System and apparatus for transferring data between communication elements

ABSTRACT

A method, device and machine-readable storage device for transferring data between identity modules is disclosed. Data is stored in one of a first removable storage module coupled to a donor communication device and a memory of the donor communication device, or both. A first portion of the data is provided to a server. The server provides the first portion of the data to a second removable storage module coupled to a recipient communication device responsive to a determination that a recipient communication device has a right to the data. Additional embodiments are disclosed.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims priority to U.S. patentapplication Ser. No. 14/567,551, filed Dec. 11, 2014, which is acontinuation of and claims priority to U.S. patent application Ser. No.13/903,429, filed May 28, 2013, which is a continuation of U.S. patentapplication Ser. No. 11/735,327, filed Apr. 13, 2007, (now U.S. Pat. No.8,474,050), each of which is incorporated herein by reference in theirentirety.

FIELD OF THE DISCLOSURE

The present disclosure relates generally to communication systems, andmore specifically to a system and apparatus for transferring databetween communication elements.

BACKGROUND

Mobile phones can come equipped with a smart card, such as removablesubscriber identity module (SIM) cards or removable user identificationmodule (RUIM) cards that store personalized data, including contactinformation. Purchase of a new mobile phone can include a new smartcard,which is typically an upgraded smartcard with improved performance inconnection with the provider's network. However, the new smartcard doesnot contain the users personalized data.

To transfer the personalized data, a user must go through atime-consuming process of removing and inserting the old and newsmartcards into the old and new phones. Typically, the user must movethe old smartcard to the new phone, and save the data from the oldsmartcard to the new phone. The user then puts the old smartcard back inthe old phone, and saves the old phone data to the old smartcard. Theuser again then moves the old smartcard to the new phone, and saves thisdata from the old smartcard to the new phone. The new smartcard is theninserted into the new phone and the old smartcard is moved back to theold phone. Activation and deactivation of the new and old smartcards canthen occur. In addition to the inefficiencies of the process, apotential risk of loss of data exists, as well as the potential risk ofdamage during handling of the smartcards.

A need therefore arises for a system and apparatus for transferring databetween communication elements.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts an exemplary embodiment of a communication system;

FIG. 2 depicts an exemplary block diagram of one of several embodimentsfor a communication device operating in the communication system;

FIG. 3 depicts an exemplary method operating in portions of thecommunication system; and

FIG. 4 depicts an exemplary diagrammatic representation of a machine inthe form of a computer system within which a set of instructions, whenexecuted, may cause the machine to perform any one or more of themethodologies disclosed herein.

DETAILED DESCRIPTION

Embodiments in accordance with the present disclosure provide a systemand apparatus for transferring data between communication elements.

In a first embodiment of the present disclosure, a computer-readablestorage medium in a web server of a telephony service provider can havecomputer instructions for receiving a request to transfer data stored inat least one among a first subscriber identity module (SIM) card and afirst communication device to at least one among a second SIM card and asecond communication device, establishing a secure communication linkbetween the web server and each of the first and second communicationdevices, retrieving the data stored in at least the first SIM card andthe first communication device, and transferring the data to at leastone among the second SIM card and the second communication deviceresponsive to verifying that a recipient of the data has rightfulpossession of at least a portion of the data.

In a second embodiment of the present disclosure, a communication devicecan have a controller element to receive data from a web server toupdate one or more entries of an identity module coupled to thecontroller element. The data can be retrieved by the web server from asecond communication device.

In a third embodiment of the present disclosure, an identity module canhave a memory updateable by a web server by way of a secondcommunication device. The update comprises one or more entries retrievedby the web server from at least one among a first identity module and afirst communication device.

FIG. 1 depicts an exemplary embodiment of a mobile communication device116 communicating by way of wireless access points (WAPs) with othercommunication devices and/or a network proxy or web server 122 whichcollectively operate in a communication system 100. The communicationdevice 116 can be a multimode VoIP terminal. However, the presentdisclosure contemplates the use of other types of communication devices,including other types of voice, video and data devices such as personaldigital assistants (PDAs) such as a Blackberry™, and a PocketPC™—just tomention a few. The communication system 100 can comprise apacket-switched network 105. The packet-switched network can be anInternet Service Provider (ISP) network 105. The network 105 can becoupled to the network proxy 122, the cellular network 113 and networkelements located in one or more of the buildings 112 representing anenterprise or residence. The ISP network 105 utilizes technology fortransporting Internet traffic.

