Contactless programming of subscriber identity modules

ABSTRACT

Exemplary embodiments of the present invention include receiving subscriber identity information for a cellular network at a mobile communication device via a short-range wireless communication network. The subscriber identity information is received from a device issued by a provider of the cellular network. Exemplary embodiments further include storing the subscriber identity information at a subscriber identity module embedded in the mobile communication device. Exemplary embodiments additionally include transmitting the subscriber identity information from the subscriber identity module to a server of the provider for authenticating a subscriber of the cellular network. Exemplary embodiments still further include receiving, from the server of the provider, authorization for the subscriber to access the cellular network, and accessing the cellular network via the mobile communication device.

TECHNICAL FIELD

The present disclosure relates generally to subscriber identity modules,and more specifically to contactless programming of subscriber identitymodules.

BACKGROUND

Wireless communication networks provide various communication servicessuch as telephony, video, data, messaging, and broadcasts. Such networkssupport communications for multiple users by sharing the availablenetwork resources. One example of such a network is the UMTS TerrestrialRadio Access Network (UTRAN). The UTRAN is the radio access network(RAN) defined as a part of the Universal Mobile TelecommunicationsSystem (UMTS), a third generation (3G) mobile phone technology. TheUMTS, which is the successor to Global System for Mobile Communications(GSM) technologies, currently supports various air interface standards,such as Wideband-Code Division Multiple Access (W-CDMA), TimeDivision-Code Division Multiple Access (TD-CDMA), and TimeDivision-Synchronous Code Division Multiple Access (TD-SCDMA). The UMTSsupports enhanced 3G data communications protocols, such as High SpeedPacket Access (HSPA), which provides greater data transfer speeds andcapacity to associated UMTS networks. Other example networks includeGPRS/EDGE, CDMA/DO, or EUTRAN (4G LTE). Such wireless communicationnetworks may follow standards implemented by the EuropeanTelecommunications Standards Institute (ETSI) or the Third GenerationPartnership Project (3GPP), for example.

Contemporary wireless devices frequently include a subscriber identitymodule (SIM) card to facilitate communication with a communicationnetwork via a subscription for the designated voice or data subscriptionof the wireless device. SIM cards include information and provideidentity documentation, authentication, and other information regardinga user of the wireless device via an embedded integrated circuitcomponent. The integrated circuit component securely stores aninternational mobile subscriber identity (IMSI) with a key that is usedto identify and authenticate subscribers on connected mobile devices,such as cell phones, tablets, and computers. Various other informationmay also be stored on the SIM card, such as an address book, textmessages, network names, or other carrier or subscriber information.This information may also be read from the SIM card and be madeavailable to the wireless device.

A SIM card is a plastic card with a SIM circuit and electrical contactsembedded therein. SIM cards conform to various standards, characterizedby the size of the card. The most recent and smallest SIM card size isNano-SIM, with Micro-SIM, Mini-SIM and the Full-size SIM cards precedingit.

SIM cards provide many benefits. SIM cards can be transferred betweenmobile devices to provide a generic, compatible identification andstorage mechanism for subscribers using multiple device platforms. Forexample, a mobile network subscriber may remove his/her SIM card from afirst mobile device and insert it into a second mobile device. After anauthentication and initialization process, the second device may belinked to the subscriber's account. The subscriber may then use thesecond device to access the subscription network for as long as the SIMcard remains connected/inserted in the device. Further, a new subscribermay use a different SIM card to unlock network access for additionalwireless networks. For example, during an international trip, a USwireless network subscriber may purchase a short term subscription to aforeign wireless network. The user may connect to the foreign network byremoving the US wireless network SIM card from his/her mobile device andinserting the foreign wireless network SIM card. After an authenticationand initialization process, the mobile device may access the foreignwireless network. It would be advantageous to use the authenticationcapabilities of the SIM card to perform other services provided bytoday's high-technology mobile devices that perform a variety ofcomputing and communication functions.

SUMMARY OF THE INVENTION

According to aspects of the present disclosure, a method includesreceiving subscriber identity information for a cellular network at amobile communication device via a short-range wireless communicationnetwork, such as, for example, Near Field Communication (“NFC”) andnon-cellular networks. The subscriber identity information is receivedfrom a device that, in exemplary embodiments, are issued by a providerof the cellular network. The method further includes storing thesubscriber identity information at a subscriber identity module embeddedin the mobile communication device. The method additionally includestransmitting the subscriber identity information from the subscriberidentity module to a server of the provider for authenticating asubscriber of the cellular network. The method still further includesreceiving, from the server of the provider, authorization for thesubscriber to access the cellular network, and accessing the cellularnetwork via the mobile communication device.

