Processing

Please wait...

Settings

Settings

Goto Application

1. WO2021044332 - SYSTEM, METHOD, AND COMPUTER PROGRAM FOR PROTECTING AGAINST UNINTENTIONAL DELETION OF AN ESIM FROM A MOBILE DEVICE

Publication Number WO/2021/044332
Publication Date 11.03.2021
International Application No. PCT/IB2020/058201
International Filing Date 03.09.2020
IPC
H04W 8/18 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
8Network data management
18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
G06F 21/60 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
G06F 21/70 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
G06F 21/77 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
71to assure secure computing or processing of information
77in smart cards
H04L 29/08 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
08Transmission control procedure, e.g. data link level control procedure
H04W 12/00 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
CPC
G06F 21/60
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
G06F 21/77
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
71to assure secure computing or processing of information
77in smart cards
H04L 67/303
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
67Network-specific arrangements or communication protocols supporting networked applications
30involving profiles
303Terminal profiles
H04L 69/40
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
69Application independent communication protocol aspects or techniques in packet data networks
40Techniques for recovering from a failure of a protocol instance or entity, e.g. failover routines, service redundancy protocols, protocol state redundancy or protocol service redirection in case of a failure or disaster recovery
H04W 12/06
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements; Authentication; Protecting privacy or anonymity
06Authentication
H04W 12/35
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements; Authentication; Protecting privacy or anonymity
30Security of mobile devices; Security of mobile applications
35Protecting application or service provisioning, e.g. securing SIM application provisioning
Applicants
  • AMDOCS DEVELOPMENT LIMITED [CY]/[CY]
Inventors
  • HADADI, Matan
  • MAYRON, Yuval
Agents
  • PERRY, Clifford
Priority Data
16/560,58604.09.2019US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SYSTEM, METHOD, AND COMPUTER PROGRAM FOR PROTECTING AGAINST UNINTENTIONAL DELETION OF AN ESIM FROM A MOBILE DEVICE
(FR) SYSTÈME, PROCÉDÉ ET PROGRAMME INFORMATIQUE DE PROTECTION CONTRE LA SUPPRESSION INVOLONTAIRE D'UNE ESIM PAR UN DISPOSITIF MOBILE
Abstract
(EN)
A system, method, and computer program are provided for protecting against unintentional deletion of an eSIM from a mobile device. In use, deletion of an eSIM from a mobile device is detected. Additionally, definitions of predefined scenarios indicative of unintentional deletions of eSIMs are accessed. Further, the detected deletion is analyzed, using the definitions, to determine that the detected deletion is unintentional. Still yet, a proactive care action is caused to be performed to address the unintentional deletion of the eSIM from the mobile device.
(FR)
L'invention concerne un système, un procédé et un programme informatique de protection contre la suppression involontaire d'une eSIM par un dispositif mobile. A l'utilisation, la suppression d'une eSIM par un dispositif mobile est détectée. De plus, des définitions de scénarios prédéfinis indiquant des suppressions involontaires d'eSIM sont consultées. En outre, la suppression détectée est analysée à l'aide des définitions pour déterminer que la suppression détectée est involontaire. Par ailleurs, une action proactive est amenée à être effectuée pour remédier à la suppression involontaire de l'eSIM par le dispositif mobile.
Also published as
Latest bibliographic data on file with the International Bureau