Portable mobile subscription

ABSTRACT

A network services provider grants a subscription to a user for use of mobile network services to communicate voice, data, and text information with a specific mobile device. Mobile devices store one or more subscriptions, each of which may be activated. An activated subscription stored in the mobile device is now made portable. The user wants to pass the portable subscription from a first mobile device to a second mobile device. The user forms a first communicative relationship between the first mobile device and a second mobile device and receives from the second mobile device identification information associated with the second mobile device. The first mobile device passes the identification information to the network services provider and receives a confirmation. The user forms a second communicative relationship between the first mobile device and the second mobile device, and the second mobile device confirms activation of the portable subscription.

BACKGROUND

1. Technical Field

The present disclosure generally relates to mobile network services andsubscriptions for the services granted by network service providers toindividual users. More particularly, but not exclusively, the presentdisclosure relates to a user being able to pass permission for thesubscribed services between a plurality of devices.

2. Description of the Related Art

Network service providers, otherwise known as mobile network operators(MNO's), manage mobile network infrastructures. The mobile networkinfrastructure permits a user (i.e., a “subscriber”) with a mobiledevice to make voice calls, send and receive data, and pass textmessages to other computing devices. The other computing devices can betelephones, computer servers, mobile devices, handheld devices, tablets,wearables, machine-to-machine devices, Internet of Things (IoT) devices,or other connected devices that receive or otherwise subscribe tonetwork-provided services. In a conventional mobile network system, aone-to-one relationship is created between the network service providerand the particular mobile device owned or otherwise operated by a singlesubscriber.

Generally, a network service provider will provision a subscriberidentity module (SIM) associated with or stored in the memory of aparticular mobile device for operation on its mobile network. Theprovisioning operation entails creating a subscription in the mobiledevice and associating the subscription, in computing hardware operatedby the network service provider, with a set of services contracted forby the subscriber. As used herein, a “subscription” may interchangeablyalso be referred to as a “profile.”

After the mobile device is provisioned, when a user desires to camp ontothe network, the device will attempt to attach to the network by sendingan activation request. In response, the network service provider sendsan authentication challenge to the mobile device, or specifically to theSIM, which uses the challenge and the provisioned credentials to createa unique authentication result. The mobile device sends the uniqueauthentication result back to the network service provider. The networkservice provider locally computes the authentication result to comparethe received result with the calculated result before allowing the userto access the services. If the two results are identical or otherwisevalidated, the mobile device is activated.

Subsequently, when the subscriber desires to use the services, theparticular mobile device will wirelessly transmit its device identifierand additional information from the active subscription to a computingdevice managed by the network service provider. The network serviceprovider's computing device verifies the device identifier, and in somecases additional information, before permitting the particular mobiledevice to access the services. If the particular mobile device isrequesting use (e.g., a voice call, an Internet session, or a textmessage) of a contracted service, then access is granted. If the serviceis not permitted, then access to the service is withheld.

A network service provider may have relationships with hundreds,thousands, or millions of individual users, also known as subscribers.For each subscriber, the network service provider activates asubscription, which is stored in the SIM associated with the mobiledevice or stored in the subscriber's mobile device memory.

When a network service provider determines that services should bedenied or otherwise withheld, for example, if a user has failed to payfor service or lost the particular mobile device, the network serviceprovider will deactivate the subscription associated with the particularmobile device.

All of the subject matter discussed in the Background section is notnecessarily prior art and should not be assumed to be prior art merelyas a result of its discussion in the Background section. Along theselines, any recognition of problems in the prior art discussed in theBackground section or associated with such subject matter should not betreated as prior art unless expressly stated to be prior art. Instead,the discussion of any subject matter in the Background section should betreated as part of the inventor's approach to the particular problem,which in and of itself may also be inventive.

BRIEF SUMMARY

In accordance with some embodiments described herein, a subscriptionattached to a set of mobile network services is transportable from onemobile device to another. In some cases, the subscribed services areonly available on a single mobile device at any one time; in other casesthe subscribed services may be available concurrently on two or moredevices. The subscribed services include one or more of voicecommunications, data communications, such as the Internet and electronicmail, text messaging services, mobile payment services, banking andother financial transaction services, voting services, active/passivesubscriptions of partner/other MNO's, and still other services.

The mobile network provider grants permission to subscribers to accessthe contracted services. The set of permissions is associated with anactivated subscription. It is possible to have multiple activesubscriptions associated with only a single mobile device. In the systemdescribed in the present disclosure, a set of permissions istransportable from one mobile device to one or more other mobiledevices.

A method to share a subscription for mobile network service between afirst mobile device and a second mobile device, the subscriptionassociated with a set of subscriber services provided by a networkservices provider, the subscription activated in the first mobiledevice, may be summarized as including: forming a first communicativerelationship between the first mobile device and the second mobiledevice; wirelessly receiving at the first mobile device from the secondmobile device, identification information associated with the secondmobile device; passing the identification information associated withthe second mobile device and a deactivation request from the firstmobile device to the network services provider; receiving at the firstmobile device a network services provider, confirmation that access tothe subscription will be deactivated; forming a second communicativerelationship between the first mobile device and the second mobiledevice; wirelessly communicating activation information associated withthe second mobile device from the first mobile device to the secondmobile device; and confirming activation of the subscription in thesecond mobile device.

The set of subscriber services may include communication of at least oneof voice information, data, or text messages. The first and secondmobile devices may be in a master slave relationship and the firstmobile device may be a master. The subscription may include informationstored in the first mobile device on a subscriber identity module (SIM)card. The first mobile device may be a smartphone and the second mobiledevice may be at least one of a smart watch, a portable media device, asmart device integrated in a motor vehicle, and a second smartphone. Thefirst communicative relationship and the second communicativerelationship may be formed as near field communication (NFC)communicative relationships. The first communicative relationship andthe second communicative relationship may provide an indication to auser that the subscription is being transferred. The identificationinformation associated with the second mobile device may be at least oneof an integrated circuit card identifier (ICCID), an Internationalmobile subscriber or station identity (IMSI), and a mobile subscriberintegrated services digital network number (MSISDN).

The method to share a subscription for mobile network service between afirst mobile device and a second mobile device, the subscriptionassociated with a set of subscriber services provided by a networkservices provider, the subscription activated in the first mobiledevice, may include: receiving at the first mobile device from thenetwork services provider the activation information associated with thesecond mobile device, wherein the activation information includes atleast one challenge value formed by the network services provider usingat least some of the identification information associated with thesecond mobile device; and passing the challenge value from the firstmobile device to the second mobile device via the second communicativerelationship.

The method to share a subscription for mobile network service between afirst mobile device and a second mobile device, the subscriptionassociated with a set of subscriber services provided by a networkservices provider, the subscription activated in the first mobiledevice, may include: performing an algorithm at the second mobile deviceusing at least some of the activation information associated with thesecond mobile device to produce an authentication result; and passingthe authentication result and an activation request from the secondmobile device to the network services provider.

