Management of multiple subscriber identity modules

ABSTRACT

Management of multiple subscriber identity modules by a server is disclosed. The server includes one or more processors, and one or more memories storing instructions, that, when executed by the one or more processors, cause the server, for each subscriber identity module belonging to a set of subscriber identity modules of a user of a mobile terminal, to: cause an analysis on use of the subscriber identity module; cause a prediction of a future activity status change of the subscriber identity module on the basis of the analysis; and cause an action affecting the activity status of the subscriber identity module on the basis of the prediction.

FIELD

The invention relates to management of multiple subscriber identitymodules.

BACKGROUND

Three previous European patent applications by the Applicant,12151906.0, 12151908.6, and 12154706.1 disclose various apparatusesutilizing a set of subscriber identity modules (SIM) for one user of amobile terminal. As the subscriber identity modules are not designed forsuch sophisticated use, the management of multiple subscriber identitymodules requires further ideas.

BRIEF DESCRIPTION

According to an aspect of the present invention, there is provided aserver comprising: one or more processors, and one or more memoriesstoring instructions, that, when executed by the one or more processors,cause the server, for each subscriber identity module belonging to a setof subscriber identity modules of a user of a mobile terminal, to: causean analysis on use of the subscriber identity module; cause a predictionof a future activity status change of the subscriber identity module onthe basis of the analysis; and cause an action affecting the activitystatus of the subscriber identity module on the basis of the prediction.

LIST OF DRAWINGS

Example embodiments of the present invention are described below, by wayof example only, with reference to the accompanying drawings, in which

FIGS. 1, 2, 3, 4, 5 and 6 illustrate example embodiments of anapparatus;

FIG. 7 illustrates an example embodiment of a wireless communicationsystem;

FIG. 8 illustrates example embodiments of a method;

FIG. 9 is a signal sequence chart of some example embodiments;

FIG. 10 illustrates example embodiments of an apparatus and a server;

FIG. 11 illustrates example embodiments of a method;

FIGS. 12 and 13 illustrate example embodiments relating to topping up ofthe subscriber identity modules; and

FIGS. 14A and 14B illustrate example embodiments relating to analysis,prediction and action on use of the subscriber identity module.

DESCRIPTION OF EMBODIMENTS

The following embodiments are only examples. Although the specificationmay refer to “an” embodiment in several locations, this does notnecessarily mean that each such reference is to the same embodiment(s),or that the feature only applies to a single embodiment. Single featuresof different embodiments may also be combined to provide otherembodiments. Furthermore, words “comprising” and “including” should beunderstood as not limiting the described embodiments to consist of onlythose features that have been mentioned and such embodiments may containalso features/structures that have not been specifically mentioned.

It should be noted that while FIGS. 1 to 6, 10, and 12 illustratevarious embodiments of apparatuses, they are simplified block diagramsthat only show some structures and functional entities. The connectionsshown in these Figures are logical connections; the actual physicalconnections may be different. Interfaces between the various elementsmay be implemented with suitable interface technologies, such as amessage interface, a method interface, a sub-routine call interface, ablock interface, or any hardware/software means enabling communicationbetween functional sub-units. It is apparent to a person skilled in theart that the described apparatuses may also comprise other functions andstructures. It should be appreciated that details of some functions,structures, and the protocols used for communication are irrelevant tothe actual invention. Therefore, they need not be discussed in moredetail here. Although the apparatuses have been depicted as separatesingle entities, different parts may be implemented in one or morephysical or logical entities.

As shown in FIG. 1, an apparatus 100 comprises an interface 108 to a setof subscriber identity (SIM) modules 110, 112, 114, 116 of a wirelesscommunication system. The interface 108 may or may not include a(contact) smart card reader 130 capable of reading the subscriber datathrough the contacts of the integrated circuit.

The number of the subscriber identity modules 110, 112, 114, 116 mayvary according to the circumstances, but there are at least threesubscriber identity modules. One subscriber identity module 110 may be adefault subscriber identity module used normally (in user's homelocation or in a network where he/she has the coverage of the defaultsubscriber identity module, for example). The number of other subscriberidentity modules 112, 114, 116 may vary between 2 to N, wherein N is aninteger greater than two, whereby the minimum number of the subscriberidentity modules (0, 1, 2, . . . , N) is three.

In an example embodiment, the subscriber identity module 110, 112, 114,116 is an integrated circuit storing subscriber data, which isnetwork-specific information used to authenticate and identifysubscribers on the network. The subscriber identity module may beembedded into a removable SIM card. First SIM cards were of credit cardsize, 85.60 mm×53.98 mm×0.76 mm, but a newer mini-SIM card isconsiderably smaller, 25 mm×15 mm×0.76 mm, or a micro-SIM card is evensmaller, 15 mm×12 mm×0.76 mm. Naturally, these measures are only exampleembodiments. It is also to be noted than one physical SIM card mayinclude a number of different subscriptions: one SIM card may be amulti-IMSI SIM card having many different subscriber identities in thesame card.

Even a virtual subscriber identity module is feasible: it is a mobilephone number provided by a mobile network operator that does not requirea SIM card to connect phone calls to the user's mobile terminal. In sucha scenario, the at least one memory 102 of the apparatus 100 may be usedto store subscriber data of the virtual subscriber identity module asrequired.

The wireless communication system may be anystandard/non-standard/proprietary radio system that supports the use ofthe subscriber identity modules 110, 112, 114, 116. In the present, sucha system may be any mobile telephone system, regardless of thegeneration (such as 2G, 3G, 4G, beyond 4G, etc.). Consequently, thewireless communication system may be GSM (Global System for MobileCommunications), WCDMA (Wideband Code Division Multiple Access),TD-SCDMA (Time Division Synchronous Code Division Multiple Access), orevolved universal terrestrial radio access (E-UTRA), also known as longterm evolution (LTE) for example, or its recent LTE-Advanced versions(LTE-A). However, the example embodiments are not restricted thereto,but may be applicable to other suitable radio systems (in their presentforms and/or in their evolution forms), such as universal mobiletelecommunications system (UMTS) radio access network (UTRAN or EUTRAN),a system based on International Mobile Telecommunication (IMT) standardor any one of its evolution versions (e.g. IMT-Advanced), wireless localarea network (WLAN) based on IEEE (Institute of Electrical andElectronics Engineers) 802.11 standard or its evolution versions (IEEE802.11ac), worldwide interoperability for microwave access (WiMAX),Wi-Fi, 3GPP, Bluetooth®, or personal communications services (PCS).

FIG. 7 illustrates an example of the radio system 702, LTE. The threebasic elements of the radio system 702 are UE 700 (=mobile terminal),eNB (=base station) 704 in a radio network and an access gateway (a-GW)706 in a core network. In such a division, the apparatus 100 is eitherin the UE 700 or coupled to it, but not in the eNB 704 nor in the a-GW706.

The base station may be called, depending on the system, a Node B,enhanced or evolved NodeB (eNB), a home eNode B (HeNB), an access point(AP), an IEEE 802.11 based access point, a femto node, a femto basestation, or any other equipment belonging to the network infrastructureof the wireless communication system, and implementing the radiocommunication interface with the mobile terminal. Functionalities of theeNB 704 may include: all radio protocols, mobility management, allretransmissions, header compression, and packet data convergenceprotocols. The a-GW 706 provides the interface of the cellular radiosystem 702 to/from the other networks 712 such as the Internet. The a-GW706 may be streamlined by separating the user and the control planes: amobility management entity (MME) 708 is just a control plane entity andthe user plane bypasses MME 708 directly to a serving gateway (S-GW)710.

The apparatus 100 also comprises one or more processors 106, and one ormore memories 102 storing instructions 104. In an example embodiment,the instructions 104, when executed by the one or more processors 106,cause the apparatus 100 to obtain data 140A, 140B, 140C, 140D relatingto the subscriber identity modules 110, 112, 114, 116, obtain data 142relating to a mobile terminal, obtain at least one selection ground 144for the subscriber identity module, and select at least one optimalsubscriber identity module 110, 112, 114, 116 for use by the mobileterminal on the basis of the data 140A, 140B, 140C, 140D relating to thesubscriber identity modules, the data 142 relating to the mobileterminal, and the at least one selection ground 144 for the subscriberidentity module. With this kind of processing, utilization of many andwide range of subscriber identity modules becomes possible, and,furthermore, selection of the right subscriber identity module becomesuser friendly and automatic (or at least semi-automatic if userinteraction is required for the selection or its confirmation).