In an enterprise setting, the building 112 can include a gateway 114that provides voice and/or video connectivity services betweencommunication devices 116, such as VoIP terminals or other forms ofcommunication devices of enterprise personnel. In a residential setting,the building 112 can include a gateway 114 represented by, for example,a residential gateway coupled to central office 106 utilizingconventional telephonic switching for processing calls with thirdparties.

The network proxy 122 can be used to control operations of a mediagateway 109, the central office 106 and the gateway 114. Communicationsbetween the network proxy 122, the communication devices 116 and othernetwork elements of the communication system 100 can conform to anynumber of signaling protocols such as a session initiation protocol(SIP), SS7, or a video communications protocol such as H.323 whichcombines video and voice over a packet-switched network, as well ascryptographic protocols, such as transport layer security (TLS) orsecure sockets layer (SSL), to provide secure communications for datatransfers.

The network proxy 122 can comprise a communications interface 124 thatutilizes common technology for communicating over an IP interface withthe network 105, the media gateway 109, the cellular network 113, and/orthe gateway 114. By way of the communications interface 124, the networkproxy 122 can direct by common means any of the foregoing networkelements to establish packet switched data, voice, and/or videoconnections between communication devices 116 distributed throughout thecommunication system 100. The network proxy 122 can further comprise amemory 126 (such as a high capacity storage medium) embodied in thisillustration as a database, and a controller 128 that makes use ofcomputing technology such as a desktop computer, or scalable server forcontrolling operations of the network proxy 122. The network proxy 122can operate as an IP Multimedia Subsystem (IMS) conforming in part toprotocols defined by standards bodies such as 3GPP (Third GenerationPartnership Protocol).

Under the control of the network proxy 122, the media gateway 109 canlink packet-switched and circuit-switched technologies such as thecellular network 113 (or central office 106) and the network 105, suchas an ISP network. The media gateway 109 can conform to a media gatewaycontrol protocol (MGCP) also known as H.248 defined by work groups inthe Internet Engineering Task Force (IETF). This protocol can handlesignaling and session management needed during a multimedia conference.The protocol defines a means of communication which converts data fromthe format required for a circuit-switched network to that required fora packet-switched network. MGCP can therefore be used to set up,maintain, and terminate calls between multiple disparate networkelements of the communication system 100. The media gateway 109 cantherefore support hybrid communication environments for communicationdevices 116, including VoIP terminals.

The central office 106 can house common network switching equipment fordistributing local and long-distance telecommunication services suppliedby network 105 to buildings 112 (such as dwellings or commercialenterprises). Telecommunication services of the central office 106 caninclude traditional POTS (Plain Old Telephone Service) and broadbandservices such as HDTV, DSL, VoIP (Voice over Internet Protocol), IPTV(Internet Protocol Television), Internet services, and so on. Thecommunication system 100 can utilize common computing and communicationstechnologies to support circuit-switched and/or packet-switchedcommunications.

The cellular network 113 can support voice and data services over anumber of access technologies such as GSM-GPRS, EDGE, CDMA-1X, UMTS,WiMAX, software defined radio (SDR), and other known and futuretechnologies. The cellular network 113 can be coupled to base stations127 under a frequency-reuse plan for communicating over-the-air withroaming VoIP terminals 116.

FIG. 2 depicts an exemplary embodiment of the wireless communicationdevice 116. The communication device 116 can comprise a wirelesstransceiver 202, a user interface (UI) 204, a power supply 214, and acontroller 206 for managing operations thereof. The transceiver 202 canutilize common technologies to support singly or in combination anynumber of wireless access technologies including without limitationcordless phone technology (e.g., DECT), Bluetooth™, Wireless Fidelity(WiFi), Worldwide Interoperability for Microwave Access (WiMAX), UltraWide Band (UWB), software defined radio (SDR), and cellular accesstechnologies such as CDMA-1X, W-CDMA/HSDPA, UMTS, GSM/GPRS, TDMA/EDGE,and EVDO. SDR can be utilized for accessing a public or privatecommunication spectrum according to any number of communicationprotocols that can be dynamically downloaded over-the-air to thecommunication device 116. It should be noted also that next generationwireless access technologies can be applied to the present disclosure.

