白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Secure channel formation using embedded subscriber information module (ESIM)

專利號
US11968523B2
公開日期
2024-04-23
申請人
Payfone, Inc.(US NY New York)
發(fā)明人
Jeffrey Robert Naujok; Rodger R. Desai; Michael Bijelich; Aditya Khurjekar
IPC分類
H04W12/03; H04W8/18; H04W12/0431; H04W12/50; H04W12/60; H04W12/72
技術(shù)領(lǐng)域
verifier,or,device,esim,may,identity,subscriber,in,resource,computing
地域: NY NY New York

摘要

Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to form a secure channel, such as between or among a communications device, a client computing resource, and/or an identity verifier. In particular embodiments, a method may include recognizing via a subscriber identifier, a known communications device within a communications network. The method may additionally include issuing an eSIM to the communications device via the communications network in response to recognizing the communications device and relating the eSIM to the subscriber identifier of the communications device. The method may further include, responsive to receipt of one or more signals from a client computing resource, utilizing encryption provided by the eSIM to form a secure channel between or among the communications device and an identity verifier.

說明書

BACKGROUND 1. Field

The present disclosure relates generally to eSIM technology to perform, for example, authentication of subscribers co-located with communications devices and, in addition, to creation of secure channels between or among communications devices and third parties.

2. Information

The World Wide Web, or simply the Web, has grown rapidly in recent years at least partially in response to the relative ease by which a wide variety of transactions can be performed or facilitated via the Internet. As a consequence of widely available Internet connections, including connections to the Internet facilitated by mobile cellular communications devices and services, for example, a mobile subscriber may shop and/or browse for virtually any product or service utilizing a communications device. However, in such an environment, in which electronic- and/or Internet-based commerce has become increasingly common, occurrences of fraud and deception, unfortunately, can also occur. To reduce the instances of fraud and deception, fraud-protection processes and/or procedures may be implemented. Such implementations may be utilized, for example, in connection with everyday online or electronic transactions, which may include financial transactions, establishment of lines of credit, purchases for goods and/or services, or the like.