A mobile network operator (MNO) system may be summarized as including:an MNO communication device, the MNO communication device arranged tocommunicate with a first mobile device and a second mobile devicewherein communicated information includes: a deactivation request fromthe first mobile device, the deactivation request associated withtransfer of a portable subscription from the first mobile device to thesecond mobile device, the portable subscription associated with a set ofsubscriber services provided by the MNO; identification informationassociated with the second mobile device; confirmation information tothe first mobile device indicating that the portable subscription willbe deactivated at the first mobile device; authentication challengeinformation for the second mobile device formed using the identificationinformation associated with the second mobile device; an activationrequest from the second mobile device, the activation request associatedwith transfer of the portable subscription from the first mobile deviceto the second mobile device, the activation request includingauthentication result information from the second mobile device formedusing the authentication challenge information; and confirmationinformation to the second mobile device indicating that the portablesubscription will be activated at the second mobile device.

The identification information associated with the second mobile devicemay be at least one of an integrated circuit card identifier (ICCID), anInternational mobile subscriber or station identity (IMSI), and a mobilesubscriber integrated services digital network number (MSISDN). Thecommunicated information may include confirmation information to thefirst mobile device indicating that the portable subscription will bedeactivated at the first mobile device and activated at the secondmobile device. The communicated information may include datacommunicated from the second mobile device through the MNO system toanother mobile device. After the portable subscription is transferredfrom the first mobile device to the second mobile device, the firstmobile device may be only enabled to access emergency services of theMNO system.

A non-transitory computer-readable storage medium whose stored contentsconfigure a mobile device to perform a method may be summarized asincluding transferring a portable subscription from a first mobiledevice to a second mobile device, the portable subscription associatedwith a set of subscriber services provided by a network servicesprovider, the portable subscription including portability informationstored in a security module of the first mobile device.

The non-transitory computer-readable storage medium whose storedcontents configure the mobile device to perform the method may furtherinclude: forming a first communicative relationship between the firstmobile device and a second mobile device; wirelessly receiving at thefirst mobile device from the second mobile device, identificationinformation associated with the second mobile device; and passing theidentification information associated with the second mobile device to athe network services provider.

The non-transitory computer-readable storage medium whose storedcontents configure the mobile device to perform the method may furtherinclude: forming a second communicative relationship between the firstmobile device and the second mobile device; wirelessly communicatingactivation information associated with the second mobile device from thefirst mobile device to the second mobile device; and confirmingde-activation of the portable subscription in the first mobile device.

The first mobile device may be a smartphone. The security module may bea subscriber identity module (SIM) card.

These features with other objects and advantages which will becomesubsequently apparent reside in the details of construction andoperation as more fully described hereafter and claimed, reference beinghad to the accompanying drawings forming a part hereof.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments are described with referenceto the following drawings, wherein like labels refer to like partsthroughout the various views unless otherwise specified. The sizes andrelative positions of elements in the drawings are not necessarily drawnto scale. For example, the shapes of various elements are selected,enlarged, and positioned to improve drawing legibility. The particularshapes of the elements as drawn have been selected for ease ofrecognition in the drawings. One or more embodiments are describedhereinafter with reference to the accompanying drawings in which:

FIG. 1 illustrates a user and a variety of mobile devices that may beoperated by the user;

FIG. 2 is a subscriber identity module (SIM) embodiment;

FIG. 3 illustrates an embodiment wherein a portable subscription (i.e.,a transportable activated profile) is transferred from one mobile deviceto another; and

FIG. 4 is a flowchart that illustrates an exemplary transfer of anactivated subscription from one mobile device to another mobile device.

DETAILED DESCRIPTION

The disclosure herein describes processes, machines, and articles ofmanufacture that service vast multitudes of users and improve thefunctioning of computing devices and systems where embodiments of thosedevices are operating. When using these devices, mobile networkoperators (MNO), also known as mobile network service providers, can addvalue to their existing offerings by permitting subscribers to transferor share one telephone number amongst a plurality of devices instead oftying a telephone number to only a single device as in conventionalofferings. That is, instead of requiring every mobile device to carryits own unique, activated subscription, the present disclosure describessystems, devices, and methods to share or transfer a single activatedsubscription from one mobile device to another mobile device.

FIG. 1 illustrates a user 100 and a variety of mobile devices that maybe operated by the user. In the illustration, a set of face-wearableglasses 102 with an integrated computing device is shown. Anotherwearable device 104 has a wrist-watch or wrist-wearable form factorhousing with an integrated computing device, though wearable smartdevices may also be formed as bracelets, necklaces, or any other type ofaccessory or clothing. A smartphone 106, a portable media device such asa tablet 108, a motor vehicle dashboard 110 (e.g., car, truck,motorcycle, train, plane, boat, or the like), and an exercise equipmentplatform 112 are also illustrated in FIG. 1 along with an industrialdevice 114. The smart industrial device 114 may also be known as anInternet of Things (IoT) device, and such devices include, but are notlimited to, a factory machine, a utility meter (e.g., gas meter,electricity meter, water meter, or the like), a commercial sign, apublic service device (e.g., light pole, traffic camera, safety device,such as a walk sign or roadway barrier, or any other public servicedevice), or nearly any other industrial device that communicativelysends or receives network data.

In one manner or another, each of the computing devices of FIG. 1 may beoperated by the user or some other subscriber entity in communicationwith one or more mobile network operator (MNO) communication devices 116such as a cell tower, a repeater, an antenna, a base station system(BSS), a mobile switching center (MSC), a gateway MSC (GMSC), a networkswitching subsystem (NSS), an authentication center (AuC), a homelocation register (HLR), a visitor location register (VLR), an equipmentidentity register (EIR), a service control point (SCP), a short messageservice center (SMSC), and other such devices recognized by one of skillin the art and not discussed herein for brevity. Collectively, the MNOcommunication devices 116 provide mobile network services. That is, eachdevice includes some form of wireless communication transceiver capableof communicating through the illustrated mobile network hardwareoperated by a mobile network service provider (i.e., the MNO) with someother communication device.

Depending on their particular need or desired use, the user 100 in FIG.1 may operate one or more of the illustrated devices and other mobiledevices not illustrated. In conventional systems, each of the devices,in order to operate in its intended full-feature configuration, willhave an activated subscription with one or more network serviceproviders. The activated subscription is associated with a particularsubscriber and with a set of mobile network services that the mobilenetwork service provider contractually permits the user to access. Theactivated subscription may also be known as a mobile subscription, asubscription for mobile services, a profile, or some other like term.

In view of the illustrations of FIG. 1, the current inventor hasrecognized that the particular user 100 may desire to access thecontracted mobile network services on a plurality of different devicesat different times. Using today's conventional technology, the user 100could separately subscribe to services for each of the devices.Alternatively, the user 100 may physically transfer a subscriberidentity module (SIM) from one device to another. For example, the user100 may remove a SIM from a smartphone 106 and insert the SIM intotablet 108, exercise equipment 112, a smart automobile device 110, orany other smart device. Alternatively, and as discussed herein, each ofthe computing devices may be improved, along with the life of user 100,if a subscription for mobile network services could be portable andeasily moved from one device to another. Thus, as used herein, aportable subscription encompasses a transfer of permission to accessnetwork services from one mobile device to another mobile device.