The term ‘processor’ 106 refers to a device that is capable ofprocessing data. Depending on the processing power needed, the apparatus100 may comprise several processors 106 such as parallel processors or amulticore processor. When designing the implementation of the processor106, a person skilled in the art will consider the requirements set forthe size and power consumption of the apparatus 100, the necessaryprocessing capacity, production costs, and production volumes, forexample. The processor 106 and the memory 102 may be implemented by anelectronic circuitry. In an example embodiment, the processor 106 isFreescale™ i.MX233 applications processor such as MCIMX233CJM4C and thememory 102 includes NAND type flash memory such as Micron®MT29F1G08ABADAH4-IT:D, and mobile DDR (=type of double data ratesynchronous DRAM) SDRAM such as Micron® MT46H32M16LFBF-6 IT:C.

A non-exhaustive list of implementation techniques for the processor 106and the memory 102 includes, but is not limited to:

-   -   logic components,    -   standard integrated circuits,    -   application-specific integrated circuits (ASIC),    -   system-on-a-chip (SoC),    -   application-specific standard products (ASSP),    -   microprocessors,    -   digital signal processors,    -   special-purpose computer chips, and    -   field-programmable gate arrays (FPGA).

The instructions 104 may be implemented by software and/or hardware. Inan example embodiment, the software may be written by a suitableprogramming language (such as C, C++, or Java), and the resultingexecutable instructions 104 may be stored on the memory 102 and run bythe microprocessor 106. In an example embodiment, the functionality ofthe hardware may be designed by a suitable hardware description language(such as Verilog or VHDL), and transformed into a gate-level netlist(describing standard cells and the electrical connections between them),and after further phases the chip implementing the processor 106, memory102 and the instructions 104 may be fabricated with photo masksdescribing the circuitry.

In an example embodiment, the one or more memories 102 may further storeinstructions 104, that, when executed by the one or more processors 106,cause the apparatus 100 to obtain the data relating to the subscriberidentity modules 110, 112, 114, 116 by at least one of the following:read the data 140A, 140B, 140C, 140D from the subscriber identitymodules 110, 112, 114, 116, receive the data 140A, 140B, 140C, 140Dwirelessly from a service provider, receive the data 140A, 140B, 140C,140D from a user interface manipulated by a user of a mobile terminal.

The data 140A, 140B, 140C, 140D relating to the subscriber identitymodules 110, 112, 114, 116 may include, for example, a unique serialnumber (Integrated Circuit Card Identifier, ICCID) of the SIM card,internationally unique number of the subscriber (International MobileSubscriber Identity, IMSI), security authentication and cipheringinformation for the subscriber (such as an authentication key Ki),temporary information related to the local network, a list of theservices the subscriber has access to, an operator-specific emergencynumber, two passwords (personal identification number, PIN, for ordinaryuse, and PIN unlock code, PUK, for PIN unlocking), and other requireddata. The subscriber data may also include other carrier-specific datasuch as the short message service centre (SMSC) number, service providername (SPN), service dialing numbers (SDN), advice-of-charge parameters,and value added service (VAS) applications. Further information may befound in the GSM Technical Specification 11.11.

Besides being called subscriber identity module, also other names andabbreviations may be used to refer to subscriptions. USIM (UniversalSubscriber Identity Module) is an application for UMTS running on a UICC(Universal Integrated Circuit Card). The USIM is a logical entity on thephysical card storing user subscriber information, authenticationinformation, text messages, and phone book contacts. For authenticationpurposes, the USIM stores a long-term pre-shared secret key, which isshared with the Authentication Center (AuC) in the network. The USIMalso verifies a sequence number that must be within a range using awindow mechanism to avoid replay attacks, and is in charge of generatingthe session keys to be used in the confidentiality and integrityalgorithms of the KASUMI block cipher in UMTS. The equivalent of USIM onCDMA networks is CSIM.

The service provider is not illustrated in FIG. 1, but the serviceprovider may be an independent supplier/vendor of the subscriberidentity modules 112, 114, 116 and the apparatus 100. The user interfacemanipulated by the user of the mobile terminal may be a user interfaceof the mobile terminal.

In an example embodiment, the one or more memories 102 further storeinstructions 104, that, when executed by the one or more processors 106,cause the apparatus 100 to obtain the data 142 relating to the mobileterminal by obtaining location of the mobile terminal, country code fromthe mobile terminal, pre-set parameters from the mobile terminal, timefrom the mobile terminal, date from the mobile terminal, day of the weekfrom the mobile terminal, information of available operators from themobile terminal, information of available networks from the mobileterminal, obtain type (laptop, mobile phone, tablet, etc.) of the mobileterminal, obtain model (Nokia® N9, Samsung® Galaxy, Apple® iPhone 4,etc.) of the mobile terminal, obtain info about applications (games,email, Skype™, etc.) in use or used in the mobile terminal, and/or othersuitable pre-set parameters.

Location of the mobile terminal may be obtained by use of a satellitenavigation receiver, for example, as will be described with reference toFIG. 2, but also from cellular location based info. Time, date, and dayof the week may be obtained from a watch/calendar application of themobile terminal, and such information may be relevant when decidingwhich subscriber identity module 110/112/114/116 to use as the chargesmay vary according to the time of day, day of the week, or also duringspecial holidays. Information relating to the available operators andavailable networks may be obtained from an appropriate application ofthe mobile terminal as the mobile terminal may listen to certainfrequencies, and such information may also be relevant for deciding theright subscriber identity module 110/112/114/116 for use as the user mayhave some preferences relating to the operator, and also the type of thenetwork may affect the decision. The type of the network, for example,may set limits to the data transfer rate, and depending on the user'srequirements, a high enough data transfer rate may be desirable.

Each location area of a public land mobile network (PLMN) has its ownunique identifier which is known as Location Area Identity (LAI). Thisinternationally unique identifier is used for location updating ofmobile subscribers. It is composed of a three decimal digit MobileCountry Code (MCC), a two to three digit Mobile Network Code (MNC) thatidentifies the GSM PLMN in that country, and a Location Area Code (LAC)which is a 16-bit number thereby allowing 65536 location areas withinone GSM PLMN.

In an example embodiment, the one or more memories 102 further storeinstructions 104, that, when executed by the one or more processors 106,cause the apparatus 100 to obtain the at least one selection ground 144for the subscriber identity module by obtaining network coveragecriterion, available services criterion, quality of service criterion,costs of using the subscriber identity module criterion, location of themobile terminal criterion.

The various criteria may be used alone or in combination. A simpleselection ground 144 could be formulated as follows: “use the cheapestsubscriber identity module 110/112/114/116 that provides the requiredservice at the required quality of service in the present location ofthe mobile terminal by network operator A if available, and if operatorA is not available then by any other operator fulfilling the criteria”,but this is only an example embodiment, as the selection ground 144 maybe made much simpler but also much more complex.

FIG. 9 is a signal sequence chart of some example embodiments.

In an example embodiment, the one or more memories 102 further storeinstructions 104, that, when executed by the one or more processors 106,cause the apparatus 100 to treat one of the subscriber identity modules110 as the default subscriber identity module and to use the defaultsubscriber identity module 110 after start-up of the mobile terminal.The default subscriber identity module 110 may, besides being thestarting subscriber identity module, be also the controlling subscriberidentity module, and possibly also the back-up subscriber identitymodule. In FIG. 9, the mobile terminal 210 uses 900 the default SIM 110for communication.

In an example embodiment, the one or more memories 102 further storeinstructions 104, that, when executed by the one or more processors 106,cause the apparatus 100 to detect roaming of the mobile terminal, and toinitiate said selection of the at least one optimal subscriber identitymodule 112/114/116 for use by the mobile terminal. Roaming is theability for a cellular customer to automatically make and receive voicecalls, send and receive data, or access other services when travellingoutside the geographical coverage area of the home network, by means ofusing a visited network. Roaming is technically supported by mobilitymanagement, authentication and billing procedures. If the visitednetwork is in the same country as the home network, this is known asNational Roaming. If the visited network is outside the home country,this is known as International (or Global) Roaming. If the visitednetwork operates on a different technical standard than the homenetwork, this is known as Inter-standard roaming. GSM Coverage Maps is aunique resource containing information supplied and approved by themembers of the GSM Association. Network, services and roaminginformation are continually updated to reflect the evolving situationworldwide. In FIG. 9, the accessory 200 inactivates 902 the mobileterminal 210, and scans 904, 906, 908 SIM data from the set of availablesubscriber identity modules 112, 114, 116 that are located in theaccessory 200. Next, the accessory 200 asks 910 available networks fromthe mobile terminal 210, whereupon the mobile terminal 210 returns 912the available networks to the accessory 200. The accessory 200 thenselects 914 at least one optimal subscriber identity module 112, 114,116 for use by the mobile terminal as the active SIM on the basis of thedata 904, 906, 908 relating to the subscriber identity modules 112, 114,116, the data 912 relating to the mobile terminal 210, and the at leastone selection ground for the subscriber identity module. In our example,SIM-2 114 is selected 914 as the active SIM, whereupon the accessory 200instructs 916 the mobile terminal 210 to reconnect network with theoptimal active subscriber identity module 114.