Other objects, features, and advantages will be apparent to persons ofordinary skill in the art from the following detailed description andthe accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention, needssatisfied thereby, and the objects, features, and advantages thereof,reference now is made to the following description taken in connectionwith the accompanying drawings.

FIG. 1 illustrates a high level block diagram of a system forcontactless programming of subscriber identity modules in accordancewith a particular non-limiting embodiment of the present disclosure.

FIG. 2 illustrates a block diagram of a system for contactlessprogramming of subscriber identity modules in accordance with aparticular non-limiting embodiment of the present disclosure.

FIG. 3 illustrates a block diagram of a system for contactlessprogramming of subscriber identity modules in accordance with aparticular non-limiting embodiment of the present disclosure.

FIG. 4 illustrates a flow chart of a method for contactless programmingof subscriber identity modules in accordance with a particularnon-limiting embodiment of the present disclosure.

DETAILED DESCRIPTION OF THE INVENTION

Removable SIM technology has set the standard for the development ofmobile telephony subscriber identity management techniques over the past25 years. SIM cards allow mobile network operators to authenticate asubscriber using a secure token that is stored in an integrated circuit(IC) on a small and inexpensive card that can be easily distributed tosubscribers. SIM cards also provide subscribers with a means forpreserving their identity and other personal information across devicesor while upgrading handset technology. SIM cards additionally allowdevice manufacturers to market a single device to different marketsaround the world by providing a mechanism for abstracting subscriber andcarrier information from the device itself. Use of SIM technology isnearly universal in mobile networks across the world.

SIM technology has been modified over the years to include additionalfeatures beyond subscriber authentication. For example, the format andspecifications of SIM cards have changed to accommodate smaller deviceform factors. Further, smaller SIM card form factors allow more devicespace to be used to accommodate memory, processor, cooling units,screens, busses, and other critical internal device components. Futuredevices may have even less internal device room to dedicate toaccommodation of removable SIM modules. SIM functions may also beimplemented through the mobile device and software via an eSIM platform.

One design aspect affecting further miniaturization of SIM technology iselectrical contact surface area requirements. Electrical contacts arenecessary in traditional SIM card technology for connecting tocorresponding pins in the receiving mobile device. When the SIM card isinserted in the receiving mobile device, the pins of the mobile devicetouch the contacts of the SIM card, and an electrical circuit is createdbetween the mobile device and the SIM card when the device is poweredon. Power is supplied to the embedded IC of the SIM card, which allowsthe information stored in the SIM card to be loaded into a memory on themobile device. These contacts essentially allow SIM cards to be swappedfreely in and out of compatible devices by creating a standard interfacefor mobile devices that are designed to retrieve information, such assubscriber identity information, from SIM cards.

However, various technologies have arisen that allow for transmittingand/or receiving information, such as the information stored on a SIMcard, via wireless means. For example, WIFI, BLUETOOTH, and NFCtechnologies each permit high-bandwidth radio communications betweendevices in varying degrees of proximity to each other. Further, thesedevices may communicate with and power un-powered chips, such as tags orcontactless cards. In other words, wireless technologies have advancedto the point where electrical contacts may not be necessary forretrieving subscriber identity information from a programmable card.Additionally, wireless technologies permit wireless re-programming ofsubscriber information on embedded cards.

Another technological limitation of electrical contacts is the amount ofsurface area required for ensuring a reliable electrical card-to-deviceconnection. For example, the surface area of the electrical contactsmust be large enough to permit some variance in the way the SIM cardfits within the mobile device. If one SIM card sits even slightly higherwithin a mobile device after being inserted into the mobile device, theelectrical connection with the SIM card is not made, and the informationon the SIM card cannot be read. Further, one user may firmly press theSIM card into place, while another user may press the SIM card moregently into place. If the contacts on the SIM card are not large enoughto contact the pins while tolerating these variances in positioning, theelectrical connection between the device and the SIM card is not made,and subscriber information is not read. Any type of manual cardconfiguration or placement design requires such tolerance in contact/pindesign.

Additionally, the protective packaging of the SIM card uses additionalspace. For example, IC's that are embedded within device packaging oreven within the chip substrate do not require separate protectivepackaging from the exterior shell that encloses the device. Removablecards mainly require this protective packaging so that they can betransferred between devices without damaging the circuit containedtherein.

One design that significantly reduces the surface area required forcreating and maintaining secure, reliable electrical connections issoldering or permanently connecting pins or contacts to the receivingchip or device. One benefit of such a design is that soldering creates amore permanent contact and thus an electrical connection that is noteasily interrupted. Another benefit is the reduced size required forpins or contacts. A small amount of solder creates a contact between amicroscopic pin and a connecting gate or conductive substrate.

