Method, apparatus and article to remotely associate wireless communications devices with subscriber identities and/or proxy wireless communications devices

ABSTRACT

Apparatus and methods provide remote access to subscriber identity information and subscriber configuration information stored on one or more subscriber identity modules (SIMs), to allow remote configuration of wireless communications devices. A SIM server provides access to the SIMs, a SIM librarian catalogs the SIMs, and a SIM accounting system tracks and/bills for SIM usage. Apparatus and methods provide remote access to proxy wireless communications devices, allowing such devices to operate as if actually present in the remote locations.

BACKGROUND OF THE INVENTION

[0001] 1. Field of the Invention

[0002] This invention generally relates to wireless communications, forexample, cellular communications.

[0003] 2. Description of the Related Art

[0004] The use of wireless communications is rapidly growing. Wirelesscommunications devices such as cellular phones and wireless personaldigital assistants (“PDA”) are ubiquitous in today's culture. Thesedevices transmit and/or receive audio and/or data wirelessly. Forexample, cellular phones may transmit and receive audio, text messaging,and may even allow access to the Internet. PDAs typically transmitand/or receive electronic mail (“e-mail”) and may provide access to theWorldwide Web (“WWW”). These wireless communications devices aretypically handheld battery powered devices which a user operates usingkeyed entries, stylus strokes, and/or voice activation by way of a userinterface (“UI”). Many wireless communications devices also include adisplay for displaying information and/or a command menu which formspart of the UI. Wireless communications devices also typically includean antenna, a transceiver or a transmitter and receiver, and a processorsuch as a microprocessor, application specific integrated circuit(“ASIC”) and/or digital signal processor (“DSP”) for controllingoperation.

[0005] The wireless communications devices rely on wirelesscommunications service providers for providing subscribed services. Thewireless communications service providers operate wirelesscommunications service provider systems that provide for registration,authentication, location updating, handovers, and call routing. Thewireless communications service provider systems typically employ a HomeLocation Register (“HLR”) and a Visitor Location Register (“VLR”) toprovide call routing and roaming. The HLR contains all of theadministrative information for each subscriber registered with thewireless communications service provider, along with current locationinformation for a wireless communications device currently associatedwith the subscriber. The VLR contains selected administrativeinformation from the HLR which is required for call control and forproviding subscribed services for each wireless communications devicecurrently within a geographical area service by the VLR.

[0006] Many wireless communications devices include computer-readablemedia commonly referred to as a subscriber identity module (“SIM”) thatcontains subscriber related data or information. While the SIM typicallytakes the form of a physically removable device such as a “smartcard” orsimilar article, in certain embodiments the SIM may be permanently fixedin the wireless communications device. The SIM typically includes amicrochip having a microprocessor and persistent memory such as erasableprogrammable read-only memory (“EPROM”). In addition to otherinformation, the SIM may store one or more identifiers that uniquelyidentify a subscriber. Thus, a wireless communications device may beassociated or configured with a subscriber's specific identity andrelated information by physically placing the appropriate SIM into a SIMslot of the wireless communication device.

[0007] While other wireless protocols exist (i.e., TDMA, CDMA), one ofthe most popular of the numerous wireless protocols is the EuropeanGlobal System for Mobile Communications (“GSM”) standard. Under GSM, theSIM stores an identifier commonly known as an International MobileSubscriber Identity (“IMSI”). The IMSI is hardcoded in the SIM and isprotected against change or tampering. The HLR logically relates theIMSI to the telephone number (i.e., Mobile Subscriber ISDN) associatedwith the subscriber, as well as relating the IMSI to the servicessubscribed to by the subscriber. Also under GSM, the SIM stores a secondidentifier in the form of a secret key for subscriber authenticationand/or communications encryption, as discussed below. The SIM may beprotected against unauthorized use by way of a password and/or personalidentity number.

[0008] Under GSM, a separate identifier, commonly known as anInternational Mobile Equipment Identity (“IMEI”), is hardwired orhardcoded into the wireless communications device, and is used touniquely identify the wireless communications device. The IMSI and IMEIare independent, providing personal mobility by allowing a subscriber touse a SIM in a variety of different wireless communications devices atdifferent times.

[0009] In use, the wireless communications service providerauthenticates the subscriber at a start of each call, and alsoauthenticates the subscriber at intervals during the call. The wirelesscommunications service provider system typically relies on the SignalingSystem Number 7 (“SS7”) for signaling between the various functionalentities, such as challenging the wireless communications device with arequest for authorization. As discussed above, each subscriber isassigned an IMSI and a secret key. One copy of the secret key resides onthe SIM and another copy of the secret key resides with the wirelesscommunications service provider in an Authentication Center (“AuC”).During authentication, the AuC challenges the wireless communicationsdevice by generating and transmitting a random number to the wirelesscommunications device as part of an authentication request. The AuC andthe wireless communications device each generate a respective response,commonly referred to as a “signed response” (“SRES”) based on the secretkey and random number using a ciphering algorithm, commonly referred toas “A3”. The wireless communications device transmits the SRES back tothe AuC, which authenticates the subscriber if the SRES generated by thewireless communications device matches the SRES generated by the AuC.The wireless communications device and AuC may also generate a cipheringkey for encrypting communications based on the random number and secretkey using a second ciphering algorithm, commonly referred to as “A8”.

[0010] The wireless communications service provider also verifies astatus of the wireless communications device, for example, at a start ofeach call. The wireless communications service provider maintains anEquipment Identity Register (EIR) which stores a list of all IMEIs onthe service provider's network and a status for each correspondingwireless communications device. Typically, the EIR will employ threelevels of status, a “white-list” status indicating that the wirelesscommunications device is approved to be connected, a “gray-list” statusindicating that the wireless communications device may be connected butthat problems may exist, and a “black-list” status indicating that thewireless communications device may not be connected due to a problem,for example, where the device has been reported stolen or is not of anapproved type for use with the wireless communications service providersystem.

[0011] The SIM may also store additional subscriber related informationsuch as subscriber configuration or customization information, forcustom configuring the wireless communications device to thesubscriber's specific requirements or preferences. For example, thesubscriber configuration information may identify a home service area, alist of frequently called numbers, voice recognition samples, a list ofmost recent calls received and/or placed by the subscriber, anotification setting (e.g., ring or vibrate), a list of short messages,etc.

[0012] Thus, wireless communication devices typically utilizessubscriber identification information such as an IMSI and/or secret key,as well as subscriber configuration information. The subscriberidentification information is hardwired into a chip or card in order toprevent tampering, while the subscriber configuration information istypically soft coded to allow updating. While the SIM may be replaceablein some wireless communications devices, replacement typically requiresthe wireless communications device and the replacement SIM to be in thesame physical location.

[0013] Wireless communications systems and devices may require testingto assure performance. One method of testing is to physically transitportions of the area covered by the wireless communications system whileoperating a wireless communications device. Another approach suggestedin U.S. Pat. Nos. 5,875,398 and 6,230,006 and employs remotely operatedtest platforms which are pre-positioned at a variety of locations in thewireless communications coverage area. The remote test platformstypically include two or more wireless communications devices which maybe controlled by a local or central controller to place and receivecalls in selected coverage areas.

BRIEF SUMMARY OF THE INVENTION

[0014] Remote testing may be limited by the subscriber identificationinformation and/or subscriber configuration information stored in thewireless communications devices at the remote test platforms. Updatingthis information would typically require a visit by a technician. Therequirement that a SIM be physically received in a SIM slot of awireless communications device also requires the ownership of more SIMsthan would be typically be desired during actual testing.

[0015] In one aspect, a system to dynamically associate wirelesscommunications devices with subscriber identities includes a subscriberidentity module bank having a number of positions for respectivelyreceiving subscriber identity modules and a subscriber identity moduleserver having a communications port to receive requests and configuredto dynamically provide subscriber identity information from subscriberidentity modules received in the respective positions, if any, to aremote wireless communications client located remotely from thesubscriber identity module bank in response to the received requests.

[0016] In another aspect, a subscriber identity module server toremotely associate a client wireless communications device withsubscriber identity information includes a processor, a communicationsport to receive requests for subscriber identity modules, thecommunications port coupled to the processor, and at least onecomputer-readable media storing instructions that cause the processor tocause subscriber identity information from the requested subscriberidentity module to be provided to the client wireless communicationsdevice in response to the request, where the client wirelesscommunications device is remote from the subscriber identity moduleserver.

[0017] In another aspect, a subscriber identity module server toremotely associate a remote client wireless communications device withsubscriber identity information includes a processor, a communicationsport to receive requests for a subscriber identity module, thecommunications port coupled to the processor, and at least onecomputer-readable media storing instructions that cause the processor todetermine whether the subscriber identity module server has access tothe requested subscriber identity module and to cause a set ofsubscriber identity information from the requested subscriber identitymodule to be provided to the client wireless communications device ifhas subscriber identity module server has access to the requestedsubscriber identity module.

[0018] In another aspect, a subscriber identity module librarian totrack subscriber identity modules for use in remotely associatingwireless communications devices with subscriber identity informationincludes a processor, a communications port to receive requests forsubscriber identity module address information, the communications portcoupled to the processor, and at least one computer-readable mediastoring a set of address information for each of a number of subscriberidentity modules in a respective position of each at least onesubscriber identity module banks remotely located from the subscriberidentity module librarian, the computer-readable media storingcomputer-readable instructions that cause the processor to providesubscriber identity module address information in response to a requestreceived at the communications port.

[0019] In yet another aspect, accounting system to track usage of aplurality of subscriber identity modules includes a processor, at leastone communications port coupled to each of a number of subscriberidentity module servers to receive subscriber module requestinformation, and at least one computer-readable media havinginstructions that cause the processor to track usage of the subscriberidentity modules by: monitoring usage of the subscriber identity modulesby at least one of a number of tracking entities.

[0020] In yet another aspect, a system to remotely operate wirelesstelecommunications devices includes a first subscriber identity modulebank having a number of positions for receiving a number of subscriberidentity modules and a first subscriber identity module serverassociated with the first subscriber identity module bank and responsiveto requests to provide subscriber identity information from thesubscriber identity modules, if any, received at the positions of theassociated subscriber identity module bank.

[0021] In yet another aspect, system to remotely operate wirelesstelecommunications devices includes a first subscriber identity modulebank having a number of positions for receiving a number of subscriberidentity modules, a first subscriber identity module server associatedwith the first subscriber identity module bank and responsive torequests to provide subscriber identity information from the subscriberidentity modules, if any, received at the positions of the associatedsubscriber identity module bank, and a subscriber identity modulelibrarian having a data structure that defines a set of relationshipsbetween a number of subscriber identity modules identifierscorresponding to respective subscriber identity modules, if any, and anetwork location of the respective subscriber identity module in anetwork.

[0022] In even another aspect, a system to remotely operate wirelesstelecommunications devices includes a first subscriber identity modulebank having a number of positions for receiving a number of subscriberidentity modules, a first subscriber identity module server associatedwith the first subscriber identity module bank and responsive torequests to provide subscriber identity information from the subscriberidentity modules, if any, received at the positions of the associatedsubscriber identity module bank, and a controller having a processorprogrammed to remotely control operation of a number of remote wirelesscommunications clients at respective remote locations with respect tothe controller, by transmitting commands over a communications channelto the remote wireless communications clients where at least one of thecommands includes a subscriber identity module identifier.

[0023] In even another aspect, a system to remotely operate wirelesstelecommunications devices includes a first subscriber identity modulebank having a number of positions for receiving a number of subscriberidentity modules, a first subscriber identity module server associatedwith the first subscriber identity module bank and responsive torequests to provide subscriber identity information from the subscriberidentity modules, if any, received at the positions of the associatedfirst subscriber identity module bank, a second subscriber identitymodule bank having a number of positions for receiving a number ofsubscriber identity modules, and a second subscriber identity moduleserver associated with the second subscriber identity module bank andresponsive to requests to provide subscriber identity information fromthe subscriber identity modules, if any, received at the positions ofthe associated second subscriber identity module bank, wherein each ofthe first and the second subscriber identity servers include arespective computer-readable media storing computer accessible addressinformation for subscriber identity modules received in each of thefirst and the second subscriber identity module banks.

[0024] In yet even another aspect, a method of remotely associating awireless communications device with subscriber identities includesreceiving a first request, determining a first subscriber identitymodule capable of providing a first set of subscriber identityinformation corresponding to the first request, and automaticallyproviding the first set of subscriber identity information from thefirst subscriber identity module to the wireless communications deviceover a communications path where the wireless communications device isremote from the first subscriber identity module.

[0025] In a further aspect, a method to remotely associate a remoteclient wireless communications device with subscriber identityinformation includes receiving a request for a subscriber identitymodule at a first subscriber identity module server, determining whetherthe first subscriber identity module server has access to the requestedsubscriber identity module, and causing a set of subscriber identityinformation from the requested subscriber identity module to be providedto the client wireless communications device if the subscriber identitymodule server has access to the requested subscriber identity module.

