklist may be temporary IMSIs.
- the one or more IMSIs received from the administrator may be added to the blacklist.
- one or more IMSIs may be added automatically to the blacklist without receiving a command directly from the administrator.
- an IMSI may automatically be added to the blacklist.
- an IMSI may be added to the blacklist.
- a wireless device that corresponds with an IMSI attempts to send a number of signaling messages over a predefined threshold number, it may be determined that this IMSI should be added to the blacklist.
- Other rules may be possible for determining whether an IMSI should be added to the blacklist.
- a command may be received from the administrator to remove one or more IMSIs from the blacklist.
- the one or more IMSIs specified may be removed from the blacklist.
- method 700 details the use of a blacklist, it should be understood that a whitelist may be used instead.
- a whitelist rather than adding IMSIs that are to be blocked to the list, IMSIs that are to be permitted to be activated may be added to the whitelist. As such, if an IMSI is to be blocked from being activated, the IMSI may be removed from the whitelist.
- the steps of method 700 may be performed in varying orders. For example, the administrator may remove one or more IMSIs from the blacklist without adding other IMSIs to the blacklist first.
- a non-temporary IMSI and a non-temporary MSISDN have been assigned to a wireless device
- data received from the wireless device may no longer be routed to the detection device. This may be because the wireless network is configured to only route data related to temporary IMSIs (e.g., a particular range of IMSIs) to the detection device.
- the detection device may not be able to directly confirm whether the wireless device has successfully attached to the wireless network using the non-temporary IMSI (and the non-temporary MSISDN).
- a method such as method 800 of FIG. 8, may be used to perform such a confirmation.
- Method 800 illustrates an embodiment of a method for confirming that a wireless device has been activated properly by attaching to the wireless network using the non-temporary IMSI.
- Method 800 may be performed using wireless network 210 of FIG. 2.
- Method 800 may also be performed by some other wireless network that has, or is in communication with, a detection device, such as detection device 240 of FIG. 2.
- Each step of method 800 may be performed by one or more computer systems, such as computer system 900 of FIG. 9.
- the detection device may be part of the wireless network or may be in communication with the wireless network but operated by a third-party.
- Method 800 may be performed following method 400 of FIG. 4, method 500 of FIG. 5, and/or some other method for activating a wireless device.
- Each step of method 800 may be performed by a detection device, unless otherwise indicated.
- Means to perform method 800 may include one or more computerized devices, such as the components of the previously detailed systems.
- a message for delivery to the wireless device that is now associated with the non- temporary IMSI and non-temporary MSISDN may be registered by the detection device.
- This message may be transmitted to and registered with an HLR.
- the message may be an SMS text message. Other forms of messages besides SMS may also be possible.
- the wireless device may update with the non-temporary IMSI. Updating with the non-temporary IMSI may involve the wireless device attempting to reattach to the wireless network using the non-temporary IMSI. This may involve the wireless device being restarted and attaching to the wireless network in a conventional way using the non- temporary IMSI. Since the non-temporary IMSI is being used to attach with the wireless network, the wireless network may not be configured to route data related to the wireless device to the detection device.
- a notification may be received by the detection device from the HLR that indicates the wireless device associated with the non-temporary IMSI and non-temporary MSISDN is available to receive the SMS message (or, has received the SMS message).
- the detection device can infer that the wireless device has successfully attached with the wireless network using the non-temporary IMSI (and non-temporary MSISDN).
- method 800 relies on the use of an SMS text message
- some other form of message being registered with the HLR for delivery to the wireless device may be used in order to confirm that the wireless device has reattached to the wireless network properly with the new IMSI. If the detection device does not receive confirmation that the wireless device has successfully attached to the network using the non-temporary IMSI, messages may be retransmitted to the AUC and/or the HLR to attempt to cure the error. Further, another SMS text message may be registered with the HLR for delivery to the wireless device now associated with the non- temporary IMSI in another attempt to confirm that the wireless device has attached properly using the non-temporary IMSI with the wireless network.
- FIG. 9 illustrates an embodiment of a computer system.