Further, a permanent connection design may also eliminate the need forprotective packaging around a subscriber identification unit. Thus, sucha design even further reduces size limitations of legacy SIMtechnologies.

However, while soldered or permanently connected cards significantlyreduce the size of subscriber identity modules, such modules are, bydesign, not easily removable or replaceable. Thus, such a designeliminates one of the great benefits of SIM technology. For examplebenefits include transferability of SIM cards between different mobiledevices and the ability to use different mobile network accounts with asingle device. Accordingly, wireless communication network carriers andmobile device manufacturers have continued to utilize legacy SIMformats.

Certain embodiments of the present disclosure describe a configurationwhereby the current benefits of removable SIM formats are maintainedwhile also facilitating the benefits of a permanently embedded orconnected module by affixing an authentication device (i.e., asubscriber identity module) within a mobile device or handset. Such asolution may be enabled by the use of wireless communicationtechnologies, such as NFC, to program or update subscriber credentialson a mobile device by using a contactless card or an NFC antenna. Incertain embodiments, the configuration has been contemplated in such amanner that it may be deployed in current wireless network subscriptionplans. Thus, the present disclosure may serve immediate benefits tothose wireless network providers and subscription management services.

With reference to FIG. 1, a system 100 for contactless programming ofsubscriber identity modules is illustrated in accordance with aparticular exemplary embodiment of the present disclosure. System 100includes mobile device 110, provider-issued device 160, a wirelesscommunication network including base station 172, satellite 170, andground link 174, and provider subscriber authentication andauthorization server 180. Mobile device 110 includes memory 120,processor(s) 130, hard disk 132, interface 134, input/output 136,embedded subscriber identity module 140 and contactless datatransmission interface 142. Contactless data transmission interface 142creates a secure short-range wireless network 150 with provider-issueddevice 160, which contains subscriber identity information for one ormore wireless network subscribers. In certain embodiments, theshort-range wireless network includes an NFC communication networkbetween two devices which each have an antenna for enabling radiofrequency communications. For example, the provider-issued device 160includes an NFC communications terminal as part of a cell phone,computer, or other suitable device. In certain embodiments, the shortrange wireless network includes a radio frequency communication networkbetween one device which transmits interrogation radio frequency signalsto a smart card, which uses an inductor to store those signals andrectify them to power embedded circuitry. The embedded circuitry in turntransmits a low power signal to the mobile device that includessubscriber identity information. In exemplary embodiments theprovider-issued device 160 comprises a smart card that may bedistributed by a wireless network service provider to a subscriber. Thesubscriber uses the smart card to activate mobile device 10 with awireless network and access the wireless network.

In certain embodiments, mobile device 110 receives subscriber identityinformation from provider-issued device 160. For example, memory 120runs a subscriber identity management process 122 that operatescontactless data transmission interface 142 to receive subscriberidentity information 162 over short-range wireless network 150.Subscriber identity management process 122 is loaded into memory 120 byprocessor 130. Subscriber identity management process loads subscriberidentity information 162 into subscriber identity module 140, whichstores subscriber identity information in persistent storage.

In certain embodiments, subscriber identity management process 122communicates via a wireless communication network with a providersubscriber authentication and authorization server 180 to activatemobile device 110 with the network provider. For example, subscriberidentity management process 122 loads subscriber identity informationand other authenticating credentials, tokens, keys, cryptographiccyphers, and the like, and transmits the subscriber identity informationand other necessary information to provider subscriber authenticationand authorization server 180. Other information loaded from subscriberidentity module 140 may aid in creation of a secure link or channel tothe provider's server 180 before activating mobile device 110.

In certain embodiments mobile device 110 receives an activation signalfrom provider subscriber authentication and authorization server 180.Mobile device 110 accesses external network 178 via the wirelesscommunication network 176.

With reference to FIG. 2, a system 200 for contactless programming of asubscriber identity module is illustrated in accordance with anexemplary embodiment of the present disclosure. System 200 includesmobile device 210, which includes subscriber identity module 220, mobiledevice memory 230, processor 234, hard disk 236, interface 238,input/output 240, and NFC antenna 242. System 200 additionally includesprovider NFC terminal 260. In certain embodiments, NFC terminal 260 is astand-alone communication terminal, which accesses a memory to transmitsubscriber identity information 262 over a communication network 250.