[0026] In a further aspect, a method of remotely associating wirelesscommunications client with subscriber identities includes receiving afirst request from a wireless communications client, determining whetherthe received first request includes a sufficient indication ofauthorization, and automatically providing a first set of subscriberidentity information from a first subscriber identity modulecorresponding to the first request to the requesting wirelesscommunications client over a communications path if the received firstrequest includes a sufficient indication of authorization where thewireless communications device is remote from the first subscriberidentity module, and denying access to the first set of subscriberidentity information from the first subscriber identity module to therequesting wireless communications client if the received first requestdoes not include a sufficient indication of authorization.

[0027] In a further aspect, a method to remotely associate a remotewireless communications client with subscriber identity informationincludes receiving a set of subscriber identity information from theremotely located subscriber identity module in response to a requestsfor a subscriber identity module and operating the wirelesscommunications device using the received subscriber identityinformation.

[0028] In yet a further aspect, a method of tracking subscriber identitymodules for use in remotely associating wireless communications deviceswith subscriber identities includes storing a respective set of addressinformation for each of a number of subscriber identity modules,receiving a request for subscriber identity module address information,and providing the set of subscriber identity module address informationin response to the received request.

[0029] In yet a further aspect, a method of tracking subscriber identitymodules for use in remotely associating wireless communications deviceswith subscriber identities includes receiving a subscriber identitymodule request, determining if the requested subscriber identity moduleis available in at least one of a number of associated subscriberidentity module banks, and requesting address information for therequested subscriber identity module from a remote subscriber identitymodule librarian if the requested subscriber identity module is notavailable in at least one of the number of associated subscriberidentity module banks.

[0030] In still a further aspect, a method of accounting in a wirelesscommunications system includes receiving subscriber identity moduleusage information from each of a number of subscriber identity moduleservers and for each of a number of tracking entities, monitoring theusage of each of a number of subscriber identity modules based on thereceived subscriber identity module usage information.

[0031] In still a further aspect, a method to remotely operate wirelesstelecommunications devices includes receiving a request for at least oneof a number of subscriber identity modules and responding to the requestby providing subscriber identity information from the requested one ofthe subscriber identity modules to an at least first wirelesstelecommunications device of a first remote wireless communicationsclient.

[0032] In yet still a further aspect, a method to remotely operatewireless telecommunications devices includes transmitting commands overa communications channel to a remote wireless communications clienthaving at least one wireless communications device where at least one ofthe commands includes a subscriber identity module identifiercorresponding to a subscriber identity module providing subscriberidentity information for use in operating the wireless communicationsdevice and receiving results from the remote wireless communicationsclient in response to execution of the commands.

[0033] In an additional aspect, a method of allocating access tosubscriber identity information includes providing remote access by atracking entity to a plurality of subscriber identity modules over acommunications channel, each of the subscriber identity modules capableof providing a respective set of subscriber identity information andautomatically tracking usage of the subscriber identity modules by thetracking entity.

[0034] In yet an additional aspect, a method of operating a subscriberidentity module server includes receiving a request at a firstsubscriber identity module server for a first subscriber identitymodule, providing subscriber identity information from the firstsubscriber identity module to a remote client communications device ifthe requested first subscriber identity module is accessible by thefirst subscriber identity module server and providing a computerroutable address to the remote client communications device if therequested first subscriber identity module not accessible by the firstsubscriber identity module server and is accessible by a secondsubscriber identity module server for which the first subscriberidentity module server stores address information.

[0035] In yet a further additional aspect, a method of remotelyassociating a wireless communications device with subscriber identitiesincludes receiving a first request for a subscriber identity,determining a first subscriber identity module corresponding to thesubscriber identity of the first request, and exclusively allocating thedetermined first subscriber identity module to a wireless communicationsdevice.

[0036] In even a further aspect, a remote access system to remotelyaccess wireless communications devices includes a wirelesscommunications device rack having a number of positions for respectivelyreceiving proxy wireless communications devices, and a wireless deviceserver having a communications port to receive a request for remoteaccess to a proxy wireless communications device and configured toprovide a communications link with at least one of the proxy wirelesscommunications devices received in the respective positions of thewireless communications rack, if any, to a controlling wirelesscommunications device located remotely from the wireless communicationsrack in response to the received request for remote access to a proxywireless communications device.

[0037] In still even a further aspect, a method of providing remoteaccess to proxy wireless communications devices by controlling wirelesscommunications devices includes receiving a first request for remoteaccess to a proxy wireless communications device, determining a firstproxy wireless communications device corresponding to the first requestfor remote access to the proxy wireless communications device, andautomatically linking the first proxy wireless communications device toa first controlling wireless communications device over a communicationspath where the first controlling wireless communications device isremote from the first proxy wireless communications device in responseto the first request for remote access to a proxy wirelesscommunications device.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

[0038] In the drawings, identical reference numbers identify similarelements or acts. The sizes and relative positions of elements in thedrawings are not necessarily drawn to scale. For example, the shapes ofvarious elements and angles are not drawn to scale, and some of theseelements are arbitrarily enlarged and positioned to improve drawinglegibility. Further, the particular shapes of the elements, as drawn,are not intended to convey any information regarding the actual shape ofthe particular elements, and have been solely selected for ease ofrecognition in the drawings.

[0039]FIG. 1 is a diagramatic view of an exemplary SIM remote accesssystem including a number of SIM servers, associated SIM banks, remotewireless communications clients, a SIM librarian computing system and aSIM accounting computing system operating in a wireless communicationsnetwork environment according to one illustrated embodiment of theinvention.

[0040]FIG. 2 is a schematic diagram of a computing system which may beconfigured as a local or central controller computing system, a SIMserver, a SIM librarian computing system or SIM accounting computingsystem of the SIM remote access system of FIG. 1.

[0041]FIG. 3 is a schematic diagram of a SIM bank.

[0042]FIG. 4 is a schematic diagram of a remote wireless communicationsclient in the form of a remote test platform having a pair of wirelesscommunications devices.

[0043]FIG. 5 a logical diagram of the SIM server and SIM bank of FIG. 1.

[0044]FIG. 6 is a logical diagram of the remote communications client ofFIG. 1, the remote communications client taking the form of a remotetest platform having two remote wireless communications devices.

[0045]FIG. 7 is a logical diagram of the SIM librarian computing systemof the wireless communications system of FIG. 1.

[0046]FIG. 8 is a flow diagram of an illustrated method of operating ofthe remote wireless communications client FIG. 1.

[0047]FIGS. 9A and 9B are a flow diagram of an illustrated method ofoperating the SIM server of FIG. 1.

[0048]FIG. 9C is a flow diagram of an illustrated method of exclusivelyassociating a requested SIM with a remote wireless communications clientin accordance with the method of operating the SIM server illustrated inFIGS. 9A and 9B.

[0049]FIG. 9D is a flow diagram of an illustrated method of passing achallenge and response between wireless communications client and a SIMin accordance with the method of exclusively associating a requested SIMwith a remote wireless communications client illustrated in FIG. 9C.

[0050]FIG. 10 is a flow diagram of an illustrated method of operatingthe SIM librarian of FIG. 1 to provide SIM location information.

[0051]FIG. 11 is a flow diagram of an illustrated method of operating ofthe SIM librarian computing system of FIG. 1 to maintain SIMlocation/identification information.

[0052]FIG. 12 is a schematic diagram of a data structure for storing SIMlocation/identification information including an number of records eachhaving a number of fields.

[0053]FIGS. 13A and 13B are a flow diagram of an illustrated method ofoperating the SIM accounting computing system of FIG. 1.

[0054]FIG. 14 is a flow diagram of an alternative illustrated method ofoperating the SIM accounting computing system of FIG. 1.

[0055]FIG. 15 is a schematic diagram of a remote wireless device accesssystem in use with the remote SIM access system of FIG. 1, the remotewireless device access system having a rack including a number of proxywireless communications devices.

[0056]FIG. 16 is a schematic diagram of the rack of wirelesscommunications devices for use in the remote wireless communicationsdevice access system of FIG. 15.

[0057]FIG. 17 is a flow diagram of a method of operating the alternativeembodiment of FIG. 15.

[0058]FIG. 18 is a flow diagram of a method of operating the SIM serveremploying caching of response to requests.

[0059]FIG. 19 is a schematic diagram of a remote access system toprovide remote access to communications devices.

DETAILED DESCRIPTION OF THE INVENTION

[0060] In the following description, certain specific details are setforth in order to provide a thorough understanding of variousembodiments of the invention. However, one skilled in the art willunderstand that the invention may be practiced without these details. Inother instances, well-known structures associated with computers,servers, networks, wireless communications devices and systems have notbeen shown or described in detail to avoid unnecessarily obscuringdescriptions of the embodiments of the invention.

[0061] Unless the context requires otherwise, throughout thisspecification and claims which follow, the word “comprise” andvariations thereof, such as, “comprises” and “comprising” are to beconstrued in an open, inclusive sense, that is as “including, but notlimited to.”

[0062] The headings provided herein are for convenience only and do notinterpret the scope or meaning of the claimed invention.

[0063] Wireless Communications Environment Overview

[0064]FIG. 1 shows a communications system 10 including a wirelesscommunications environment such as a cellular network 12.

[0065] The cellular network 12 includes a number of cell sites or basestations, collectively referenced as 14 and individually referenced as14 a-14 d. The cell site or base station 14 typically consists of anantenna tower, transceiver radios (i.e., base transceiver station), andradio controllers (i.e., base station controller). The base stations 14each include a transceiver or transmitter and receiver through whichradio links are established between the cellular network 12 and a numberof wireless communication clients, collectively referenced as 16 andindividually referenced as 16 a-16 d. The area served by each basestation 14 a 14 d is commonly referred to as a cell, collectivelyreferenced as 18 and individually referenced as 18 a-18 d, respectively.The cells 18 can vary in size depending upon terrain, capacity, demands,and other factors. The radio frequency that is assigned to one cell 18can be limited to the boundary of that cell 18 by controlling thetransmission power.

[0066] The cellular network 12 also includes a number of mobiletelephone switching centers (“MSC”), collectively referenced as 20 andindividually referenced as 20 a, 20 b, located at one or more mobiletelephone switching offices (“MTSO”) which route the transmissions.Additionally, the cellular network 12 may include one or more basecellular centers (“BSC”), not shown, coupled between the base stations14 and the MSCs 20, for example, to handle call hand off. Forconvenience, the description will refer only to MSC, although oneskilled in the art will recognize that many of the functions describedas being performed by the MSC may alternatively or additionally beperformed by the BSC.

[0067] The MSC 20 constantly monitors signal strength of both the callerand receiver, locating the next cell site when signal strength fades,and automatically rerouting the communications to maintain thecommunications link. For example, when a wireless communications client16 moves from one cell to another cell (e.g., 18 a to 18 b), a computerat the MSC 20 a monitors the movement, and transfers (i.e., handoff) thephone call from the first base station (e.g., 14 a) to the new basestation (e.g., 14 b) at the appropriate time. The transfer willtypically include switching of radio frequency. The transfer should betransparent to the users. Thus, the MSC 20 acts like a standard PSTN orISDN switching node, and additionally provides mobile subscriber relatedfunctions such as registration, authentication, location updating,handovers and call routing to roaming subscribers.

[0068] As discussed in the background section, the MSC 20 typicallyemploys two databases (e.g., HLR and VLR) for tracking subscribers androuting calls. The MSC 20 typically employs a database (e.g., AuC) forauthenticating subscribers, and a separate database (e.g., EIR) forverifying the equipment. The MSC 20 typically allocates a routing numberto each of the calls that the MSC 20 is switching. While the routingnumber is different than the unique subscriber identifier (e.g., IMSI)and the unique equipment identifier (e.g., IMEI), MTSO may define arelationship between the routing number and the subscriber and/orequipment identifiers associated with each wireless communicationsclient 16. These identifiers allows the MSC 20 to track and coordinateall wireless communications clients 16 in its service area, and alsoallows the MSC 20 to determine the validity of the call and caller.

[0069] The MSC 20 routes calls using the communications network 22,which may include wireless as well as landline communications links.While the cellular network 12 provides wireless communications serviceand landline networks typically provide conventional communicationsservice, such as conventional telephone service, these networks andservices generally overlap. For example, a wireless communications usercan place a call through the cellular network to the landline network toestablish a communications link with a conventional communicationsdevice, such as a telephone. Conversely, a conventional communicationsdevice user can place a call through a landline network to a cellularnetwork to establish a communications link with a wirelesscommunications device such as a cellular phone. Thus, the cellularnetwork 12 including the communications network 22 often includescommunications links that may be considered part of the landlinenetwork, including POTS lines, trunk lines, and optical fiber to name afew.

[0070] SIM Remote Access System

[0071] The communications system 10 also includes a SIM remote accesssystem 24 to provide remote access to information stored on SIMs. TheSIM remote access system 24 includes a number of SIM servers,collectively referenced as 26 and individually referenced as 26 a-26 e,and a number of SIM banks, collectively referenced as 28 andindividually referenced as 28 a-28 g, for receiving one or more SIMs. Asused throughout this specification and claims, the term SIM refers toany computer—or processor—readable media that stores unique subscriberidentifying information, such as, but not limited to, an IMSI and/orsecret key, and/or that stores subscriber customization or configurationinformation.