- a computer system as illustrated in FIG. 9 may be incorporated as part of the previously described computerized devices.
- computer system 900 can represent some of the components of the wireless devices, MSCs, VLRs, BSCs, AUCs, detection devices, HLRs, and/or activation systems.
- FIG. 9 is meant only to provide a generalized illustration of various components, any or all of which may be utilized as appropriate.
- the computer system 900 is shown comprising hardware elements that can be electrically coupled via a bus 905 (or may otherwise be in communication, as appropriate).
- the hardware elements may include one or more processors 910, including without limitation one or more general-purpose processors and/or one or more special -purpose processors (such as digital signal processing chips, graphics acceleration processors, and/or the like); one or more input devices 915, which can include without limitation a mouse, a keyboard and/or the like; and one or more output devices 920, which can include without limitation a display device, a printer and/or the like.
- the computer system 900 may further include (and/or be in communication with) one or more non-transitory storage devices 925, which can comprise, without limitation, local and/or network accessible storage, and/or can include, without limitation, a disk drive, a drive array, an optical storage device, solid-state storage device such as a random access memory
- RAM random access memory
- ROM read-only memory
- Such storage devices may be configured to implement any appropriate data stores, including without limitation, various file systems, database structures, and/or the like.
- the computer system 900 might also include a communications subsystem 930, which can include without limitation a modem, a network card (wireless or wired), an infrared communication device, a wireless communication device and/or chipset (such as a
- BluetoothTM device an 802.11 device, a WiFi device, a WiMax device, cellular
- the communications subsystem 930 may permit data to be exchanged with a network (such as the network described below, to name one example), other computer systems, and/or any other devices described herein.
- the computer system 900 will further comprise a working memory 935, which can include a RAM or ROM device, as described above.
- the computer system 900 also can comprise software elements, shown as being currently located within the working memory 935, including an operating system 940, device drivers, executable libraries, and/or other code, such as one or more application programs 945, which may comprise computer programs provided by various embodiments, and/or may be designed to implement methods, and/or configure systems, provided by other embodiments, as described herein.
- an operating system 940 operating system 940
- device drivers executable libraries
- application programs 945 which may comprise computer programs provided by various embodiments, and/or may be designed to implement methods, and/or configure systems, provided by other embodiments, as described herein.
- code and/or instructions can be used to configure and/or adapt a general purpose computer (or other device) to perform one or more operations in accordance with the described methods.
- a set of these instructions and/or code might be stored on a non-transitory computer-readable storage medium, such as the storage device(s) 925 described above.
- the storage medium might be incorporated within a computer system, such as computer system 900.
- the storage medium might be separate from a computer system (e.g., a removable medium, such as a compact disc), and/or provided in an installation package, such that the storage medium can be used to program, configure and/or adapt a general purpose computer with the instructions/code stored thereon.
- These instructions might take the form of executable code, which is executable by the computer system 900 and/or might take the form of source and/or installable code, which, upon compilation and/or installation on the computer system 900 (e.g., using any of a variety of generally available compilers, installation programs, compression/decompression utilities, etc.), then takes the form of executable code.
- executable code which is executable by the computer system 900 and/or might take the form of source and/or installable code, which, upon compilation and/or installation on the computer system 900 (e.g., using any of a variety of generally available compilers, installation programs, compression/decompression utilities, etc.), then takes the form of executable code.
- some embodiments may employ a computer system (such as the computer system 900) to perform methods in accordance with various embodiments of the invention. According to a set of embodiments, some or all of the procedures of such methods are performed by the computer system 900 in response to processor 910 executing one or more sequences of one or more instructions (which might be incorporated into the operating system 940 and/or other code, such as an application program 945) contained in the working memory 935. Such instructions may be read into the working memory 935 from another computer-readable medium, such as one or more of the storage device(s) 925.
- a computer system such as the computer system 900
- execution of the sequences of instructions contained in the working memory 935 might cause the processor(s) 910 to perform one or more procedures of the methods described herein.