權(quán)利要求

1
What is claimed is:1. A method of forming a secure communications channel with a communications device, comprising:at an identity verifier computing device, recognizing, via a subscriber identifier of the communications device obtained from a client computing resource, the communications device within a communications network;obtaining, at the identity verifier computing device, a request from the communications device, wherein the request comprises a resource locator parameter generated by the identity verifier computing device and provided to the communications device via the client computing resource, wherein the resource locator parameter identifies a first transaction between the communications device and the client computing resource;issuing an eSIM from the identity verifier computing device to the communications device via the communications network in response to the request;relating the eSIM to the subscriber identifier of the communications device; andresponsive to receipt at the identity verifier computing device of one or more signals from the client computing resource, utilizing an encryption provided by the eSIM to form the secure communications channel between the communications device and the identity verifier computing device.2. The method of claim 1, further comprising recognizing the communications device, including the identity verifier computing device accessing one or more memory devices to obtain one or more historical or behavioral parameters corresponding to the communications device.3. The method of claim 2, wherein the one or more historical or behavioral parameters correspond to a trustworthiness metric of the communications device.4. The method of claim 1, further comprising:receiving, prior to issuing the eSIM from the identity verifier computing device to the communications device, one or more signals generated responsive to the communications device obtaining one or more parameters from a machine-readable code.5. The method of claim 4, wherein the machine-readable code corresponds to an optically readable code, a code operating in a radiofrequency domain, or a combination thereof.6. The method of claim 1, further comprising recognizing the communications device, including receiving, at the identity verifier computing device, a mobile telephone number or one or more parameters assigned to the eSIM.7. The method of claim 1, wherein the secure communications channel corresponds to a wireless fidelity (Wi-Fi) channel.8. The method of claim 1, further comprising:transmitting, from the identity verifier computing device, a key and an endpoint identifier to the communications device over the secure communications channel; andtransmitting, to the client computing resource, one or more historical or behavioral parameters corresponding to the communications device and the key.9. The method of claim 1, further comprising:transmitting a key and an endpoint identifier from the identity verifier computing device to the communications device over the secure communications channel;transmitting a first key portion to the communications device; andtransmitting a second key portion to the client computing resource, wherein the first key portion is used by the communications device to digitally sign a transaction, and wherein the second key portion is used by the client computing resource to validate the transaction.10. The method of claim 1, further comprising:requesting, via the client computing resource, an eSIM-encrypted push notification for transmitting to the communications device.11. An apparatus to form a secure communications channel with a communications device, comprising:at least one processor of an identity verifier computing device coupled to at least one memory device of the identity verifier computing device to:recognize, via a subscriber identifier of the communications device obtained from a client computing resource, the communications device within a communications network;obtain, at the identity verifier computing device, a request from the communications device, wherein the request comprises a resource locator parameter generated by the identity verifier computing device and provided to the communications device via the client computing resource, wherein the resource locator parameter to identify a first transaction between the communications device and the client computing resource;issue an eSIM from the identity verifier computing device to the communications device via the communications network in response to the request;relate the eSIM to the subscriber identifier of the communications device; andresponsive to receipt at the identity verifier computing device of one or more signals from the client computing resource, utilize an encryption provided by the eSIM to form the secure communications channel between the communications device and the identity verifier computing device.12. The apparatus of claim 11, wherein the at least one processor coupled to the at least one memory device are additionally to:access the at least one memory device to obtain one or more historical or behavioral parameters to correspond to the communications device.13. The apparatus of claim 12, wherein the one or more historical or behavioral parameters are to correspond to a trustworthiness metric of the communications device.14. The apparatus of claim 11, wherein the at least one processor coupled to the at least one memory device are additionally to:receive, prior to the issue of the eSIM from the identity verifier computing device to the communications device, one or more signals generated responsive to the communications device obtaining one or more parameters from a machine-readable code.15. The apparatus of claim 11, wherein the secure communications channel corresponds to a wireless fidelity (Wi-Fi) channel.16. The apparatus of claim 11, wherein the processor coupled to the at least one memory device are is additionally to:transmit a key and an endpoint identifier from the identity verifier computing device to the communications device over the secure communications channel; and totransmit, to the client computing resource, one or more historical or behavioral parameters to correspond to the communications device and the key.17. The apparatus of claim 11, wherein the processor coupled to the at least one memory device is additionally to:transmit a key and an endpoint identifier to the communications device over the secure communications channel;transmit a first key portion to the communications device; andtransmit a second key portion to the client computing resource, wherein the first key portion is to be used by the communications device to digitally sign a transaction, and wherein the second key portion is to be used by the client computing resource to validate the transaction.18. The apparatus of claim 11, wherein the processor coupled to the at least one memory is additionally to:request, via the client computing resource, an eSIM-encrypted push notification to transmit to the communications device.19. An article comprising:a non-transitory storage medium having instructions stored thereon executable by a special-purpose computing platform to:at an identity verifier computing device, recognize, via a subscriber identifier of a communications device obtained from a client computing resource, the communications device within a communications network;obtain, at the identity verifier computing device, a request from the communications device, wherein the request comprises a resource locator parameter generated by the identity verifier computing device and provided to the communications device via the client computing resource, wherein the resource locator parameter to identify a first transaction between the communications device and the client computing resource;issue an eSIM from the identity verifier computing device to the communications device via the communications network in response to the request;responsive to receipt at the identity verifier computing device of one or more signals from the client computing resource, utilize an encryption provided by the eSIM to form a secure communications channel between the communications device and the identity verifier computing device, wherein the instructions executable by the special-purpose computing platform are additionally to:transmit a key and an endpoint identifier to the communications device over the secure communications channel; and totransmit, to the client computing resource, one or more historical or behavioral parameters corresponding to the communications device and the key.20. The article of claim 19, wherein the instructions executable by the special purpose computing platform are additionally to:transmit the key and the endpoint identifier to the communications device over the secure communications channel;transmit a first key portion to the communications device; andtransmit a second key portion to the client computing resource, wherein the first key portion is to be used by the communications device to digitally sign a transaction, and wherein the second key portion is to be used by the client computing resource to validate the transaction.21. The article of claim 19, wherein the instructions executable by the special purpose computing platform are additionally to:request, via the client computing resource, an eSIM-encrypted push notification to transmit to the communications device.
微信群二維碼
意見反饋