[0072] As illustrated, a SIM server 26 b may be associated with one SIMbank 28 b, or a SIM server 26 a may be associated with more than one SIMbank 28 a, 28 f, 28 g. The SIM banks 28 may be housed separately fromthe associated SIM server 26 a, for example, SIM banks 28 a, 28 f, 28 gand SIM server 26 a. Alternatively, the SIM banks 28 may be commonlyhoused with the associated servers 26, for example, SIM banks 28 b-28 dand SIM servers 26 b-26 d, respectively, as illustrated by the brokenline therebetween.

[0073] Also as illustrated in FIG. 1, the SIM servers 26 and SIM banks28 may be logically arranged in groups, identified by broken line boxes30 a-30 c. Each SIM server 26 stores information regarding the SIMsassociated with that SIM server 26. In the illustrated embodiment, eachSIM server 26 in a group 30 also stores information about the SIMsassociated with the other SIM servers 26 in the group 30. Thus, the SIMserver 26 b not only stores information regarding the SIMs in SIM bank28 b, but also stores information regarding the SIMs in the SIM banks 28c, 28 d of the same group 30 b. The stored information may provide aneasy or alternative method of identifying the particular SIM orcharacteristics of the SIM, as explained in detail below.

[0074] The wireless communications clients 16 may access the informationstored or provided by the SIMs through the communications network 22 viathe respective associated SIM servers 26. The remote SIM access system24 may be composed of any one or more of the SIM servers 26 and SIM bank28 in any one or more of the relationships illustrated in FIG. 1 or inother relationships not specifically illustrated.

[0075] The remote SIM access system 24 may include one or morecontrollers, collectively referenced as 32 and individually referencedas 32 a, 32 b, to remotely control one or more wireless communicationsclients 16. The controllers 32 can send commands to the wirelesscommunications clients 16 via the communications network 22, allowingautomatic or manual remote operation of the wireless communicationsclient 16 from one or more local or central locations. The controllers32 may allow real time testing by an operator of remote switches and/orwireless communications. Additionally, or alternatively, the controllers32 may allow automated scheduled testing of remote switches and/orwireless communications. Automated testing may be scheduled, forexample, for non-peak times to limit the loss of valuable cellularcapacity, or may be scheduled during peak times, for example whentesting system performance under peak demand conditions.

[0076] The SIM remote access system 24 may also include a SIM librarian,for example, in the form a SIM librarian computing system 34 to trackthe location of the SIMs in the various SIM banks 28 across a portion orall of the SIM remote access system 24. The SIM librarian system 34 maycommunicate with the SIM servers 26 via the communications network 22,to provide computer-routable address information for various requestedSIMs. The SIM librarian system 34 may also perform queries and/orreceive new and/or updated SIM location information via thecommunications network 22. The SIM librarian computing system 34 may mapa number of human-recognizable identifiers for each of the SIMs torespective computer-routable address information for accessing thesubscriber identity information and/or subscriber configurationinformation stored in the respective SIM. Additionally, or alternativelythe SIM librarian computing system 34 may map SIM characteristics foreach of the SIMs to respective computer-routable address information foraccessing the subscriber identity information and/or subscriberconfiguration information stored or provided by the respective SIM. Suchmappings allow the formulation of simple human-recognizable textsearches or queries to locate corresponding SIMs.

[0077] While illustrated as having one SIM librarian computing system34, some embodiments of the SIM remote access system 24 may include morethan one SIM librarian computing system 34. Having multiple SIMlibrarian computing systems 34 may provide a number of benefits, such asredundancy and faster access time, however multiple SIM librariancomputing systems 34 may produce a number of detriments, such as addedoverhead in time and cost of maintaining redundant information, and thepossibility of inconsistencies between the SIM librarian computingsystems 34.

[0078] The SIM remote access system 24 may also include an accountingsystem such as a SIM accounting computing system 36 to account for SIMusage by one or more billing or tracking entities. The SIM accountingcomputing system 36 may receive SIM usage information from the SIMservers 26 and/or the wireless communications clients 16 via thecommunications network 22, as is explained in detail below.

[0079] The tracking entities may be separate companies or businesses,and/or may be separate divisions within a single company or business.The SIM accounting system computing 36 may allow companies to simplytrack SIM usage, allocate cost for SIM usage in budgeting, and/or evenbill or invoice for actual SIM usage. For example, a division within acompany may own a set of SIMs which the division routinely accesses, butthe division may require occasional use of the SIMs of another division,which can be accounted for using the SIM accounting computing system 36.Additionally, or alternatively, an access providing business entity canown a number of SIMs, and can employ the SIM accounting computing system36 to rent or lease SIM usage to other entities. For example, under onebusiness model the access providing business entity owns a number ofSIMs and provides a number of different wireless communicationsproviders or testing companies with remote access to the SIMs using theSIM accounting computing system 36. In a variation on the businessmodel, the access providing business may also own a number of wirelesscommunications clients located in the field for remote testing. Underthis model, the access providing business may simply provide wirelesscommunications providers with access to the wireless communicationsclients, or may actually perform testing for the wireless communicationsproviders.

[0080]FIG. 1 illustrates a small number of the possible communicationslinks which may be established. For example, the controller 32 a maycause the wireless communications client 16 b in one cell 18 b toestablish a communications link, illustrated by double headed arrow 37,with a wireless communications client 16 a in another cell 18 a. Inanother example, the controller 32 a may cause the wirelesscommunications client 16 c in one cell 18 b to establish a wirelesscommunications link, illustrated by double headed arrows 35, withitself, where the wireless communications client 16 c includes twoseparately addressable wireless communications devices 100 a, 100 b(FIG. 4). In a further example, the controller 32 b may cause thewireless communications client 16 d in one cell 18 d to establish awireless communications link, illustrated by double headed arrow 33,with a wireless communications client 16 e in the same cell 18 d. In yeta further example, the controller 32 a may cause the wirelesscommunications client 16 c in one cell 18 c associated with the one MSC20 a to establish a wireless communications link, illustrated by doubleheaded arrow 41, with a wireless communications client 16 d in anothercell 18 d through another MSC 20 b. Other variations are of coursepossible, as will be recognized by one skilled in the art with anunderstanding of these teachings.

[0081] Typically, such communications links may be used to testswitching in the cellular network 12. However, such communications linksmay also be used to remotely provide identities and/or configurations tothe wireless communications clients 16. For example, a wireless PDA 16Ain a remote geographic location 18 a may take on a desired set ofproperties associated with a SIM in a locally located SIM bank 28 a.Thus, for example, a successive number of SIMs can be selected such thatthe wireless communications device 16 a is always in a “home callingarea” as it travels from cell 18 a to cell 18 d. Additionally, oralternatively, the wireless client 16 can take on the identity of anydesired wireless communications device, such as a wireless PDA byremotely assigning the appropriate SIM to the wireless communicationsdevice 16.

[0082] System Hardware

[0083]FIG. 2 and the following discussion provide a brief and generaldescription of a suitable computing environment in which embodiments ofthe invention can be implemented, particularly those of FIG. 1. Althoughnot required, embodiments of the invention will be described in thegeneral context of computer-executable instructions, such as programapplication modules, objects or macros being executed by a computer.Those skilled in the relevant art will appreciate that the invention canbe practiced with other computing system configurations, includinghand-held devices, multiprocessor systems, microprocessor-based orprogrammable consumer electronics, personal computers (“PCs”), networkPCs, mini-computers, mainframe computers, and the like. The inventioncan be practiced in distributed computing environments where tasks ormodules are performed by remote processing devices, which are linkedthrough a communications network. In a distributed computingenvironment, program modules may be located in both local and remotememory storage devices.

[0084] The subject matter of FIG. 2 and the following discussion may begenerally or specifically relevant to computing systems suitable for useas any one or more of the SIM servers 26, controllers 32, SIM librariancomputing system 34, and/or SIM accounting computing system 36, ect. Inthe interest of brevity, only significant differences in hardware andoperation of the various computing systems 26, 32, 34, 36 will be setout and discussed separately.

[0085] Referring to FIG. 2, a computing system 39 includes a processingunit 40, a system memory 42, and a system bus 43 that couples varioussystem components including the system memory 42 to the processing unit40. The computing system 39 will at times be referred to in the singularherein, but this is not intended to limit the application of theinvention to a single computing system 39 since in typical embodiments,there will be more than one computing system 39 or other deviceinvolved. The SIM remote access system 24 may employ other computingsystems, such as convention and personal computers, where the size orscale of the system allows. The processing unit 40 may be any logicprocessing unit, such as one or more central processing units (“CPUs”),digital signal processors (“DSPs”), application-specific integratedcircuits (“ASICs”), etc. Unless described otherwise, the constructionand operation of the various blocks shown in FIG. 2 are of conventionaldesign. As a result, such blocks need not be described in further detailherein, as they will be understood by those skilled in the relevant art.

[0086] The system bus 43 can employ any known bus structures orarchitectures, including a memory bus with memory controller, aperipheral bus, and a local bus. The system memory 42 includes read-onlymemory (“ROM”) 44 and random access memory (“RAM”) 46. A basicinput/output system (“BIOS”) 48, which can form part of the ROM 44,contains basic routines that help transfer information between elementswithin the computing system 39, such as during startup.

[0087] The computing system 39 also includes a hard disk drive 50 forreading from and writing to a hard disk 52, and an optical disk drive 54and a magnetic disk drive 56 for reading from and writing to removableoptical disks 58 and magnetic disks 60, respectively. The optical disk58 can be read by a CD-ROM, while the magnetic disk 60 can be a magneticfloppy disk or diskette. The hard disk drive 50, optical disk drive 54and magnetic disk drive 56 communicate with the processing unit 40 viathe bus 43. The hard disk drive 50, optical disk drive 54 and magneticdisk drive 56 may include interfaces or controllers (not shown) coupledbetween such drives and the bus 43, as is known by those skilled in therelevant art. The drives 50, 54 and 56, and their associatedcomputer-readable media, provide non-volatile storage of computerreadable instructions, data structures, program modules and other datafor the computing system 39. Although the depicted computing system 39employs hard disk 52, optical disk 58 and magnetic disk 60, thoseskilled in the relevant art will appreciate that other types ofcomputer-readable media that can store data accessible by a computer maybe employed, such a magnetic cassettes, flash memory cards, digitalvideo disks (“DVD”), Bernoulli cartridges, RAMs, ROMs, smart cards, etc.

[0088] Program modules can be stored in the system memory 42, such as anoperating system 62, one or more application programs 64, other programsor modules 66 and program data 68. The system memory 42 may also includea web client or browser 70 for permitting the computing system 39 toaccess and exchange data with sources such as website of the Internet,corporate Intranets, or other networks as described below, as well asother server applications on server computers such as those furtherdiscussed below. The browser 70 in the depicted embodiment is markuplanguage based, such as hypertext markup language (“HTML”), extensiblemarkup language (“XML”) or wireless markup language (“WML”), andoperates with markup language that use syntactically delimitedcharacters added to the data of a document to represent the structure ofthe document. A number of web clients or browsers are commercialavailable such as Netscape Navigator from America Online and InternetExplorer available from Microsoft, Redmond, Wash.

[0089] While shown in FIG. 2 as being stored in the system memory 42,the operating system 62, application program 64, and otherprograms/modules 66, program data 68 and browser 70 can be stored on thehard disk 52 of the hard disk drive 50, the optical disk 58 of theoptical disk drive 54 and/or the magnetic disk 60 of the magnetic diskdrive 56.

[0090] The computing system 39 can operate in a networked environmentusing logical connections to one or more remote computers, such as thewireless communications clients 16, controllers 32, SIM servers 26, SIMlibrarian computing system 34, and/or SIM accounting computing system36. The computing system 39 is logically connected to one or more othercomputing systems 39 under any known method of permitting computers tocommunicate, such as through a local area network (“LAN”) 72, or a widearea network (“WAN”) including, for example, the Internet 74. Suchnetworking environments are well known including wired and wirelessenterprise-wide computer networks, intranets, extranets, and theInternet. Other embodiments include other types of communicationnetworks such as telecommunications networks, cellular networks, pagingnetworks, and other mobile networks. When used in a LAN networkingenvironment, the computing system 39 is connected to the LAN 72 throughan adapter or network interface 76 (communicative linked to the bus 43).When used in a WAN networking environment, the computing system 39 mayinclude an interface 78 and modem 80 or other device, such as thenetwork interface 76, for establishing communications over theWAN/Internet 74.