The UI 204 can include a keypad 208 with depressible or touch sensitivenavigation disk and keys for manipulating operations of thecommunication device 116. The UI 204 can further include a display 210such as monochrome or color LCD (Liquid Crystal Display) for conveyingimages to the end user of the communication device 116, and an audiosystem 212 that utilizes common audio technology for conveying andintercepting audible signals of the end user.

The power supply 214 can utilize common power management technologiessuch as replaceable batteries, supply regulation technologies, andcharging system technologies for supplying energy to the components ofthe communication device 116 and to facilitate portable applications. Instationary applications, the power supply 214 can be modified so as toextract energy from a common wall outlet and thereby supply DC power tothe components of the communication device 116. The controller 206 canutilize computing technologies such as a microprocessor and/or digitalsignal processor (DSP) with associated storage memory such a Flash, ROM,RAM, SRAM, DRAM or other like technologies for controlling operations ofthe aforementioned components of the communication device 116. Thememory of the controller 206 can have personalized data stored thereinincluding contact book entries, calendar entries, still pictures, ringtones, wallpapers, music, video recordings, movies and games.

The communication device 116 can also comprise an identity module 216.In one embodiment, the identity module 216 can be removably connectableto the communication device 116 to provide for selective coupling withthe controller 206 of the communication device. The identity module 216can have a memory for storage of various data including an internationalcircuit card identification (ICCID), international mobile subscriberidentity (IMSI), an authentication key (Ki), a local area identity(LAI), a short message service center (SMSC) number, service providername (SPN), service dialing numbers (SDN), and value added service (VAS)applications. The data can also be personalized data including contactbook entries, calendar entries, still pictures (e.g., JPEG or GIFfiles), ring tones (e.g., MIDI files), wallpapers, audio (e.g., MP3files), video recordings (e.g., captured by a camera coupled with thecommunication device 116), movies (e.g., MP4 or WAV files), and games.

In one embodiment, the identity module 216 can be a subscriber identitymodule (SIM) card, a universal subscriber identity module (USIM) card ora removable user identification module (RUIM) card. In anotherembodiment, the identity module 216 can be a Willcom-SIM (W-SIM) cardhaving one or more core components of the mobile communication device116 therein, such as a W-SIM card for a cellular telephone with theradio receiver and transmitter built in the card.

FIG. 3 depicts an exemplary method 300 operating in portions of thecommunication system 100. Method 300 has variants as depicted by thedashed lines. It would be apparent to an artisan with ordinary skill inthe art that other embodiments not depicted in FIG. 3 are possiblewithout departing from the scope of the claims described below.

Method 300 begins with step 302 where a donating communication device116 transmits a data transfer request to the network proxy 122. In step304, the network proxy 122 can establish a secure communication linkwith the donating communication device 116 and with the intendedrecipient of the data, e.g., another communication device. The presentdisclosure also contemplates initially establishing a securecommunication link with the donating communication device 116 andsubsequently establishing a secure communication link with a receivingcommunication device, such as where the receiving communication deviceis temporarily unavailable. The secure communication link can beestablished by various means, such as through use of cryptographicprotocol (e.g., TLS or SSL), as in step 306.

In one embodiment, the donating communication device 116 and theintended recipient of the data can be the same communication device butwith different identity modules 216, such as where a user is keeping thesame cellular phone but upgrading to a new identity module, and desiresto transfer data to the new module. In such an embodiment, a singlesecure communication link can be established by the network proxy 122with the communication device 116, and the donating and receivingidentity modules 216 can be switched out in accordance with the uploadand subsequent download of the data. The downloaded data is not limitedto storage in the receiving identity module but can be stored in eitheror both of the memory of the controller 206 of the receivingcommunication device 116 and the memory of the identity module 216 ofthe receiving device.

Once the secure communication link has been established, the networkproxy 122 can retrieve the data from the donating communication device116, as in step 308. The data can be retrieved from the controller 206of the donating communication device 116 and/or the identity module 216of the donating device. In one embodiment, the donating communicationdevice 116 can upload data to the network proxy 122 from both of itscontroller 206 and identity module 216. In step 310, the network proxy122 can transfer the data to the receiving communication device 116.