In an example embodiment, the one or more memories 102 further storeinstructions 104, that, when executed by the one or more processors 106,cause the apparatus 100 to detect if the default subscriber identitymodule 110 is taken out of the use and instead at least one more optimalsubscriber identity module 112/114/116 is taken into use, in which casethe apparatus 100 is caused to switch on a call forwarding from thedefault subscriber identity module 110 to one of the more optimalsubscriber identity modules 112/114/116 taken into use. With such callforwarding (or diversion) an incoming call to the default subscriberidentity module 110 that is not currently in use is redirected to thecurrently used, more optimal subscriber identity module 112/114/116.

In an example embodiment, the one or more memories 102 further storeinstructions 104, that, when executed by the one or more processors 106,cause the apparatus 100 to perform said selection of the at least oneoptimal subscriber identity module 112/114/116 for use by the mobileterminal in two stages, by pre-selecting subscriber identity modulesthat are usable on the basis of the data 140A, 140B, 140C, 140D relatingto the subscriber identity modules and the data 142 relating to themobile terminal, and by selecting at least one subscriber identitymodule for use by the mobile terminal from among the pre-selectedsubscriber identity modules on the basis of the at least one selectionground 144. With this kind of two-stage selection, processing may becomesimpler, as the pre-selection removes unfeasible subscriber identitymodules, whereupon the final selection may be made among a smaller setof subscriber identity modules.

In an example embodiment, the apparatus 100 may be a mobile wirelesscommunications terminal, an accessory of a mobile wirelesscommunications terminal, a combination of a mobile wirelesscommunications terminal and an accessory of the mobile wirelesscommunications terminal, an accessory of a mobile terminal, acombination of a mobile terminal and an accessory of the mobileterminal, or a USB (Universal Serial Bus) modem, or any other suitablemobile terminal capable of employing the set of subscriber identitymodules 110, 112, 114, 116, such as a mobile phone, a tablet pc, aportable computer, or a computer. In an example embodiment, theapparatus 100 is a part of a mobile base station, which may employ anyearlier mentioned wireless communication system or their combination.

However, in an example embodiment, the apparatus 100 may also beinterpreted as a circuitry implementing the required functionalitywithin some suitable equipment.

If the apparatus 100 is an independent apparatus, then it may alsocomprise equipment needed for other tasks as well. On the other hand, ifthe apparatus 100 is the circuitry, then it may only comprise theprocessor 106, the memory 102, the instructions 104, and the interface108.

Various example embodiments will be explained with reference to FIGS. 2,3, 4, 5 and 6.

In an example embodiment illustrated in FIG. 6, the apparatus 100 may bean electronic digital computer, which may comprise, besides theprocessor 106 and the (working) memory 102, a non-volatile memory 600,and a system clock 602. Naturally, the computer may comprise a number ofother peripheral devices, not illustrated here for the sake of clarity.

In an example embodiment, the system clock 602 constantly generates astream of electrical pulses, which cause the various transferringoperations within the computer to take place in an orderly manner andwith specific timing.

In an example embodiment, the processor 106 may be implemented as amicroprocessor implementing functions of a central processing unit (CPU)on an integrated circuit. The CPU is a logic machine executing acomputer program 122, which comprises the program instructions 104. Theinstructions 104 may be coded as a computer program using a programminglanguage, which may be a high-level programming language, such as C, orJava, or a low-level programming language, such as a machine language,or an assembler. The CPU may comprise a set of registers 604, anarithmetic logic unit (ALU) 606, and a control unit (CU) 608. Thecontrol unit 608 is controlled by a sequence of instructions 104transferred to the CPU from the working memory 102. The control unit 608may contain a number of microinstructions for basic operations. Theimplementation of the microinstructions may vary, depending on the CPUdesign. The microprocessor 106 may also have an operating system (adedicated operating system of an embedded system, or a real-timeoperating system), which may provide the computer program 122 withsystem services.

In an example embodiment, there may be three different types of busesbetween the working memory 102 and the processor 106: a data bus 610, acontrol bus 612, and an address bus 614. The control unit 608 uses thecontrol bus 612 to set the working memory 102 in two states, one forwriting data into the working memory 102, and the other for reading datafrom the working memory 102. The control unit 608 uses the address bus614 to send to the working memory 102 address signals for addressingspecified portions of the memory in writing and reading states. The databus 610 is used to transfer data 622, such as data 140A, 140B, 140C,140D, 142, 144, from the working memory 102 to the processor 106 andfrom the processor 106 to the working memory 102, and to transfer theinstructions 104 from the working memory 102 to the processor 106.During running of the program 122, the instructions 104 are transferredvia the data bus 610 from the working memory 102 into the control unit608, wherein usually a portion of the instructions 104 resides andcontrols the operation of the apparatus 100.

In an example embodiment, the working memory 102 may be implemented as arandom-access memory (RAM), where the information is lost after thepower is switched off. The RAM is capable of returning any piece of datain a constant time, regardless of its physical location and whether ornot it is related to the previous piece of data. The data may comprisedata 140A, 140B, 140C, 140D, 142, 144 and any other permanent ortemporary data needed during the processing, program instructions etc.

In an example embodiment, the non-volatile memory 600 retains the storedinformation even when not powered. Examples of non-volatile memoryinclude read-only memory (ROM), flash memory, magnetic computer storagedevices such as hard disk drives, and optical discs. As is shown in FIG.6, the non-volatile memory 600 may store both data 620 and the computerprogram 122 comprising the instructions 104.

An example embodiment provides a computer program 122 comprising theinstructions 104 which, when loaded 126 into the apparatus 100, causethe apparatus 100 to obtain data 140A, 140B, 140C, 140D relating to thesubscriber identity modules 110, 112, 114, 116, obtain data 142 relatingto a mobile terminal, obtain at least one selection ground 144 for thesubscriber identity module, and select at least one optimal subscriberidentity module 110, 112, 114, 116 for use by the mobile terminal on thebasis of the data 140A, 140B, 140C, 140D relating to the subscriberidentity modules, the data 142 relating to the mobile terminal, and theat least one selection ground 144 for the subscriber identity module.

In an example embodiment, the computer program 122 may be in source codeform, object code form, or in some intermediate form. The computerprogram 122 may be stored in a carrier 120, which may be any entity ordevice capable of carrying the program 122 to the apparatus 100. Thecarrier 120 may be a computer-readable storage medium. Besides this, thecarrier 120 may be implemented as follows, for example: the computerprogram 122 may be embodied on a record medium, stored in a computermemory, embodied in a read-only memory, carried on an electrical carriersignal, carried on a telecommunications signal, and/or embodied on asoftware distribution medium. In some jurisdictions, depending on thelegislation and the patent practice, the carrier 120 may not be thetelecommunications signal. The medium 120 may be a non-transitorycomputer-readable storage medium.

FIG. 1 illustrates an example embodiment in which the carrier 120 may becoupled 126 with the apparatus 100, whereupon the program 122 comprisingthe instructions 104 is transferred into the (working) memory 102, andpossibly also into the non-volatile memory 600. The program 122 with itsinstructions 104 may be loaded from the non-volatile memory 600 into theworking memory 102 as needed.

There are many ways to structure the program 122. In an exampleembodiment, the operations of the program may be divided into functionalmodules, sub-routines, methods, classes, objects, applets, macros, etc.,depending on the software design methodology and the programminglanguage used. In modern programming environments, there are softwarelibraries, i.e. compilations of ready-made functions, which may beutilized by the program for performing a wide variety of standardoperations.

FIG. 2 illustrates an example embodiment wherein the apparatus 100functionality is implemented in an accessory 200 of a mobile terminal210. Consequently, the accessory 200 comprises the set of the subscriberidentity modules 112, 114, 116, and the at least one processor 106 andat least one memory 102 with the instructions 104.

The accessory 200 may or may not comprise a battery 202, depending onthe power requirements of the accessory 200 and the possibility toobtain electric energy from an external source such as the mobileterminal 210. The (rechargeable) electrical battery 202 is one or moreelectrochemical cells that convert stored chemical energy intoelectrical energy. Instead of battery 202, other suitable accumulatormeans may be used to store energy.

