Method and system for managing subscriber identity modules on wireless networks for machine-to-machine applications

ABSTRACT

A mobile station connected to a wireless network can comprise a subscriber identity module. The subscriber identity module can maintain a list of networks. The list can comprise forbidden public land mobile network data. Software can manage the forbidden public land mobile network data. For example, an applet transmitted to the subscriber identity module can periodically delete entries from the list and/or reset the subscriber identity module on predefined time intervals or when specified events occur.

CROSS REFERENCE TO RELATED APPLICATIONS

This patent application is a continuation application of U.S. patentapplication Ser. No. 13/345,018, now U.S. Pat. No. 8,412,186, filed Jan.6, 2012, which claims priority under 35 U.S.C. §119 to U.S. ProvisionalPatent Application No. 61/430,763, entitled “Method for AutomaticManagement of SIM Resident Forbidden Networks in Unmanned MachineEmbedded Applications” and filed Jan. 7, 2011 in the name of PatrickAidee and Greg Selig, the entire contents of which each are herebyincorporated herein by reference.

FIELD OF THE TECHNOLOGY

The present invention relates generally to managing a subscriberidentity module of a mobile station that is connected to a wirelessnetwork and that may be associated with a machine for machine-to-machinecommunication, and more specifically to automatic or periodic deletionof networks that are marked as forbidden to the subscriber identitymodule.

BACKGROUND

When a wireless telecommunications system mobile station (“MS”) detectsthe presence of signals from a system technically compatible with themobile station, the mobile station will attempt to register or make itspresence known with the system. Industry standard specifications providedetails of a typical registration process, such as the standardsidentified as 3GPP TS 23.122 and 3GPP TS 11.11, which are available fromthe 3^(rd) Generation Partnership Project (“3GPP”), and others.

If the registration is denied, the mobile station will create a dataentry in its subscriber identity module (“SIM”), also known as asubscriber identification module, indicating that the system is aforbidden public land mobile network (“FPLMN”). The mobile system thenuses this entry, in the future, to avoid further registration attemptson such forbidden system(s). As described in the aforementioned industrystandards, the forbidden public land mobile network list, if existing,is deleted when the mobile station is switched off or when thesubscriber identity module is removed, thus permitting another, futureattempt at registration with the formerly forbidden system.

For cell phones and other personal handheld devices, such resetting ofthe forbidden public land mobile network list on device power cyclesoffers advantages as the nature or reason for registration denial isfluid and may change. In other words, in some future registration, themobile station may not be denied. For example, denial would no longer beappropriate if, in the interim, a roaming contract was enacted betweenthe serving system and the mobile system's home system. Accordingly,conventional industry standard operations for dealing with forbiddenpublic land mobile network data are suitable for many portable mobilestations that are subject to frequent power cycling or subscriberidentity module removals, such as in a personal wirelesstelecommunications handset.

However, such conventional approaches can be detrimental for a mobilestation integrated as the communications link for unmanned applicationsthat may involve telemetry, asset tracking, device monitoring and otherapplications generally referred to in the industry's vernacular as “M2M”products, which stands for machine-to-machine. A typical mobile stationused in a machine-to-machine application will not normally encounterfrequent power cycles or subscriber identity module removals.Furthermore, since such machine-to-machine mobile station applicationsare typically unmanned and geographically dispersed, power cycling amobile station in order to flush the forbidden public land mobilenetwork list would typically involve a manned site visit. Such visitscan be expensive and difficult.

Accordingly, conventional approaches that rely on current industrystandards for managing forbidden public land mobile network lists arelargely ill suited to machine-to-machine applications. The field lacksan affordable and efficient method of deleting forbidden public landmobile network data for mobile stations used in a machine-to-machineapplications.

In view of the foregoing discussion of representative deficiency in theart, need is apparent for improved management of subscriber identifymodules. Need exists for autonomous manipulation or deletion offorbidden public land mobile network data of a subscriber identitymodule. Need exists for a technology that can periodically deleteforbidden public land mobile network data of a mobile station. Needexists for a capability to eliminate costly, in-person visits to mobilestations by a technician in order to delete forbidden public land mobilenetwork data. Need exists for an automated capability to load a softwareprogram into a remote mobile station's subscriber identity module of amobile station, for periodically deleting forbidden public land mobilenetwork data of the mobile station. A capability addressing one or moresuch needs, or some related deficiency in the art, would promotemachine-to-machine systems and applications as well as the general fieldof wireless communications.