The transfer of data can be a complete or partial transfer, as in step312. In one embodiment, the user of the donating communication device116 can select whether to upload to the network proxy 122 all of thedata from the controller 206 and/or identity module 216 of the donatingdevice or to upload only portions thereof. In another embodiment, theuser of the receiving communication device can select whether todownload from the network proxy 122 all of the data from the controller206 and/or identity module 216 of the donating device 116 or to downloadonly portions thereof. In yet another embodiment, network proxy 122 canprovide for the user of the donating communication device 116 todesignate transferable data, and further provide for the user of thereceiving communication device to select from the designatedtransferable data. The present disclosure contemplates the user of thedonating and receiving communication devices 116 being the same ordifferent users. If a partial upload and/or download is chosen, then instep 314 the data to be transferred can be selected, such as throughscrolling down and highlighting from a list of transferable datadisplayed on one or both of the donating and receiving communicationdevices 116. The present disclosure contemplates other data managementtechniques being utilized, such as merging and overwriting functionsthat can be selected by the user.

In one embodiment, prior to download of the data to the receivingcommunication device 116, the network proxy 122 can determine whetherthe intended recipient of the data is a subscriber of the serviceprovider, as in step 316. If the intended recipient is a subscriber,then the data can be transferred as recited back in step 310. If on theother hand, the intended recipient is not a subscriber, then the datatransfer request can be rejected by the network proxy 122 as in step318.

In another embodiment, the network proxy 122 can determine whether theintended recipient of the data has a right to possess some or all of thedata that is to be transferred, as in step 320. The determination ofrightful possession can be made based upon a number of factors,including the intended recipient being a subscriber to the serviceprovider as recited in step 316, as well as other factors, such as theterms of the service plan purchased from the provider. If the intendedrecipient has a right to possess some or all of the data that is to betransferred, then the data can be transferred as recited back in step310. If on the other hand, the intended recipient does not have such aright, then the data transfer request can be rejected by the networkproxy 122, as recited back in step 318.

In one embodiment, the network proxy 122 can retrieve or otherwisereceive identification information of the intended recipient of thedata, as in step 322. Based at least in part on the identificationinformation of the intended recipient, in step 324, the network proxy122 can identify a subscriber account for the intended recipient. Thesubscriber account can then be used at least in part to verify rightfulpossession by the intended recipient of the data, as recited back instep 320.

In one embodiment, the donating communication device 116 can transmit anidentifier to the network proxy 122, as in step 326. The identifier canthen be used at least in part to verify rightful possession by theintended recipient of the data, as recited back in step 320. In anotherembodiment, the network proxy 122 can verify rightful possession basedupon identification information for both the donating communicationdevice 116 and the receiving communication device, such as through acombination of steps 322-326 described above. In yet another embodiment,the network proxy 122 in step 328 can verify rightful possession byassociating the donating and receiving communication devices 116, suchas by associating the identifier of the donating communication devicewith the receiving communication device.

In one embodiment, the network proxy 122 can reformat the uploaded data,as in step 330, such as where a communication device 116 and/or identitymodule 216 has been upgraded, and is operating with a new format ofdata. In another embodiment, after the transfer of data is completed instep 310, the receiving communication device 116 can transmit anacknowledgement of receipt and successful download of the data, as instep 332. In yet another embodiment, after the transfer of data iscompleted in step 310, the network proxy 122 can implement the removalof the data from the donating communication device 116 and/or theidentity module 216 of the donating device. In another embodiment, afterthe transfer of data is completed in step 310, the donatingcommunication device 116 and/or the identity module 216 of the donatingdevice can be disabled to prevent further use.

The disablement of the donating communication device 116 and/or theidentity module 216 of the donating device can be done after the networkproxy 122 receives acknowledgement of receipt and successful download ofthe data, such as through an instruction transmitted from the networkproxy. Where the data transfer has occurred between different identitymodules 216 of the same communication device 116, the donating identitymodule alone can be disabled, such as through an instruction from thenetwork proxy 122. In one embodiment, after the transfer of data iscompleted in step 310, the receiving communication device 116 canrequest a data transfer to another or third communication device, as instep 336, which can begin the data transfer process all over again.

The embodiments of method 300 provide a convenient way for end user totransfer data identity modules, communication devices and combinationsthereof. The data transferred can be contact book data, calendar data,and media files such as JPEGs, GIFs, MPEG3, MPEG4, MIDI ringtones,software applications, and so on. Any form of transferable data can beapplied to the present disclosure.