The discussion of a portable subscription feature with respect to aconsumer's use of multiple mobile devices represents only one set ofnon-limiting embodiments, and different uses are also contemplated. Forexample, in an Internet of Things (IoT) embodiment, a singlesubscription may be portably transferred to a sequence of smart utilitymeters by service personnel carrying a mobile device to each meter. Asingle subscription may be transferred back and forth from a work-pieceto various industrial machines in a factory embodiment as the work-piecetravels down an assembly line. A subscription may also be transferredbetween mobile devices in other circumstances.

FIG. 2 is a non-limiting subscriber identity module (SIM) embodiment200. The SIM of FIG. 2 is coupled to or otherwise integrated in aparticular mobile device such as one of the devices of FIG. 1. Theactivated subscription includes information that is securely stored inthe SIM, which is associated with the mobile device.

The SIM of FIG. 2 is exemplary only. That is, in some cases, theinformation is stored in a subscriber identity module (SIM) card, but indifferent cases, the information is stored in some other security modulesuch as an embedded memory, a memory in a dongle, a memory connectable(e.g., pluggable) into the mobile device through an interface, or insome other configuration. For simplicity in this disclosure, however,the SIM of FIG. 2 is considered.

SIM 200 in FIG. 2 is embodied as a small, square or rectangular devicehaving one truncated corner, but other form factors are considered. TheSIM 200 has an integrated memory device 202, and in some cases, the SIMcard may also have limited or significant computing functionality. Inthis respect, the SIM 200 of FIG. 2 is illustrated with an optionalprocessor 204 and at least one optional logic module 206. It isrecognized, however, in the alternative or in addition, that processor204 and logic module 206 may be implemented as a processor and logicmodule of the mobile device to which the SIM 200 is associated. Stateddifferently, in some embodiments, a SIM 200 includes one or both of anintegrated processor 204 and an integrated logic module 206. In otherembodiments, computing and logic features of SIM 200 are performed byone or both of an external processor 204 and an external logic module206 (e.g., integrated in the mobile device). In still other embodiments,SIM 200 and the external device may both include processors, logiccircuits, and other features. In this case, the processor 204 and logicmodule 206 of FIG. 2 represent that either processor may perform thecomputing functions associated with SIM 200 and described herein, andeither logic module may perform the logic functions associated with SIM200 and described herein.

The particular shape, electronic pin configuration, and operationalcharacteristics of the SIM 200 are generally governed by one or morestandards such as the Global System for Mobile Communications (GSM)mobile communications standards. As illustrated in FIG. 2, SIM 200includes a mobile device interface 208 having eight pins. The eight pinsinclude a voltage source V_(CC), a reset RST, a clock CLK, first andsecond USB differential pints D+, D−, an input/output I/O, a programmingvoltage source V_(PP), and a ground reference GND. Other interfaces,such as buses, are contemplated. In SIM 200, the mobile device interface208 provides a mechanism by which the SIM 200 may be provisioned,accessed, or otherwise functionally utilized by a mobile device.

Memory 202 includes a plurality of storage cells wherein data associatedwith SIM 200 and an associated mobile device may be stored. The variousstructures of memory 202 illustrated in FIG. 2 are exemplary and areprovided for simplifying the discussion. Many other structures arecontemplated and more or fewer datums may be stored in said structures.

A first memory structure 210 stores SIM-centric information; a secondmemory structure 212 stores user-centric information, and a third memorystructure stores portable subscription-centric (e.g., profile-centric)information. The third memory structure of FIG. 2 is collectivelyillustrated as a plurality of memory structures 214 a, 214 b, 214 c, 214n. In the discussion herein, one of the plurality of third memorystructures 214 a is discussed for simplicity. Nevertheless, it isrecognized that the principles, concepts, and other features discussedwith reference to third memory structure 214 a may be similarly appliedto any number of other third memory structures including third memorystructures 214 b to 214 n.

The first memory structure 210 is illustrated with four fields includingan ICCID field, a PIN field, a PUK field, and a Card Data field.

The integrated circuit card identifier (ICCID) is an internationallyunique identification number for SIM 200. In many cases, the ICCID isalso permanently printed, engraved, or otherwise marked on the body ofthe card when SIM 200 is personalized; sometimes as part of amanufacturing operation and sometimes when the card is distributed by acard issuing entity. The ICCID is defined by the InternationalTelecommunications Union Telecommunications Standardization Sector(ITU-T) as a primary account number. The ICCID is currently a uniquenumber having up to 22 digits, including a single check digit calculatedby a data verification formula such as the Luhn algorithm or anothermodulus 10 algorithm. A PIN is a personal identification number, and aPUK is a personal unblocking code to unlock the PIN if necessary. TheCard Data field may include any number of bytes. Card Data in some casesincludes specific information associating the card with a portablesubscription.

The second memory structure 212 is illustrated with a Contacts field, aPrograms field, a User Data field, and a plurality of other fields. Eachof the fields may be of any size. The amount of memory available on SIM200 may be small or large. Accordingly, in some cases, the second memorystructure 212 is zero bytes long indicating that the user may not storeany contacts, programs, or other data on SIM 200. In other cases, thesecond memory structure 212 is many thousands or millions of bytes longindicating that the user may store hundreds or thousands of contacts,many software programs executable by processor 204, and a large quantityof user data. In some cases, the User Data field or other fields of thesecond memory structure 212 includes specific information associatedwith a portable subscription.

The third memory structure 214 a includes information associated with asubscription (i.e., a profile). Information associated with a pluralityof subscriptions stored respectively in third memory structures 214 a to214 n are illustrated in FIG. 2, but more or fewer may be integrated invarious embodiments.

Exemplary subscription information stored in third memory structure 214a includes an IMSI field, a Key(s) field, a Services field, a Tempfield, and an OSEN field. The third memory structure 214 a also includesSMSC, SPN, SDN, and VAS fields along with fields for one or moreprograms (i.e., Pgm₁, Pgm₂, . . . Pgm_(N)), and optionally Otherinformation.

An International Mobile Subscriber (or Station) Identity (IMSI) fieldrepresents a unique subscription of a particular set of contractedservices or an account with a network service provider (e.g., a mobilenetwork operator (MNO)). Thus, a single IMSI number may be used toidentify a particular subscription.

