The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 20, 2018

Filed:

Apr. 16, 2015
Applicant:

Giesecke & Devrient Gmbh, Munchen, DE;

Inventors:

Thomas Stocker, München, DE;

Monika Eckardt, Mammendorf, DE;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04M 1/66 (2006.01); H04W 12/08 (2009.01); H04W 4/70 (2018.01); H04W 76/10 (2018.01); H04W 4/50 (2018.01); H04W 4/60 (2018.01); H04W 8/18 (2009.01); H04W 12/04 (2009.01); H04L 29/06 (2006.01); H04W 48/02 (2009.01); H04W 48/16 (2009.01); H04W 48/18 (2009.01);
U.S. Cl.
CPC ...
H04W 12/08 (2013.01); H04L 63/08 (2013.01); H04L 63/126 (2013.01); H04W 4/50 (2018.02); H04W 4/60 (2018.02); H04W 4/70 (2018.02); H04W 8/183 (2013.01); H04W 12/04 (2013.01); H04W 48/02 (2013.01); H04W 48/16 (2013.01); H04W 48/18 (2013.01); H04W 76/10 (2018.02);
Abstract

A method is provided for operating a security module of a mobile terminal, and a security module. The security module is developed to communicate over one of a plurality of mobile communication networks. The security module comprises different system configurations for different mobile communication networks of the plurality of mobile communication networks. The security module receives subscription data for logging into one mobile communication network of the plurality of mobile communication networks, analyzes the subscription data, and identifies the mobile communication network out of the plurality of mobile communication networks. Subsequently, the security module selects a system configuration in accordance with the mobile communication network, identified in the preceding step, of the plurality of mobile communication networks. The security module is operated with the selected system configuration in the identified mobile communication network.


Find Patent Forward Citations

Loading…