- machine-readable medium and “computer-readable medium,” as used herein, refer to any medium that participates in providing data that causes a machine to operate in a specific fashion.
- various computer-readable media might be involved in providing instructions/code to processor(s) 910 for execution and/or might be used to store and/or carry such instructions/code.
- a computer-readable medium is a physical and/or tangible storage medium.
- Such a medium may take the form of a non- volatile media or volatile media.
- Non- volatile media include, for example, optical and/or magnetic disks, such as the storage device(s) 925.
- Volatile media include, without limitation, dynamic memory, such as the working memory 935.
- Common forms of physical and/or tangible computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD- ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, EPROM, a FLASH-EPROM, any other memory chip or cartridge, or any other medium from which a computer can read instructions and/or code.
- Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to the processor(s) 910 for execution.
- the instructions may initially be carried on a magnetic disk and/or optical disc of a remote computer.
- a remote computer might load the instructions into its dynamic memory and send the instructions as signals over a transmission medium to be received and/or executed by the computer system 900.
- the communications subsystem 930 (and/or components thereof) generally will receive signals, and the bus 905 then might carry the signals (and/or the data, instructions, etc. carried by the signals) to the working memory 935, from which the processor(s) 910 retrieves and executes the instructions.
- the instructions received by the working memory 935 may optionally be stored on a storage device 925 either before or after execution by the processor(s) 910.
- the methods, systems, and devices discussed above are examples. Various configurations may omit, substitute, or add various procedures or components as appropriate. For instance, in alternative configurations, the methods may be performed in an order different from that described, and/or various stages may be added, omitted, and/or combined. Also, features described with respect to certain configurations may be combined in various other configurations. Different aspects and elements of the configurations may be combined in a similar manner. Also, technology evolves and, thus, many of the elements are examples and do not limit the scope of the disclosure or claims.
- the above elements may be components of a larger system, wherein other rules may take precedence over or otherwise modify the application of the invention. Also, a number of steps may be undertaken before, during, or after the above elements are considered. Accordingly, the above description does not bound the scope of the claims.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente invention se rapporte à divers systèmes adaptés pour activer un dispositif sans fil sur un réseau sans fil. Selon la présente invention, une requête de rattachement au réseau sans fil peut être reçue depuis le dispositif sans fil. La requête peut spécifier une identité internationale d'abonné mobile (IMSI, International Mobile Subscriber Identity). Un message d'authentification peut être transmis à un dispositif de détection du réseau sans fil. L'IMSI peut être comparée à un ensemble d'IMSI bloquées enregistrées. Chaque IMSI de l'ensemble d'IMSI bloquées enregistrées peut être empêchée d'être utilisée pour accéder au réseau sans fil. Il peut être déterminé que le dispositif sans fil qui correspond à l'IMSI est autorisé à être rattaché au réseau sans fil. En réponse à la détermination selon laquelle le dispositif sans fil est autorisé à être rattaché au réseau sans fil, une authentification du dispositif sans fil peut se produire.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11825821.9A EP2617213A4 (fr) | 2010-09-13 | 2011-09-13 | Activation étendue d'un dispositif sans fil |
Applications Claiming Priority (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US38232410P | 2010-09-13 | 2010-09-13 | |