In a system defined by the International Telecommunications Union (ITU),for example, within 3GPP TS 23.003, Digital cellular telecommunicationssystem (Phase 2+); Universal Mobile Telecommunication System (UMTS);Numbering, addressing and identification (version 12.4.1 Release 12), anIMSI number has up to 15 digits or sub-fields. In other systems, adifferent number of digits may also be implemented. The sub-fields ofthe IMSI include a Mobile Country Code (MCC) value that uniquelyidentifies a country of domicile associated with the subscription, oneor more Mobile Network Codes (MNC) that identify a home public landmobile network (PLMN), and a Mobile Subscriber Identification Number(MSIN) that identifies a mobile subscription within a PLMN. Another IMSIsub-field illustrated in FIG. 2 is a Portability sub-field. In theexemplary embodiment, the Portability sub-field may be used to identifya particular device to which the subscription is attached.

One or more authentication Keys are stored in the third memory structure214 a. In one case, a key is a 128-bit value used to authenticate asubscription within a network. The MNO or an MNO-authorized entity alsostores a copy of the key(s) that are stored in memory 202 of the SIM200. Using such a key, a subscription may be permitted or denied accessto network services. For example, in one case, the mobile devicerequests activation on the MNO network by providing its IMSI number. Thenetwork recognizes the IMSI and sends challenge information to thedevice, which can include a number such as a random number. The mobiledevice uses a Key value stored in the third memory structure 214 a tocreate a result, which is sent back to the MNO. The MNO performs thesame calculation on the challenge number sent to the mobile device usingits copy of the key. If the MNO calculates the same result that wasreturned by the mobile device, the mobile device is authorized to usethe services associated with the subscription. Alternatively, if the MNOcalculates a different result, the mobile device is denied access tonetwork services.

Additional information may also be included in the subscription of thirddata structure 214 a. Services data may represent a set of networkservices that are associated with the subscription and available to themobile device. Roaming, data throughput, data volume, and other servicesmay be included.

Temporary data may be stored when a subscription is activated on aparticular mobile network. In one example, the Temporary data is used bya transceiver of the mobile device to expedite access to particularservices by storing a Local Area Identity (LAI), a current or mostrecent tower ID, location ID, or other “current” information associatedwith access to network services.

An Operator-Specific Emergency Number may be stored in the subscriptionof third data structure 214 a along with other network service providerspecific data such as a Short Message Service Center (SMSC) number, aService Provider Name (SPN), Service Dialing Numbers (SDN), and ValueAdded Service (VAS) applications.

A plurality of SIM-specific programs Pgm₁, Pgm₂, . . . Pgm_(N) may alsobe stored along with Other associated data. In some cases, one or moreof the programs Pgm₁, Pgm₂, . . . Pgm_(N), along with Portability orOther data, are used to implement the subscription portability features.The programs are executed by processor 204.

As discussed with respect to the third data structures 214 a-214 n, theIMSI field is exemplary in that it uniquely represents a subscription ora particular account within a mobile network. It is recognized thatother identifiers may also be used to represent a portable subscription.One other such field that is contemplated is a Mobile SubscriberIntegrated Services Digital Network Number (MSISDN), which is alsodefined in 3GPP TS 23.003, Digital cellular telecommunications system(Phase 2+); Universal Mobile Telecommunication System (UMTS); Numbering,addressing and identification (version 12.4.1 Release 12), and whichalso has up to 15 digits or sub-fields. As defined by the ITU, theMSISDN is formed by several sub-fields including a Country Code (CC), aNational Destination Code (NDC) and a Subscriber Number (SN). Generallyspeaking, the MSISDN is the “telephone number” associated with theparticular subscription stored on SIM 200.

Within the mobile network, the IMSI is used to identify a subscriptionbased on its association with a specific mobile network operator, andthe MSISDN is used to identify a subscription as a mechanism to route amobile telephone call. A user (i.e., a subscriber) becomes a customer ofa mobile network operator by purchasing or otherwise acquiring a SIM 200having stored information associated with the MNO. The subscription isallocated an IMSI and an MSISDN. The IMSI is used to identify thesubscription across the network by the operator, and the MSISDN is thenumber which is used for dialing. In some cases, a single MSISDN isassociated with a single subscription. In other cases, a single MSISDNmay be associated with multiple subscriptions stored in the same memory202 of the same SIM 200. In this way, like the IMSI, the MSISDN may alsobe considered a unique subscription identifier.

As discussed herein, the unique subscription identifier may comprise anIMSI, an MSISDN, or some other value. Both the IMSI and MSISDN are nowdefined by the ITU to have up to 15 digits, though future IMSI andMSISDN values and other values may have different numbers of digits.Currently, the world has about 7 billion people. When current and futuremachine type communication (MTC) is considered within the Internet ofThings (IoT), about 100 smart machines per person or 700,000,000,000subscriptions are contemplated. In this respect, a 15-digit number issufficient to uniquely identify and store all 12-digits of the 700billion machines. Accordingly, even as mobile communications evolve,current and future uses of IMSI numbers, MSISDN numbers, and otherunique subscription identifiers are considered within the presentportable subscription concepts.

As discussed herein, SIM 200 of FIG. 2 is an exemplary case. In othercases, the information that, in whole or in part, comprises an activatedor activatable subscription, is stored in a Universal Integrated CircuitCard (UICC). The UICC, which is not shown for simplicity, may beconsidered a newer generation SIM. The UICC is generally compatible withmobile communication systems that comply with 3G and 4Gtelecommunications standards as well as some non-GSM telecommunicationsstandards. The UICC includes a computing processor, data storage memory,and executable software, which is often embodied in one or moreapplications that run on the computing processor. For example, a USIMapplication provides activated subscription functionality to identifythe subscriber and associated contracted services to the mobile networkservices provider. A UICC is conventionally compatible with UniversalMobile Telecommunications Systems (UMTS), High Speed Packet Access(HSPA) systems, Long Term Evolution (LTE) systems, carrier detectmultiple access (CDMA) systems, and other systems. The UICC may alsoprovide applications for Intelligent SIM (ISIM) to secure mobile accessto multimedia services and other non-telecom applications such as mobilepayment services, financial services, banking services, privatehealthcare services, and the like.

In still other cases, an embedded mobile UICC (eUICC) device or someother logic in the mobile device includes the information andfunctionality to enable a user's activated subscription.

In order to transfer an activated subscription, the activatedsubscription is made portable. That is, a secure software applicationrunning on the mobile device cooperates with secure software running onone or more computing devices of the mobile network service provider topermit the information representing the activated subscription to movefrom one mobile device to another mobile device.

A security module in the mobile device such as SIM 200 includes asubscriber identity module Application Toolkit, also known as a SIMToolkit or, commonly, a STK. The STK is a GSM standard system thatenables the security module to initiate actions, which can be used bymobile network service provider to provide various value-added services.

The STK is represented by one or more processor executable commandsprogrammed into the security module (e.g., the SIM 200), which definehow the security module will interface with devices outside of thesecurity module. The STK can operate independent from the applicationsprocessor and baseband processor of the mobile device where the securitymodule is located. In cases where a security module includes acontactless interface, the STK can also in some cases operate when themobile device has a “dead” battery.