In certain embodiments, NFC terminal 260 is connected to and/or embeddedwithin another device, such as a smartphone, tablet, personal computer,or other device. For example, a mobile wireless network provider issuesto its sales employees a tablet that is configured to process salestransactions, process mobile network plan bill payments, providedemonstrations to consumers, and provide other helpful in-store salesdata. The tablet is further configured with an NFC terminal thatincludes an antenna for activating mobile devices. Sales associates usethe tablets to activate mobile devices so that subscribers are able toconnect to the mobile wireless network. For example, the sales associatepoints the NFC terminal 260 at the mobile device and holds the NFCterminal 260 within a predetermined distance of the device. Network 250is created using radio frequency signals, which is a short-rangewireless communication network. In this example, NFC terminal 260 canaccess subscriber identity information 262 from the connected device.

In certain embodiments, NFC terminal 260 also retrieves personalinformation of the subscriber from mobile device 210. For example, auser stores contacts and other personal information on mobile device210, such as in hard disk 236 and/or subscriber identity module memory224. Subscriber identity module 220 transmits contact informationdetails via network 250 to the provider issued NFC terminal 260. NFCterminal 260 stores the subscriber information, such as the subscribercontact details, locally and/or remotely on either one or more of aconnected device or a remote subscriber information server.

In certain embodiments, provider NFC terminal 260 retrieves subscriberidentity information from a server via a communications network. Forexample, NFC terminal 260 includes a memory and logic for processinginstructions, such as instructions from a subscriber identity managementprocess. NFC terminal 260 creates a secure network connection with aremote server of the wireless network provider.

In exemplary embodiments the server is a subscriber management server. Asales associate or other user creates an account for a subscriber. Forexample, the tablet or smart device that was issued to the salesassociate includes software for creating new user accounts or editingexisting user accounts via a secure network connection to a providerserver. The newly created account is created at the server and uniqueidentifiers are created for the new subscriber.

In certain embodiments, the subscriber may also purchase a new mobiledevice, such as mobile device 210. The mobile device includes, interalia, a subscriber identity module 220. The subscriber identity modulemay be removable and/or permanently embedded within mobile device 210.For example, subscriber identity module 220 that is embedded in mobiledevice 210 includes certain advantages over removable subscriberidentity modules. The subscriber identity module 220 contains certaininformation pre-loaded onto it. The pre-loading occurs during devicemanufacturing. In certain embodiments, a sales associate pre-loadssecurity information onto the device before, during, and/or after a saleis made.

The sales associate programs the subscriber identity module withsubscriber information using the provider-issued NFC terminal 260. Forexample, as part of an activation process 232, when a user account iscreated, subscriber identity information is generated for the newsubscriber. NFC terminal 260 retrieves the subscriber identityinformation for the user based on identifying information of thesubscriber, such as the subscriber's name, account number, address,social security number, or the like. NFC terminal 260 uses thissubscriber information to program subscriber identity module 220, whichuses logic 222 with NFC antenna 242 to receive the subscriber identityinformation from the NFC terminal and store the subscriber identityinformation in memory 224. Subscriber identity module 220 using logic222 then begins an activation process 232 using a network (eitherwireless or wired) to connect to a provider server, such as a providerauthentication and authorization server. Subscriber identity informationis used during the activation process to authenticate the subscriber andthe mobile device. Information regarding the mobile device is stored atthe provider's server. Additional subscriber identity information isretrieved from the provider's server and stored in memory 224 ofsubscriber identity module 220.

In one example, retail chains are maintained where subscribers purchasehandsets and register for network subscription plans. Handsets includeany mobile communication device, tablet, smartphone, smart-watch, or thelike. Some devices include an embedded subscriber identity module. Incertain embodiments, the subscriber identity module includesauthentication information for establishing a secure network connectionwith a network provider server during activation. Such a store mayinclude a terminal for wirelessly programming mobile devices. New mobiledevices, such as mobile device 210, may include generic subscriberidentity modules 220. Subscribers or new users purchase mobile devices,and sales associates use NFC terminal 260 to program subscriber identityinformation for the subscriber or new user onto the subscriber identitymodule. The subscriber subsequently activates the mobile device usingany network connection, such as a home or in-store WIFI connection.

With reference to FIG. 3, a system 300 for contactless programming ofsubscriber identity modules is illustrated in accordance with aparticular non-limiting embodiment of the present disclosure. System 300includes mobile device 310 and smart card 350. Mobile device 310includes memory 320, processor(s) 330, hard disk 332, interface 334,input/output 336, and subscriber identity module (SIM) 338. Smart card350 includes integrated circuit component 352, inductor (i.e., antenna)354, and memory 360. The memory is used to store subscriber identityinformation. In certain embodiments, memory 360 is used to storecontacts 362 of the mobile device user or wireless network subscriber.In certain embodiments, smart card 350 includes a separate antennaelement for receiving interrogating signals (shown integrated withinductor 354 in FIG. 3). Inductor 354 receives and stores power from theantenna element. Inductor 354 powers integrated circuit 352 with thestored power and powers the antenna element to transmit data processedby integrated circuit 352.