[0091] The modem 80 is shown in FIG. 2 as communicatively linked betweenthe interface 78 and the WAN/Internet 74. In a networked environment,program modules, application programs, or data, or portions thereof, canbe stored in the computing system 39 for provision to the networkedcomputers. In one embodiment, the computing system 39 is communicativelylinked through the LAN 72 or WAN/Internet 74 with TCP/IP middle layernetwork protocols; however, other similar network protocol layers areused in other embodiments, such as user datagram protocol (“UDP”). Thoseskilled in the relevant art will readily recognize that the networkconnections shown in FIG. 2 are only some examples of establishingcommunications links between computers, and other links may be used,including wireless links.

[0092] An operator can enter commands and information into the computingsystem 39 through optional input devices, such as a keyboard 82, and apointing device, such as a mouse 84. Other input devices can include amicrophone, joystick, scanner, etc. These and other input devices areconnected to the processing unit 40 through the interface 78, such as aserial port interface that couples to the bus 43, although otherinterfaces, such as a parallel port, a game port, or a wirelessinterface, or a universal serial bus (“USB”) can be used. A monitor 86or other display device is coupled to the bus 43 via a video interface88, such as a video adapter. The computing system 39 can include otheroutput devices, such as speakers, printers, etc.

[0093] The significant differences between the SIM server 26, controllercomputing system 32, SIM librarian computing system 34, and SIMaccounting computing system 36 are typically in the operation of thevarious computing systems 26, 32, 34, 36, as embodied the particularapplication programs, other programs/modules, program data and/oroperating system loaded in the system memory 42, and is discussed indetail below.

[0094]FIG. 3 shows the SIM bank 28, having a number of positions, forexample slots, collectively referenced as 92 and individually referencedas 92 a-92 n, sized and dimensioned for receiving SIMs, collectivelyreferenced as 94 and individually referenced as 94 a-94 n. In FIG. 2,one SIM 94 n is shown removed from the SIM slot 92 n, exposing aninterface 96 for communicatingly coupling to a complementary interfaceon the SIM 94 n. The interface 96 may, for example, take the form of anumber of electrical contacts or optical transceivers aligned tocommunicatingly couple with a complementary interface (not shown) on theSIM 94 n.

[0095] The SIM server 26 and SIM bank 28 can share a common housing asillustrated in FIG. 1 by SIM servers 26 b-26 d and associated SIM banks28 b-28 d. Alternately, the SIM server 26 may be separately housed fromthe respective SIM bank 28 as illustrated in FIG. 1 by SIM servers 26 a,26 e and associated SIM banks 28 a, 28 f, 28 g, and 28 e.

[0096] A universal asynchronous receiver/transceiver (“UART”),collectively referenced as 98 and individually referenced as 98 a-98 n,is associated with each of the SIM slots 92 a-92 n. The UART 98 is adevice, usually in the form of an integrated circuit, that performs theparallel-to-serial conversion of digital data that has been transmitted,for example, from a modem or other serial port, for use by a computer,and which converts parallel to serial, for example, suitable forasynchronous transmission over phone lines. While illustrated as aportion of the SIM bank 28, the UARTs 98 may be housed within the SIMserver 26.

[0097]FIG. 4 shows an example of a remote wireless communications client16 in the form of a remote test platform 16 c including a first and asecond wireless communications device, collectively referenced as 100and individually referenced as 100 a, 100 b. In the illustratedembodiment, the wireless communications devices 100 a, 100 b can takethe form of cellular telephones, with or without their individualhousings, keypads and/or displays, each of the cellular telephonesincluding one or more SIM interfaces 102 a, 102 b, respectively, such aSIM slots, electrical contacts such as pins, optical transceivers orother interfaces. In some embodiments, the SIM interfaces 102 a, 102 bmay be empty, the wireless communications device 100 a, 100 b completelyrelying on remote access to SIMs 94, while in other embodiments one ormore SIM interfaces 102 c may contain a SIM 84 for local access. Thewireless communications devices 100 a, 100 b wirelessly communicate viathe cellular network 12.

[0098] The remote test platform 16 c includes communications switch 104such as an audio switch which can cross-couple an input and outputbetween the two wireless communications devices 100 a, 100 b. Thecommunications switch 104 can also couple audio and data signalsreceived at one or more physical and/or virtual ports 106 a, 106 b byway of, for example, a network 108 such as a landline network, IPnetwork, voice-over-IP network, wireless modem or wireless datacommunications network such as GPRS, 1XRTT to name a few, which may bethe same as, or a portion of, the communications network 22 (FIG. 1).The remote test platform 16 c also includes a processor 110, whichreceives commands and data at a port 112 by way of the network 108. Theprocessor 110 controls the wireless communication devices 100 a, 100 b,as described in detail below. The processor 110 also couples to a bridge114 that includes a controller such as a micro-controller 116, and afield programmable gate array 118. The field programmable gate array 118includes logical insertion UARTs 120 a, 120 b which provide informationfrom the SIM 94, such as subscriber identity information and/orsubscriber configuration information, in a serial stream at respectiveSIM interfaces 102 a, 102 b.

[0099]FIG. 5 is the logical representation of the SIM server 26 and SIMbank 28. SIM server 26 operates according to instructions stored in thesystem memory 42 (FIG. 2), for example, instructions stored as theoperating system 62, application program 64, other programs/modules 66,program data 68 and/or browser 70. While the above description presentsa physical embodiment of the SIM server 26, under the logical embodimenteach process, instance or session spawned by the SIM server computingsystem constitutes a separate “SIM server.” The SIM server 26 ensuresthat power and ground are applied to the various contacts of each of theSIMs 94 in the correct order.

[0100] The SIM server 26 includes a span protocol listener 130 thatmonitors a communications port for requests from the remote wirelesscommunications clients 16. Requests may include requests to associate aSIM 94 with a wireless communications client 16, or requests to transferinformation to and/or from the SIM 94. The SIM server 26 also includes aSIM name resolver 132 that resolves human-recognizable names into acomputer-recognizable name. The SIM server 26 further includes a numberof SIM socket control and span encapsulation threads, collectivelyidentified as 134 and individually identified as 134 a-134 d. Theinstances of SIM socket control and span encapsulation threads providevarious remote wireless communications clients 16 with access to the SIMinformation from the various SIMs 94, such as subscriber identityinformation and/or subscriber configuration information viabi-directional communications.

[0101] The SIM server 26 includes a configuration and control userinterface 136 to handle interactions with the various wirelesscommunications clients 16. The configuration and control user interface136 allows the SIM server 26 to receive requests and to respond to suchrequests with either the requested SIM information or with an addressfor retrieving the requested SIM information.

[0102] The SIM server 26 includes a group protocol manager 138 whichhandles the interaction between SIM servers 26 in a group, such as SIMservers 26 b, 26 c, 26 d of the SIM server group 30 b (FIG. 1). Forexample, the group protocol manager 138 allows the interchange of SIMlocation/identification information between the various SIM servers 26b, 26 c, 26 d of the SIM server group 30 b. Thus, all SIM servers 26 inthe SIM server group 30 have up-to-date information about the SIMs 94 inall of the SIM banks 28 associated with the SIM servers 26 included inthe particular SIM server group 30.

[0103] The SIM server 26 includes a library protocol manager 140 thatcontrols interaction with the SIM librarian computing system 34. Thisallows any one of the SIM servers 26 to locate SIMs 94 in SIM banks 28associated with other SIM servers 26 that are not included within thesame SIM server group 30 as the inquiring SIM server 26.

[0104]FIG. 6 shows a logical representation of the remote wirelesscommunications client 16 in the form of a remote test platform 16 c. Theprocessor 110 provides client entity services 150. The processor 110also provides a span encapsulation engine 152 for handling theinteraction between the processor 110 and the bridge 114, for examplecreating and/or opening envelopes including packets of data such as SIMinformation. The processor 110 employs a transport 154 between theclient entity services 150 and a command interface 156 which may bemanual and/or automated. The command interface 156 interacts with ageneral interface 158 a, 158 b which is a logical function of thewireless communications devices 100 a, 100 b, respectively.

[0105]FIG. 7 shows a logical view of the SIM librarian computing system34 having instructions stored in the system memory 42 for trackingnetwork addresses of particular SIMs 94 and providing the networkaddresses in response to queries. The SIM librarian computing system 34includes a persistent name list storage 160 which may, for example, takethe form of a data structure 338 (FIG. 12) stored in system memory 42.The data structure 338 may include one or more human-recognizable namesfor the SIM 94 (FIG. 3), a network address for the SIM 94 including anaddress of a SIM server 26 (FIG. 1) having access to the SIM bank 28holding the SIM 94. The data structure 338 may further includeadditional information such as geographic location of the SIM 94 and/ora description of the contents of the SIM 94 including SIM informationsuch as the subscriber identification information (e.g., ISMI) and/orsubscriber configuration information, as discussed in detail below withreference to FIG. 12.

[0106] The SIM librarian computing system 34 also includes a name listmanagement user interface 162. The name list management user interface162 handles the maintenance of the persistent name list storage 160, forexample creating, modifying and/or deleting information from thepersistent name list storage 160.

[0107] The SIM librarian computing system 34 further includes a libraryprotocol 164 which allows SIM servers 26 to access information in thepersistent name list storage 160. The library protocol 164 may furtherallow the SIM librarian computing system 34 to pass inquiries to the SIMservers 26, for example, to verify existing information in thepersistent name list storage 160, and/or receive new and updatedinformation from the SIM servers 26 for use in maintaining thepersistent name list storage 160. In use, a remote wirelesscommunications client 16 connecting to any SIM server 26 a, 26 e not inthe SIM server group 30 b (FIG. 1) will effectively search every server26 a, 26 e not in the SIM server group 30 b with a single request. Toquery the SIM servers 26 b-26 d in the SIM server group 30 b requires aseparate connect sequence. Thus, to scan every SIM server 26 a-26 e, aremote wireless communications client 16 would have to have only twoservers saved in its configuration files.

[0108] Operating a Wireless Communications Client

[0109]FIG. 8 shows a method 200 of operating a wireless communicationsclient 16 according to one illustrated exemplary embodiment. In step202, the general computer 110 (FIG. 6) of the wireless communicationsclient 16 monitors one or more communications ports 106, 112 (FIG. 4).As discussed above, the communications ports may take the form ofphysical port and/or virtual ports. The flow of data and or commandsbetween the wireless communications client 16 and other systemcomponents are illustrated by large arrows pointing into and away fromthe various boxes which represent the acts and steps of the method. Asimilar convention is employed in the Figures illustrating other methodsof operation of the SIM remote access system 24.

[0110] In step 204, the wireless communications client 16 receives arequest for a SIM 94, for example, from one of the controllers 32 (FIG.1). The request may include a unique SIM identfier and/or ahuman-recognizable name corresponding to the SIM 94 or group of SIMs 94.In step 206, the wireless communications client 16 sends a request forthe SIM 94 to a SIM server 26. In step 208, the wireless communicationsclient 16 determines whether an address is received from the SIM server26. If an address is received in step 208, the wireless communicationsclient 16 sends another request in step 210, this request being sent toan address returned by the SIM server 26. In step 211, the wirelesscommunications client 16 receives connection information from the SIMserver 26 to which the request was addressed in either step 206 or 210.

[0111] In step 212, the general purpose computer 110 employs the bridge114 to associate one the wireless communications device 100 of thewireless communications client 16 with the subscriber information fromthe SIM 94 by establishing a communications session between the wirelesscommunications device 100 and the SIM 94. The communications session mayemploy a socket protocol for establishing a persistent communicationssession, lasting until the SIM 94 is explicitly released.

[0112] With a persistent communications session started, in step 213 thewireless communications client 16 determines whether a command isreceived, for example, from the controller 32. If a command has beenreceived, in step 214 the wireless communications client 16 determineswhether the command is to release the SIM 94. If the command is not torelease the SIM 94, the wireless communications client 16 employs thecommand interface 156 to execute the command in step 215, operating thewireless communications device 100 via the general interface 158, themethod 200 then retuning to step 213. If the command is to release theSIM 94, in step 216 the wireless communications client 16 employs theclient entity services 150 to release the SIM 94, for example, bysending an appropriate message to the SIM server 26 and terminating thecommunications session with the SIM 94 via the span encapsulation engine152.

[0113] In step 218, the wireless communications device 16 determineswhether a request is received, for example, from the MSC 20. Asdiscussed in the background, the MSC 20 may, from time-to-time, requestcertain information from the SIM 94, including challenging the SIM 94with an authentication request. Under the GSM standard the authorizationrequest includes a random number or seed. If a request has not beenreceived, the method 200 returns to step 213. If a request has beenreceived, the wireless communications client 16 employs the spanencapsulation engine 152 to pass the request to the SIM 94 via thecommunications session in step 220.

[0114] In step 221, the wireless communications client 16 determineswhether a response is received from the SIM 94, transmitting waitsignals back to the requester (e.g., MSC 20) in step 222 where requiredto prevent a time out from occurring. Often, the MSC 20 or other portionof the wireless service provider system will require a response from thewireless communications client 16 within a specified time period. Step222 provides a “wait” message to the MSC 20 or other portion of thewireless service provider system. In some instances, successive “wait”messages can provide a sufficient response, although some wirelessservice provider systems will limit the number of consecutive “wait”messages that may be received before terminating the connection. The“wait” loop repeats until the wireless communications client 16 receivesa response from the SIM 94, at which point control passes to step 223.Once a response is received from the SIM 94, the wireless communicationsclient 16 passes the response to the requester (e.g., MSC 20) in step223, and returns to step 213.