SUMMARY

The present technology supports managing data stored in memory at amobile station, for example a network list maintained at a subscriberidentity module of the mobile station.

In one aspect of the present invention, a mobile station connected to awireless network can comprise a subscriber identity module. Thesubscriber identity module can maintain data regarding forbidden publicland mobile networks. A computer program loaded on the subscriberidentity module can manage the data. The computer program canperiodically delete part or all of the data. The computer program candetermine deletion times and/or take other actions by tracking thenumber of communications received or observed over the wireless network,where the communications occur with some level of regularity.

The discussion of managing wireless communication systems presented inthis summary is for illustrative purposes only. Various aspects of thepresent invention may be more clearly understood and appreciated from areview of the following detailed description of the disclosedembodiments and by reference to the drawings and the claims that follow.Moreover, other aspects, systems, methods, features, advantages, andobjects of the present invention will become apparent to one withordinary skill in the art upon examination of the following drawings anddetailed description. It is intended that all such aspects, systems,methods, features, advantages, and objects are to be included withinthis description, are to be within the scope of the present invention,and are to be protected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an illustration of an exemplary wireless system supportingmachine-to-machine applications in accordance with certain embodimentsof the present invention.

FIG. 2 is an functional block diagram of an exemplary mobile station inaccordance with certain embodiments of the present invention.

FIG. 3 is a flowchart for an exemplary process for managing a subscriberidentity module in accordance with certain embodiments of the presentinvention.

FIG. 4 is an illustration of exemplary poll interval logic for managinga subscriber identity module in accordance with certain embodiments ofthe present invention.

Many aspects of the invention can be better understood with reference tothe above drawings. The elements and features shown in the drawings arenot to scale, emphasis instead being placed upon clearly illustratingthe principles of exemplary embodiments of the present invention.Moreover, certain dimensions may be exaggerated to help convey suchprinciples visually. In the drawings, reference numerals designate likeor corresponding, but not necessarily identical, elements throughout theseveral views.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

In accordance with certain exemplary embodiments of the presentinvention, a computer-based method or process can manage data maintainedat a subscriber identity module of a mobile station, such as a list offorbidden public land mobile networks stored in memory of a subscriberidentity module. A software module executing on the subscriber identitymodule can implement the method or process. The software module, whichcan take the form of an applet, can be transmitted wirelessly to themobile station, such as over a cellular network.

Certain exemplary embodiments of the present invention supportautomatically clearing one or more forbidden networks from memory in asubscriber identity module of a mobile station. The mobile station canbe part of a network of mobile stations providing communication linksfor unmanned, geographically dispersed applications. Automaticmanagement of forbidden network data in machine-to-machine applicationscan enhance functionality in fluid network environments, for examplereducing costs, improving efficiency, and avoiding many onsitetechnician visits.

Such machine-to-machine applications can comprise two devicescommunicating with one another wirelessly. The communications caninvolve telemetry. For example, sensors can detect or capture events,such as a change in temperature, speed, or some other parameter, andrelay information about such events through a communication,information, or computing network. A hub, gateway, or manager canprocess and/or aggregate event information, for example in connectionwith providing a human interface.