In certain embodiments, smart card 350 subscriber identity information364 is similar to subscriber identity information distributed inremovable subscriber identity modules of today. In certain embodiments,the same useful characteristics as today's SIM cards are incorporatedinto smart card 350. For example, smart card 350 has a small profile, isportable, and is generic. In other words, smart card 350 can be used toprogram mobile device 310, as well as other mobile devices equipped withcontactless card reading equipment with an embedded SIM 338 module. Incertain examples, smart card 350 is used to re-program removable SIMcards.

In certain embodiments, mobile device 310 is equipped with a smart cardor contactless card reader. The contactless card reader creates awireless network with smart card 350 when it is placed within a certaindistance of mobile device 310. For example, mobile device 310automatically transmits interrogating radio frequency signals forlocating and creating wireless networks with smart cards. In certainembodiments, mobile device 310 is placed in an activation mode by auser. The interrogating signals are transmitted only during thisactivation mode so as to extend battery life during normal usageperiods.

In certain embodiments, smart card 350 is programmed with subscriberidentity information including a unique identifier and other securityinformation. The unique identifier is not linked to a specificsubscriber account when it is created. Instead it is noted by theprovider and held in a bank until it is issued to a particular user,such as after a phone or in person point of sale transaction in which auser purchases a new mobile device with a mobile network subscriptionplan.

During an activation process, subscriber identity information istransmitted from smart card 350 to mobile device 310 and stored in SIM338 of mobile device 310. A subscriber identity management process 322creates a secure connection with a subscriber identity management serverthat is hosted by the network provider. The subscriber is authenticatedusing mobile device 310 information, subscriber identity information,and personal information of the subscriber, such as an accountidentifier and/or name of the subscriber.

Such personal information is then loaded onto additional devices as thesubscriber desires. For example, if the subscriber updates his/herhandset to a different model, the contactless card, or smart card 350,can be used to load personal information of the subscriber, such ascontacts and settings, in addition to the subscriber identityinformation. Thus, this feature of removable SIM technologies ispreserved.

Various other embodiments of the present disclosure, beyond merely anNFC terminal and/or a smart card are contemplated by the presentdisclosure. The examples above are merely used for explanatory purposesonly and should not be construed to limit the scope of the presentdisclosure.

With reference to FIG. 4, a method for contactless programming ofsubscriber identity modules is illustrated in yet another non-limitingembodiment of the present disclosure 400. At step 410, subscriberidentity information is received. For example, subscriber identityinformation is received at a mobile device.

At step 420, the subscriber identity information is stored in thesubscriber identity module of the mobile device. For example, a busconnects a special identity module in the mobile device to a mobiledevice processor. The processor stores the subscriber identityinformation in the subscriber identity module.

At step 430, the subscriber identity information is transmitted to aprovider server. In certain embodiments, this occurs during anactivation process. The subscriber initiates this activation processusing a home network or an in-store network. In certain embodiments, asales associate initiates this activation process. In certainembodiments, upon receiving subscriber identity information the mobiledevice begins the activation process automatically. In certainembodiments the activation process begins the first time that the mobiledevice is connected to a network. In other words, the activation processautomatically begins at the first chance that it can.

At step 440, authorization to access the network is received. In certainembodiments, authorization is received after an activation processcompletes. The activation process includes transmitting and receivingsubscriber information between a mobile device and an activation server.The activation server grants the mobile device permission to access amobile wireless network hosted by the provider.

At step 450, a subscriber or other user uses the mobile device to accessan external network using the mobile network provided by the provider.

In certain embodiments, contactless cards may be distributed in the sameway that SIM cards are sold in existing wireless network subscriptionplan implementations. For example, a traveler arriving in a foreignairport after an international flight buys a local network-accesssubscription (e.g., a prepaid subscription) for use with an existinghandset device by purchasing a contactless card programmed withsubscriber identity information. As another example, consumers who wishto upgrade their mobile device but want to preserve their networkcredentials and associated data (e.g., a SIM-based address book) may usea contactless card to first update registers on the contactless cardwith associated data stored on the mobile device, and then initialize orprogram the new device with network credentials and associated datastored on the contactless card.

In certain embodiments, handsets may be loaded with mobile networkcredentials before being shipped to mobile network operators so thatthey are ready to be sold when they reach the network operator's retailchannels. For example, device manufacturers may pre-load certain deviceswith subscriber identity information. Once a consumer purchases thedevice, the device is initialized by interacting with a server and thesubscriber's information is linked to the subscriber identityinformation pre-loaded on the mobile device.