From the foregoing descriptions, it would be evident to an artisan withordinary skill in the art that the aforementioned embodiments can bemodified, reduced, or enhanced without departing from the scope andspirit of the claims described below. For example, the donatingcommunication device 116 can upload its data for transfer to multiplereceiving communication devices. Similarly, multiple donatingcommunication devices 116 can collectively upload their data fortransfer to one or more receiving communication devices. The presentdisclosure contemplates transfer of data from various combinations ofcommunication devices 116 and identity modules 216 through use ofuploading and downloading of the data by network proxy 122. For example,a user can transfer data from a donating communication device to adifferent receiving communication device that can use the same identitymodule 216 or a different identity module. The network proxy 122 canretrieve and transfer other types of data for other types of componentsof the communication device 116, such as GPS data where thecommunication device has a location determination component. These arebut a few examples of the modifications that can be applied to thepresent disclosure without departing from the scope of the claims.Accordingly, the reader is directed to the claims for a fullerunderstanding of the breadth and scope of the present disclosure.

FIG. 4 depicts an exemplary diagrammatic representation of a machine inthe form of a computer system 400 within which a set of instructions,when executed, may cause the machine to perform any one or more of themethodologies discussed above. In some embodiments, the machine operatesas a standalone device. In some embodiments, the machine may beconnected (e.g., using a network) to other machines. In a networkeddeployment, the machine may operate in the capacity of a server or aclient user machine in server-client user network environment, or as apeer machine in a peer-to-peer (or distributed) network environment.

The machine may comprise a server computer, a client user computer, apersonal computer (PC), a tablet PC, a laptop computer, a desktopcomputer, a control system, a network router, switch or bridge, or anymachine capable of executing a set of instructions (sequential orotherwise) that specify actions to be taken by that machine. It will beunderstood that a device of the present disclosure includes broadly anyelectronic device that provides voice, video or data communication.Further, while a single machine is illustrated, the term “machine” shallalso be taken to include any collection of machines that individually orjointly execute a set (or multiple sets) of instructions to perform anyone or more of the methodologies discussed herein.

The computer system 400 may include a processor 402 (e.g., a centralprocessing unit (CPU), a graphics processing unit (GPU, or both), a mainmemory 404 and a static memory 406, which communicate with each othervia a bus 408. The computer system 400 may further include a videodisplay unit 410 (e.g., a liquid crystal display (LCD), a flat panel, asolid state display, or a cathode ray tube (CRT)). The computer system400 may include an input device 412 (e.g., a keyboard), a cursor controldevice 414 (e.g., a mouse), a disk drive unit 416, a signal generationdevice 418 (e.g., a speaker or remote control) and a network interfacedevice 420.

The disk drive unit 416 may include a machine-readable medium 422 onwhich is stored one or more sets of instructions (e.g., software 424)embodying any one or more of the methodologies or functions describedherein, including those methods illustrated above. The instructions 424may also reside, completely or at least partially, within the mainmemory 404, the static memory 406, and/or within the processor 402during execution thereof by the computer system 400. The main memory 404and the processor 402 also may constitute machine-readable media.

Dedicated hardware implementations including, but not limited to,application specific integrated circuits, programmable logic arrays andother hardware devices can likewise be constructed to implement themethods described herein. Applications that may include the apparatusand systems of various embodiments broadly include a variety ofelectronic and computer systems. Some embodiments implement functions intwo or more specific interconnected hardware modules or devices withrelated control and data signals communicated between and through themodules, or as portions of an application-specific integrated circuit.Thus, the example system is applicable to software, firmware, andhardware implementations.

In accordance with various embodiments of the present disclosure, themethods described herein are intended for operation as software programsrunning on a computer processor. Furthermore, software implementationscan include, but not limited to, distributed processing orcomponent/object distributed processing, parallel processing, or virtualmachine processing can also be constructed to implement the methodsdescribed herein.

The present disclosure contemplates a machine readable medium containinginstructions 424, or that which receives and executes instructions 424from a propagated signal so that a device connected to a networkenvironment 426 can send or receive voice, video or data, and tocommunicate over the network 426 using the instructions 424. Theinstructions 424 may further be transmitted or received over a network426 via the network interface device 420.