The interface 108 to the subscriber identity modules 110, 112, 114, 116is within the accessory 200, but also another interface 228 to thesubscriber identity module 110 possibly located in the mobile terminal210 may be needed.

Furthermore, both the mobile terminal 210 and the accessory 200 comprisea wired/wireless standard/proprietary communication protocol interface204, 220 enabling two-way communication 230 between the mobile terminal210 and the accessory 200. In an example embodiment, the interface 204,220 is implemented as a serial or parallel communication bus, hardwareline, an USB (Universal Serial Bus) cable with appropriate connectors, aSIM bus according to ISO/IEC 7816-3, a wireless Bluetooth link, awireless WLAN (Wireless Local Area Network) link, a wireless Wi-Fi(Wireless Fidelity) link, a serial bus such as UART (UniversalAsynchronous Receiver/Transmitter), I²C (Inter-Integrated Circuit) orSPI (System Packet Interface). The data 140A relating to the subscriberidentity module 110 and the data 142 relating to the mobile terminal 210may be transferred from the mobile terminal 210 to the accessory 200through the interfaces 204, 220.

The instructions 104, when executed by the one or more processors 106 ofthe accessory 200, cause the accessory 200 to obtain the data 140A,140B, 140C, 140D relating to the subscriber identity modules 110, 112,114, 116, obtain the data 142 relating to the mobile terminal 210,obtain at least one selection ground 144 for the subscriber identitymodule, and select at least one optimal subscriber identity module 110,112, 114, 116 for use by the mobile terminal 210 on the basis of thedata 140A, 140B, 140C, 140D relating to the subscriber identity modules,the data 142 relating to the mobile terminal 210, and the at least oneselection ground 144 for the subscriber identity module.

In an example embodiment, the mobile terminal 210 may be a mobilewireless communications terminal employing a transceiver 218 capable ofcommunicating with a wireless communication system, such as 702illustrated in FIG. 7. In an example embodiment, the mobile terminal 210may be a mobile phone comprising the default subscriber identity module110, a user interface 216, a battery 212, at least one processor 222 andat least one memory 226 with instructions 224.

The user interface 216 may comprise a display, means for producingsound, a keyboard, and/or a keypad, for example. The display may be aliquid crystal display, for example, but it may also be implemented byany appropriate prior art technique, such as with an active-matrixorganic light-emitting diode. The display may also incorporate otheruser interaction means, such as touch input, or haptic feedback, i.e.the display may be a touch screen. The means for producing sound may bea loudspeaker or a simpler means for producing beeps or other soundsignals. The keyboard/keypad may comprise a complete (QWERTY) keyboard,a mere numeric keypad or only a few push buttons and/or rotary buttons.In addition, the user interface 216 may comprise other user interfaceelements, for example various means for focusing a cursor (mouse, trackball, various arrow keys, touch sensitive area etc.) or elementsenabling audio control. A parameter, setting or command relating to thedescribed processing of the subscriber identity modules 110, 112, 114,116 may be manipulated with the user interface 216.

Furthermore, the mobile terminal 210 may comprise a positioning receiver214 receiving external location information, which may be utilized togenerate location of the mobile terminal 210. The positioning receiver214 may be a receiver of a global navigation satellite system (GNSS).Such a system may be the Global Positioning System (GPS), the GlobalNavigation Satellite System (GLONASS), the Galileo Positioning System(Galileo), the Beidou Navigation System, The Quasi-Zenith SatelliteSystem (QZSS), or the Indian Regional Navigational Satellite System(IRNSS), for example. The positioning receiver 214 determines itslocation (longitude, latitude, and altitude) using signals transmittedfrom satellites orbiting the earth. Besides global navigationsatellites, the positioning receiver 214 may also determine its locationby utilizing other known positioning techniques. It is well known thatby receiving radio signals from several different base stations, amobile phone may determine its location, for example.

In the example embodiment of FIG. 2, the accessory 200 does not comprisea user interface of its own, but the user interaction is performedthrough the user interface 216 of the mobile terminal 210 as data may betransferred between the accessory 200 and the mobile terminal 210through the interfaces 204, 220. However, in another example embodiment,the accessory 200 may comprise a user interface as well for outputtingand/or inputting data relating to the described processing of thesubscriber identity modules 110, 112, 114, 116.

In the example embodiment of FIG. 2, the apparatus 100 functionality maybe implemented in the accessory 200 such that the instructions 104 arerun in the at least one processor 106 of the accessory 200. However,also such an example embodiment is feasible wherein a part of theapparatus 100 functionality is implemented in the mobile terminal 210 aswell such that a part of the instructions 104 are also run in the atleast one processor 222 of the mobile terminal 210.

FIG. 3 illustrates an example embodiment wherein the apparatus 100functionality is divided between an accessory 300 of a mobile terminal310 and the mobile terminal 310. Consequently, the accessory 200comprises the set of the subscriber identity modules 112, 114, 116. Theinterface 108 to the subscriber identity modules 110, 112, 114, 116 iswithin the accessory 200, but also another interface 228 to thesubscriber identity module 110 possibly located in the mobile terminal210 may be needed. But, as shown in FIG. 3, the accessory 300 does notrequire a processor or a memory.

The mobile terminal 310 comprises the at least one processor 106 and atleast one memory 102 with the instructions 104, and also the other parts110, 212, 214, 216, 218, 220, 228 as shown in FIG. 3, and explained inrelation to FIG. 2.

In the example embodiment of FIG. 3, the accessory 300 is a kind ofcontainer including the extra subscriber identity modules 112, 114, 116to be used by the mobile terminal 310, but the required processing isperformed only in the at least one processor 106 of the mobile terminal310.

The data 140B, 140C, 140D relating to the subscriber identity modules112, 114, 116 may be transferred from the accessory 300 to the mobileterminal 310 through the interfaces 204, 220.

The instructions 104, when executed by the one or more processors 106 ofthe mobile terminal 310, cause the mobile terminal 310 to obtain thedata 140A, 140B, 140C, 140D relating to the subscriber identity modules110, 112, 114, 116, obtain the data 142 relating to the mobile terminal210, obtain at least one selection ground 144 for the subscriberidentity module, and select at least one optimal subscriber identitymodule 110, 112, 114, 116 for use by the mobile terminal 210 on thebasis of the data 140A, 140B, 140C, 140D relating to the subscriberidentity modules, the data 142 relating to the mobile terminal 210, andthe at least one selection ground 144 for the subscriber identitymodule.

FIG. 4 illustrates an example embodiment wherein the apparatus 100functionality is implemented to a mobile terminal 400. Consequently, themobile terminal 400 comprises the interface 108 to the set of thesubscriber identity modules 110, 112, 114, 116 of the wirelesscommunication system, the one or more processors 106, and the one ormore memories 102 storing the instructions 104. The instructions 104,when executed by the one or more processors 106, cause the mobileterminal 400 to obtain data 140A, 140B, 140C, 140D relating to thesubscriber identity modules 110, 112, 114, 116 through the interface108, obtain data 142 relating to the mobile terminal 400, obtain atleast one selection ground 144 for the subscriber identity module, andselect at least one optimal subscriber identity module for use by themobile terminal 400 on the basis of the data 140A, 140B, 140C, 140Drelating to the subscriber identity modules 110, 112, 114, 116, the data142 relating to the mobile terminal 400, and the at least one selectionground 144 for the subscriber identity module. The mobile terminal 400may also comprise at least some of the other parts 212, 214, 216, 218 asshown in FIG. 4, and explained in relation to FIG. 2.

FIG. 5 illustrates an example embodiment wherein the apparatus 100functionality is implemented in a USB (Universal Serial Bus) modem 500.Consequently, the USB modem 500 comprises the set of the subscriberidentity modules 110, 112, 114, 116, the interface 108 to the subscriberidentity modules 110, 112, 114, 116, the at least one processor 106, andat least one memory 102 with the instructions 104.

The USB modem 500 may or may not comprise a battery, depending on thepower requirements of the USB modem 500 and the possibility to obtainelectric energy from an external source such as a mobile terminal 510.

Furthermore, the USB modem 500 comprises a USB interface 204 capable ofbeing coupled 230 through a USB cable and appropriate connectors to aUSB interface 220 of the mobile terminal 510. The data 142 relating tothe mobile terminal 510 may be transferred from the mobile terminal 510to the USB modem 500 through the interfaces 204, 220.

The instructions 104, when executed by the one or more processors 106 ofthe USB modem 500, cause the USB modem 500 to obtain the data 140A,140B, 140C, 140D relating to the subscriber identity modules 110, 112,114, 116, obtain the data 142 relating to the mobile terminal 510,obtain at least one selection ground 144 for the subscriber identitymodule, and select at least one optimal subscriber identity module 110,112, 114, 116 for use by the mobile terminal 510 on the basis of thedata 140A, 140B, 140C, 140D relating to the subscriber identity modules,the data 142 relating to the mobile terminal 510, and the at least oneselection ground 144 for the subscriber identity module.