[0115] It should be noted that the wireless communications device 16 iscapable of handling multiple communications sessions at the same time,for example, the wireless communications device 16 may simultaneously behandling a separate communications session for each of the wirelesscommunications clients 100 a, 100 b. Thus, the wireless communicationsdevice 16 continues monitoring the communications port (i.e., step 202),while executing other portions of the method 200. The general computer110 of the wireless communications client 16 may employ a multitaskingstrategy, multiple processors or other techniques to realize suchconcurrent operation.

[0116] Operating a SIM Server

[0117]FIGS. 9A and 9B show a method 250 of operating a SIM server 26according to one illustrated exemplary embodiment.

[0118] In step 251, the span protocol listener 130 (FIG. 5) of the SIMserver 26 monitors a communications port. In step 252, the SIM server 26receives a request from a remote wireless communications client 16. Therequest may originate with the remote wireless communications client 16,or may originate with the controller 32.

[0119] In optional step 253, the SIM server 26 determines whether therequest includes sufficient authorization to provide access to therequested SIM information. Authorization can take any one or more of avariety of forms. For example, the request can include one or more useridentifiers and/or passwords generated by one or both of the controller32 and the requesting wireless communications client 16. The useridentifier may be associated with a privilege level, allowing certaintypes of access to certain SIMs 94. Alternatively, or additionally, therequest may contain an indication of a business, tracking or billingentity making the request. This information can be compared with SIMownership information stored in the requested SIM 94 and/or storedlocally at the SIM server 26 for allowing authorization determinationswithout inquiries to the SIM 94. Thus, in some embodiments the SIMserver 26 may read information from the requested SIM 94 in order todetermine whether the request includes sufficient authority, while inother embodiments the SIM server 26 makes the determination withoutresort to the requested SIM 94, relying on pre-stored information or ona level of authority that is not specific to the particular SIM 94.Consequently, it should be clear to one skilled in the art that theoptional step 253 may occur at other points in the method 250.

[0120] If the request does not include sufficient authorization, the SIMserver 26 denies the request in step 254, perhaps passing an appropriatemessage to the requesting wireless communications device 16 and/orcontroller 32. The method 250 then returns to a “wait” state, monitoringthe communications port in step 251. Additionally, or alternatively, theSIM server 26 may track the number of unauthorized requests for the SIM94, or may track the number of unauthorized requests by the particularrequesting wireless communications client 16, to deter unauthorizedentries. If the request does include sufficient authorization, the SIMserver 26 passes control to step 255.

[0121] In step 255, the SIM name resolver 132 (FIG. 5) of the SIM server26 determines whether a received human-recognizable name for the SIM 94is resolvable. If the name is not resolvable, the method 250 passescontrol to step 269 where a request is sent to the SIM librarian 34,details of which are explained below. If the human-recognizable name isresolvable, the SIM name resolver 132 resolves the human-recognizablename into a computer-recognizable or computer-routable name in step 256.

[0122] In step 257, the SIM server 26 determines whether the requestedSIM 94 is accessible by the SIM server 26. SIMs 94 are consideredaccessible by the SIM server 26 if the SIM server 26 can read, writeand/or command the SIM 94, for example where the SIM 94 is in a SIM bank28 associated with the SIM server 26. If the requested SIM 94 isaccessible by the SIM server 26, in step 258 the SIM server 26determines whether the requested SIM 94 is available for use. If therequested SIM 94 is available, in step 261 the SIM server 26 exclusivelyassociates the requested SIM 94 with the requesting wirelesscommunications client 16. For example, the SIM server 26 may establish apersistent communications session between the requested SIM 94 and therequesting wireless communications client 16. Additionally, oralternatively, the SIM server 26 may set a flag in the SIM 94 and/oridentify the SIM 94 as being exclusively allocated or “not available” ina corresponding database which the SIM server 26 checks as part of step258 and/or step 259 (discussed immediately below). The SIM server 26 mayretain the exclusive association between the requested SIM 94 with therequesting wireless communications client 16 until the SIM server 16receives a request to release or terminate the association, or until a“time-out” condition occurs.

[0123] If the requested SIM 94 is not available, the SIM server 26 sendsan appropriate message to the requesting wireless communications device16 and/or controller 32 indicating that the SIM 94 is not available foruse in optional step 259, and then returns to the “wait” state,monitoring the communications port in step 251.

[0124] If the requested SIM 94 is available, the method 250 passescontrol to step 260. In step 260, the SIM server exclusively associatesthe requested SIM 94 with the remote wireless communications device 100,an illustrated example of which is described below with reference toFIG. 9C.

[0125] Returning to step 257, if the SIM server 26 determines therequested SIM 94 is not accessible by the SIM server 26, the method 250passes control to step 261, where the SIM server 26 determines whetherthe requested SIM 94 is accessible by other SIM servers 26 in a same SIMserver group 30.

[0126] If the requested SIM 94 is accessible by another SIM server 26 inthe same SIM server group 30, the SIM server 26 provides addressinformation for the requested SIM 94 to the requesting remote wirelesscommunications client 16 in step 262, and then returns control to step252. If the requested SIM 94 is not accessible by other SIM servers 26in the same SIM server group 30, the SIM server 26 sends a request tothe SIM librarian system 34 in step 263.

[0127] In step 264, the SIM server 26 receives a response including anaddress from the SIM librarian 34. In step 265, the SIM server 26returns the received address to the requesting remote wirelesscommunications client 16, and returns to a waiting state at step 252.

[0128]FIG. 9C shows an exemplary illustrated method 266 of exclusivelyassociating the requested SIM 94 with the wireless communications device100 of the requesting wireless communications client 16. The method 266is suitable for realizing the step 260 of the method 250 (FIGS. 9A, 9B).

[0129] In step 267, the SIM server 26 exclusively reserves the SIM 94,for example marking the SIM 94 as being unavailable in an appropriatedatabase or otherwise ensuring that the SIM 94 is not available for useby other requesters. In step 268, the SIM server 26 provides connectioninformation to the requesting remote wireless communications client 16and employs the SIM socket control 134 to start up a local protocol andwaits for a connection. In step 269, the SIM server 26 starts the localspan protocol instance (e.g., span encapsulation thread 134134 d)associated with the requested SIM 94. In step 270, the SIM server 26receives a communication from the remote wireless communications client16. In step 271, the SIM server 26 determines whether the requestcorresponds to a request to release the SIM 94 or otherwise close theconnection.

[0130] If the request is to release the SIM 94 or otherwise close theconnection, in step 272 the SIM server 26 stops the local span protocolinstance 134 a-134 d associated with the SIM 94. In step 273, the SIMserver 26 then makes the SIM 94 available, for example, marking the SIM94 as being available in the appropriate database. In step 274, the SIMserver 26 returns a message to the remote wireless communications client16 indicating that the connection has been closed and the exclusiveassociation has been terminated.

[0131] If the SIM server 26 determines in step 271 that the request doesnot correspond to a request to release the SIM 94 or otherwise close theconnection, in step 275 the SIM server 26 removes a protocol wrapper andpasses the payload data of the request to the SIM 94. In step 276, theSIM server 26 receives a response from the SIM 94. In step 277, the SIMserver 26 wraps the payload data (i.e., received response) into anencapsulation protocol and transmits the encapsulated payload data tothe wireless communications device 100 of the wireless communicationsclient 16. The method 266 then returns to step 270 for receipt offurther communications from the wireless communications client 100.Typical SIMs 94 are not capable of initiating action, but rather canrespond to requests to retrieve and/or store information or to performother actions.

[0132]FIG. 9D shows an exemplary illustrated method 278 of passing anauthorization challenge and response between a wireless communicationsdevice 100 of the wireless communications client 16 and a SIM 94, inaccordance with the method 266 (FIG. 9C). In at least some embodiments,the SIM server 26 may be unaware of the contents of some or all of therequests or communications, and will simply be forwarding communicationsbetween the wireless communications device 100 and the SIM 94. Thus, theSIM server 26 may be unaware that it is transmitting an authorizationchallenge and response.

[0133] In step 279, the SIM server 26 passes an authorization requestreceived via the wireless communications client 16 to the SIM 94. Asdiscussed in the background, it is common for the MSC 20 or otherportion of the wireless service provider system to periodicallychallenge the wireless communications device 100 for authentication.This prevents fraud, for example by preventing the simultaneous use of asubscriber identity by the swapping of a single SIM 94 between multiplewireless communications devices 100 after starting a call on each of therespective wireless devices 100. Under GSM, the challenge orauthentication request includes a random number or seed, which the SIM94 employs along with the secret key encoded in the SIM 94 toalgorithmically create a response, commonly referred to as a “signedresponse.”

[0134] In step 280, the SIM server 26 receives a response from the SIM94. In step 281, the SIM server 26 provides subscriber information inthe form of the response from the requested SIM 94 to the requestingremote wireless communications client 16.

[0135] Additionally, the SIM server 26 may cache certain data todecrease the time the SIM server 26 takes to respond to requests. Forexample, the SIM server 26 may be programmed to store the first responsefrom a SIM 94 to each of a number of selected requests (e.g., SS7messages or other communications) in a data cache. The requests may beselected by the stability of the response and/or the frequency withwhich the particular request occurs in typically transactions. Further,the SIM server 26 can be programmed to “learn” which requests/responsecombinations to cache by recognizing patterns of requests (e.g., SS7messages) and responses, for example relying on the stability of theresponse and the frequency of the request during operation. Thus, theSIM server 26 does not even need to understand or know what is beingrequested, but simply must understand if the requested data is stable orchanges over time. Where the caching is bi-directional (i.e., retrievalfrom, and storage to, the SIM 94), the SIM server 26 may also store adirection indication in the data cache. One skilled in the art will notethat caching typically will not work for authorization challenges, sincethe correct response is dependent on a random number or seed providedwith each authorization request. However, caching can significantlyreduce response times for the retrieval and/or storage of otherinformation, which may be particularly useful where a portion of thecommunications network 22 employs TCP/IP with its associated timingproblems.

[0136]FIG. 18 shows one illustrated embodiment of a method 550 foroperating the SIM sever 26 employing caching. The method 550 may beemployed as part of, or as a substitute for, the method 250 of FIG. 9.

[0137] In step 552, the SIM server 26 receives a request for the SIM 94from the wireless communications client 16. In step 554, the SIM server26 determines whether a response to the request has been cached in thedata cache. If the response to the request has been cached, in step 556the SIM server 26 retrieves the cached response, passes the retrievedcached response to the wireless communications client in step 558, andreturns to step 552. Thus, the SIM server can provide the response tothe requester, either directly where the requester is the wirelesscommunications client 16 or indirectly via the wireless communicationsclient 16 where the requester is the MSC 20, without the delayassociated with passing the request to the SIM 94 and waiting for aresponse from the SIM 94. This can provide significant saving in latencyand response times.

[0138] If the response to the request has not been cached, in step 560the SIM server 26 passes the request to the SIM 94. In step 562, the SIMserver 26 receives a response from the SIM 94. In step 564, the SIMserver 26 passes the response received from the SIM 94 to the wirelesscommunications client 16.

[0139] In step 566, the SIM server 26 determines whether there is arelationship between the received response and the request. As discussedabove, the SIM server 26 can determine whether the request of a typepreviously identified as being suitable for caching, or can analyze thestability of the response and/or frequency of the request in determiningif a relationship exists. The SIM server may rely on a set ofrelationship recognition information which may include a list ofrequests suitable for caching, a tracking of the number of times aparticular response has occurred for a given request, and/or acumulative tally of the number of times or frequency that particularrequests have occurred.

[0140] If the SIM server 26 determines that there is a relationship, theSIM server 26 caches the response in the data cache in step 568, andreturns to step 552 to wait for the next request. As an alternative, theSIM server 26 may pass control to step 570 before returning to step 552.

[0141] If the SIM server 26 determines that there is a no relationship,the SIM server 26 updates a set of relationship recognition informationin step 570 and returns to step 552 to wait for the next request.

[0142] Operating a SIM Librarian

[0143]FIG. 10 shows a method 300 of operating a SIM librarian computingsystem 34 according to one illustrated exemplary embodiment. In step302, the SIM librarian computing system 34 waits for a request on acommunications port. In step 304, the SIM librarian computing system 34receives a request for SIM address from a SIM server 26. In step 306,the SIM librarian computing system 34 resolves the human-recognizableSIM identifier in the received request into a computer-recognizable SIMidentifier. The human-recognizable SIM identifier can take any of avariety of forms such as a name of the SIM 94, group of SIMs 94, and/orcharacteristic of the SIM 94 (e.g., geographic location, home callingarea, wireless communications service provider, phone type, etc.). Instep 308, the SIM librarian computing system 34 determines an addressfor the requested SIM 94 based on the computer-recognizable SIMidentifier. In step 310, the SIM librarian computing system 34 returnsthe determined address for the requested SIM 94 to the requesting SIMserver 26. SIM librarian computing system 34 returns control to step302, waiting for additional requests.