While the machine-readable medium 422 is shown in an example embodimentto be a single medium, the term “machine-readable medium” should betaken to include a single medium or multiple media (e.g., a centralizedor distributed database, and/or associated caches and servers) thatstore the one or more sets of instructions. The term “machine-readablemedium” shall also be taken to include any medium that is capable ofstoring, encoding or carrying a set of instructions for execution by themachine and that cause the machine to perform any one or more of themethodologies of the present disclosure.

The term “machine-readable medium” shall accordingly be taken toinclude, but not be limited to: solid-state memories such as a memorycard or other package that houses one or more read-only (non-volatile)memories, random access memories, or other re-writable (volatile)memories; magneto-optical or optical medium such as a disk or tape;and/or a digital file attachment to e-mail or other self-containedinformation archive or set of archives is considered a distributionmedium equivalent to a tangible storage medium. Accordingly, thedisclosure is considered to include any one or more of amachine-readable medium or a distribution medium, as listed herein andincluding art-recognized equivalents and successor media, in which thesoftware implementations herein are stored.

Although the present specification describes components and functionsimplemented in the embodiments with reference to particular standardsand protocols, the disclosure is not limited to such standards andprotocols. Each of the standards for Internet and other packet switchednetwork transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) representexamples of the state of the art. Such standards are periodicallysuperseded by faster or more efficient equivalents having essentiallythe same functions. Accordingly, replacement standards and protocolshaving the same functions are considered equivalents.

The illustrations of embodiments described herein are intended toprovide a general understanding of the structure of various embodiments,and they are not intended to serve as a complete description of all theelements and features of apparatus and systems that might make use ofthe structures described herein. Many other embodiments will be apparentto those of skill in the art upon reviewing the above description. Otherembodiments may be utilized and derived therefrom, such that structuraland logical substitutions and changes may be made without departing fromthe scope of this disclosure. Figures are also merely representationaland may not be drawn to scale. Certain proportions thereof may beexaggerated, while others may be minimized. Accordingly, thespecification and drawings are to be regarded in an illustrative ratherthan a restrictive sense.

Such embodiments of the inventive subject matter may be referred toherein, individually and/or collectively, by the term “invention” merelyfor convenience and without intending to voluntarily limit the scope ofthis application to any single invention or inventive concept if morethan one is in fact disclosed. Thus, although specific embodiments havebeen illustrated and described herein, it should be appreciated that anyarrangement calculated to achieve the same purpose may be substitutedfor the specific embodiments shown. This disclosure is intended to coverany and all adaptations or variations of various embodiments.Combinations of the above embodiments, and other embodiments notspecifically described herein, will be apparent to those of skill in theart upon reviewing the above description.

The Abstract of the Disclosure is provided to comply with 37 C.F.R. §1.72(b), requiring an abstract that will allow the reader to quicklyascertain the nature of the technical disclosure. It is submitted withthe understanding that it will not be used to interpret or limit thescope or meaning of the claims. In addition, in the foregoing DetailedDescription, it can be seen that various features are grouped togetherin a single embodiment for the purpose of streamlining the disclosure.This method of disclosure is not to be interpreted as reflecting anintention that the claimed embodiments require more features than areexpressly recited in each claim. Rather, as the following claimsreflect, inventive subject matter lies in less than all features of asingle disclosed embodiment. Thus the following claims are herebyincorporated into the Detailed Description, with each claim standing onits own as a separately claimed subject matter.