In certain exemplary embodiments of the present invention, a softwareprogram can reside in one or more subscriber identity modules of one ormore mobile stations. The software program can delete forbidden publicland mobile network data of such mobile station or stations periodicallyand/or programmatically. The software program can periodically orautomatically delete one or more networks from a list of networks thatare marked as forbidden to the subscriber identity module. In certainembodiments, the software program can be transferred from a remotelocation into one or more subscriber identity modules of one or moremobile stations. In certain embodiments, the software program comprisesa JAVA software program applet. In certain embodiments, the softwareprogram resets one or more data files located in a subscriber identitymodule. In certain embodiments, the software program resets thesubscriber identity module and/or an associated wireless modem if themobile station has not a successful global system for mobilecommunications (“GSM”) registration within a specified amount of timeafter power up, for example within fifteen minutes or some otherappropriate time. In certain embodiments, the software program restoresone or more data files located in a subscriber identity module of amobile station to a predetermined state when the mobile station failsregistration. In certain embodiments, the software program restores oneor more data files located in a subscriber identity module of a mobilestation to a predetermined state when the mobile station does notsuccessfully register within a predetermined time period. In certainembodiments, the software program restores one or more data fileslocated in a subscriber identity module of a mobile station to apredetermined state at a predetermined time. In certain embodiments, thesoftware program resets a subscriber identity module of a mobile stationperiodically, for example daily or every twenty-four hours or at someother appropriate interval.

Certain exemplary embodiments of the present invention can comprise amethod or process for automatic management of subscriber identity moduleresident forbidden networks in unmanned applications. Certain exemplaryembodiments of the present invention can comprise a method or processfor automatic management of subscriber identity module residentforbidden networks in machine embedded applications.

Technology for managing subscriber identity modules will now bediscussed more fully hereinafter with reference to FIGS. 1-4, whichdescribe representative embodiments of the present invention. In thecontext of a representative operating environment for certainembodiments of the present invention, FIG. 1 describes a representativewireless network comprising a mobile station associated with a machine.The illustrated mobile station can be a machine-to-machine mobilestation. FIG. 2 describes a representative embodiment of the mobilestation that comprises a subscriber identity module. FIGS. 3 and 4describe a representative process for managing the subscriber identitymodule.

The invention can be embodied in many different forms and should not beconstrued as limited to the embodiments set forth herein; rather, theseembodiments are provided so that this disclosure will be thorough andcomplete, and will fully convey the scope of the invention to thosehaving ordinary skill in the art. Furthermore, all “examples” or“exemplary embodiments” given herein are intended to be non-limiting,and among others supported by representations of the present invention.

Turning now to FIG. 1, this figure illustrates a wireless system 100supporting machine-to-machine applications according to certainexemplary embodiments of the present invention. As illustrated, acellular network 175 comprises cell towers 180, 180 b, . . . 180 n thatlink multiple machines 125, 125 b, . . . 125 n to a gateway 190. Thecellular network 175 can comprise a radiotelecommunications network suchas the global system for mobile communications (“GSM”) system or theuniversal mobile telecommunications system (“UMTS”) system, for example.

The machine 125 is illustrated in exemplary form as a tractor. Othermachines that can be supported include road vehicles, sensors, vendingmachines, meters, gauges, pumps, motors, industrial equipment,manufacturing machines, electrical equipment, transformers (that may ormay not have moving parts), generators, and computing equipment, tomention a few representative examples without limitation.

As will be discussed in further detail below, each machine 120 has anassociated mobile station 150 that sends and receives wireless signalsover the cellular network. The gateway 190 can provide an interface tothe machines 125, 125 b, . . . 125 n for connectivity to a managingcomputer-based system that may comprise a human interface.

In certain exemplary embodiments, the wireless system 100 illustrated inFIG. 1 comprises one or more of the technologies disclosed in U.S. Pat.No. 7,936,256, entitled “Method and System for Interacting with aVehicle Over a Mobile Radio Telephone Network” and issued on May 3, 2011in the name of Tomas Murray and Edward R. Jansson. The entire contentsof U.S. Pat. No. 7,936,256 (entitled “Method and System for Interactingwith a Vehicle Over a Mobile Radio Telephone Network” and issued on May3, 2011 in the name of Tomas Murray and Edward R. Jansson) are herebyincorporated herein by reference.

In certain exemplary embodiments, the wireless system 100 illustrated inFIG. 1 of the present application can comprise a cellular-based systemin accordance with the disclosure in U.S. Pat. No. 7,936,256, forexample the cellular-based system that is referenced as “cellular-basedsystem 100” in U.S. Pat. No. 7,936,256 and that is illustrated in theFIG. 1 and described in the specification of U.S. Pat. No. 7,936,256.