[0144] Maintaining a Persistent Name List

[0145]FIG. 11 shows a method 320 of maintaining SIM information in apersistent name list storage 160 (FIG. 7) of the SIM librarian computingsystem 34 according to one illustrated exemplary embodiment.

[0146] In optional step 322, the SIM librarian computing system 34transmits an inquiry to one or more of the SIM servers 26. In step 324,the SIM librarian computing system 34 receives SIM location and/oridentification information from the SIM servers 26. In step 326, the SIMlibrarian system 34 determines whether the received SIMlocation/identification information identifies a new SIM being added toa SIM bank.

[0147] If a new SIM 94 is being added to a SIM bank 28, the SIMlibrarian computing system 34 creates a corresponding new entry in adata structure 338 (FIG. 12) stored in the persistent name list storage160, and the method 320 returns control to step 322. Otherwise, the SIMlibrarian computing system 34 determines whether a SIM 94 is deleted orremoved from one of the SIM banks 28 in step 330. If a SIM 94 is beingdeleted or removed, the SIM librarian computing system 34 deletes acorresponding entry from the data structure 338 (FIG. 12) stored in thepersistent name list storage 160 in step 332, the method 320 thenreturning control to step 322. If a SIM 94 is not being deleted, the SIMlibrarian computing system 34 determines whether the SIMlocation/identification information for a SIM has changed in step 334.

[0148] If the SIM location/identification information has changed, theSIM librarian computing system 34 updates a corresponding entry in thedata structure 338 (FIG. 12) and the persistent name list storage 160 instep 336, the method 320 then returning control to step 322. Otherwisethe method 320 passed control directly to step 322. Typically thelocation or human-recognizable identification information may change,while the unique SIM identifier will remain unchanged.

[0149] Data Structure for SIM Information

[0150]FIG. 12 shows a data structure 338 including a number of records,collectively referenced as 340 and individually referenced as 340 a-340c, for storing SIM location/identification information in the persistentname list storage 160 (FIG. 7) of the SIM librarian computing system 34.Each record 340 includes a number of fields, for storing informationabout the SIM 94 including human-recognizable information to simplifythe task of SIM selection. The fields represented in FIG. 12 areexemplary, and the records 340 may include a greater or a lesser numberof fields, and/or other fields.

[0151] A “SIM serial number” field 342 stores a SIM serial number foruniquely identifying the SIM 94. A number of “SIM name” fields 344, 346store human-recognizable names for the SIMs. There may be a less orgreater number of “SIM name” fields, although only two are shown. TheSIMs 94 may be randomly assigned names, or given names based on someproperty of the SIM such as physical location of the SIM 94 or of thehome calling area associated with the SIM 94.

[0152] A number of “SIM group” fields 348, 350, 352 store groupidentifiers which identify one or more groups to which the SIM 94belongs. Grouping of SIMs 94 allows easy access to SIMs 94 with similarcharacteristics or usefulness. A “SIM server group” field 354 stores anidentifier of a SIM server group 30 to which the SIM 94 is associated byway of being received in a SIM bank 28 associated with one of the SIMservers 26 that belong to the SIM server group 30. A “SIM serveraddress” field 356 stores a computer-routable address for the SIM server26 to which the SIM 94 is associated. A “SIM bank identifier” field 358stores a computer-routable address, such as a port number, of the SIMbank 28 in which the SIM 94 is received. The “SIM position” field 360stores a computer-routable address, such as a slot number, correspondingto a position 92 of the SIM bank 28 in which the SIM 94 is received.

[0153] A “SIM logical geographic location” field 362 stores anindication of a logical geographic location for the SIM 94. A “SIMphysical geographic location” field 364 stores an indication of aphysical geographic location of the SIM 94, for example a city in whichthe SIM bank is located. A “SIM associated carrier” field 366 stores anidentification of a wireless communications provider or carrier withwhich the SIM 94 is associated. For example the SIM 94 may be associatedwith a particular wireless service provider. A “carrier service plan”field 368 stores an indication of the particular carrier service planwith which the SIM 94 is associated. For example the SIM 94 may beassociated with a particular unlimited long distance plan of aparticular carrier.

[0154] A “home area” field 370 includes an indication of a particularhome calling area with which the SIM 94 is associated. Home callingareas are common in cellular calling plans. A “subscriber configuration”description field 372 includes a description of various configurationparameters for the wireless communications device 16 which arepreprogrammed into the SIM 94. For example, the SIM 94 may store a listof frequently used telephone numbers which are automatically programmedin the wireless communications device 16 when associated with aparticular SIM 94, a font for use in a display menu, or a notificationsetting such as ring, vibrate or ring and vibrate.

[0155] A “SIM owner” field 374 may identify a person or entity that ownsthe SIM 94. For example, the owner could be one of a number of billingentities such as a company, or a department within a company, which maybe particularly useful to the SIM accounting computing system 36 (FIG.1). The “SIM owner” field 374 allows an operator to elect to employ SIMs94 that the operator owns, before relying on SIMs 94 for which theoperator would have to receive permission and/or pay a fee to use.

[0156] Operating SIM Accounting System

[0157]FIGS. 13A and 13B show a method 400 of accounting for SIM usageaccording to one illustrated exemplary embodiment. Most of the steps inthe method 400 are optional, and are dependent upon the particularinformation that interests an operator of the SIM remote access system24. Additionally, many of the steps can be executed in a differentorder, and additional steps may be added to the method 400.

[0158] In step 402, the SIM accounting computing system 36 (FIG. 1)receives usage information for a SIM 94, for example from the SIM server26 with which the SIM 94 is associated and/or from a wirelesscommunications client 16 requesting or using the SIM 94. In step 404,SIM accounting computing system 36 increments a cumulative count of thenumber of times that the SIM 94 has been accessed. In step 406, the SIMaccounting computing system 36 increments a cumulative count of thenumber of times that the SIM 94 has been accessed by a particularbilling entity. In step 408, the SIM accounting computing system 36increments a cumulative count of the number of times the billing entityhas accessed any of the SIMs 94 available via the SIM remote accesssystem 24.

[0159] In step 410, the SIM accounting computing system 36 determinesfrom the received SIM usage information the amount of time that the SIM94 has been accessed. In step 412, the SIM accounting computing system36 adds the determined amount of time that the SIM 94 has been accessedto a cumulative amount of time that the SIM 94 has been accessed. Instep 414, the SIM accounting computing system 36 adds the determinedamount of time that the SIM 94 has been accessed to a cumulative amountof time that the SIM 94 has been accessed by a billing entity for theappropriate billing entity. This permits the SIM accounting computingsystem 36 to track the total amount of usage of a particular SIM 94 by aparticular billing entity. In step 416, the SIM accounting computingsystem 36 adds the determined amount of time that the SIM 94 has beenaccessed to a cumulative amount of time that the billing entity hasaccessed all SIMs 94 for the appropriate billing entity.

[0160] In step 418, the SIM accounting computing system 36 determinesthe period of access to the SIM 94. For example, a day may be dividedinto different periods which may have different accounting aspects, forexample different rates dependent upon predicted demand for the period.In a similar fashion a week, month or year may be divided into differentperiods, for example weekend SIM usage may be associated with a lowerrate than weekday SIM usage.

[0161] In step 420, the SIM accounting computing system 36 adds thedetermined amount of time that the SIM 94 has been accessed to acumulative amount of time that the SIM 94 has been accessed during theperiod for the appropriate period. In step 422, the SIM accountingcomputing system 36 adds the determined amount of time that the SIM 94has been accessed to a cumulative amount of time that the SIM 94 hasbeen accessed by the billing entity during the period for theappropriate period and billing entity. This allows the SIM accountingcomputing system 36 to track a billing entity's usage of a SIM 94 byperiod, which may be particularly suitable for some billing scenarios.In step 424, the SIM accounting computing system 36 adds the determinedamount of time the SIM 94 has been accessed to a cumulative amount oftime the billing entity has accessed all SIMs during the period for theappropriate billing entity.

[0162] In step 426, the SIM accounting computing system 36 determinesthe cost of access to the SIM 94. In step 428, the SIM accountingcomputing system 36 adds the determined cost of access to the SIM 94 toa cumulative amount of cost for access to the SIM 94. In step 430, theSIM accounting computing system adds the determined cost of access tothe SIM 94 to a cumulative amount of cost for access to the SIM 94 by aparticular billing entity during the period for an appropriate periodand billing entity. In step 432, the SIM accounting computing system 36adds the determined cost of access to the SIM 94 to a cumulative amountof cost for access to all SIMs 94 by the billing entity for theappropriate billing entity. In step 434 the SIM accounting computingsystem 36 bills the billing entity for the billing entity's SIM usageduring the billing period.

[0163]FIG. 14 shows a method 440 of accounting for SIM usage which maybe employed in addition to, or in substitution to, step 434 of FIGS.13A, 13B.

[0164] In step 442, the SIM accounting computing system 36 subtracts thecumulative cost from a billing entity balance that represents a sum offunds on account for the billing entity or a credit to an billing entityaccount. For example, the billing entity may receive a set balance inits accounts for a regular monthly payment. Usage exceeding theallocated amount may be billed by time, for example, by each wholeminute, rounded up. While the account balance is discussed in terms ofcost, one skilled in the art will recognize that the cost and accountscan just as easily be represented in terms of time or number of uses.

[0165] In step 444, the SIM accounting computing system 36 determines ifthe balance is below some set minimum balance. If the balance is notbelow the set minimum balance, the SIM accounting computing system 36grants further access to SIMs in step 446. If the balance is below theminimum access, the SIM accounting computing system 36 may optionallyoffer an opportunity to replenish the balance in step 448. For example,the SIM computing accounting system 36 may allow a user (e.g., billingentity) to enter a charge account number, or prepaid card number toreplenish the balance of the account.

[0166] In step 450, the SIM accounting computing system 36 determines ifthe balance is replenished. If the balance has been replenished, the SIMaccounting computing system 36 grants further access to the SIMs 94 instep 446. If the balance has not been replenished, the SIM accountingcomputing system 36 denies further access to the SIMs 94 in step 452.

[0167] Wireless Communications Device Server

[0168]FIG. 15 shows a wireless communications device remote accesssystem 500, in use with the remote SIM access system 24 of FIG. 1. Thewireless communications device remote access system 500 includes awireless communications device rack 502 having a number of positions forreceiving proxy wireless communications devices and a proxy wirelessdevice server 503 capable of communicatively coupling proxy wirelesscommunications devices received in the rack 502 to controllers 32,controlling wireless communications clients 16, and/or controllingwireless communications devices 100 (FIG. 4). The wirelesscommunications device remote access system 500 can also include awireless device usage accounting computing system 504 and/or a wirelessdevice librarian system (not shown).

[0169]FIG. 16 shows the wireless communications device rack 502containing the number of proxy wireless communications devices, forexample wireless PDAs, collectively referenced as 506 and individuallyreferenced as 506 a-506 h. As used herein and in the claims, the termproxy refers to a device that may act as a servant or agent of anotherdevice, for example being remotely controlled by the other device. Therack 502 includes a bus 508 coupling the wireless PDAs 506 to acommunications port 510, and a controller such as a micro-controller 512for controlling the bus 510 and/or the PDAs 506.

[0170] The rack 502 may be associated with one or more proxy wirelessdevice servers 503 at a local or a central location to form the wirelesscommunications device remote access system 500. The proxy wirelessdevice servers 503 can be configured to selectively couple a wirelessPDA 506 to a remote controlling device such as a controller 32 or acontrolling wireless communications client 16 such as the remote testplatform 16 c, by way of the communications network 22.

[0171] This allows the wireless PDA 506, or other wirelesscommunications device, to be operated as if it were present at theremote site 18 c where the remote test platform 16 c is located. Thus,for example, a wireless device manufacturer or wireless service providercan verify that a wireless communications device 506 is operable in agiven location 18 c, for example, before releasing the wirelesscommunications device 506 for sale. This testing may be instead of, orin addition to, the previously discussed testing of switching in theremote locations 18.

[0172] Additionally, or alternatively, this arrangement can allow an enduser at a remote location 18 a to use a wireless communications device506 of their choice without actually owning the wireless communicationsdevice 506. For example, an end user may rent or lease use of a wirelessPDA 506, which is accessed via the end user's cellular phone 16 a orother controlling wireless communications device. The end user mayselect any available wireless communications device 506 in the rack 502,or an available wireless communications device 506 may be automaticallyassigned to the user, for example, upon connection. Thus the remote testplatform 16 c, or other controlling wireless device, acts like thewireless PDA at the remote location, downloading files, moving data,playing games, executing networking operations and/or reporting results.