The computer applications of an STK permit the security module toinitiate, manage, control, or otherwise direct mobile networkoperations, security operations, display menus, user input, and stillother operations of the mobile device.

In many cases, the STK is a single application resistant to hackers.Multiple functional “applets” may be included in an STK to provideexpanded utility. In many cases, the STK begins executing when themobile device first powers up. The STK operates in a secure environmentof the security module. As discussed herein, the STK may be stored asCard Data in the first memory structure 210 of SIM 200, stored asPrograms or User Data in the second memory structure 212, or stored asprograms Pgm₁, Pgm₂, . . . Pgm_(N) in the third memory structures 214a-214 n.

FIG. 3 illustrates a first portable subscription transfer embodiment 300wherein a portable subscription (i.e., a transportable activatedprofile) is transferred from one mobile device 302 to another mobiledevice 312. The first mobile device 302 has a security module 304 suchas SIM 200 of FIG. 2. The security module 304 includes a first portablesubscription transfer program 306 and first portable subscriptioninformation 308, which may be stored in the security module 304 asdiscussed with respect to SIM 200 of FIG. 2. Correspondingly, the secondmobile device 312 also has a security module 314 that stores a secondportable subscription transfer program 316 and second portablesubscription information 318, which may be understood as discussed withrespect to SIM 200 of FIG. 2. The first mobile device 302 maybi-directionally communicate with the mobile network service provider310 as represented by first device to MNO communications 324. The secondmobile device 312 may bi-directionally communicate with the mobilenetwork service provider 310 as represented by second device to MNOcommunications 326.

In the first portable subscription transfer embodiment 300, a particularset of instructions is present in the STK to manage the portablesubscription. Also in the embodiment, the mobile devices amongst whichthe portable subscription is transferred have a secure contactlessinterface with an associated transceiver. Considering SIM 200 of FIG. 2,the mobile devices may represent subscription information in memory 202and the contactless interface may be embodied in the logic module 206.

In the first portable subscription transfer embodiment 300 of FIG. 3,the secure contactless interface is illustrated as a near fieldcommunication (NFC) system, but other interfaces are contemplated. Forexample, the secure contactless interface may have underlying radiofrequency identification (RFID) logic, Bluetooth logic, low energyBluetooth (BLe) logic, IEEE 802.11 (WiFi) logic, or some other likeinfrastructure. In some cases, the underlying logic (i.e., circuitry,software, protocols, and the like) conforms to parameters established bya standard setting body. In other cases, the underlying logic conformsto a proprietary interface.

In the first portable subscription transfer embodiment 300 of FIG. 3,the first mobile device 302 has an activated subscription and operatesas a master. The second mobile device 312 where the activatedsubscription will be transferred to operates as a slave. Both the masterand slave devices are executing an STK that is aware of the portabilityof the activated subscription.

In a first act, the master mobile device 302 taps the slave mobiledevice 312. A first communicative relationship 322 is formed. The NFCprotocol detects the tap and recognizes the tap as a possible firstaction to transfer an activated subscription 320. The detection may bebased on the slave mobile device 312 not having an activatedsubscription, or the detection may be based on information transferredto the slave mobile device 312 in the first tap. Alternatively, thedetection may be based on a user input, a mobile network serviceprovider input, or some other circumstance. In embodiments without asecure contactless interface, one or more parts of the activatedsubscription transfer may be guided by user input prompted from adisplayed menu, an audio queue, a tactile signal such as vibration, orsome other prompt signaling a first action to transfer an activatedsubscription 320.

In response to the first act, information about the slave mobile device312 is optionally captured by the master mobile device 302. Theinformation may be sent in an NFC packet as part of the first formedcommunicative relationship. Alternatively, the information may be passedto the master mobile device 302 or entered in the master mobile device302 in another way. The optional information is typically some type of aunique identifier to the slave mobile device 312. The unique identifiermay be an integrated circuit card identifier (ICCID) number, anInternational mobile station equipment identity (IMEI) number, a mobileequipment identifier (MEID) number, an International mobile subscriberidentity (IMSI) number, a mobile subscription identification number(MSIN), a Mobile Station International Subscriber Directory Number(MSISDN), or some other identifier.

After the first act, the STK in the master mobile device 302 may providean output to indicate to the user that an activated subscriptiontransfer process has been initiated. The output can be a displayedmessage, a light source illuminated with a particular pattern, an audiooutput such as a beep, or some other indication.

In a second act, the master mobile device 302 will send a request to themobile network service provider 310. The request includes information todeactivate the activated subscription of the master mobile device 302and information to activate the subscription of the slave mobile device312. The mobile network service provider 310 will respond to the requestof the master mobile device 302.

In some cases, a third act includes the mobile network service provider310 sending an encrypted packet of information back to the master mobiledevice 302. The encrypted packet can only be decrypted by the slavemobile device 312, which has stored in its own associated securitymodule particular keys to decode the packet.

When the encrypted packet arrives at the master mobile device 302, theuser can be alerted. The alert may be a menu or other displayed message,an audio or tactile indication, or some other indication. Alternatively,the user of the master device may merely wait for a short time such as 1second or 10 seconds and proceed with the process.

A fourth act of the process to transfer an activated subscription fromthe master mobile device 302 to the slave mobile device 312 isillustrated in FIG. 3 as another portable subscription transferinitiation event 320 (e.g., device tap) to engage the NFC hardware. Bythis second tap, a second communicative relationship 322 is formedbetween the master and slave devices wherein information can again betransferred between the devices. In cases where a non-NFC interface isemployed such, as WiFi or Bluetooth, the fourth act may be seamless tothe user. That is, the user may not be aware that the fourth act isunderway.

In the fourth act as described herein, the encrypted informationreceived by the master mobile device 302 from the mobile network serviceprovider 310 is transferred to the slave mobile device 312. Upontransfer, the STK on the slave mobile device 312 will decrypt the packetand begin a registration process with the computing devices of themobile network service provider 310. The slave mobile device 312 maycommunicate with the mobile network service provider 310 first or themobile network service provider 310 may communicate with the slavemobile device 312 first. In cooperation with the fourth act, theactivated subscription in the slave mobile device 312 governs access tothe services of the mobile network service provider 310.

According to a fifth act, the mobile network service provider 310 willsend subscription deactivation information to the master mobile device302. After the deactivation information is sent, the master mobiledevice 302 will no longer have an activated subscription, and the mastermobile device 302 will no longer be able to access the mobile networkservices contracted according to the user's subscription. Instead, theset of mobile network services are only available to the slave mobiledevice 312.

The fifth act in the first portable subscription transfer embodiment 300is optional. In many cases, the mobile network service provider 310 willonly permit one mobile device at a time to access mobile networkservices. Alternatively, in some cases, the mobile network serviceprovider 310 will grant or contract a particular user to concurrentlyaccess mobile network services with two or more devices. When a mobilenetwork service provider permits two or more devices to concurrentlymaintain activated subscriptions, user input or some other mechanism maybe employed to determine whether or not the master device remainsactivated.

A particular use case is now described. In the exemplary case, a user100 is taking personal time for vacation, jogging, or some otherpurpose. The user 100 has determined that carrying two or more mobiledevices is uncomfortable, bulky, or otherwise undesirable. On the otherhand, the user 100 would like access to a rich set of mobile networkservices that are available on the user's smartphone 106. The servicesare available because the user has contracted with a mobile networkservice provider 310 and subscribed to a particular set of mobilenetwork services. In the example, the user 100 taps the smartphone 106against a smart watch 104. The smartphone 106 and smart watch 104 bothhave a cooperative wireless interface such as NFC, Bluetooth, WiFi, orsome other interface. Via a series of seamless information exchangesbetween the devices, the activated subscription from the smartphone 106is transferred to the smart watch 104, and the user 100 is free to enjoythe bulk-free, comfortable personal time.

The use case exemplified above with respect to the user 100 transferringa portable subscription from a smartphone 106 to a smart watch 104 isnow described in more detail.

FIG. 4 is a flowchart that illustrates an exemplary transfer of anactivated subscription 400 from a first mobile device 302 to a secondmobile device 312. In the embodiment, the first mobile device 302 has anactivated subscription with a mobile network operator (MNO) such asmobile network service provider 310. Optionally, the second mobiledevice 312 may also have an activated subscription with the MNO. In suchcase, when the first mobile device 302 subscription is transferred tothe second mobile device 312, the previously active subscription of thesecond mobile device 312 may be suspended, deactivated, or unaffected.For example, prior to the transfer, if the second mobile device has anactivated subscription with a different MNO, the different subscriptionmay remain active. As another example, if the activated subscription ofthe first mobile device has different available mobile network servicesfrom the activated subscription of the second mobile device 312, the MNOmay choose to temporarily grant the services available to the firstmobile device to the second mobile device without deactivating orotherwise transferring a subscription.

Turning back to the exemplary transfer of the activated subscription 400of FIG. 4, in a first act 402, the user of a smartphone first mobiledevice 302 opens the application to move the wireless network servicessubscription from the smartphone to the smart watch second mobile device312. A display or another user interface on the smartphone may indicatethe request to move the subscription at 502. The application can beinitiated as typical user application on a smartphone such as withparticular key presses or touch screen actions. Alternatively, theapplication may be initiated in another way. For example, the tapping ofthe smartphone on the watch may engage the NFC interface of bothdevices. A first communicative relationship is formed and a request totransfer data occurs between the first smartphone and the smart watch.Correspondingly, a display or another user interface of the smart watchmay optionally indicate the request to move the subscription at 504.

In a second act 404 of FIG. 4, the smart watch responds to thesmartphone to acknowledge the process of transferring the subscription.Optionally in the acknowledgement, the smart watch may send an ICCID,MSISDN, or some other identifier to the smartphone. The smart watch mayalso send a set of capabilities to the smartphone. The set ofcapabilities may include indicators representative of wireless basebandhardware, data speed, voice communication abilities, user input/outputfunctionality, memory space, codec (encoder/decoder) capabilities, andthe like. The information communicated during the first communicativerelationship of the first and second acts may be encrypted,un-encrypted, or some combination thereof. Upon receipt of theacknowledgement, the first mobile device 302 smartphone may indicate toa user that the subscription transfer is in process at 506 via thesmartphone's user interface.

A third act 406 illustrated in FIG. 4 includes communication between thesmartphone and the mobile network service provider 310. In the third act406, the smartphone sends a request to disassociate the activesubscription of the current security module. Optionally, the request todisassociate may also include a request to attach the activesubscription to the security module of the second mobile device 312smart watch. If the optional request to activate the smart watch is madeby the smartphone to the mobile network service provider, the smartphonewill include some or all of the information gathered from the smartwatch in the second act 404. That is, the request to disassociate theactive subscription will include the unique identifier of the smartwatch and may also include some or all of the capabilities of the smartwatch. In some cases, it is further recognized that the request todisassociate the active subscription of the smartphone may also beoptional because in some cases, the mobile network service provider maypermit two or more devices to concurrently maintain an activatedsubscription.

Upon receiving the disassociation request at 406, the mobile networkservice provider 310 may optionally verify that the smartphone has anactivated subscription and that the request to disassociate was properlyformed at 508. The MNO may also perform other internal acts at 510 suchas verification that the identifier of the smart watch is valid,adjusting accounting information, and the like. The mobile networkservice provider 310 may also verify more or less information.

In a fourth act at 408, the MNO verifies the disassociation of thesmartphone by sending disassociation information back to the smartphone.Optionally, using the unique identifier of the smart watch, the mobilenetwork service provider 310 may also form an encrypted activationpacket directed to the smart watch. The mobile network service provider310 may use the unique identifier as a seed value for the encryption.Alternatively, the mobile network service provider 310 may use otherinformation that was previously gathered about the smart watch, publiclyavailable about the smart watch, or determined in another way. In thesecases, the encrypted activation packet may be sent back to thesmartphone at 408 with the disassociation verification or in a separatepacket. Upon receipt of the disassociation verification, the smartphonemay indicate to a user that the first mobile device 302 is onlyavailable for emergency calls.

A fifth act 410A optionally commences with receipt of the encryptedpacket from the mobile network service provider 310 at the smartphone.The STK of the smartphone will receive and process the message from themobile network service provider 310. In some cases, a message ispresented on the smartphone display requesting the user re-tap thesmartphone to the smart watch at 512. In other cases, some otherindication is provided to the user of the smartphone such as a tactile(e.g., vibration) or audio (e.g., a beep) indication 512. The STK willdirect the smartphone to communicate the encrypted packet to the smartwatch. In a second communicative relationship, the encrypted packet isdelivered to the smart watch at 410A. In cases where the fifth act at410A is not performed, an alternative fifth act 4108 is performed totransfer the protocol. In these cases, the mobile network serviceprovider 310 communicates directly with the second mobile device 312smart watch to transfer information such as a challenge to permittransfer of the subscription to the smart watch. The smart watch mayprovide feedback to a user indicating transfer of the subscription at514.

At 516, the STK operating within the security module of the smart watchbegins activating the subscription by processing the encrypted packetreceived from the smartphone or the MNO. Only the smart watch is capableof decrypting the packet. Upon decryption, the STK of the smart watchwill make changes to permit the activated subscription. A refreshcommand on the smart watch may awaken the baseband radio and begincommunication with the mobile network service provider.

A sixth act 412 is initiated by the smart watch. The smart watchinitiates a network session to complete the process of activating thesubscription. The relationship between the mobile network serviceprovider 310 and the smart watch is established. The MNO will performinternal procedures to confirm association of the smart watch at 518.

An optional seventh act 414 sends a disable packet to the smartphonefirst mobile device 302. At 512, the disable packet is processed and thesmartphone may indicate to a user the transfer of its activesubscription and “emergency only” status.