US38231110P | 2010-09-13 | 2010-09-13 | |
US61/382,311 | 2010-09-13 | ||
US61/382,324 | 2010-09-13 | ||
US38711010P | 2010-09-28 | 2010-09-28 | |
US38710110P | 2010-09-28 | 2010-09-28 | |
US61/387,101 | 2010-09-28 | ||
US61/387,110 | 2010-09-28 | ||
US13/231,363 US8463258B2 (en) | 2007-12-06 | 2011-09-13 | Extended wireless device activation |
US13/231,363 | 2011-09-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012037167A1 true WO2012037167A1 (fr) | 2012-03-22 |
Family
ID=45831944
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2011/051464 WO2012037167A1 (fr) | 2010-09-13 | 2011-09-13 | Activation étendue d'un dispositif sans fil |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2617213A4 (fr) |
WO (1) | WO2012037167A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107708103A (zh) * | 2017-11-05 | 2018-02-16 | 浙江东信昆辰科技股份有限公司 | 基于map信令实现号码保密的方法及系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20010033025A (ko) * | 1997-12-10 | 2001-04-25 | 옴니포인트 코포레이션 | 다중 용량 무선 트렁크를 어드레싱하기 위한 통신 시스템및 방법 |
KR20050033956A (ko) * | 2003-10-07 | 2005-04-14 | 삼성전자주식회사 | 개인 정보 보호를 위한 이동 단말기 및 그 방법 |
KR20060135003A (ko) * | 2004-02-27 | 2006-12-28 | 삼성전자주식회사 | 무선 이동 통신 시스템에서 접근 인증을 위한 방법 및 장치 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1774706A1 (fr) * | 2004-06-14 | 2007-04-18 | Nokia Corporation | Registre de service a redondance positive integrale dans un reseau a vendeurs multiples |
US8145212B2 (en) * | 2007-12-06 | 2012-03-27 | Evolving Systems, Inc. | Wireless device activation |
SE534785C2 (sv) * | 2009-02-13 | 2011-12-20 | Smarttrust Ab | Förfarande för att aktivera SIM-kort |
-
2011
- 2011-09-13 WO PCT/US2011/051464 patent/WO2012037167A1/fr active Application Filing
- 2011-09-13 EP EP11825821.9A patent/EP2617213A4/fr not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20010033025A (ko) * | 1997-12-10 | 2001-04-25 | 옴니포인트 코포레이션 | 다중 용량 무선 트렁크를 어드레싱하기 위한 통신 시스템및 방법 |
KR20050033956A (ko) * | 2003-10-07 | 2005-04-14 | 삼성전자주식회사 | 개인 정보 보호를 위한 이동 단말기 및 그 방법 |
KR20060135003A (ko) * | 2004-02-27 | 2006-12-28 | 삼성전자주식회사 | 무선 이동 통신 시스템에서 접근 인증을 위한 방법 및 장치 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2617213A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107708103A (zh) * | 2017-11-05 | 2018-02-16 | 浙江东信昆辰科技股份有限公司 | 基于map信令实现号码保密的方法及系统 |
CN107708103B (zh) * | 2017-11-05 | 2020-08-14 | 浙江东信昆辰科技股份有限公司 | 基于map信令实现号码保密的方法 |
Also Published As
Publication number | Publication date |
---|---|
EP2617213A1 (fr) | 2013-07-24 |
EP2617213A4 (fr) | 2016-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8463258B2 (en) | Extended wireless device activation | |
US9161296B2 (en) | Controlled access to a wireless network | |
US10911944B2 (en) | Access data provisioning apparatus and methods | |
CA2697427C (fr) | Activation de dispositif sans fil | |
US9940141B2 (en) | Method and apparatus for selecting bootstrap ESIMs | |
US8929863B2 (en) | Methods and systems for temporarily permitting a wireless device to access a wireless network | |
CN107005836B (zh) | 订户标识模块池化 | |
EP2422537B1 (fr) | Accès occasionnel à un réseau sans fil | |
CN103583067B (zh) | 用于多sim环境的sim锁定 | |
US20160234675A1 (en) | Dynamic Subscriber Identity Module | |
US10911945B1 (en) | Automated eUICC service profile configuration in view of operational issue with respect to eUICC service profile | |
US10187786B2 (en) | System and method for handling inactive SIM cards | |
US9832714B2 (en) | Method and system for network node selection based user equipment agent assisted modification of temporary identity in 3G and 4G networks | |
US10206095B2 (en) | System and method for handling inactive SIM cards | |
US20200228979A1 (en) | Framework for securing device activations | |
WO2012037167A1 (fr) | Activation étendue d'un dispositif sans fil | |
CN117319987A (zh) | 限制机卡分离的方法及装置、系统、存储介质、电子装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11825821 Country of ref document: EP Kind code of ref document: A1 |
|
REEP | Request for entry into the european phase |
Ref document number: 2011825821 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011825821 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |