The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 27, 2022

Filed:

Dec. 19, 2019
Applicant:

Network-1 Technologies, Inc., New York, NY (US);

Inventor:

John A. Nix, Evanston, IL (US);

Assignee:

Network-1 Technologies, Inc., New Canaan, CT (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04W 4/70 (2018.01); H04W 12/30 (2021.01); H04W 12/06 (2021.01); H04B 1/3816 (2015.01);
U.S. Cl.
CPC ...
H04L 63/08 (2013.01); H04B 1/3816 (2013.01); H04L 9/0819 (2013.01); H04L 9/0869 (2013.01); H04L 9/3271 (2013.01); H04L 63/0428 (2013.01); H04L 63/0435 (2013.01); H04L 63/06 (2013.01); H04L 63/062 (2013.01); H04L 63/101 (2013.01); H04W 4/70 (2018.02); H04W 12/06 (2013.01); H04W 12/35 (2021.01);
Abstract

A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The network can send a first network module identity, a first key K, and an encrypted second key K for an eUICC profile to an eUICC subscription manager. The second key K can be encrypted with a symmetric key. The module can receive and activate the eUICC profile, and the network can authenticate the module using the first network module identity and the first key K. The network can (i) authenticate the user of the module using a second factor, and then (ii) send the symmetric key to the module. The module can decrypt the encrypted second key K using the symmetric key. The network can authenticate the module using the second key K. The module can comprise a mobile phone.


Find Patent Forward Citations

Loading…