In an eighth act 416 and ninth act 418 that occur in cooperation withthe sixth act, the mobile network service provider 310 verifies theactivated subscription in the smart watch and enables access to mobilenetwork services in the smart watch such that data transfer may occur.If the optional request to disassociate the smartphone was made at 406,then the mobile network service provider 310 will also deactivate thesubscription or otherwise disable the smartphone's access to the mobilenetwork services.

It is recognized that the process may be terminated at many points. If aparticular act fails to complete, for example, the process may end, andthe activated subscription may not be transferred. In another example,if the mobile network service provider detects a malicious attempt totransfer an activated subscription, the mobile network service providermay disable the activated subscription and prohibit the transfer.

Other optional actions may also be included in a process to transfer anactivated subscription from one mobile device to another mobile device.For example, in one embodiment, the process of transferring theactivated subscription is scheduled. Once initiated, the process willbegin and the transfer will take place at some point in the future.Along these lines, a transfer of an activated subscription may in somecases be temporary. That is, a user may select a time period such as onehour, one week, or some other time frame. After the time period expires,the activated subscription in the slave device may be deactivated. Inanother example, the master device may remain a master device.

That is, within the exemplary use case described herein the mastersmartphone that initiated the transfer of the activated subscription tothe slave smart watch may also initiate the re-transfer or return of theactivated subscription back to the smartphone.

As discussed herein, still other embodiments are contemplated as withinthe scope of a portable subscription transfer between two smart deviceas illustrated in the present figures and described in the presentdisclosures. For example, in one embodiment, one smart device undertakesthe process of transferring a subscription. Referring to FIG. 3, a firstmobile device 302 is a smartphone, and a second mobile device 312 is aglobal positioning system (GPS) tracking device as may be attached to amotor vehicle, a shipping container, or any other type of vehicle ordevice that is desirably tracked. In this case, the first mobile device302 can instantiate an STK via a display or other user input. The STKforms a communicative relationship with a portal application operated orotherwise directed by the mobile network service provider 310. Accessthrough the portal may include entering a username and password, a PIN,or some other secure information thereby verifying to the networkoperator's satisfaction proper authority to transfer a portablesubscription.

Through the STK and portal, the first mobile device 302 and the mobilenetwork service provider 310 cooperate to transfer a subscription. Thefirst mobile device can be manipulated by a user to enter identifyinginformation associated with the GPS tracking device such as an IMSI, anMSISDN, an ICCID, IMEI, or the like via the portal. After thisinformation is input, the mobile network service provider 310 cancooperate with the GPS tracker in a manner previously described totransfer the subscription. In some embodiments, only the same devicethat initially transfers the subscription (i.e., the first mobile device302) is permitted to retrieve or otherwise re-transfer the subscriptionfrom the GPS tracking device. In other cases, a different mechanism canbe used to transfer the subscription from second mobile device 312(i.e., the GPS device), which may have no user interface or only alimited user interface.

In another example, a portable subscription is transferred through theMNO portal without input from any smart device. As discussed herein, ifa user that is remote from either first mobile device 302 or the secondmobile device 312 desires to transfer a portable subscription, the usermay be able to access the mobile network service provider 310 portal viaa different computing device. With proper credentials or otherauthorization, the user may enter information that identifies both thefirst mobile device 302 and the second mobile device 312. After enteringthe information, the mobile network service provider 310 will activateand deactivate the associated subscriptions as described herein. In thistype of an embodiment, a business entity such as a shipping company orsome other entity may be able to efficiently enable communicationsbetween several smart devices without requiring direct provisioning ofeach individual device. In a complimentary way, a mobile network serviceprovider 310 may receive additional revenue from the entity above whateach device may individually generate because the mobile network serviceprovider 310 enables the easy transfer of such subscriptions.

As used herein, the term “module” refers to an electronic circuit, aprocessor (e.g., shared, dedicated, group, single core, multicore, orthe like) and memory operative to execute one or more software orfirmware programs, an application specific integrated circuit (ASIC), acombinational logic circuit, or some other individual or cooperativecoupling of suitable components (either hardware or software) thatprovides the functionally described with respect to the module.

Non-limiting embodiments of computing device are referenced herein butnot described in detail for the sake of brevity and simplicity. Thecomputing devices are understood to include operative hardware found ina conventional computing apparatuses such as one or more centralprocessing units (CPU's), volatile and non-volatile memory, serial andparallel input/output (I/O) circuitry compliant with various standardsand protocols, wired and/or wireless networking circuitry (e.g., acommunications transceiver), and the like.

Along these lines, processor 204 (i.e., a processing unit), as used inthe present disclosure, refers to one or more processing unitsindividually, shared, or in a group, having one or more processing cores(e.g., execution units), including central processing units (CPUs),digital signal processors (DSPs), microprocessors, micro controllers,state machines, and the like that execute instructions.

In the present disclosure, memory 202 may be used in one configurationor another. The memory 202 may be configured to store data. In thealternative or in addition, the memory may be a non-transitory computerreadable medium (CRM) wherein the CRM is configured to storeinstructions executable by a processor. The instructions may be storedindividually or as groups of instructions in files. The files mayinclude functions, services, libraries, and the like. The files mayinclude one or more computer programs or may be part of a largercomputer program. Alternatively or in addition, each file may includedata or other computational support material useful to carry out thecomputing functions of the systems, methods, and apparatus described inthe present disclosure.

Logic module 206 may include a contactless interface such as formed bynear-field communications (NFC) logic, radio frequency identifier (RFID)logic, Bluetooth logic, low energy Bluetooth (BLe) logic, IEEE 802.11(WiFi) logic, or some other electronic infrastructure. In some cases,the underlying logic (i.e., circuitry, software, protocols, and thelike) conforms to parameters established by a standard setting body. Inother cases, the underlying logic conforms to a proprietary interface.In addition, or in the alternative, logic module 206 may form or directother operations in a mobile device such as input/output (I/O) functionsto beep, buzz, vibrate, cause a message, or perform some other userinterface feature.

In the present disclosure the term “mobile device” is used to indicate adevice capable of communicating through a wireless communicationsnetwork such as a cellular mobile device network, a satellite mobiledevice network, or some other mobile device network. It is understoodthat the device capable of such communication may itself be mobile orotherwise portable. Conversely, the device capable of such communicationmay be temporarily or permanently stationary.

The flowchart of FIG. 4 illustrates processes that may be used byembodiments of the devices described herein transferring an activatedsubscription from one mobile device to another mobile device. In thisregard, each described process may represent a module, segment, orportion of software code, which comprises one or more executableinstructions for implementing the specified logical function(s). Itshould also be noted that in some implementations, the functions notedin the process may occur in a different order, may include additionalfunctions, may occur concurrently, and/or may be omitted.

In the foregoing description, certain specific details are set forth inorder to provide a thorough understanding of various disclosedembodiments. However, one skilled in the relevant art will recognizethat embodiments may be practiced without one or more of these specificdetails, or with other methods, components, materials, etc. In otherinstances, well-known structures associated with electronic andcomputing systems including client and server computing systems, as wellas networks, have not been shown or described in detail to avoidunnecessarily obscuring descriptions of the embodiments.

