5g service compatible 4g sim

ABSTRACT

The methods, systems, and computer readable media discussed herein are directed to enabling a fifth generation cellular-wireless access technology (5G) user equipment (UE) to receive 5G service using a fourth generation cellular-wireless access technology (4G) subscriber identity module (SIM). Upon powering on, the 5G UE may determine whether a mobile network operator (MNO) public key file exists in the 4G SIM. Upon determining that the MNO public key file exists in the 4G SIM, the 5G UE may retrieve a MNO public key value from the MNO public key file, read a subscription permanent identifier (SUPI) from the 4G SIM, generate a subscription concealed identifier (SUCI) based on the SUPI and the MNO public key value, send the SUCI to a 5G mobile network for registering the 5G UE, and begin receiving 5G services from the 5G mobile network.

BACKGROUND

Modern telecommunications systems include heterogeneous mixtures ofsecond, third, and fourth generation (2G, 3G, and 4G) cellular-wirelessaccess technologies, which can be cross-compatible and can operatecollectively to provide data communication services. Global Systems forMobile (GSM) is an example of 2G telecommunications technologies;Universal Mobile Telecommunications System (UMTS) is an example of 3Gtelecommunications technologies; and Long Term Evolution (LTE),including LTE Advanced, and Evolved High-Speed Packet Access (HSPA+) areexamples of 4G telecommunications technologies. As increasedcapabilities of user equipment (UE) enable greater data consumption,placing increased demands on networks, new networks with highercapabilities have been developed. The 5G telecommunications technologiesare the next generation mobile networks that are designed to combineboth an evolution and revolution of the existing LTE/LTE-A mobilenetworks to provide a much higher connectivity, greater throughput, muchlower latency, and ultra-high reliability to support new use cases andapplications.

To access 5G services, a user equipment (UE), such as a 5G mobiletelephone, will require 5G key features including an internationalmobile subscriber identity (IMSI) privacy feature for 5G Core servicefrom a subscriber identity module (SIM), or a SIM card, of the UE.However, because 4G/LTE SIMs do not have the IMSI privacy feature, a 5GUE with a 4G/LTE SIM will not be able to access 5G services.

BRIEF DESCRIPTION OF THE DRAWINGS

The detailed description is set forth with reference to the accompanyingfigures. In the figures, the left-most digit(s) of a reference numberidentifies the figure in which the reference number first appears. Theuse of the same reference numbers in different figures indicates similaror identical items or features.

FIG. 1 illustrates an example process in a 5G UE with a 4G SIM foraccessing 5G services.

FIG. 2 illustrates an example block diagram of the 4G SIM for a 5G UE toaccess 5G services.

FIG. 3 illustrates an example block diagram of the 5G UE with the 4G SIMfor accessing 5G services.

DETAILED DESCRIPTION

The methods, devices, and computer readable media discussed herein aredirected to a fourth generation cellular-wireless access technology (4G)subscriber identity module (SIM), and more specifically, to enabling the4G SIM to be used in a fifth generation cellular-wireless accesstechnology (5G) user equipment (UE) for receiving 5G services.

4G SIMs do not have required 5G features, such as an internationalmobile subscriber identifier (IMSI) privacy, to access 5G services.Therefore, although the 4G SIM may be compatible with both a 4G UE and a5G UE, the 5G UE would not be able to receive 5G services with the 4GSIM. To enable the 5G UE to receive 5G service with the 4G SIM, the 4GUE, while having the 4G SIM, may receive a first over-the-air (OTA)command from a 4G mobile network to create a mobile network operator(MNO) public key file on the 4G SIM. The 4G UE may also receive a secondOTA command from the 4G mobile network to update a MNO public key valuein the MNO public folder. The 4G SIM may comprise one or more processorsand memory coupled to the one or more processors. The memory may beconfigured to store the MNO public key file and the MNO public key valuein the MNO public key file.