In an example embodiment, the mobile terminal 510 may be a portablecomputer, a tablet computer, or any other suitable mobile terminalcapable of employing the set of subscriber identity modules 110, 112,114, 116, but not necessarily itself including a transceiver capable ofcommunicating with a wireless communication system, such as 702illustrated in FIG. 7. Consequently, the mobile terminal 510 may onlycomprise the battery 212 and the user interface 216 of the other partsof the mobile terminal 210 illustrated in FIG. 2.

In the example embodiment of FIG. 5, the apparatus 100 functionality maybe implemented in the USB modem 500 such that the instructions 104 arerun in the at least one processor 106 of the USB modem 500. However,also such an example embodiment is feasible wherein a part of theapparatus 100 functionality is implemented in the mobile terminal 510 aswell such that a part of the instructions 104 are also run in at leastone processor 222 of the mobile terminal 510 besides the otherinstructions 224 stored in at least one memory 226 of the mobileterminal 510.

The example embodiments explained so far with reference to FIGS. 1 to 9mainly deal with the selection of the at least one optimal subscriberidentity module 110, 112, 114, 116 for use by the mobile terminal,wherein the processing relating to the selection is mainly done in themobile terminal and/or in the accessory of the mobile terminal.

FIG. 10 illustrates example embodiments, wherein an external server 1010participates in said processing relating to the selection of the atleast one optimal subscriber identity module 110, 112, 114, 116.

The apparatus 100 comprises, as already explained, the SIM interface 108to the set of the subscriber identity modules 110, 112, 114, 116 of thewireless communication system. Furthermore, the apparatus 100 comprisesa radio interface 1002 to a radio transceiver of a wirelesscommunication system. The radio transceiver is not illustrated in FIG.10, but it may be the radio transceiver 218 of the mobile terminal 210as illustrated in FIG. 2, 3 or 4, or it may be the radio transceiver216/218 of the USB modem 500 as illustrated in FIG. 5, for example. Infact, the apparatus 100 illustrated in FIG. 10 may be implemented as inany example embodiment described in FIGS. 1 to 9. These embodimentsinclude a mobile wireless communications terminal, an accessory of amobile wireless communications terminal, a combination of a mobilewireless communications terminal and an accessory of the mobile wirelesscommunications terminal, an accessory of a mobile terminal, acombination of a mobile terminal and an accessory of the mobileterminal, a Universal Serial Bus USB modem. Consequently, the apparatus100 may communicate 1030 with the server 1010 either through theaccessory 200/300/500, which then includes a suitable transceiver216/218, or through the mobile terminal 210/310/400/510, which includesa suitable transceiver 218.

The apparatus 100 further comprises the one or more processors 106, andthe one or more memories 102 storing the instructions 104 as alreadyexplained earlier. The one or more memories 102 may further store theearlier mentioned data 620.

The instructions 104, when executed by the one or more processors 106,cause the apparatus 100 to obtain, through the SIM interface 108, data140A, 140B, 140C, 140D relating to the subscriber identity modules 110,112, 114, 116, and obtain data 142 relating to the mobile terminal210/310/400/510.

Furthermore, the instructions 104, when executed by the one or moreprocessors 106, cause the apparatus 100 to transmit, through the radiointerface 1002, the data 140A, 140B, 140C, 140D relating to thesubscriber identity modules 110, 112, 114, 116 and the data 142 relatingto the mobile terminal 210/310/400/510 to the service provider server1010, and receive, through the radio interface 1002, a selection fromthe service provider server 1010 of at least one optimal subscriberidentity module 110/112/114/116 from among the set of the subscriberidentity modules 110, 112, 114, 116 for use by the mobile terminal210/310/400/510.

The server 1010 comprises a communication interface 1012 capable ofcommunicating 1030 with the apparatus 100 through a communicationnetwork 1004. The communication network 1004 comprises at least awireless system such as the earlier mentioned wireless communicationsystem, but it may also comprise wired system, such as the Internet.Consequently, the communication interface 1012 utilizes either a radiotransceiver and/or a wired network interface.

The server 1010 also comprises one or more processors 1014, and one ormore memories 1018 storing instructions 1020. In an example embodiment,the server 1010 is a computer, such as a single server computer or acluster of computers, whereby the one or more processors 104 and the oneor more memories may be implemented by suitable processors, even inparallel or multicore embodiments, for example. As shown in FIG. 10,data 1022 relating to the processing may reside on the one or morememories 108. FIG. 10 also shows that the server 1010 may comprise adatabase interface 1016 to a database 1024 filled with informationrelating to the selection of optimal subscriber identity module. Thedatabase 1024 may reside in the server 1010, or, as illustrated in FIG.10, in another computer.

In an example embodiment, the instructions 1020, when executed by theone or more processors 1014, cause the server 1010 to receive, throughthe communication interface 1012, the data 140A, 140B, 140C, 140Drelating to the set of subscriber identity modules 110, 112, 114, 116 ofthe mobile terminal 210/310/400/510 of the wireless communicationsystem, and data 142 relating to the mobile terminal 210/310/400/510.

In an example embodiment, the instructions 1020, when executed by theone or more processors 1014, cause the server 1010 to select at leastone optimal subscriber identity module 110/112/114/116 for use by themobile terminal 210/310/400/510 on the basis of the data 140A, 140B,140C, 140D relating to the subscriber identity modules 110, 112, 114,116, the data 142 relating to the mobile terminal 210/310/400/510, andat least one selection ground for the subscriber identity module.

With this kind of processing, utilization of many and wide range ofsubscriber identity modules becomes possible, and, furthermore,selection of the right subscriber identity module becomes user friendlyand automatic. Besides, making the selection in the server 1010 enablesthe service provider to utilize the latest possible information relatingto the selection grounds, whereby the selection is as optimal aspossible. The centralized processing within the server 1010 enables theservice provider to gather and combine data relating to a large numberof users, whereby the information relating to the selection grounds maybe interpreted more precisely.

In addition to selection of the at least one optimal subscriber identitymodule for use, i.e. what subscriber identity module to use, also theway to use the selected subscriber identity module(s) may be informed bythe server 1010, i.e. how to use the subscriber identity module110/112/114/116. A simple rule for use could be formulated as follows:use the subscriber identity module 110 for web surfing, but for moviedownload use the subscriber identity module 112″, but this is only anexample embodiment, as the rule may be made much simpler but also muchmore complex.

As was explained earlier, the service provider may be an independentsupplier/vendor of the subscriber identity modules 110, 112, 114, 116and the apparatus 100. Also a mobile operator may take the role of theservice provider. In any case, besides the subscriber identity modulessupplied by the service provider, the user may also set own subscriberidentity modules into the set of the subscriber identity modules amongwhich the optimal one(s) is (are) selected.

The at least one selection ground comprises at least one of thefollowing: network coverage criterion, available services criterion,quality of service criterion, costs of using the subscriber identitymodule criterion, location of the mobile terminal criterion. The server1010 may gather real-life data relating to the selection grounds, and,as the processing is centralized, even confidential information may beutilized for the selection.

But, as was explained earlier, at least one selection ground 144 mayalso be obtained by the apparatus 100. Consequently, the one or morememories 102 further store instructions 104, that, when executed by theone or more processors 102, cause the apparatus 100 to obtain at leastone selection ground 144 for the subscriber identity module, andtransmit, through the radio interface 1002, the at least one selectionground 144 for the subscriber identity module to the service providerserver 1010.

In an example embodiment, the instructions 1020, when executed by theone or more processors 1014, cause the server 1010 to transmit, throughthe communication interface 1012, the selection of at least one optimalsubscriber identity module 110/112/114/116 from among the set of thesubscriber identity modules 110, 112, 114, 116 for use by the mobileterminal 210/310/400/510.

As was explained earlier, in an example embodiment, the one or morememories 102 further store instructions 104, that, when executed by theone or more processors 106, cause the apparatus 100 to obtain the data140A, 140B, 140C, 140D relating to the subscriber identity modules 110,112, 114, 116 by at least one of the following: read the data from thesubscriber identity modules 110, 112, 114, 116, receive the data from auser interface manipulated by a user of the mobile terminal210/310/400/510.