A similar process may occur in legacy subscriber identity systems withremovable SIM cards. However, point-of-sale pairing processes are usedmore often. These point of sale processes may also be improved by theteachings of the present disclosure.

Mobile network operator retail locations may have a choice of managementmethods. For example, smaller retail locations, such as mall kiosks, mayuse contactless cards in a similar way that SIM cards are used in legacysubscriber identity systems today. That is to say, they may loadcredentials onto the handset at the time that the device is sold, wherethe handset is then activated over the network.

As another example, larger retail locations may install and use NFCdevices as a replacement for the activation terminals used in legacysubscriber identity systems. NFC communication mechanisms enable largerand more complex and secure credentials to be loaded with ahigh-bandwidth, secure data connection, without depending on networkavailability and signal strength. Thus, the teachings of the presentdisclosure may present a framework for improving the current subscriberidentity management systems while avoiding the pitfalls that werepreviously thought to be unavoidable.

Herein, “or” is inclusive and not exclusive, unless expressly indicatedotherwise or indicated otherwise by context. Therefore, herein, “A or B”means “A, B, or both,” unless expressly indicated otherwise or indicatedotherwise by context. Moreover, “and” is both joint and several, unlessexpressly indicated otherwise or indicated otherwise by context.Therefore, herein, “A and B” means “A and B, jointly or severally,”unless expressly indicated otherwise or indicated otherwise by context.

Any combination of one or more computer-readable media may be utilizedto store computer-readable instructions described herein. Thecomputer-readable media may be a computer-readable signal medium or acomputer-readable storage medium, for example. A computer-readablestorage medium may be, for example, but not limited to, an electronic,magnetic, optical, electromagnetic, or semiconductor system, apparatus,or device, or any suitable combination of the foregoing. More specificexamples (a non-exhaustive list) of such a computer-readable storagemedium include the following: a portable computer diskette, a hard disk,a random access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an appropriateoptical fiber with a repeater, a portable compact disc read-only memory(CD-ROM), an optical storage device, a magnetic storage device, asubscriber identity module (SIM) card or other universal integratedcircuit card (UICC or eUICC), memory integrated with or separate fromthe wireless device, or any suitable combination of the foregoing orother data carriers. In the context of this document, acomputer-readable storage medium may be any tangible medium that cancontain, or store a program for use by or in connection with aninstruction execution system, apparatus, or device.

Aspects of the present disclosure are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatuses(including systems), and computer program products. Individual blocks ofthe flowchart illustrations and/or block diagrams, and combinations ofblocks in the flowchart illustrations or block diagrams, may beimplemented by computer program instructions, for example. Thesecomputer program instructions may be provided to a processor of ageneral purpose computer, special purpose computer, or otherprogrammable data processing apparatus to produce a machine, such thatthe instructions, which execute via the processor of the computer orother programmable instruction execution apparatus, create a mechanismfor implementing the function(s) specified in the flowcharts or blockdiagram block(s).

These computer program instructions may also be stored in acomputer-readable medium. When accessed from the computer-readablemedium and executed, the computer program instructions may direct acomputer, other programmable data processing apparatus, or other devicesto function in a particular manner, such that the instructions whenstored in the computer-readable medium produce an article of manufactureincluding instructions that, when executed, cause a computer toimplement the function(s) specified in the flowchart or block diagramblock(s). The computer program instructions may also be loaded onto acomputer, other programmable instruction execution apparatus, or otherdevices to cause a series of operational steps to be performed on thecomputer, other programmable apparatuses or other devices to produce acomputer implemented process such that the instructions which execute onthe computer or other programmable apparatus provide processes forimplementing the function(s) specified in the flowcharts or blockdiagram block(s). For example, wireless devices described herein areexamples of such programmable data processing apparatuses.

Aspects of the present disclosure may be implemented by variouscombinations of apparatuses, devices, systems, or components thereof,for example. Reference in the appended claims to an apparatus, device,or system or a component thereof being configured to or operable toperform a particular function encompasses that apparatus, system,component, or device, whether such apparatus, system, component, ordevice or such particular function is activated, turned on, or unlocked,as long as that apparatus, system, or component is so configured oroperable.