The 4G SIM may then be placed in the 5G UE, and upon powering on, the 5GUE, or more specifically one or more processors of the 5G UE, maydetermine whether the MNO public key file exists in the 4G SIM. Upon the5G UE determining that the MNO public key file exists in the 4G SIM, the4G SIM may have the MNO public key value retrieved from the MNO publickey file, have a subscription permanent identifier (SUPI) read from the4G SIM, have a subscription concealed identifier (SUCI) generated basedon the SUPI and the MNO public key value, and have the SUCI sent to a 5Gmobile network for registering the 5G UE. The SUPI in the 4G SIM may bean IMSI, or another identifier based on the IMSI. The SUCI may begenerated by encrypting the SUPI based on the MNO public key value toimprove IMSI privacy. After the 5G UE is registered with the 5G mobilenetwork, it may begin receiving 5G services from the 5G mobile network.

However, if the 5G UE determines that the public key file does not existin the 4G SIM, then the 4G SIM may have the IMSI read from the 4G SIMand sent to the 5G mobile network, or have the SUPI read from the 4G SIMand sent to the 5G mobile network.

FIG. 1 illustrates an example process 100 in a UE with a SIM foraccessing 5G services.

The UE may be a 5G UE and the SIM may be a 4G SIM that is compatiblewith the 5G UE and a 4G UE. Upon powering on at block 102, the 5G UE maydetermine whether an MNO public key file exists in the 4G SIM at block104. Upon determining that the MNO public key file exists in the 4G SIM(“YES” branch from block 104), the 5G UE may retrieve an MNO public keyvalue from the MNO public key file at block 106. The 5G UE may then reada SUPI from the 4G SIM at block 108 and may generate a SUCI based on theSUPI and the MNO public key value at block 110. The SUPI may be an IMSIor an identifier based on the IMSI, and security of the IMSI may beimproved by encrypting the SUPI based on the MNO public key value atblock 110. The 5G UE may then send the SUCI to a mobile network, such asa 5G mobile network, for registering the 5G UE with the mobile networkat block 112. The 5G UE may begin receiving 5G services from the 5Gmobile network at block 114.

If the 5G UE determines that the public key file does not exist in the4G SIM at block 104 (“NO” branch from block 104), the 5G UE may read theIMSI, or the SUPI, from the 4G SIM at block 116, and send the IMSI, orthe SUPI, to an available non-5G mobile network at block 118. The 5G UEmay then register with the available mobile network at block 120 andbegin receiving non-5G services at block 122.

FIG. 2 illustrates an example block diagram of the 4G SIM 200 for a 5GUE to access 5G services.

The 4G SIM 200 may comprise one or more processors 202 and memory 204coupled to the one or more processors 202. The memory 204 may beconfigured to store an MNO public key value 206 in a MNO public key file208, and a SUPI 210. The SUPI 210 may be an IMSI or another identifierbased on the IMSI. The 4G SIM 200 may be configured to have the MNOpublic key value 206 retrieved from the MNO public key file 208 whilethe 4G SIM 200 is placed in a 5G UE, have the SUPI 210 read from thememory 204, have a SUCI generated based on the SUPI 210 and the MNOpublic key value 206, have the SUCI sent to a 5G mobile network forregistering the 5G UE, and have 5G UE receive 5G services from the 5Gmobile network. The SUCI may be generated by encrypting the SUPI 210based on the MNO public key value 206 to improve security of the IMSI.The 5G UE may determine whether the MNO public key file 208 exists inthe memory 204 of the 4G SIM 200 upon powering on, and the 4G SIM 200may be further configured to have the MNO public key value 206 retrievedfrom the MNO public key file 208 upon the 5G UE determining that the MNOpublic key file 208 exists in the memory 204 of the 4G SIM 200.

The 4G SIM 200, while placed in a 4G UE, may be further configured tohave the MNO public key file 208 created in the memory 204 of the 4G SIM200 upon the 4G UE receiving a first OTA command from a 4G mobilenetwork, and have the MNO public key value 206 in the MNO public keyfile 208 updated upon the 4G UE receiving a second OTA command from the4G mobile network.

The memory 204 may be further configured to have SUPI, or IMSI, readfrom the memory 204 upon the 5G UE determining that the MNO public keyfile 208 does not exists in the memory 204, and have the SUPI, or IMSI,sent to an available mobile network. The 5G UE may then be registeredwith the available mobile network, which may be a non-5G mobile network,and begin receiving non-5G services from the available mobile network.

FIG. 3 illustrates an example block diagram of the 5G UE 300 with the 4GSIM 200 for accessing 5G services.