In certain exemplary embodiments, the wireless system 100 illustrated inFIG. 1 of the present application can comprise a cellular mobileradiotelephone system in accordance with the disclosure of U.S. Pat. No.7,936,256, for example the cellular mobile radiotelephone system that isreferenced as “CMR system 8” in U.S. Pat. No. 7,936,256 and that isillustrated in the FIGS. 1, 3A, and 3B and described in thespecification of U.S. Pat. No. 7,936,256.

In certain exemplary embodiments, the vehicle 100 illustrated in FIG. 1of the present application can comprise a vehicle in accordance with thedisclosure of U.S. Pat. No. 7,936,256, for example the vehicle that isreferenced as “vehicle 105” in U.S. Pat. No. 7,936,256 and that isillustrated in the FIGS. 1 and 2 and described in the specification ofU.S. Pat. No. 7,936,256.

In certain exemplary embodiments, the gateway 190 illustrated in FIG. 1of the present application can comprise a gateway in accordance with thedisclosure of U.S. Pat. No. 7,936,256, for example the gateway that isreferenced as “communication gateway 135” in U.S. Pat. No. 7,936,256 andthat is illustrated in the FIG. 1 described in the specification andother figures of U.S. Pat. No. 7,936,256.

Turning now to FIG. 2, this figure illustrates a functional blockdiagram of a mobile station 150 according to certain exemplaryembodiments of the present invention. The mobile station 150 illustratedin FIG. 2 exemplifies the mobile station 150 illustrated in FIG. 1 anddiscussed above and will be described in further detail below in thatexemplary context. In the illustrated embodiment, the mobile station 150comprises two logical units, specifically mobile equipment 225 and asubscriber identity module 200.

The mobile equipment 225 comprises the radio components and providesnetwork access through a radio interface, exemplarily embodied as atransceiver 230 and an associated antenna 220, as illustrated. Themobile equipment 225 further comprises computational elements,exemplarily embodied as a microprocessor module 205 and associatedvolatile memory 215 and nonvolatile memory 210. The transceiver 230 andits associated antenna 220 communicate data bidirectionally over thecellular network 175. The transceiver 230 comprises circuitry (notshown) for processing incoming and outgoing wireless signals through thecellular network system 175.

The microprocessor module 205 controls operations and/or telemetry ofthe mobile station 150 based on local sensory information and commandsreceived via cellular network 175. The microprocessor module cancomprise a microprocessor, microcontroller, controller, or othercomputing element that executes instructions or code.

In certain exemplary embodiments, the subscriber identity module 200comprises a small circuit printed on a card that fits within orphysically connects to the mobile equipment 225. In certain exemplaryembodiments, the subscriber identity module 200 can comprise a “SIMcard.”

The term “SIM card,” as used herein, is substantially consistent withtypical industry terminology and generally refers to a small card thatconnects to a mobile station and that stores data regarding asubscriber's identity, such as information about one or more networks.For example, certain SIM cards can comprise an integrated circuit thatsecurely stores an international mobile subscriber identity (“IMSI”) anda related key that identifies and authenticates a subscriber on mobiletelephony devices. While many SIM cards are removable from an associatedmobile station to facilitate transfer to another mobile station, othersmay be permanently attached, for example via soldering.

Certain SIM cards contain a unique serial number known as an integratedcircuit card identifier (“ICCID”), internationally unique number of themobile user (IMSI), security authentication and ciphering information,temporary information related to the local network, a list of accessibleservices, and a password, for example a PIN and a PUK for PIN unlockingSIM cards typically store forbidden public land mobile network data.

In the illustrated embodiment, the subscriber identity module 200comprises a microprocessor module 265 that comprises non-volatile memory260 and volatile memory 255. The non-volatile memory 260 and thevolatile memory 255 can be accessed by the mobile equipment 225 as wellas by a computing element within the subscriber identity module 200,such as a microprocessor or microcontroller.

The subscriber identity module 200 comprises an operating system. Incertain embodiments the operating system is based on proprietary orvendor-specific software, in which case the subscriber identity module200 can be referred to as a native subscriber identity module. Incertain embodiments, the operating system is based on JAVA card, inwhich case the subscriber identity module 200 can be referred to as aJAVA card subscriber identity module. JAVA card is a subset of JAVAprogramming language targeting embedded devices and can be based onstandards. JAVA card facilitates running programs on the subscriberidentity module that are hardware independent and interoperable. “JAVA”is a registered trademark of Oracle Corporation of Redwood Shores,Calif.