As was also explained earlier, in an example embodiment, the one or morememories 102 further store instructions 104, that, when executed by theone or more processors 106, cause the apparatus 100 to obtain the datarelating 142 to the mobile terminal 210/310/400/510 by at least one ofthe following: obtain location of the mobile terminal 210/310/400/510,obtain country code from the mobile terminal 210/310/400/510, obtaintime from the mobile terminal 210/310/400/510, obtain date from themobile terminal 210/310/400/510, obtain day of the week from the mobileterminal 210/310/400/510, obtain information of available operators fromthe mobile terminal 210/310/400/510, obtain information of availablenetworks from the mobile terminal 210/310/400/510, obtain type of themobile terminal 210/310/400/510, obtain model of the mobile terminal210/310/400/510, obtain info about applications in use or used in themobile terminal 210/310/400/510.

In an example embodiment, wherein the apparatus 100 further comprises adata interface 1000 to a user interface, and wherein the one or morememories 102 further store instructions 104, that, when executed by theone or more processors 106, cause the apparatus 100 to present, throughthe data interface 1000, the selection of the at least one optimalsubscriber identity module 110/112/114/116 as pre-selected subscriberidentity modules for the user, and to receive, through the datainterface 1000, a confirmation/selection of at least one subscriberidentity module 110/112/114/116 for use by the mobile terminal210/310/400/510 from among the pre-selected subscriber identity modules.

Next, example embodiments of a method will be described with referenceto FIG. 8. Other functions, not described in this application, may alsobe executed between the operations or within the operations. Some of theoperations or parts of the operations may also be left out or replacedby a corresponding operation or part of the operation. The method startsin 800. In 802, data relating to subscriber identity modules of awireless communication system is obtained. In 804, data relating to amobile terminal is obtained. In 806, at least one selection ground forthe subscriber identity module is obtained. It is to be noted that thesequence of operations 802, 804, 806 may differ from what is shown, andthey may also be executed at least partly in parallel. In 808 at leastone optimal subscriber identity module for use by the mobile terminal isselected on the basis of the data relating to the subscriber identitymodules, the data relating to the mobile terminal, and the at least oneselection ground for the subscriber identity module. The method ends in810.

The embodiments of the earlier described apparatus 100 may also be usedto enhance the method. In an example embodiment, the method may beimplemented in an electronic apparatus 100 described earlier. In anembodiment, a computer program comprises instructions which, when loadedinto an apparatus 100, cause the apparatus 100 to perform the describedprocess. In an embodiment, a computer-readable storage medium comprisesthe computer program.

Next, further example embodiments of the method will be described. Theseexample embodiments may be freely combined with each other in order toproduce further example embodiments.

In an example embodiment, obtaining 802 the data relating to thesubscriber identity modules comprises at least one of the following:reading the data from the subscriber identity modules; receiving thedata wirelessly from a service provider; receiving the data from a userinterface manipulated by a user of the mobile terminal.

In an example embodiment, obtaining 804 the data relating to the mobileterminal comprises at least one of the following: obtaining location ofthe mobile terminal; obtaining country code from the mobile terminal;obtaining time from the mobile terminal; obtaining date from the mobileterminal; obtaining day of the week from the mobile terminal; obtaininginformation of available operators from the mobile terminal; obtaininginformation of available networks from the mobile terminal; obtainingtype of the mobile terminal, obtaining model of the mobile terminal;obtaining info about applications in use or used in the mobile terminal.

In an example embodiment, obtaining 806 the at least one selectionground for the subscriber identity module comprises at least one of thefollowing: obtaining network coverage criterion; obtaining availableservices criterion; obtaining quality of service criterion; obtainingcosts of using the subscriber identity module criterion; obtaininglocation of the mobile terminal criterion.

In an example embodiment, the method further comprises: treating one ofthe subscriber identity modules as the default subscriber identitymodule; and using the default subscriber identity module after start-upof the mobile terminal.

In an example embodiment, the method further comprises: detectingroaming of the mobile terminal; and initiating said selection of the atleast one optimal subscriber identity module for use by the mobileterminal.

In an example embodiment, the method further comprises: detecting if thedefault subscriber identity module is taken out of the use and insteadat least one more optimal subscriber identity module is taken into use,and, in such a case, switching on a call forwarding from the defaultsubscriber identity module to one of the more optimal subscriberidentity modules taken into use.

In an example embodiment, the method further comprises: performing saidselection of the at least one optimal subscriber identity module for useby the mobile terminal in two stages, by pre-selecting subscriberidentity modules that are usable on the basis of the data relating tothe subscriber identity modules and the data relating to the mobileterminal, and by selecting at least one subscriber identity module foruse by the mobile terminal from among the pre-selected subscriberidentity modules on the basis of the at least one selection ground.

FIG. 11 illustrates further example embodiments of the method. Themethod starts in 1100.

In 1102, data relating to subscriber identity modules of a wirelesscommunication system is obtained. In an example embodiment, obtainingthe data relating to the subscriber identity modules in 1102 comprisesat least one of the following: reading the data from the subscriberidentity modules, receiving the data from a user interface manipulatedby a user of the mobile terminal.

In 1104, data relating to a mobile terminal is obtained. In an exampleembodiment, obtaining the data relating to the mobile terminal in 1104comprises at least one of the following: obtaining location of themobile terminal, obtaining country code from the mobile terminal,obtaining time from the mobile terminal, obtaining date from the mobileterminal, obtaining day of the week from the mobile terminal, obtaininginformation of available operators from the mobile terminal, obtaininginformation of available networks from the mobile terminal, obtainingtype of the mobile terminal, obtaining model of the mobile terminal,obtaining info about applications in use or used in the mobile terminal.

In 1106, the data relating to the subscriber identity modules and thedata relating to the mobile terminal is transmitted to a serviceprovider server. In 1108, a selection is received from the serviceprovider server of at least one optimal subscriber identity module fromamong the set of the subscriber identity modules for use by the mobileterminal. The method ends in 1110.

A further example embodiment includes an additional operation: in 1112,at least one selection ground for the subscriber identity module isobtained, and the at least one selection ground for the subscriberidentity module is additionally transmitted in 1106 to the serviceprovider server.

In another example embodiment, the method further comprises: presentingthe selection of the at least one optimal subscriber identity module aspre-selected subscriber identity modules for the user in 1114, andreceiving, from a user, a confirmation/selection of at least onesubscriber identity module for use by the mobile terminal from among thepre-selected subscriber identity modules in 1116.

The previous embodiments have described an elaborated system ofutilizing the set of the subscriber identity modules 110, 112, 114, 116for the single user of the mobile terminal 210/310/400/510. Next, somefurther aspects relating to the management of the subscriber identitymodules 110, 112, 114, 116 are revealed.

FIGS. 12 and 13 illustrate topping up of the subscriber identity modules110, 112, 114, 116.

FIG. 12 illustrates the way the various parts of the system may interactwith each other. It is to be noted that, for the sake of clarity, allpossible connections between the various parts are not illustrated.

The apparatus 100 with the set of the subscriber identity modules 110,112, 114, 116 illustrated in FIG. 12 is as in the example embodimentsdescribed earlier with reference to FIGS. 1 to 11.

Also the server 1010 and the database 1024 are as illustrated with theearlier described embodiments. The server 1010 may comprise at least oneof the following: a computer, a server computer, a cluster of computers,a computer system, any one of the previous operated by a serviceprovider providing the set of the subscriber identity modules 110, 112,114, 116.

The communication network 1004 may comprise, as already explained acombination of various wireless and/or wired systems such as the earliermentioned wireless communication system and the Internet.

As explained before, the server 1010 comprises the communicationinterface 1012, the one or more processors 1014, and the one or morememories 1018 storing the instructions 1020.

In an example embodiment, the instructions 1020, when executed by theone or more processors 1014, cause the server 1010, for each subscriberidentity module 110, 112, 114, 116 belonging to the set of subscriberidentity modules of the user of the mobile terminal 210/310/400/510, todetect 1220, 1222, 1224, 1226, 1228 a need to top up credit of thesubscriber identity module 110/112/114/116, and after the detection,transmit, through the communication interface 1012, transaction data1230 determining a payment to the mobile phone operator 1200, 1202,1204, 1206 of the subscriber identity module 110/112/114/116 in order totop up the credit of the subscriber identity module 110/112/114/116. Theneed for the topping-up may be detected by the mobile phone operatorinfrastructure 1200, 1202, 1204, 1206, and/or by the subscriber identitymodule 110, 112, 114, 116 and the apparatus 100.