While the invention has been described in connection with variousexample structures, configurations, and illustrative implementations, itwill be understood by those skilled in the art that other variations andmodifications of the structures, configurations, and implementationsdescribed above may be made without departing from the scope of theinvention. For example, the scope of this application comprises allpossible combinations of the various elements and features disclosed andincorporated by reference herein, and the particular elements andfeatures presented in the claims and disclosed and incorporated byreference above may be combined with each other in other ways within thescope of this application, such that the application should berecognized as also directed to other implementations comprising otherpossible combinations. Other structures, configurations, andimplementations consistent with the scope of the claimed invention willbe apparent to those skilled in the art from a consideration of thespecification or practice of the invention disclosed herein. It isintended that the specification and the described examples areillustrative with the true scope of the invention being defined by thefollowing claims.

1. A method comprising: receiving subscriber identity information for acellular network at a mobile communication device via a short-rangewireless communication network, the subscriber identity informationbeing received from a device issued by a provider of the cellularnetwork; in response to receiving the subscriber identity information,storing the subscriber identity information at a subscriber identitymodule embedded in the mobile communication device, the storingcomprising overwriting any other subscriber identity information storedat the subscriber identity module; transmitting the subscriber identityinformation from the subscriber identity module to a server forauthenticating a subscriber of the cellular network; receiving, from theserver, authorization for the subscriber to access the cellular network;and accessing the cellular network via the mobile communication device.2. The method of claim 1, further comprising: transmitting interrogatingradio-frequency signals to the device issued by the provider of thecellular network, wherein the device issued by the provider is acontactless smart card comprising an integrated circuit and an inductor,the inductor configured to capture the interrogating radio-frequencysignals for powering the integrated circuit to transmit the subscriberidentity information.
 3. The method of claim 2, further comprising:transmitting personal data associated with the subscriber to thecontactless smart card, wherein the contactless smart card furthercomprises one or more registers for storing the personal data associatedwith the subscriber.
 4. The method of claim 1, wherein the short-rangewireless communication network used for receiving the subscriberidentity information for the cellular network uses radio frequency vianear-field communication.
 5. The method of claim 1, further comprising:receiving second subscriber identity information for a second cellularnetwork at the mobile communication device via the short-range wirelesscommunication network; overwriting the subscriber identity informationin the subscriber identity module with the second subscriber identityinformation for the second cellular network; transmitting the secondsubscriber identity information from the subscriber identity module to asecond server of a second provider for authenticating a secondsubscriber of the second cellular network; and receiving, from thesecond server of the second provider, authorization for the secondsubscriber to access the second cellular network.
 6. The method of claim1, further comprising: storing information associated with thesubscriber on the mobile communication device; transmitting theinformation associated with the subscriber to the device issued by theprovider via the short-range wireless communication network for loadingonto a different mobile communication device.
 7. The method of claim 1,wherein the subscriber identity module comprises: a unique serial number(ICCID); an international mobile subscriber identity (IMSI); andsecurity authentication information.
 8. A mobile communication deviceconfigured to access a storage device, the mobile communication devicecomprising: at least one processor; and a non-transitory,computer-readable storage medium storing computer-readable instructionsthat when executed by the at least one processor cause the computer toperform: receiving subscriber identity information for a cellularnetwork at the mobile communication device via a short-range wirelesscommunication network, the subscriber identity information beingreceived from a device issued by a provider of the cellular network; inresponse to receiving the subscriber identity information, storing thesubscriber identity information at a subscriber identity module embeddedin the mobile communication device, the storing comprising overwritingany other subscriber identity information stored at the subscriberidentity module; transmitting the subscriber identity information fromthe subscriber identity module to a server for authenticating asubscriber of the cellular network; receiving, from the server,authorization for the subscriber to access the cellular network; andaccessing the cellular network via the mobile communication device. 9.The mobile communication device of claim 8, wherein thecomputer-readable instructions further cause the computer to perform:transmitting interrogating radio-frequency signals to the device issuedby the provider of the cellular network, wherein the device issued bythe provider is a contactless smart card comprising an integratedcircuit and an inductor, the inductor configured to capture theinterrogating radio-frequency signals for powering the integratedcircuit to transmit the subscriber identity information.
 10. The mobilecommunication device of claim 9, wherein the computer-readableinstructions further cause the computer to perform: transmittingpersonal data associated with the subscriber to the contactless smartcard, wherein the contactless smart card further comprises one or moreregisters for storing the personal data associated with the subscriber.11. The mobile communication device of claim 8, wherein the short-rangewireless communication network used for receiving the subscriberidentity information for the cellular network uses radio frequency vianear-field communication.