As will be discussed in further detail below, the subscriber identitymodule 200 comprises an applet 275 that manages forbidden public landmobile network data. In certain embodiments, the applet 275 is a JAVAapplet. The applet 275 can comprise an associated timer 280 fortriggering time-based actions, such as managing or resetting forbiddenpublic land mobile network data or associated hardware. The applet 275can be stored on a compute readable medium, for example in the volatilememory 255 or the nonvolatile memory 260 of the subscriber identitymodule 200. The applet 275 can be executed by the operating system ofthe subscriber identity module 200.

Either or both of the microprocessor module 205 and the microprocessormodule 265 can comprise a variety of digital circuitry elementsincluding flash memory, random access memory (“RAM”), adigital-to-analog converter (“DAC”), an analog-to-digital converter(“ADC”), and timing circuits. Flash memory can facilitate softwareupgrades or replacements. RAM can support data storage and programexecution.

Either or both of the microprocessor module 205 and the microprocessormodule 265 can further comprise various types of memory such as any oneor combination of volatile memory elements (e.g., forms of RAM such asDRAM, EPROM, EEPROM, SRAM, SDRAM, etc.) and nonvolatile memory elements(e.g., ROM, hard drive, tape, CDROM, etc.). Moreover, the memory mayincorporate electronic, magnetic, optical, and/or other types of storagemedia and can have a distributed architecture, where various componentsare situated remote from one another, but can be accessed at the mobilestation 150.

A “computer-readable medium” can be any means that can store,communicate, propagate, or transport a program for use by or inconnection with an instruction execution system, apparatus, or device.The computer readable medium can be, for example but not limited to, anelectronic, magnetic, optical, electromagnetic, infrared, orsemiconductor system, apparatus, device, or propagation medium. Morespecific examples (a nonexhaustive list) of the computer-readable mediumwould include the following: an electrical connection (electronic)having one or more wires, a portable computer diskette (magnetic), a RAM(electronic), a read-only memory (ROM) (electronic), an erasableprogrammable read-only memory (EPROM, EEPROM, or flash memory)(electronic), an optical fiber (optical), and a portable compact discread-only memory (CDROM) (optical). Note that the computer-readablemedium could even be paper or another suitable medium upon which theprogram is printed, as the program can be electronically captured, viafor instance optical scanning of the paper or other medium, thencompiled, interpreted or otherwise processed in a suitable manner ifnecessary, and then stored in a computer memory.

Either or both of the microprocessor module 205 and the microprocessormodule 265 can also comprise logic implemented in hardware with any or acombination of the following technologies, which are each well known inthe art: a discrete logic circuit(s) having logic gates for implementinglogic functions upon data signals, an application specific integratedcircuit (ASIC) having appropriate combinational logic gates, aprogrammable gate array(s) (PGA), a field programmable gate array(FPGA), etc. Further a microcontroller, functioning as a microprocessor,can comprise an integration of such digital logical devices.

Turning now to FIG. 3, this figure illustrates a flowchart for a process300 for managing a subscriber identity module 200 according to certainexemplary embodiments of the present invention. In an exemplaryembodiment, the applet 275 executing on the subscriber identity module200 implements process 300. Accordingly, FIG. 3 can be viewed asproviding an exemplary logic flow of the applet 275.

Certain steps in the process 300 (as well as other processes and methodsdescribed herein) may naturally precede others for the present inventionto function as described. However, the present invention is not limitedto the order of the steps described if such order or sequence does notalter the functionality of the present invention to the extent ofrendering the present invention inoperable or nonsensical. Accordingly,those of skill in the art will appreciate that certain steps may beperformed before or after other steps or in parallel with other stepswithout departing from the scope and spirit of the present invention.

