FIG. 7 also illustrates device 704 as including a component 732 operable with input/output devices, and communication bus 715, for example, so that signals and/or states may be appropriately communicated between devices, such as device 704 and an input device and/or device 704 and an output device. A user may make use of an input device, such as a computer mouse, stylus, track ball, keyboard, and/or any other similar device capable of receiving user actions and/or motions as input signals. Likewise, for a device having speech to text capability, a user may speak to generate input signals. Likewise, a user may make use of an output device, such as a display, a printer, etc., and/or any other device capable of providing signals and/or generating stimuli for a user, such as visual stimuli, audio stimuli and/or other similar stimuli.
FIG. 8 is a flowchart for a process of proving possession of a communications device, according to an embodiment (800). The method of FIG. 8 begins at 810, which comprises recognizing, via or utilizing a subscriber identifier, a communications device as a known communications device with in a communications network. The method may continue at 815, which includes issuing and eSIM to the communications device via the communications network in response to recognizing the communications device. The method may continue at 820, which may include relating that eSIM to the subscriber identifier of the communications device. The method may conclude at 825 in which, responsive to receipt of one or more signals from a client computing resource, utilize encryption provided by the eSIM to form a secure channel between or among the communications device and an identity verifier.