The 5G UE 300 may include one or more processors 302, memory 304 coupledto the one or more processors 302. In some embodiments, the one or moreprocessors 302 may be a central processing unit (CPU), a graphicsprocessing unit (GPU), or both CPU and GPU, or other processing unit orcomponent known in the art. Memory 304 may include volatile memory (suchas random-access memory (RANI)) and/or non-volatile memory (such asread-only memory (ROM), flash memory, etc.) 306. The 5G UE 300 mayinclude the 4G SIM card 200 coupled to the one or more processors 302,and non-removable storage 308 including, but not limited to, flashmemory, magnetic storage, optical storage, and/or tape storage that mayprovide non-volatile storage of computer-readable instructions, datastructures, program modules, and other data for the 5G UE 300.

The 5G UE 300 may include an Input/Output (I/O) interface 310 coupled tothe one or more processors 302 and may include a keyboard, mouse, touchpad, touch screen, microphone, and the like, configured to receiveinformation from a user, and may also include a speaker, display whichmay be a touchscreen, and the like, configured to provide an output forthe user. The 5G UE 300 may include a communication module 312 coupledto the one or more processors 302 and configured to wirelesslycommunicate with a 5G mobile network 314. The 5G UE 300 may also includea battery 316 configured to power all components of the 5G UE 300.

The memory 304, a non-transitory computer storage medium, may storecomputer-readable instructions executable by the one or more processors302, that when executed by the one or more processors 302, cause the oneor more processors 302 to perform operations described above withreferenced to FIGS. 1 and 2. For example, when the 5G UE 300 is poweredon, the one or more processors 302 may determine whether the MNO publickey file 208 exists in the 4G SIM 200, more specifically, in the memory204 of the 4G SIM 200. Upon determining that the MNO public key file 208exists in the 4G SIM 200, the one or more processors 302 may retrievethe MNO public key value 206 from the MNO public key file 208, read theSUPI 210 from the 4G SIM 200, generate the SUCI based on the SUPI 210and the MNO public key value 206, and send the SUCI to the 5G mobilenetwork 314, via the communication module 312.

The SUPI 210 may be an IMSI or another identifier based on the IMSI, andthe one or more processors 302 may encrypt the SUPI 210 based on the MNOpublic key value 206 to generate the SUCI for improving security of theIMSI. After registering the 5G UE 300 with the 5G mobile network 314,the 5G UE 300 may then begin receiving 5G services from the 5G mobilenetwork 314.

If, upon powering on the 5G UE 300, the one or more processors 302determines that the MNO public key file 208 does not exist in the 4G SIM200, the one or more processors 302 may read the SUPI 210, or the IMSI,from the 4G SIM 200, and send the SUPI 210, or the IMSI, via thecommunication module 312, to an available non-5G mobile network 318. The5G UE 300 may then begin receiving non-5G services from the non-5Gavailable mobile network 318.

Some or all operations of the methods described above can be performedby execution of computer-readable instructions stored on acomputer-readable storage medium, as defined below. The term“computer-readable instructions” as used in the description and claims,include routines, applications, application modules, program modules,programs, components, data structures, algorithms, and the like.Computer-readable instructions can be implemented on various systemconfigurations, including single-processor or multiprocessor systems,minicomputers, mainframe computers, personal computers, hand-heldcomputing devices, microprocessor-based, programmable consumerelectronics, combinations thereof, and the like.

The memory 204 and the memory 304, discussed above with referenced toFIGS. 2 and 3, respectively, are examples of computer-readable media.Computer-readable media includes at least two types of computer-readablemedia, namely computer storage media and communications media. Computerstorage media includes volatile and non-volatile, removable andnon-removable media implemented in any process or technology for storageof information such as computer-readable instructions, data structures,program modules, or other data. Computer storage media includes, but isnot limited to, phase change memory (PRAM), static random-access memory(SRAM), dynamic random-access memory (DRAM), other types ofrandom-access memory (RAM), read-only memory (ROM), electricallyerasable programmable read-only memory (EEPROM), flash memory or othermemory technology, compact disk read-only memory (CD-ROM), digitalversatile disks (DVD) or other optical storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other non-transmission medium that can be used to storeinformation for access by a computing device. In contrast, communicationmedia may embody computer-readable instructions, data structures,program modules, or other data in a modulated data signal, such as acarrier wave, or other transmission mechanism. As defined herein,computer storage media does not include communication media.