What is claimed is:
 1. A device, comprising: a processing systemincluding a processor; and a memory that stores executable instructionsthat, when executed by the processing system, facilitate performance ofoperations, comprising: receiving a request to transfer data stored in afirst identity module of a donating communication device to a secondidentity module of a recipient communication device, wherein therecipient communication device is associated with a subscriber having aservice plan with a service provider; retrieving the data from the firstidentity module; identifying transferable portions of the data;providing a list of the transferable portions to both the donatingcommunication device and the recipient communication device; receiving auser selection to transfer a first portion of the data and a secondportion of the data in the first identity module to the second identitymodule; identifying a media content type of the first portion of thedata as a first media content type and identifying a media content typeof the second portion of the data as a second media content type;determining the recipient communication device has a right to possessthe first portion of the data based on the subscriber associated withthe recipient communication device and based on the service planassociated with the subscriber, wherein the service plan allows thesubscriber to possess media content that is of the first media contenttype; determining the recipient communication device does not have theright to possess the second portion of the data based on the subscriberassociated with the recipient communication device and based on theservice plan associated with the subscriber, wherein the service plandoes not allow the subscriber to possess media content that is of thesecond media content type; converting the first portion of the data froma first format to a second format in response to detecting the recipientcommunication device is a different device type than the donatingcommunication device; determining that a first secure communication linkis established between an intermediary device and the donatingcommunication device and determining that a second secure communicationlink is established between the intermediary device and the recipientcommunication device; and providing the first portion of the data andthe second portion of the data in the first identity module to theintermediary device by way of first secure communication link, whereinthe intermediary device provides the first portion of the data withoutthe second portion of the data to the second identity module of therecipient communication device by way of the second secure communicationlink, wherein the recipient communication device has permission to storethe first portion of the data on the second identity module based on thefirst media content type according to the service plan and the recipientcommunication device does not have permission to store the secondportion of the data on the second identity module based on the secondmedia content type according to the service plan.
 2. The device of claim1, wherein the intermediary device comprises a web server.
 3. The deviceof claim 1, wherein each of the first secure communication link and thesecond secure communication link is established utilizing acryptographic protocol.
 4. The device of claim 1, wherein the firstportion of the data comprises music media content and the first mediacontent type comprises a music media content type, wherein the secondportion of the data comprises movie media content and the second mediacontent type comprises a movie media content type.
 5. The device ofclaim 1, wherein the operations further comprise: receiving an identityof the subscriber of the data; and identifying the service planassociated with the service provider according to the identity of thesubscriber, wherein the providing of the first portion of the data andthe second portion of the data further comprises verifying that thesubscriber has a right to store the first portion of the data accordingto a subscriber account.
 6. The device of claim 1, wherein theoperations further comprise disabling the first identity moduleresponsive to retrieving of the first portion of the data.
 7. The deviceof claim 1, wherein the operations further comprise directing removal ofthe first portion of the data from the first identity module of thedonating communication device.
 8. The device of claim 7, wherein thedirecting of the removal of the first portion of the data from the firstidentity module of the donating communication device comprises directingthe removal of the first portion of the data from the first identitymodule of the donating communication device without disabling the firstidentity module and without disabling the recipient communicationdevice.
 9. A machine-readable storage device comprising executableinstructions that, when executed by a processing system including aprocessor, facilitate performance of operations comprising: receiving arequest to transfer data stored in a first identity module of a donatingcommunication device to a second identity module of a recipientcommunication device, wherein the recipient communication device isassociated with a subscriber having a service plan with a serviceprovider; retrieving the data from the first identity module;identifying transferable portions of the data; providing a list of thetransferable portions to both the donating communication device and therecipient communication device; obtaining a user selection to transfer afirst portion of the data and a second portion of the data in the firstidentity module to the second identity module; identifying a mediacontent type of the first portion of the data as a first media contenttype and identifying a media content type of the second portion of thedata as a second media content type; determining that the recipientcommunication device has a right to store the first portion of the databased on the subscriber associated with the recipient communicationdevice and based on the service plan associated with the subscriber,wherein the service plan allows the subscriber to possess media contentthat is of the first media content type; determining that the recipientcommunication device does not have the right to store the second portionof the data based on the subscriber associated with the recipientcommunication device and based on the service plan associated with thesubscriber, wherein the service plan does not allow the subscriber topossess media content that is of the second media content type;converting the first portion of the data from a first format to a secondformat in response to detecting the recipient communication device is adifferent device type than the donating communication device;determining that a first secure communication link is establishedbetween an intermediary device and the donating communication device anddetermining that a second secure communication link is establishedbetween the intermediary device and the recipient communication device;and providing the first portion of the data and the second portion ofthe data in the first identity module to the intermediary device by wayof first secure communication link, wherein the intermediary deviceprovides the first portion of the data without the second portion of thedata to the second identity module of the recipient communication deviceby way of the second secure communication link, wherein the recipientcommunication device has permission to store the first portion of thedata on the second identity module based on the first media content typeaccording to the service plan and the recipient communication devicedoes not have permission to store the second portion of the data on thesecond identity module based on the second media content type accordingto the service plan.