[0173] Usage and billing may be maintained by the wirelesscommunications device accounting system 504 in a similar fashion to thatof the SIM accounting computing system 36 (FIG. 1) previously discussed.While illustrated in use with the SIM remote access system 24, thewireless device remote access system 500 can operate independentlythereof where remote access to SIMs 94 (FIG. 3) is not required.Additionally, a wireless device librarian (not shown) can operate in asimilar manner to the SIM librarian 34 previously discussed, trackingthe location of various proxy wireless communications devices 506 andallowing the location of proxy wireless communications devices 506 usinghuman-recognizable identifiers such as names.

[0174]FIG. 17 shows a method 520 operating the wireless communicationsdevice remote access system 500 of according to one illustratedembodiment.

[0175] In step 522, the wireless communications device server 503receives a request for remote access to a proxy wireless communicationsdevice 506. The request may originate from an operator of the controller32 a, from an automatically executed script on the controller 32 a, orfrom another source, such as one of the wireless communications clients16.

[0176] In step 524, the wireless communications device server 503 or themicro-controller 512 determines if the request was for a specific proxywireless communications device 506. If the request is not for a specificproxy wireless communications device 506, in step 526 the wirelesscommunications device server 503 or the micro-controller 512 locates anavailable proxy wireless communications device 506 in the rack 502. Ifthe request is for a specific proxy wireless communications device 506or for a proxy wireless communications device having one or morespecific characteristics (e.g., device type, user configuration, etc.),in step 528 the wireless communications device server 503 or themicro-controller 512 identifies a suitable proxy wireless communicationsdevice 506 in the rack 502.

[0177] In step 530, the wireless communications device server 503 or themicro-controller 512 determines whether the proxy wirelesscommunications device 506 is available for use. If the proxy wirelesscommunications device 506 is not available, the wireless communicationsdevice server 503 or the micro-controller 512 notifies the requester ofthe unavailability in step 532. The wireless communications deviceserver 503 or then micro-controller 512 may wait a determined period oftime in step 534, rechecking the availability one or more times beforenotifying the requester. Alternatively, or additionally, the wirelesscommunications device server 503 or the micro-controller 512 may notifythe requester in step 534 and then monitor the availability of desiredproxy wireless communications device 506 in step 536, automaticallynotifying the requester and/or automatically linking the proxy wirelesscommunications device 506 to a remote controlling wirelesscommunications client 16 in step 538 when the proxy wirelesscommunications device 506 becomes available.

[0178] If the proxy wireless communications device 506 is available(either from step 530 or step 536), the wireless communications deviceserver 503 or the micro-controller 512 determines whether the requesteris authorized to use the proxy wireless communications device 506 instep 533. Authorization may include verification of one or more of auser identifier, password, requesting device identifier, level ofprivilege, account balance, etc. The verification can be similar to thatdiscussed above with respect to authorization of SIM usage.

[0179] If the requester is not authorized, the wireless communicationsdevice server 503 or the micro-controller 512 deny access to the proxywireless communications device 506 in step 535. If the requester isauthorized, the wireless communications device server 503 or themicro-controller 512 links the proxy wireless communications device 506to a remote controlling wireless communications client 16 in step 540.

[0180] Remote Access Wired Access

[0181]FIG. 19 shows an illustrated embodiment of a remote access system600, that can provide remote access for communication devices withoutwireless functionality such as conventional PDAs 602. The system 600 mayalso provide remote access for communication devices that have wirelessfunctionality without making use of that functionality, or making use oflimited wireless functionality such as infrared communications.

[0182] The PDA 602 typically includes a communications port 604, forexample an RS232 port, for providing bi-directional communications. ThePDA 602 is coupled to a networking device such as a computer 606, toprovide networked communications via the communications network 22. Thecomputer 606 may take the form of a conventional networked PC. Thecoupling may take the form of a cable or limited range communicationsdevice such as an infrared transceivers or short range wirelesstransceiver. A computer 606 appropriately configured for the desiredprotocol and security can provide access to any of the wirelesscommunications devices 100 of the wireless communications clients 16.Thus, a user at one location may operate the PDA 602 as if the PDA 602was physically present at another location, for example, the physicallocation of the wireless communications client 16. Additionally, thewireless communications client 16 may be associated with a SIM 94located at a third physical location.

[0183] The connection between the PDA 604 and the computer 606 can bemade in the conventional fashion. The PC 606 simply makes the networkconnection to the desired wireless communications client 16,automatically providing the appropriate protocol to the communicationsincluding any required handshaking and/or security.

[0184] Further Variations

[0185] The above description sets out a SIM remote access system and awireless device remote access system, and methods for each. Althoughspecific embodiments of, and examples for, the invention are describedherein for illustrative purposes, various equivalent modifications canbe made without departing from the spirit and scope of the invention, aswill be recognized by those skilled in the relevant art.

[0186] The teachings provided herein of the invention can be applied toother remote access systems, not necessarily the SIM remote accesssystem 24 and wireless communications device remote access system 500generally described above. For example, the SIM remote access system 24and/or and wireless communications device remote access system 500 mayinclude a greater or less number of computing systems, for exampleeliminating the SIM accounting computing system 36 and/or the SIMlibrarian computing system 34. The SIM accounting system 24 and/or andwireless communications device remote access system 500 can include agreater or less number of remote communications clients 16. Whileillustrated in FIG. 12 as a set of records 340 having fields, the datastructure 338 can take a variety of other forms commonly employed in thecomputing arts, including but not limited to one or more linked lists,lookup tables or the like. Additionally, many of the methods includeoptional acts or steps, and may include additional act or steps, orperform the steps in a different order, as will be recognized by thoseskilled in the relevant arts.

[0187] The SIM remote access system 24 and/or wireless communicationsdevice remote access system 500 can have a different organization thanthe illustrated embodiment, combining some functions and/or eliminatingsome functions. The system 24 can employ some of the disclosed automatedcomponents for some functions, while relying on manual methods for otherfunctions. The system can be more centralized, or more distributed, asis suitable for the particular communications environment.

[0188] The various embodiments described above can be combined toprovide further embodiments. All of the above U.S. patents, U.S. patentapplication publications, U.S. patent applications, foreign patents,foreign patent applications and non-patent publications referred to inthis specification and/or listed in the Application Data Sheet areincorporated herein by reference in their entirety, including but notlimited to commonly assigned U.S. provisional patent application SerialNo. 60/379,603, entitled “METHOD, APPARATUS AND ARTICLE TO REMOTELYASSOCIATE WIRELESS COMMUNICATIONS DEVICES WITH SUBSCRIBER IDENTITIESAND/OR PROXY WIRELESS COMMUNICATIONS DEVICES,” filed May 9, 2002.Aspects of the invention can be modified, if necessary, to employsystems, circuits and concepts of the various patents, applications andpublications to provide yet further embodiments of the invention.

[0189] These and other changes can be made to the invention in light ofthe above-detailed description. In general, in the following claims, theterms used should not be construed to limit the invention to thespecific embodiments disclosed in the specification and the claims, butshould be construed to include all SIM remote access systems and methodsthat operate in accordance with the claims. Accordingly, the inventionis not limited by the disclosure, but instead its scope is to bedetermined entirely by the following claims.