The computer-executable instructions stored on one or morecomputer-readable storage media that, when executed by one or moreprocessors, perform operations described above with reference to FIGS.1, 2, and 3. Generally, computer-executable instructions includeroutines, programs, objects, components, data structures, and the likethat perform particular functions or implement particular abstract datatypes. The order in which the operations are described is not intendedto be construed as a limitation, and any number of the describedoperations can be combined in any order and/or in parallel to implementthe processes.

Example Clauses

A. A method in a user equipment (UE) for having a subscriber identitymodule (SIM), the method comprising: determining whether a mobilenetwork operator (MNO) public key file exists in the SIM; upondetermining that the MNO public key file exists in the SIM: retrievingan MNO public key value from the MNO public key file; reading asubscription permanent identifier (SUPI) from the SIM; generating asubscription concealed identifier (SUCI) based on the SUPI and the MNOpublic key value; and sending the SUCI to a mobile network forregistering the UE with the mobile network; or upon determining that thepublic key file does not exist in the SIM: reading an internationalmobile subscriber identifier (IMSI) from the SIM, and sending the IMSIto an available mobile network; or reading the SUPI from the SIM andsending the SUPI to the available mobile network.

B. The method as paragraph A recites, wherein determining whether theMNO public key file exists in the SIM includes: determining whether theMNO public key file exists in the SIM upon powering on the UE.

C. The method of as paragraph B recites, wherein: the UE is a fifthgeneration cellular-wireless access technology (5G) UE, the SIM is afourth generation cellular-wireless access technology (4G) SIM, and themobile network is a 5G mobile network.

D. The method as paragraph C recites, further comprising: receiving 5Gservices from the 5G mobile network upon registering with the 5G mobilenetwork.

E. The method as paragraph A recites, wherein the SUPI is one of: aninternational mobile subscriber identifier (IMSI), or an identifierbased on the IMSI.

F. The method as paragraph E recites, wherein generating the SUCI basedon the SUPI and the MNO public key value includes improving security ofthe IMSI by encrypting the SUPI based on the MNO public key value.

G. A fourth generation cellular-wireless access technology (4G)subscriber identity module (SIM) compatible with a 4G user equipment(UE) and a fifth generation cellular-wireless access technology (5G) UE,the 4G SIM comprising: one or more processors; memory coupled to the oneor more processors, the memory configured to: store a mobile networkoperator (MNO) public key value in a MNO public key file; have the MNOpublic key value retrieved from the MNO public key file; have asubscription permanent identifier (SUPI) read from the memory; have asubscription concealed identifier (SUCI) generated based on the SUPI andthe MNO public key value; and have the SUCI sent to a 5G mobile networkfor registering the 5G UE, in which the 4G SIM is placed.

H. The 4G SIM as paragraph G recites, wherein the 4G SIM is placed inthe 5G UE and the 5G UE receives 5G services from the 5G mobile networkafter having the SUCI sent to the 5G mobile network for registering the5G UE.

I. The 4G SIM as paragraph H recites, wherein the 4G SIM is placed inthe 5G UE, and the memory is further configured to: have the MNO publickey value retrieved from the MNO public key file upon the 5G UEdetermining that the MNO public key file exists in the memory.

J. The 4G SIM as paragraph I recites, wherein the 5G UE is configured todetermine whether the MNO public key file exists in the memory uponpowering on.

K. The 4G SIM as paragraph H recites, wherein the 4G SIM is furtherconfigured to, while placed in the 4G UE: have the MNO public key filecreated in the memory of the 4G SIM upon the 4G UE receiving a firstover-the-air command (OTA) command; and have the MNO public key value inthe MNO public key file updated upon the 4G UE receiving a second OTAcommand.

L. The 4G SIM as paragraph K recites, wherein the 4G UE receiving thefirst and second commands includes: receiving, by a communication moduleof the 4G UE, the first and second commands from a 4G mobile network.