The present invention can include one or multiple computer programsembodying certain functions disclosed herein in text and/or asillustrated in functional block diagrams and flow charts. However, itshould be apparent that there could be many different ways ofimplementing aspects of the present invention in computer programming,and the invention should not be construed as limited to any one set ofcomputer program instructions. Further, a skilled programmer would beable to prepare such computer programs without undue experimentation ordifficulty based on the exemplary functional block diagrams, flowcharts, and associated description in the application text.

Accordingly, disclosure of a particular set of program code instructionsis not considered necessary for an adequate understanding of how to makeand use the present invention. The inventive functionality of certainprogramming aspects of the present invention will be explained in moredetail in the following description in conjunction with FIGS. 3 and 4illustrating representative functions and program flow and processes.

Referring now to FIG. 3, at step 305 of process 300, the timer 280 ofthe applet 275 increments when transmission of a message containinglocation information is detected. Location messages are transmitted onaverage about every 30 seconds, each location message can be used toclock time. In certain embodiments, each location message can comprise astatus command. For example, detection of twenty location messages wouldprovide an indication of a passage of approximately ten minutes of time.

At inquiry step 310, the applet 275 determines whether timer 280 hascounted a sufficient number of location messages to indicate that a dayhas passed. In the exemplary embodiment where the cellular network 175transmits location messages on 30-second intervals, a count of 2880messages indicates that 24 hours have passed.

If inquiry step 310 determines that at least 24 hours have passed, thenthe applet 275 executes step 350, which will be discussed below.

If inquiry step 310 determines that 24 hours have not passed, then theapplet 275 waits until the terminal profile (“TP”) of the SIMapplication toolkit is received at step 315. The TP is a list of SIMapplication toolkit facilities that are supported by the mobileequipment 225. In other terms, the terminal profile indicates if thedevice supports Provide Local Information. If the TP status received bythe applet 275 supports the “Provide Local Information”, the applet 275sends the Provide Location Information proactive command to the mobileequipment 225 in order to retrieve the (MCC/MNC) and service level (NoService, Limited Service and Normal Service) in step 325. If TP has notbeen received, then the applet 275 exits process 315 at step 320. If onthe other hand, TP has been received, then processing proceeds to step325.

At step 325, the applet 275 determines or provides local information,the country code (“MCC”) and the network code (“MNC”). At inquiry step330, the applet 275 determines if the country code and the network codeare valid and if service is normal. If the determination is positive,then process 300 executes step 335 to reset the 15-minute count and thenexits at step 320.

If the applet 275 determines at inquiry step 325 that service is notnormal or that the country code and the network code are invalid, thenprocess 300 proceeds to step 340.

At step 340, the applet 275 increments a 15 minute time counter. Atinquiry step 345, the applet determines whether the 15 minute timecounter is greater than or equal to 30 counts (where each countcorresponds to about 30 seconds). If the determination is negative, thenprocess 300 proceeds to step 320 and exits. If on the other hand, thedetermination is positive, then process 300 proceeds to step 350.Process 300 can branch to step 350 from step 345 or from step 310 asdescribed above.

At step 350, the applet 275 clears the forbidden public land mobilenetwork list (EF FPLMN), clears the network parameters of the lastsuccessful registration (EF LOCI), clears the upper layer in the generalpacket radio service (“GPRS”) network (ER LOCI GPRS, and repopulates thefields (refresh reset). Following execution of step 340 process 300exits at step 320.

Turning now to FIG. 4, this figure illustrates a poll interval logicdiagram for managing a subscriber identity module 200 according tocertain exemplary embodiments of the present invention. FIG. 4illustrates how applying the increment clock step 450 to typical stepsin a GSI registration process provides the subscriber identity module200 with a clocking or timing capability. Accordingly, the subscriberidentity module 200 can take actions at specific times, periodically, oron predetermined intervals without necessarily having a conventionalclock.