 12. The mobile communication device of claim8, wherein the computer-readable instructions further cause the computerto perform: receiving second subscriber identity information for asecond cellular network at the mobile communication device via theshort-range wireless communication network; overwriting the subscriberidentity information in the subscriber identity module with the secondsubscriber identity information for the second cellular network;transmitting the second subscriber identity information from thesubscriber identity module to a second server for authenticating asecond subscriber of the second cellular network; and receiving, fromthe second server, authorization for the second subscriber to access thesecond cellular network.
 13. The mobile communication device of claim 8,wherein the computer-readable instructions further cause the computer toperform: storing information associated with the subscriber on themobile communication device; transmitting the information associatedwith the subscriber to the device issued by the provider via theshort-range wireless communication network for loading onto a differentmobile communication device.
 14. The mobile communication device ofclaim 8, wherein the subscriber identity module comprises: a uniqueserial number (ICCID); an international mobile subscriber identity(IMSI); and security authentication information.
 15. A non-transitorycomputer program product comprising: a computer-readable storage mediumhaving computer-readable program code embodied therewith, thecomputer-readable program code comprising: computer-readable programcode configured to receive subscriber identity information for acellular network at a mobile communication device via a short-rangewireless communication network, the subscriber identity informationbeing received from a device issued by a provider of the cellularnetwork; computer-readable program code configured to, in response toreceiving the subscriber identity information, store the subscriberidentity information at a subscriber identity module embedded in themobile communication device, the storing comprising overwriting anyother subscriber identity information stored at the subscriber identitymodule; computer-readable program code configured to transmit thesubscriber identity information from the subscriber identity module to aserver for authenticating a subscriber of the cellular network;computer-readable program code configured to receive, from the server,authorization for the subscriber to access the cellular network; andcomputer-readable program code configured to access the cellular networkvia the mobile communication device.
 16. The computer program product ofclaim 15, wherein the computer-readable program code further comprises:computer-readable program code configured to transmit interrogatingradio-frequency signals to the device issued by the provider of thecellular network, wherein the device issued by the provider is acontactless smart card comprising an integrated circuit and an inductor,the inductor configured to capture the interrogating radio-frequencysignals for powering the integrated circuit to transmit the subscriberidentity information.
 17. The computer program product of claim 16,wherein the computer-readable program code further comprises:computer-readable program code configured to transmit personal dataassociated with the subscriber to the contactless smart card, whereinthe contactless smart card further comprises one or more registers forstoring the personal data associated with the subscriber.
 18. Thecomputer program product of claim 15, wherein the short-range wirelesscommunication network used for receiving the subscriber identityinformation for the cellular network uses radio frequency via near-fieldcommunication.
 19. The computer program product of claim 15, wherein thecomputer-readable program code further comprises: computer-readableprogram code configured to receive second subscriber identityinformation for a second cellular network at the mobile communicationdevice via the short-range wireless communication network;computer-readable program code configured to overwrite the subscriberidentity information in the subscriber identity module with the secondsubscriber identity information for the second cellular network;computer-readable program code configured to transmit the secondsubscriber identity information from the subscriber identity module to asecond server of for authenticating a second subscriber of the secondcellular network; and computer-readable program code configured toreceive, from the second server, authorization for the second subscriberto access the second cellular network.
 20. The computer program productof claim 15, wherein the computer-readable program code furthercomprises: computer-readable program code configured to storeinformation associated with the subscriber on the mobile communicationdevice; computer-readable program code configured to transmit theinformation associated with the subscriber to the device issued by theprovider via the short-range wireless communication network for loadingonto a different mobile communication device.
 21. A system comprising:an antenna configured to receive incident radio-frequency signals; aninductor configured to capture and rectify the incident radio-frequencysignals received by the antenna from one of a plurality of mobilecommunication devices; and an integrated circuit, powered by theinductor, configured to: store subscriber identity information for acellular network in a non-volatile storage module; transmit, using theantenna, the subscriber identity information to a first mobilecommunication device; receive, using the antenna, information associatedwith a user of the first mobile communication device; store theinformation associated with the user in the non-volatile storage module;and transmit, using the antenna, the information associated with theuser and the subscriber identity information for the cellular network toa second mobile communication device in the plurality of mobilecommunication devices.
 22. The method of claim 1, wherein the deviceissued by the provider of the cellular network is a smart card issued tothe subscriber, the smart card having the subscriber identityinformation stored thereon and being configured to transmit thesubscriber identity information through the short-range wirelesscommunication network.
 23. The mobile communication device of claim 8,wherein the device issued by the provider of the cellular network is asmart card issued to the subscriber, the smart card having thesubscriber identity information stored thereon and being configured totransmit the subscriber identity information through the short-rangewireless communication network.
 24. The non-transitory computer programproduct of claim 15, wherein the device issued by the provider of thecellular network is a smart card issued to the subscriber, the smartcard having the subscriber identity information stored thereon and beingconfigured to transmit the subscriber identity information through theshort-range wireless communication network.