M. The 4G SIM as paragraph H recites, wherein the SUPI is one of aninternational mobile subscriber identifier (IMSI), or an identifierbased on the IMSI.

N. The 4G SIM as paragraph M recites, wherein the SUCI generated basedon the SUPI and the MNO public key value includes the SUCI generated byencrypting the SUPI based on the MNO public key value to improvesecurity of the IMSI.

O. The 4G SIM as paragraph J recites, wherein the memory is furtherconfigured to, upon the 5G UE determining that the public key file doesnot exist in the 4G SIM: have an international mobile subscriberidentifier (IMSI) read from the memory of the 4G SIM and sent to anavailable mobile network, or have the SUPI from the memory of the 4G SIMread and sent to the available mobile network.

P. A non-transitory computer storage medium configured to storecomputer-readable instructions by one or more processors of a fifthgeneration cellular-wireless access technology (5G) user equipment (UE),that when executed, cause the one or more processors to performoperations comprising: determining whether a mobile network operator(MNO) public key file exists in a fourth generation cellular-wirelessaccess technology (4G) subscriber identity module (SIM) of the 5G UE;upon determining that the MNO public key file exists in the 4G SIM:retrieving an MNO public key value from the MNO public key file; readinga subscription permanent identifier (SUPI) from the 4G SIM; generating asubscription concealed identifier (SUCI) based on the SUPI and the MNOpublic key value; and sending, by the communication module, the SUCI toa 5G mobile network for registering the 5G UE with the 5G mobilenetwork; or upon determining that the public key file does not exist inthe SIM: reading an international mobile subscriber identifier (IMSI)from the SIM, and sending the IMSI to an available mobile network; orreading the SUPI from the SIM, and sending the SUPI to the availablemobile network.

Q. The non-transitory computer storage medium as paragraph P recites,wherein determining whether the MNO public key file exists in the 4G SIMincludes determining whether the MNO public key file exists in the 4GSIM upon powering on the 5G UE.

R. The non-transitory computer storage medium as paragraph P recites,wherein the operations further comprise receiving 5G services from the5G mobile network upon registering with the 5G mobile network.

S. The non-transitory computer storage medium as paragraph P recites,wherein the SUPI is one of an international mobile subscriber identifier(IMSI), or an identifier based on the IMSI.

T. The non-transitory computer storage medium as paragraph S recites,wherein generating the SUCI based on the SUPI and the MNO public keyvalue includes improving security of the IMSI by encrypting the SUPIbased on the MNO public key value.

CONCLUSION

Although the subject matter has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the specific features or acts described. Rather,the specific features and acts are disclosed as exemplary forms ofimplementing the claims.