Unless the context requires otherwise, throughout the specification andclaims which follow, the word “comprise” and variations thereof, suchas, “comprises” and “comprising” are to be construed in an open,inclusive sense, e.g., “including, but not limited to.”

Reference throughout this specification to “one embodiment” or “anembodiment” and variations thereof means that a particular feature,structure, or characteristic described in connection with the embodimentis included in at least one embodiment. Thus, the appearances of thephrases “in one embodiment” or “in an embodiment” in various placesthroughout this specification are not necessarily all referring to thesame embodiment. Furthermore, the particular features, structures, orcharacteristics may be combined in any suitable manner in one or moreembodiments.

As used in this specification and the appended claims, the singularforms “a,” “an,” and “the” include plural referents unless the contentclearly dictates otherwise. It should also be noted that the term “or”is generally employed in its sense including “and/or” unless the contentclearly dictates otherwise.

The headings and Abstract of the Disclosure provided herein are forconvenience only and do not interpret the scope or meaning of theembodiments.

The various embodiments described above can be combined to providefurther embodiments.

These and other changes can be made to the embodiments in light of theabove-detailed description. In general, in the following claims, theterms used should not be construed to limit the claims to the specificembodiments disclosed in the specification and the claims, but should beconstrued to include all possible embodiments along with the full scopeof equivalents to which such claims are entitled. Accordingly, theclaims are not limited by the disclosure.

1. A method to share a subscription for mobile network service between afirst mobile device and a second mobile device, the subscriptionassociated with a set of subscriber services provided by a networkservices provider, the subscription activated in the first mobiledevice, the method comprising: forming a first communicativerelationship between the first mobile device and the second mobiledevice; wirelessly receiving at the first mobile device from the secondmobile device, identification information associated with the secondmobile device; passing the identification information associated withthe second mobile device and a deactivation request from the firstmobile device to the network services provider; receiving at the firstmobile device from the network services provider, confirmation thataccess to the subscription will be deactivated; forming a secondcommunicative relationship between the first mobile device and thesecond mobile device; wirelessly communicating activation informationassociated with the second mobile device from the first mobile device tothe second mobile device; and confirming activation of the subscriptionin the second mobile device.
 2. The method of claim 1 wherein the set ofsubscriber services includes communication of at least one of voiceinformation, data, or text messages.
 3. The method of claim 1 whereinthe first and second mobile devices are in a master slave relationshipand the first mobile device is a master.
 4. The method of claim 1wherein the subscription includes information stored in the first mobiledevice on a subscriber identity module (SIM) card.
 5. The method ofclaim 1 wherein the first mobile device is a smartphone and the secondmobile device is at least one of a smart watch, a portable media device,a smart device integrated in a motor vehicle, and a second smartphone.6. The method of claim 1 wherein the first communicative relationshipand the second communicative relationship are formed as near fieldcommunication (NFC) communicative relationships.
 7. The method of claim1 wherein the first communicative relationship and the secondcommunicative relationship provide an indication to a user that thesubscription is being transferred.
 8. The method of claim 1 wherein theidentification information associated with the second mobile device isat least one of an integrated circuit card identifier (ICCID), anInternational mobile subscriber or station identity (IMSI), and a mobilesubscriber integrated services digital network number (MSISDN).
 9. Themethod of claim 1, comprising: receiving at the first mobile device fromthe network services provider the activation information associated withthe second mobile device, wherein the activation information includes atleast one challenge value formed by the network services provider usingat least some of the identification information associated with thesecond mobile device; and passing the challenge value from the firstmobile device to the second mobile device via the second communicativerelationship.
 10. The method of claim 9, comprising: performing analgorithm at the second mobile device using at least some of theactivation information associated with the second mobile device toproduce an authentication result; and passing the authentication resultand an activation request from the second mobile device to the networkservices provider.
 11. A mobile network operator (MNO) system,comprising: an MNO communication device, the MNO communication devicearranged to communicate with a first mobile device and a second mobiledevice wherein communicated information includes: a deactivation requestfrom the first mobile device, the deactivation request associated withtransfer of a portable subscription from the first mobile device to thesecond mobile device, the portable subscription associated with a set ofsubscriber services provided by the MNO; identification informationassociated with the second mobile device; confirmation information tothe first mobile device indicating that the portable subscription willbe deactivated at the first mobile device; authentication challengeinformation for the second mobile device formed using the identificationinformation associated with the second mobile device; an activationrequest from the second mobile device, the activation request associatedwith transfer of the portable subscription from the first mobile deviceto the second mobile device, the activation request includingauthentication result information from the second mobile device formedusing the authentication challenge information; and confirmationinformation to the second mobile device indicating that the portablesubscription will be activated at the second mobile device.
 12. The MNOsystem of claim 11 wherein the identification information associatedwith the second mobile device is at least one of an integrated circuitcard identifier (ICCID), an International mobile subscriber or stationidentity (IMSI), and a mobile subscriber integrated services digitalnetwork number (MSISDN).
 13. The MNO system of claim 11 wherein thecommunicated information includes: confirmation information to the firstmobile device indicating that the portable subscription will bedeactivated at the first mobile device and activated at the secondmobile device.
 14. The MNO system of claim 11 wherein the communicatedinformation includes: data communicated from the second mobile devicethrough the MNO system to another mobile device.
 15. The MNO system ofclaim 11 wherein after the portable subscription is transferred from thefirst mobile device to the second mobile device, the first mobile deviceis only enabled to access emergency services of the MNO system.
 16. Anon-transitory computer-readable storage medium whose stored contentsconfigure a mobile device to perform a method, the method comprising:transferring a portable subscription from a first mobile device to asecond mobile device, the portable subscription associated with a set ofsubscriber services provided by a network services provider, theportable subscription including portability information stored in asecurity module of the first mobile device.
 17. The non-transitorycomputer-readable storage medium according to claim 16 whose storedcontents configure the mobile device to perform the method, the methodfurther comprising: forming a first communicative relationship betweenthe first mobile device and a second mobile device; wirelessly receivingat the first mobile device from the second mobile device, identificationinformation associated with the second mobile device; and passing theidentification information associated with the second mobile device to athe network services provider.
 18. The non-transitory computer-readablestorage medium according to claim 17 whose stored contents configure themobile device to perform the method, the method further comprising:forming a second communicative relationship between the first mobiledevice and the second mobile device; wirelessly communicating activationinformation associated with the second mobile device from the firstmobile device to the second mobile device; and confirming de-activationof the portable subscription in the first mobile device.
 19. Thenon-transitory computer-readable storage medium according to claim 16wherein the first mobile device is a smartphone.
 20. The non-transitorycomputer-readable storage medium according to claim 16 wherein thesecurity module is a subscriber identity module (SIM) card.