The mobile phone operator (also known as mobile network operator,wireless service provider, wireless carrier, cellular company, or mobilenetwork carrier) 1200, 1202, 1204, 1206 is a telephone company providingservices for the user of the mobile terminal 210/310/400/510. Someexamples of the mobile phone operators include: China Mobile, Vodafone,Orange, TeliaSonera, T-Mobile, Verizon Wireless etc. The mobile phoneoperator 1200, 1202, 1204, 1206 gives the subscriber identity module110, 112, 114, 116 to the user who inserts it into the apparatus 100 togain access to the service. In the described embodiments, the mobilephone operators 1200, 1202, 1204, 1206 may first supply the serviceprovider with at least some of the subscriber identity modules 110, 112,114, 116, whereupon the service provider assembles a suitable set of thesubscriber identity modules 110, 112, 114, 116, possibly with theapparatus 100, and gives them to the end-user for use. Other ways ofsupplying the subscriber identity modules 110, 112, 114, 116 to theend-user are also feasible: the service provider may give one or moresubscriber identity modules 110, 112, 114, 116 to the end-user who willset them to the apparatus 100, for example. The mobile phone operator1200, 1202, 1204, 1206 may either own the underlying network andspectrum assets required to run the service, or the mobile phoneoperator may be a virtual one, buying wholesale service from the mobilephone operator owning the underlying network and spectrum assets andselling on to its own customers. Even though connections between thesubscriber identity modules 110, 112, 114, 116 and the operatorinfrastructure 1200, 1202, 1204, 1206 are not shown in FIG. 12, it isclear that such connections exist, as the subscriber identity modules110, 112, 114, 116 remain, in general, under management of theoperators; the service provider only supports their flexible use undervarying circumstances.

In an example embodiment, the set of the subscriber identity modules110, 112, 114, 116 comprises prepaid subscriber identity modulesobtained from various mobile phone operators 1200, 1202, 1204, 1206.Credit is purchased in advance of use for the prepaid subscriberidentity module. The purchased credit is used to pay for the services atthe point they are used. If there is no credit left, the requestedservice is denied by the mobile network operator 1200, 1202, 1204, 1206.Topping-up of the credit is consequently needed in order to be able touse the network services. A variety of payment methods (including theuse of bank accounts and/or credit cards) may be utilized for thetopping-up.

As shown in FIG. 12, the server 1010 may transmit transaction data 1230determining the payment to the mobile phone operator 1200, 1202, 1204,1206 to a special payment system 1210. The payment system 1210 may be apart of a computer system of a bank, or another similar system capableof implementing financial transactions. Depending on the legislation andon the selected business model, the financial transactions relating tothe topping-up may be performed in various ways. If the service providermaintaining the server 1010 is an independent supplier/vendor of thesubscriber identity modules 110, 112, 114, 116, the service provider mayfirst pay the topping-up for the mobile network operator and latercharge it from the user. In such a case, the service provider acquiressubscriber identity modules from various mobile phone operators 1200,1202, 1204, 1206, and offers them as a convenient package (as the set)for the user, who may enjoy flexible roaming and reasonable costs as theoptimal subscriber identity module 110/112/114/116 may be chosen for usedepending on various earlier mentioned factors such as location, networkcoverage, cost, network quality, or any other parameter or theircombination.

In the case of prepaid subscriber identity modules 110, 112, 114, 116,the mobile network operator 1200, 1202, 1204, 1206 is not necessarilyusing the most convenient payment methods due to the nature and/orfeatures of the prepaid subscriber identity modules and its typicalcustomer. This situation is improved by the service provider purchasinga large number of prepaid subscriber identity modules 110, 112, 114, 116and acting as one billed customer towards the mobile network operator1200, 1202, 1204, 1206, whereupon the service provider takes care of theindividual billing towards the end-user.

In an example embodiment, the one or more memories 1018 further storeinstructions 1020, that, when executed by the one or more processors1014, cause the server 1010 to determine the payment to the mobile phoneoperator 1200, 1202, 1204, 1206 to be paid from a bank account of theservice provider providing the set of the subscriber identity modules110, 112, 114, 116.

In another example embodiment, the one or more memories 1018 furtherstore instructions 1020, that, when executed by the one or moreprocessors 1014, cause the server 1010 to transmit, through thecommunication interface 1012, an invoice to the user covering the sumneeded to top up the credit of the subscriber identity module110/112/114/116. Such single topping-up results in smaller individualbills for the user. This is in contrast to the compiled invoicingdescribed next.

In another example embodiment, the one or more memories 1018 furtherstore instructions 1020, that, when executed by the one or moreprocessors 1014, cause the server 1010 to compile user balance data fromthe balance data of each subscriber identity module 110, 112, 114, 116belonging to the set of subscriber identity modules 110, 112, 114, 116.

In another example embodiment, the one or more memories 1018 furtherstore instructions 1020, that, when executed by the one or moreprocessors 1014, cause the server 1010 to transmit, through thecommunication interface 1012, a compiled invoice to the user coveringthe sum indicated by the user balance data. The compiled invoicesimplifies the invoicing, both for the service provider and the user.

In an example embodiment, the one or more memories 1018 further storeinstructions 1020, that, when executed by the one or more processors1014, cause the server 1010 to keep balance data 1022 relating to thesubscriber identity module 110, 112, 114, 116, and detect the need totop up the credit of the subscriber identity module 110, 112, 114, 116on the basis of the balance data 1022. In order to keep the balance data1022, the server 1010 may itself process and store it in the database1024, or the server 1010 may, alternatively, or additionally, receivethe balance data 1022 from the mobile phone operator 1200, 1202, 1204,1206. In an example embodiment, to the one or more memories 1018 furtherstore instructions 1020, that, when executed by the one or moreprocessors 1014, cause the server 1010 to receive 1222, 1224, 1226,1228, through the communication interface 1012, the balance data fromthe mobile phone operator 1200, 1202, 1204, 1206 of the subscriberidentity module 110, 112, 114, 116.

Besides keeping the balance data, or in addition to it, the server 1010may detect the need for the topping-up in other ways as well. In anexample embodiment, the one or more memories 1018 further storeinstructions 1020, that, when executed by the one or more processors1014, cause the server 1010 to receive 1222, 1224, 1226, 1228, throughthe communication interface 1012, a request from the mobile phoneoperator 1200, 1202, 1204, 1206 of the subscriber identity module 110,112, 114, 116 to top up the credit, and detect the need to top up thecredit of the subscriber identity module 110, 112, 114, 116 on the basisof the received request.

The topping-up of the credit may be performed automatically, without anyuser action, or semi-automatically with some user interaction.

In an example embodiment, the one or more memories 1018 further storeinstructions 1020, that, when executed by the one or more processors1014, cause the server 1010 to, after the detection, decideautomatically to top up the credit of the subscriber identity module110/112/114/116.

In another example embodiment, the one or more memories 1018 furtherstore instructions 1020, that, when executed by the one or moreprocessors 1014, cause the server 1010 to, after the detection, transmit1220, through the communication interface 1012, alarm data to the userinforming of the need to top up the credit of the subscriber identitymodule 110/112/114/116. Such alarming may be performed just to informthe user that the topping-up is needed, i.e. the topping-up is stillperformed automatically. Or, alternatively, user interaction isrequired, whereupon in a further example embodiment, the one or morememories 1018 further store instructions 1020, that, when executed bythe one or more processors 1014, cause the server 1010 to receive 1220,through the communication interface 1012, in response to the alarm data,instructions from the user instructing to top up the credit of to thesubscriber identity module 110/112/114/116.

FIG. 13 illustrates an example embodiment of a service provider tablerepresenting possible contents of the database 1024. For each user(=user of the subscriber identity modules) 1320, 1322, 1324, the tablehas one row with various columns. It is to be noted that this table doesnot reflect the accurate database structure, but merely an outline ofthe information.

User column 1300 includes the name of the user 1300.

User info column 1302 includes various information of the user.

Invoicing info column 1304 includes various information relating to theinvoicing such as credit card number, billing address, account balanceetc.

For each subscriber identity module of the user there is at least onecolumn 1306, 1308, 1310, 1312, 1314 including various informationrelating to the subscriber identity module 110, 112, 114, 116 such asSIM number, tariff, preferred area, other network info, operator info,balance of account (in minutes or in money).

Total info column 1316 includes various summary information such asnumber of cards, usage of SIM cards, total time, usage over time, otherstatistics.

Forecasting column 1318 includes forecasts for the user such as aforecast of SIM usage over time.

Additionally, the table has at least two summary rows: total info row1330, and forecasting row 1340.

Total info row 1330 includes various summary information of all userssuch as number of cards, usage of SIM cards, total time, usage overtime, other statistics.

Forecasting row 1340 includes forecasts for all users such as a forecastof SIM usage over time.