 10. The machine-readable storage device of claim 9,wherein the intermediary device comprises a web server.
 11. Themachine-readable storage device of claim 9, wherein the first portion ofthe data comprises music media content and the first media content typecomprises a music media content type, wherein the second portion of thedata comprises movie media content and the second media content typecomprises a movie media content type.
 12. The machine-readable storagedevice of claim 9, wherein the operations further comprise: receiving anidentity of the subscriber of the data; and identifying the service planassociated with the service provider according to the identity of thesubscriber, wherein the providing of the first portion of the data andthe second portion of the data further comprises verifying that thesubscriber has the right to store the first portion of the dataaccording to a subscriber account.
 13. The machine-readable storagedevice of claim 9, wherein the operations further comprise disabling thefirst identity module responsive to retrieving of the first portion ofthe data.
 14. The machine-readable storage device of claim 9, whereinthe operations further comprise directing removal of the first portionof the data from the first identity module and the donatingcommunication device.
 15. The machine-readable storage device of claim14, wherein the directing of the removal of the first portion of thedata from the first identity module and the donating communicationdevice comprises directing the removal of the first portion of the datafrom the first identity module and the donating communication devicewithout disabling the first identity module and without disabling therecipient communication device.
 16. A method, comprising: receiving, bya processing system including a processor, a request to transfer datastored in a first identity module of a donating communication device toa second identity module of a recipient communication device, whereinthe recipient communication device is associated with a subscriberhaving a service plan with a service provider; retrieving, by theprocessing system, the data from the first identity module; identifying,by the processing system, transferable portions of the data; providing,by the processing system, a list of the transferable portions to boththe donating communication device and the recipient communicationdevice; obtaining, by the processing system, data from the firstidentity module e, wherein the data comprises a first portion of thedata and a second portion of the data; receiving, by the processingsystem, a user selection to transfer the first portion of the data andthe second portion of the data in the first identity module to thesecond identity module; identifying, by the processing system, a mediacontent type of the first portion of the data as a first media contenttype and identifying a media content type of the second portion of thedata as a second media content type; determining, by the processingsystem, the recipient communication device has a right to possess thefirst portion of the data based on the subscriber associated with therecipient communication device and based on the service plan associatedwith the subscriber, wherein the service plan allows the subscriber topossess media content that is of the first media content type;determining, by the processing system, the recipient communicationdevice does not have the right to possess the second portion of the databased on the subscriber associated with the recipient communicationdevice and based on the service plan associated with the subscriber,wherein the service plan does not allow the subscriber to possess mediacontent that is of the second media content type; converting, by theprocessing system, the first portion of the data from a first format toa second format in response to detecting the recipient communicationdevice is a different device type than the donating communicationdevice; determining, by the processing system, that a first securecommunication link is established between an intermediary device and thedonating communication device and determining that a second securecommunication link is established between the intermediary device andthe recipient communication device; and transmitting, by the processingsystem, the first portion of the data and the second portion of the datain the first identity module to the intermediary device by way of firstsecure communication link, wherein the intermediary device provides thefirst portion of the data without the second portion of the data to thesecond identity module of the recipient communication device by way ofthe second secure communication link, wherein the recipientcommunication device has permission to store the first portion of thedata on the second identity module based on the first media content typeaccording to the service plan and the recipient communication devicedoes not have permission to store the second portion of the data on thesecond identity module based on the second media content type accordingto the service plan.
 17. The method of claim 16, wherein each of thefirst secure communication link and the second secure communication linkis established utilizing a cryptographic protocol.
 18. The method ofclaim 16, wherein the first portion of the data comprises music mediacontent and the first media content type comprises a music media contenttype, wherein the second portion of the data comprises movie mediacontent and the second media content type comprises a movie mediacontent type.
 19. The method of claim 16, comprising: receiving, by theprocessing system, an identity of the subscriber of the data; andidentifying, by the processing system, the service plan associated withthe service provider according to the identity of the subscriber,wherein the transmitting of the first portion of the data and the secondportion of the data further comprises verifying that the subscriber hasa right to store the first portion of the data according to a subscriberaccount.
 20. The method of claim 16, comprising directing, by theprocessing system, removal of the first portion of the data from thefirst identity module and the donating communication device withoutdisabling the first identity module and without disabling the recipientcommunication device.