1. A subscriber identity module server to remotely associate a clientwireless communications device with subscriber identity information,comprising: a processor; a communications port to receive requests forsubscriber identity modules, the communications port coupled to theprocessor; and at least one computer-readable media storing instructionsthat cause the processor to cause subscriber identity information fromthe requested subscriber identity module to be provided to the clientwireless communications device in response to the request, where theclient wireless communications device is remote from the subscriberidentity module server.
 2. The subscriber identity module server ofclaim 1 wherein the instructions stored in the computer-readable mediacause the processor to cause subscriber identity information to beprovided to the client wireless communications device, by:communicatingly coupling the client wireless communications device to asubscriber identity module.
 3. The subscriber identity module server ofclaim 1 wherein the instructions stored in the computer-readable mediacause the processor to cause subscriber identity information to beprovided to the client wireless communications device, by: providing arandom number received from the wireless communications device to thesubscriber identity module; and providing a signed response receivedfrom the subscriber identity module to the client wirelesscommunications device, where the signed response is algorithmicallybased on the random number and the subscriber identity informationstored in the subscriber identity module in the form of a secret key. 4.The subscriber identity module server of claim 1 wherein theinstructions stored in the computer-readable media cause the processorto cause subscriber identity information to be provided to the clientwireless communications device, by: providing a random number receivedfrom the wireless communications device to the subscriber identitymodule; providing a signed response received from the subscriberidentity module to the client wireless communications device, where thesigned response is algorithmically based on the random number and thesubscriber identity information stored in the subscriber identity modulein the form of a secret key; and providing a number of intermediatemessages to the wireless communications device between providing therandom number and providing the signed response.
 5. A subscriberidentity module server to remotely associate a remote client wirelesscommunications device with subscriber identity information, comprising:a processor; a communications port to receive requests for a subscriberidentity module, the communications port coupled to the processor; andat least one computer-readable media storing instructions that cause theprocessor to determine whether the subscriber identity module server hasaccess to the requested subscriber identity module and to cause a set ofsubscriber identity information from the requested subscriber identitymodule to be provided to the client wireless communications device ifhas subscriber identity module server has access to the requestedsubscriber identity module.
 6. The subscriber identity module server ofclaim 5 wherein the instructions stored in the computer-readable mediacause the processor to cause subscriber identity information to beprovided to the client wireless communications device, by: establishinga persistent communications coupling of the client wirelesscommunications device and a subscriber identity module until a requestto end an association between the wireless communications device and thesubscriber identity module is received.
 7. The subscriber identitymodule server of claim 5 wherein the instructions stored in thecomputer-readable media cause the processor to cause subscriber identityinformation to be provided to the client wireless communications device,by: establishing a socket communications coupling of the client wirelesscommunications device and a subscriber identity module.
 8. Thesubscriber identity module server of claim 5 wherein the instructionsstored in the computer-readable media cause the processor to causesubscriber identity information to be provided to the client wirelesscommunications device, by: establishing a communications coupling of theclient wireless communications device and a subscriber identity moduleproviding the subscriber identity information by way of a universalasynchronous receiver/transmitter.
 9. The subscriber identity moduleserver of claim 5 wherein the instructions stored in thecomputer-readable media cause the processor to cause subscriber identityinformation to be provided to the client wireless communications device,further by: determining a routable address for the requested subscriberidentity module from a human recognizable identifier for the requestedsubscriber identity module.
 10. The subscriber identity module server ofclaim 5 wherein the instructions stored in the computer-readable mediacause the processor to cause subscriber identity information to beprovided to the client wireless communications device, further by:monitoring the communications port for an instance of a span protocol.11. The subscriber identity module server of claim 5 wherein theinstructions stored in the computer-readable media cause the processorto cause subscriber identity information to be provided to the clientwireless communications device, further by: determining an alternativeaddress for the requested subscriber identity module if the subscriberidentity module server does not have access to the requested subscriberidentity module.
 12. The subscriber identity module server of claim 5wherein the instructions stored in the computer-readable media cause theprocessor to cause subscriber identity information to be provided to theclient wireless communications device, further by: limiting access tothe subscriber identity module only to a request for the subscriberidentity module that includes a sufficient indication of authorization.13. The subscriber identity module server of claim 5 wherein theinstructions stored in the computer-readable media cause the processorto cause subscriber identity information to be provided to the clientwireless communications device, further by: maintaining an exclusiveassociation between the wireless communications device and the requestedsubscriber identity module until a request to release the requestedsubscriber identity module is received at the communications port. 14.The subscriber identity module server of claim 5 wherein theinstructions stored in the computer-readable media cause the processorto cause a set of subscriber identity information to be provided to theclient wireless communications device, by: providing a random numberreceived from the wireless communications device to the subscriberidentity module; providing a series of messages to the wirelesscommunications device while waiting for a signed response from thesubscriber identity module, where the signed response is based on therandom number an the subscriber identity information stored in thesubscriber identity module in the form of a secret key; and providingthe signed response received from the subscriber identity module to theclient wireless communications device.
 15. A method to remotelyassociate a remote client wireless communications device with subscriberidentity information, comprising: receiving a request for a subscriberidentity module at a first subscriber identity module server;determining whether the first subscriber identity module server hasaccess to the requested subscriber identity module; and causing a set ofsubscriber identity information from the requested subscriber identitymodule to be provided to the client wireless communications device ifthe subscriber identity module server has access to the requestedsubscriber identity module.
 16. The method of claim 15 wherein causing aset of subscriber identity information from the requested subscriberidentity module to be provided to the client wireless communicationsdevice includes establishing a communications coupling of the clientwireless communications device to the requested subscriber identitymodule storing the subscriber identity information.
 17. The method ofclaim 15 wherein causing a set of subscriber identity information fromthe requested subscriber identity module to be provided to the clientwireless communications device includes establishing a persistentcommunications coupling of the client wireless communications device tothe requested subscriber identity module storing the subscriber identityinformation until a request to release the requested subscriber identitymodule is received.
 18. The method of claim 15 wherein causing a set ofsubscriber identity information from the requested subscriber identitymodule to be provided to the client wireless communications deviceincludes receiving a seed from a requesting entity via the wirelesscommunications device, providing the seed to the requested subscriberidentity module, receiving a response to the seed from the requestedsubscriber identity module, and providing the response to the requestingentity via the wireless communications device.
 19. The method of claim15 wherein causing a set of subscriber identity information from therequested subscriber identity module to be provided to the clientwireless communications device includes receiving a seed from arequesting entity via the wireless communications device, providing theseed to the requested subscriber identity module, providing a number ofwait messages to the requesting entity via the wireless communicationsdevice, receiving a response to the seed from the requested subscriberidentity module, and providing the response to the requesting entity viathe wireless communications device.
 20. The method of claim 15 whereincausing a set of subscriber identity information from the requestedsubscriber identity module to be provided to the client wirelesscommunications device includes establishing a communications coupling ofthe client wireless communications device to the requested subscriberidentity module by way of a universal asynchronous receiver/transmitter.21. The method of claim 15 wherein causing a set of subscriber identityinformation from the requested subscriber identity module to be providedto the client wireless communications device includes establishing acommunications coupling of the client wireless communications device tothe requested subscriber identity module by way of a socket and auniversal asynchronous receiver/transmitter.
 22. The method of claim 15,further comprising: determining a routable address for the requestedsubscriber identity module from a human recognizable name for therequested subscriber identity module.
 23. The method of claim 15,further comprising: monitoring a communications port for instances aspan protocol.
 24. The method of claim 15, further comprising:determining a routable address for the requested subscriber identitymodule if the subscriber identity module server does not have access tothe requested subscriber identity module.
 25. A method to remotelyassociate a remote client wireless communications device with subscriberidentity information, comprising: receiving a set of subscriber identityinformation from the remotely located subscriber identity module inresponse to a requests for a subscriber identity module; and operatingthe wireless communications device using the received subscriberidentity information.
 26. The method of claim 25 wherein operating thewireless communications device using the received subscriber identityinformation includes configuring a set of user options based on thereceived subscriber identity information.
 27. The method of claim 25wherein operating the wireless communications device using the receivedsubscriber identity information includes transmitting wirelesscommunications using the received subscriber identity information. 28.The method of claim 25 wherein operating the wireless communicationsdevice using the received subscriber identity information includestransmitting wireless communications using a unique identifier receivedas a portion of the subscriber identity information.
 29. The method ofclaim 25 wherein operating the wireless communications device using thereceived subscriber identity information includes confirming anauthentication request by returning to a requesting entity a response toa seed, the response received from the subscriber identity module via asubscriber identity module server, the response being algorithmicallygenerated by the subscriber identity module from the seed and a secretkey stored in the subscriber identity module.
 30. A method of operatinga subscriber identity module server, comprising: receiving a request ata first subscriber identity module server for a first subscriberidentity module; providing subscriber identity information from thefirst subscriber identity module to a remote client communicationsdevice if the requested first subscriber identity module is accessibleby the first subscriber identity module server; and providing a computerroutable address to the remote client communications device if therequested first subscriber identity module is not accessible by thefirst subscriber identity module server and is accessible by a secondsubscriber identity module server for which the first subscriberidentity module server stores address information.
 31. The method ofclaim 30, further comprising: requesting address information for thefirst subscriber identity module if the requested first subscriberidentity module is not accessible by the first subscriber identitymodule server and is not accessible by a second subscriber identitymodule server for which the first subscriber identity module serverstores address information; receiving a computer routable address forthe first subscriber identity module from a subscriber module librariansystem in response to the request for address information; and providingthe received computer routable address to the remote clientcommunications device if the requested first subscriber identity moduleis not accessible by the first subscriber identity module server and isnot accessible by a second subscriber identity module server for whichthe first subscriber identity module server stores address information.32. A method of remotely associating a wireless communications devicewith subscriber identities, comprising: receiving a first request for asubscriber identity; determining a first subscriber identity modulecorresponding to the subscriber identity of the first request; andexclusively allocating the determined first subscriber identity moduleto a wireless communications device.
 33. The method of claim 32, furthercomprising: receiving an authentication request; passing theauthentication request to the first subscriber identity module;receiving a response to the authentication request from the firstsubscriber identity module; and passing the received response to anauthenticating requester via the wireless communications device.
 34. Themethod of claim 32, further comprising: receiving an authenticationrequest including a seed; passing the seed to the first subscriberidentity module; receiving a response to the seed from the firstsubscriber identity module; and passing the received response to anauthenticating requester via the wireless communications device.
 35. Themethod of claim 32, further comprising: determining whether the receivedfirst request includes a sufficient indication of authorization beforeexclusively allocating the determined first subscriber identity moduleto a wireless communications device.
 36. The method of claim 32, furthercomprising: receiving a request to release the first subscriber identitymodule; and releasing the first subscriber identity module from theexclusive allocation to the wireless communications device in responseto the received request to release the first subscriber identity module.37. The method of claim 32 wherein determining a first subscriberidentity module corresponding to the subscriber identity of the firstrequest includes determining a routable address for the first subscriberidentity module from a human-recognizable name contained in the firstrequest for a subscriber identity.
 38. The method of claim 32 whereinexclusively allocating the determined first subscriber identity moduleto a wireless communications device includes establishing a persistentcommunications link between the wireless communications device and thefirst subscriber identity module until a request to release the firstsubscriber identity module is received.
 39. A method of facilitatingremote access to subscriber identity modules by wireless communicationsdevices, the method comprising: receiving a first request from awireless communications device for an action by a subscriber identitymodule; passing the received first request to the subscriber identitymodule; receiving a first response to the first request from thesubscriber identity module; passing the first response from thesubscriber identity module to the wireless communications device; andcaching the first response received from the subscriber identity module.40. The method of claim 39, further comprising: receiving a secondrequest from a wireless communications device for an action by asubscriber identity module; determining that the received second requestis the same as the received first request; and passing the firstresponse from the subscriber identity module to the wirelesscommunications device without passing the second request to thesubscriber identity module.
 41. The method of claim 39, furthercomprising: receiving a second request from a wireless communicationsdevice for an action by a subscriber identity module; determining thatthe received second request is the same as the received first request;retrieving the first response from a data cache; and passing theretrieved first response to the wireless communications device.
 42. Themethod of claim 39 wherein caching the first response received from thesubscriber identity module includes storing the first response in a datacache with a defined relationship to the first request and thesubscriber identity module.
 43. The method of claim 39 wherein cachingthe first response received from the subscriber identity module includesstoring the first response in a data cache with a defined relationshipto the first request and the subscriber identity module, and with anindication of a direction of data flow with respect to the subscriberidentity module.
 44. A method of facilitating remote access tosubscriber identity modules by wireless communications devices, themethod comprising: receiving a plurality of requests from a wirelesscommunications device for an action by a subscriber identity module;passing a number of the received plurality of requests to the subscriberidentity module; receiving a number of responses to the respectiverequests from the subscriber identity module; passing the number ofreceived responses from the subscriber identity module to the wirelesscommunications device; recognizing a relationship between at least oneof the requests and at least one of the responses; and caching the atleast one of the responses having a recognized relationship to the atleast one of the requests.
 45. The method of claim 44, furthercomprising: for each of a number of the requests, determining whetherthe response to the request is cached; and passing the cached responseto the wireless communications device without passing the correspondingrequest to the subscriber identity module.
 46. The method of claim 44,further comprising: for each of a number of the requests, determiningwhether the response to the request is cached; retrieving thecorresponding one of the responses from a data cache if the response tothe request is cached; and passing the retrieved one of the responses tothe wireless communications device.
 47. The method of claim 44 whereinrecognizing a relationship between at least one of the requests and atleast one of the responses includes at least one of recognizing therequest as one of a number of requests identified as suitable forcaching, recognizing a level of consistency in the response to therequest over a number of identical requests to the subscriber identitymodule, and recognizing a frequency of the occurrence of the requestduring operation.
 48. A remote access system to remotely access proxywireless communications devices, the remote access system comprising: awireless communications device rack having a number of positions forrespectively receiving proxy wireless communications devices; and awireless device server having a communications port to receive a requestfor remote access to a proxy wireless communications device andconfigured to provide a communications link with at least one of theproxy wireless communications devices received in the respectivepositions of the wireless communications rack, if any, to a controllingwireless communications device located remotely from the wirelesscommunications rack in response to the received request for remoteaccess to a proxy wireless communications device.
 49. The remote accesssystem of claim 48, further comprising: a number of proxy wirelesscommunications devices received at respective ones of at least some ofthe number of positions of the wireless communications device rack, eachof the proxy wireless communications devices separately operable fromthe one another.
 50. The remote access system of claim 48, furthercomprising: a number of proxy wireless personal digital assistantsreceived at respective ones of at least some of the number of positionsof the wireless communications device rack, each of the proxy wirelesspersonal digital assistants separately operable from the one another.51. The remote access system of claim 48 wherein each of the positionsin the wireless communications device rack includes an interface tocommunicatingly couple with an interface on a respective one of theproxy wireless communications devices located at the position.
 52. Theremote access system of claim 48 wherein the controlling wirelesscommunications device is a cellular phone.
 53. The remote access systemof claim 48 wherein the controlling wireless communications device is afirst cellular phone in a remote test platform having at least twocellular phones and a switch selectively operable to cross an input fromthe first cellular phone to an output of a second of the cellularphones, and to cross an output from the first of the cellular phones toan input of the second of the cellular phones.
 54. The remote accesssystem of claim 48, further comprising: a wireless communications deviceusage accounting computing system coupled to the wireless device serverto maintain track of usage of the proxy wireless communications devicesby the controlling wireless communications clients.
 55. A method ofproviding remote access to proxy wireless communications devices bycontrolling wireless communications devices, comprising: receiving afirst request for remote access to a proxy wireless communicationsdevice; determining a first proxy wireless communications devicecorresponding to the first request for remote access to the proxywireless communications device; and automatically linking the firstproxy wireless communications device to a first controlling wirelesscommunications device over a communications path where the firstcontrolling wireless communications device is remote from the firstproxy wireless communications device in response to the first requestfor remote access to a proxy wireless communications device.
 56. Themethod of claim 55 wherein receiving a first request for remote accessto a proxy wireless communications device includes receiving a securehypertext transfer protocol request.
 57. The method of claim 55 whereinreceiving a first request for remote access to a proxy wirelesscommunications device includes receiving a request from a controllerwhich is remote to the first controlling wireless communications client.58. The method of claim 55, further comprising: receiving a secondrequest for remote access to a proxy wireless communications device;determining a second proxy wireless communications device correspondingto the second request for remote access to a proxy wirelesscommunications device; and automatically linking the second proxywireless communications device to a second controlling wirelesscommunications device over a communications path where the controllingwireless communications device is remote from the second proxy wirelesscommunications device in response to the second request for remoteaccess to a proxy wireless communications device.
 59. The method ofclaim 55, further comprising: determining whether the received firstrequest for remote access to a proxy wireless communications deviceincludes a sufficient indication of authorization before automaticallylinking the first proxy wireless communications device to the firstcontrolling wireless communications device.
 60. The method of claim 55,further comprising: determining whether the determined first proxywireless communications device is available for use.
 61. The method ofclaim 55, further comprising: determining whether the determined firstproxy wireless communications device is available for use; and notifyinga requester if the determined first proxy wireless communications deviceis not available for use.
 62. The method of claim 55, furthercomprising: determining whether the determined first proxy wirelesscommunications device is available for use; notifying a requester if thedetermined first proxy wireless communications device is not availablefor use; waiting a determined period; and again determining whether thedetermined first proxy wireless communications device is available foruse, after the determined period.
 63. The method of claim 55, furthercomprising: determining whether the determined first proxy wirelesscommunications device is available for use; notifying a requester if thedetermined first proxy wireless communications device is not availablefor use; and again determining whether the determined first proxywireless communications device is available for use after a determinedperiod, wherein automatically linking the first proxy wirelesscommunications device to the first controlling wireless communicationsdevice occurs after the again determining whether the determined firstproxy wireless communications device is available for use after thedetermined period.
 64. The method of claim 55 wherein determining afirst proxy wireless communications device corresponding to the firstrequest for remote access to the proxy wireless communications deviceincludes at least one of resolving a human-recognizable name into acomputer-recognizable name, and matching at least one desiredcharacteristic in the request against a list of device characteristicsfor each of a number of the proxy wireless communications devices.
 65. Aremote access system, comprising: a networking device; a communicationdevice coupled to the networking device; and a remote wirelesscommunications client selectively couplable to the communications devicevia the networking device and remotely operable thereby.
 66. The remoteaccess system of claim 65 wherein the networking device is a personalcomputer, the communications device is a personal digital assistant andthe remote wireless communications device is a remote test platformhaving at least one wireless communications device.
 67. A method ofremote access, comprising: a networking device; coupling a communicationdevice to a networking device; and providing a network communicationslink between a remote wireless communications client and the networkingdevice; and operating the communications device.
 68. The method of claim67 wherein coupling a communications device to a networking deviceincludes providing a cable therebetween.