Referring now to FIGS. 3 and 4, the applet 275 (which can comprise aJAVA software program) is installed in the subscriber identity module200 that is associated with mobile equipment 225 of the mobile station150. The applet 275 can be downloaded to the subscriber identity module200 over the cellular network 175 from the gateway 190. The applet 275resets certain data files, such as the forbidden public land mobilenetwork data file, located in the subscriber identity module 200 andrefreshes both the subscriber identity module 200 and the mobileequipment 225 each time the mobile station 150 fails registration aswell as on a daily basis. As per the global system for mobilecommunications standards, some reject codes may restrict the subscriberidentity module 200 from registering onto an available global system formobile communications networks until a power cycle occurs. The refreshof the subscriber identity module 200 and the mobile equipment 225 cancomprise such a power cycle. Each reject code can have a differentassociated behavior. Some reject codes may be implicit type rejects thatforce the modem to not try again until the next power cycle (likeillegal mobile station and others). Some reject codes force the modem toretry after a predetermined time or for a predetermined amount number ofattempt, for example.

Via the applet 275, a subscriber identity module 200 resident autonomousmethod resolves issues caused by such network reject codes. The applet275 on the subscriber identity module 200 can determine if the mobileequipment 225 has failed to register for nominally 15 minutes based uponuse of the status command, which is typically expected to be sentapproximately every 30 seconds in accordance with industry standards. Ifthe mobile equipment 225 fails to register to a network for such apredetermined period, the following steps execute:

1. The subscriber identity module 200 autonomously resets data files forforbidden public land mobile networks, the parameters of last successfulregistration, and the upper layer of the general packet radio servicenetwork.

2. The subscriber identity module 200 autonomously requests a refreshproactive command with option reset.

3. The mobile equipment 225 and the subscriber identity module 200reboot.

At a predetermined time, for example once per day, the applet 275 on thesubscriber identity module 200 autonomously triggers a reset of thesubscriber identity module 200 and the mobile equipment 225. Thesubscriber identity module 200 autonomously counts 2880 status commands(24 hr/day×60 min/hr×2 STATUS commands/minute). This count triggers areset as follows:

1. The subscriber identity module 200 autonomously resets data files forforbidden public land mobile networks, the parameters of last successfulregistration, and the upper layer of the general packet radio servicenetwork.

2. The subscriber identity module 200 autonomously requests a refreshproactive command with option reset.

3. The subscriber identity module 200 and the mobile equipment 225reboots.

Technology has been described for managing subscriber identity modulesand for managing forbidden public land mobile network data. From thedescription, it will be appreciated that an embodiment of the presentinvention overcomes the limitations of the prior art. Those skilled inthe art will appreciate that the present invention is not limited to anyspecifically discussed application or implementation and that theembodiments described herein are illustrative and not restrictive. Fromthe description of the exemplary embodiments, equivalents of theelements shown herein will suggest themselves to those skilled in theart, and ways of constructing other embodiments of the present inventionwill appear to practitioners of the art. Therefore, the scope of thepresent invention is to be limited only by the claims that follow.