What is claimed is:
 1. A method in a user equipment (UE) having asubscriber identity module (SIM), the method comprising: determiningwhether a mobile network operator (MNO) public key file exists in theSIM; upon determining that the MNO public key file exists in the SIM:retrieving an MNO public key value from the MNO public key file; readinga subscription permanent identifier (SUPI) from the SIM; generating asubscription concealed identifier (SUCI) based on the SUPI and the MNOpublic key value; and sending the SUCI to a mobile network forregistering the UE with the mobile network; or upon determining that thepublic key file does not exist in the SIM: reading an internationalmobile subscriber identifier (IMSI) from the SIM and sending the IMSI toan available mobile network; or reading the SUPI from the SIM andsending the SUPI to the available mobile network.
 2. The method of claim1, wherein determining whether the MNO public key file exists in the SIMincludes: determining whether the MNO public key file exists in the SIMupon powering on the UE.
 3. The method of claim 2, wherein: the UE is afifth generation cellular-wireless access technology (5G) UE, the SIM isa fourth generation cellular-wireless access technology (4G) SIM, andthe mobile network is a 5G mobile network.
 4. The method of claim 3,further comprising: receiving 5G services from the 5G mobile networkupon registering with the 5G mobile network.
 5. The method of claim 1,wherein the SUPI is one of: an international mobile subscriberidentifier (IMSI), or an identifier based on the IMSI.
 6. The method ofclaim 5, wherein generating the SUCI based on the SUPI and the MNOpublic key value includes: improving security of the IMSI by encryptingthe SUPI based on the MNO public key value.
 7. A fourth generationcellular-wireless access technology (4G) subscriber identity module(SIM) compatible with a 4G user equipment (UE) and a fifth generationcellular-wireless access technology (5G) UE, the 4G SIM comprising: oneor more processors; and memory coupled to the one or more processors,the memory configured to: store a mobile network operator (MNO) publickey value in a MNO public key file; have the MNO public key valueretrieved from the MNO public key file; have a subscription permanentidentifier (SUPI) read from the memory; have a subscription concealedidentifier (SUCI) generated based on the SUPI and the MNO public keyvalue; and have the SUCI sent to a 5G mobile network for registering the5G UE in which the 4G SIM is placed.
 8. The 4G SIM of claim 7, whereinthe 4G SIM is placed in the 5G UE and the 5G UE receives 5G servicesfrom the 5G mobile network after having the SUCI sent to the 5G mobilenetwork for registering the 5G UE.
 9. The 4G SIM of claim 8, wherein the4G SIM is placed in the 5G UE, and the memory is further configured to:have the MNO public key value retrieved from the MNO public key fileupon the 5G UE determining that the MNO public key file exists in thememory.
 10. The 4G SIM of claim 9, wherein the 5G UE is configured todetermine whether the MNO public key file exists in the memory uponpowering on.
 11. The 4G SIM of claim 8, wherein the 4G SIM is furtherconfigured to, while placed in the 4G UE: have the MNO public key filecreated in the memory of the 4G SIM upon the 4G UE receiving a firstover-the-air command (OTA) command; and have the MNO public key value inthe MNO public key file updated upon the 4G UE receiving a second OTAcommand.
 12. The 4G SIM of claim 11, wherein the 4G UE receiving thefirst and second commands includes: receiving, by a communication moduleof the 4G UE, the first and second commands from a 4G mobile network.13. The 4G SIM of claim 8, wherein the SUPI is one of: an internationalmobile subscriber identifier (IMSI), or an identifier based on the IMSI.14. The 4G SIM of claim 13, wherein the SUCI generated based on the SUPIand the MNO public key value includes the SUCI generated by encryptingthe SUPI based on the MNO public key value to improve security of theIMSI.
 15. The 4G SIM of claim 10, wherein the memory is furtherconfigured to, upon the 5G UE determining that the public key file doesnot exist in the 4G SIM: have an international mobile subscriberidentifier (IMSI) read from the memory of the 4G SIM and sent to anavailable mobile network; or have the SUPI from the memory of the 4G SIMread and sent to the available mobile network.
 16. A non-transitorycomputer storage medium configured to store computer-readableinstructions by one or more processors of a fifth generationcellular-wireless access technology (5G) user equipment (UE), that whenexecuted, cause the one or more processors to perform operationscomprising: determining whether a mobile network operator (MNO) publickey file exists in a fourth generation cellular-wireless accesstechnology (4G) subscriber identity module (SIM) of the 5G UE; upondetermining that the MNO public key file exists in the 4G SIM:retrieving an MNO public key value from the MNO public key file; readinga subscription permanent identifier (SUPI) from the 4G SIM; generating asubscription concealed identifier (SUCI) based on the SUPI and the MNOpublic key value; and sending, by the communication module, the SUCI toa 5G mobile network for registering the 5G UE with the 5G mobilenetwork; or upon determining that the public key file does not exist inthe SIM: reading an international mobile subscriber identifier (IMSI)from the SIM and sending the IMSI to an available mobile network; orreading the SUPI from the SIM and sending the SUPI to the availablemobile network.
 17. The non-transitory computer storage medium of claim16, wherein determining whether the MNO public key file exists in the 4GSIM includes: determining whether the MNO public key file exists in the4G SIM upon powering on the 5G UE.
 18. The non-transitory computerstorage medium of claim 16, wherein the operations further comprise:receiving 5G services from the 5G mobile network upon registering withthe 5G mobile network.
 19. The non-transitory computer storage medium ofclaim 16, wherein the SUPI is one of: an international mobile subscriberidentifier (IMSI), or an identifier based on the IMSI.
 20. Thenon-transitory computer storage medium of claim 19, wherein generatingthe SUCI based on the SUPI and the MNO public key value includes:improving security of the IMSI by encrypting the SUPI based on the MNOpublic key value.