What is claimed is:
 1. A mobile station for providing a communicationslink for a machine-to-machine (M2M) application, the mobile stationcomprising: mobile equipment comprising: a microprocessor moduleoperative to control operation of telemetry of the mobile station basedon local sensor information and commands received via a cellularnetwork; a transceiver, operatively coupled to the microprocessormodule, operative to process wireless signals incoming from and outgoingto the cellular network; and an antenna, associated with thetransceiver, that conducts the wireless signals; a subscriber identitymodule (SIM); and a computer program loaded on the subscriber identitymodule, the computer program comprising a timer that increments timebased on detecting transmissions of periodic messages containinglocation information, wherein the timer is operative to trigger one ormore time-based actions responsive to the timer determining that apredetermined amount of time has passed by counting the transmissions ofperiodic messages and comparing the count to a threshold number that isgreater than one, the threshold number equating to the predeterminedamount of time according to transmission time interval, wherein thesubscriber identity module comprises forbidden public land mobilenetwork data stored in memory of the subscriber identity module andmanaged by the one or more time-based actions that the timer isoperative to trigger.
 2. The mobile station of claim 1, wherein theperiodic messages comprise status commands.
 3. The mobile station ofclaim 1, wherein the periodic messages are sent approximately every 30seconds, and wherein the predetermined amount of time is approximatelyone day.
 4. The mobile station of claim 1, wherein the periodic messagesare sent on a time interval set in an industry standard, and wherein thethreshold number is not less than
 20. 5. A mobile station for providinga communications link for a machine-to-machine (M2M) application, themobile station comprising: mobile equipment comprising: a microprocessormodule operative to control operations of telemetry of the mobilestation based on local sensor information and commands received via acellular network; a transceiver, operatively coupled to themicroprocessor module, operative to process wireless signals incomingfrom and outgoing to the cellular network; and an antenna, associatedwith the transceiver, that conducts the wireless signals; a subscriberidentity module (SIM); and a computer program loaded on the subscriberidentity module, the computer program comprising a timer that incrementstime based on transmission of periodic messages containing locationinformation, wherein the timer is operative to trigger one or moretime-based actions, wherein the computer program comprises an appletthat clears a forbidden public land mobile network from a forbiddenpublic land mobile network data file when the timer counts apredetermined number of the periodic messages.
 6. A mobile station for amachine-to-machine (M2M) application, comprising: a transceiver that isconfigured to send telemetry data over a cellular network to a gateway;and a subscriber identity module (SIM) comprising instructions for:tracking time from within the subscriber identity module by countingcommunications that carry location information and that are transmittedperiodically over the cellular network; determining if the tracked timehas met a threshold by determining if a predetermined number of thecommunications have been counted, the predetermined number at least two;and if the tracked time has met the threshold, modifying forbiddenpublic land mobile network data stored in memory of the subscriberidentity module.
 7. A mobile station for a machine-to-machine (M2M)application, comprising: a transceiver that is configured to sendtelemetry data over a cellular network to a gateway; and a subscriberidentity module (SIM) comprising instructions for: tracking time fromwithin the subscriber identity module by counting communications thatcarry location information and that are transmitted periodically overthe cellular network; determining if the tracked time has met athreshold by determining if a predetermined number of the communicationshave been counted; and if the tracked time has met the threshold,modifying data stored in the subscriber identity module, whereinmodifying data comprises clearing a forbidden land mobile network from aforbidden public land mobile network data file stored in memory of thesubscriber identity module.
 8. The mobile station of claim 6, whereinmodifying the forbidden public land mobile data comprises automaticallyclearing an entry of a data file stored at the subscriber identitymodule.
 9. The mobile station of claim 6, wherein modifying theforbidden public land mobile data comprises periodically deleting one ormore networks from a list of networks stored in memory of the subscriberidentity module.
 10. The mobile station of claim 6, wherein thetelemetry data comprises local sensor information.
 11. The mobilestation of claim 6, wherein the subscriber identity module comprises anapplet that comprises a timer for triggering time-based actionsaccording to the tracked time.
 12. The mobile station of claim 6,wherein the communications that carry location information and that aretransmitted periodically over the cellular network are transmitted on atime interval of approximately 30 seconds.
 13. The mobile station ofclaim 6, wherein the communications that carry location information andthat are transmitted periodically over the cellular network aretransmitted on a time interval set in accordance with an industrystandard.
 14. A mobile station, comprising: a SIM card comprising anapplet; and a transceiver that is operatively coupled to the SIM card,that provides connectivity to a cellular network via an antenna, andthat is operative to send telemetry information over the cellularnetwork for a machine-to-machine (M2M) application, wherein the appletcomprises a timer that increments time based on detection oftransmission of periodic messages containing location information, thetransmissions occurring on a time interval, and wherein the appletcomprises instructions for changing a data file stored on the SIM cardwhen the timer increments to a predetermined level indicating passage ofa predetermined amount of time that is at least twice the time interval,wherein the data file comprises a forbidden public land mobile networklist, and wherein changing the data file comprises resetting the datafile.
 15. The mobile station of claim 14, wherein the mobile stationcomprises mobile equipment, and wherein the applet further comprisesinstructions for: using the timer to determine if the mobile equipmenthas not registered for a predetermined amount of time; and rebooting themobile equipment if the mobile equipment has not registered for thepredetermined amount of time.
 16. The mobile station of claim 14,wherein each periodic message containing location information comprisesa status command.
 17. The mobile station of claim 14, wherein the timeinterval is set in accordance with an industry standard and thepredetermined amount of time comprises 24 hours.
 18. The mobile stationof claim 14, wherein the telemetry data comprises local sensorinformation.