FIGS. 14A and 14B illustrate example embodiments relating to analysis,prediction and action on use of the subscriber identity module. Theseexample embodiments may be enhanced with the details of the otherexample embodiments disclosed in FIGS. 1 to 13.

In an example embodiment of the server 1010, the instructions 1020, whenexecuted by the one or more processors 1014, cause the server 1010, foreach subscriber identity module 110, 112, 114, 116 belonging to the setof subscriber identity modules of the user of the mobile terminal210/310/400/510, to cause an analysis on use of the subscriber identitymodule 110/1121114/116, cause a prediction of a future activity statuschange of the subscriber identity module 110/112/114/116 on the basis ofthe analysis, and cause an action affecting the activity status of thesubscriber identity module 110/112/114/116 on the basis of theprediction.

Let us study FIG. 14A illustrating an example embodiment of a serviceprovider table representing possible contents of the database 1024 forone single user of the subscriber identity modules 1430, 1432, 1434,1436. For each subscriber identity module 1430, 1432, 1434, 1436, thetable has one row with various columns. It is to be noted that thistable does not reflect the accurate database structure, but merely anoutline of the information.

The user has four subscriber identity modules, one for each area 1400:the subscriber identity module 1430 for Finland (FIN), the subscriberidentity module 1432 for Germany (DE), the subscriber identity module1434 for France (FR), and the subscriber identity module 1436 for GreatBritain (GB).

The subscriber identity modules have the following labels 1402: SIM1=FINSIM 1430, SIM2=DE SIM 1432, SIM3=FR SIM 1434, and GB SIM 1436 is to bedelivered (TBD) to the user.

Status 1404 of the subscriber identity module is maintained: FIN SIM1430 is in use, DE SIM 1432 is in use, FR SIM 1434 has not yet beenactivated, and as GB SIM 1436 has not yet been delivered, it does nothave a usage status either.

Furthermore, the table includes the following information: balance (ofsubscriber identity module user account) 1406, use as minutes/day 1408,and use as megabytes/day 1410. The marking “NO, AVG” means that as thereis no data available, an average (of all users/a subset of users/theuser in question) is used.

The present and future 1422 use of each subscriber identity module 1430,1432, 1434, 1436 of the user is shown on the right side of the table. Inthe example embodiment of FIG. 14A, months 1412, 1414, 1416, 1418, 1420from January to May are shown, but also other suitable time measurementunits such as minutes, hours, days, weeks, years etc. may be used forprocessing/displaying the information.

Let us suppose that the analysis on use of each subscriber identitymodule 1430, 1432, 1434, 1436 has been performed. The analysis may beperformed on the past use and/or the present use.

The horizontal line pattern shows a prediction of future activity statusfor each subscriber identity module 1430, 1432, 1434, 1436. Thehorizontal line pattern means that it is predicted that the user willuse the subscriber identity module 1430, 1432, 1434, 1436: FIN SIM 1430will be in use from January to May, DE SIM 1432 will be used in Februaryand May, FR SIM 1434 will be used in April, and GB SIM 1436 will be inuse in May. Such prediction may be based on history information and/oron information obtained from the user on future use, such informationmay include future travel plans, for example.

FIG. 14B illustrates the same table as FIG. 14A, but with a slightlydifferent view on its contents. The present and future 1422 are shown onthe far right, but history 1424 is now shown in the middle: minutes andmegabytes for July 1442 and minutes and megabytes for August 1444 of theprevious year are shown, but months from September 1426 to December ofthe previous year are hidden as the window in which the history 1424 isshown is scrollable.

If there is a change in the future activity status of the subscriberidentity module 1430, 1432, 1434, 1436, an action affecting the activitystatus of the subscriber identity module 1430, 1432, 1434, 1436 isperformed.

As shown in FIG. 14B, no actions are necessary for the FIN SIM 1430 asits use will continue as usual.

Regarding the DE SIM 1432, the analysis shows that it has not been inuse in six months 1450, i.e. from July 1442 to December, and theprediction is that a future activity status change will happen, i.e. DESIM 1432 will be taken out of use by the operator due to this period ofno use. Accordingly, an action 1452 affecting the activity statusbecomes necessary, i.e. an updating action 1452 that keeps the DE SIM1432 in use. One way of achieving this is by performing an action 1452that ends the period of no use 1450 before the operator takes the DE SIM1432 out of use.

In an example embodiment, the action 1452 affecting the activity statusof the subscriber identity module 1432 on the basis of the predictioncomprises at least one of the following:

-   -   cause a top up of the credit of the subscriber identity module        1432 in order to keep the subscriber identity module 1432 alive;    -   cause a phone call with the subscriber identity module 1432 in        order to keep the subscriber identity module 1432 alive;    -   cause a phone call to the subscriber identity module 1432 in        order to keep the subscriber identity module 1432 alive;    -   cause a data transfer with the subscriber identity module 1432        in order to keep the subscriber identity module alive 1432.

As the action 1452 is only needed in order to keep the SIM 1432 alive,the phone call may be of minimal duration such as 0.1 seconds, as wellas the data transfer may handle a minimal amount of data such as 1kilobytes. Furthermore, even the top up of the credit may be of aminimal money amount such as 0.01

.

Regarding the FR SIM 1434, the analysis shows that the user is planningto take it into use in March 1416, which results in a prediction statingthat a future activity status change is needed in March 1416, whereuponan action 1454 changing the activity status of FR SIM 1434 from “NOTACTIVATED” to “IN USE” is performed before March.

In an example embodiment, the action 1454 affecting the activity statusof the subscriber identity module 1434 on the basis of the predictioncomprises: cause a top up of the credit of the subscriber identitymodule 1434 in order to take the subscriber identity module 1434 intouse.

Regarding the FR SIM 1434, the analysis also shows that the FR SIM 1434needs to activated before the end of May 1420. In an example embodiment,the action 1456 affecting the activity status of the subscriber identitymodule 1434 on the basis of the prediction comprises: cause anactivation 1456 of the subscriber identity module 1434 before an expiryof a time limit for the activation in order to keep the subscriberidentity module 1434 alive.

Regarding the GB SIM 1436, the analysis shows that nothing will happen,and, consequently, no actions are necessary for the time being.

In some cases, such as with use of prepaid SIM cards, the SIM card maybe going out of date. In a further example embodiment, the actionaffecting the activity status of the subscriber identity module on thebasis of the prediction comprises: cause an order of a new subscriberidentity module in order to replace the subscriber identity module thatis about to expire.

The actions described so far may be performed automatically. The term‘automatic’ refers to the fact that the server 1010 performs its tasksautonomously, self-acting, and/or without an external motive force. Thisis opposite to such an operation where the user of the subscriberidentity modules 110/112/114/116, 1430/1432/1434/1436 has to take careof the actions. Even if the embodiments operate automatically in thisrespect, it is not excluded that the user may perform a confirmationoperation or operations. Consequently, the server 1010 may be configuredto perform the selection automatically, without the user interactingwith a user interface, or semi-automatically, the user accepting a userprofile suggested in the user interface. In an example embodiment, theone or more memories 1018 further store instructions 1020, that, whenexecuted by the one or more processors 1014, cause the server 1010 to:cause transmission 1220 of alarm data to the user informing of thepredicted future activity status change of the subscriber identitymodule 110/112/114/116, 1430/1432/1434/1436. In an example embodiment,the one or more memories 1018 further store instructions 1020, that,when executed by the one or more processors 1014, cause the server 1010to: cause reception 1220, in response to the alarm data, of instructionsfrom the user authorizing the action affecting the activity status ofthe subscriber identity module 110/112/114/116, 1430/1432/1434/1436.

The present invention is applicable to apparatuses defined above butalso to other suitable apparatuses. The protocols used, thespecifications of wireless communication systems, and the apparatusesdevelop rapidly. Such development may require extra changes to thedescribed example embodiments. Therefore, all words and expressionsshould be interpreted broadly and they are intended to illustrate, notto restrict, the example embodiments. It will be obvious to a personskilled in the art that, as technology advances, the inventive conceptcan be implemented in various ways. The invention and its embodimentsare not limited to the examples described above but may vary within thescope of the claims.

The invention claimed is:
 1. A server comprising: one or moreprocessors, and one or more memories storing instructions, that, whenexecuted by the one or more processors, cause the server, for eachprepaid subscriber identity module belonging to a set of subscriberidentity modules of a user installed for use by a mobile terminal, to:cause an analysis on use of the subscriber identity module to determinewhether a period of no use is present; cause a prediction of a futureactivity status change of the subscriber identity module in response tothe analysis determining the presence of the period of no use, thefuture activity status change including taking the subscriber identitymodule out of use by a mobile phone operator providing the subscriberidentity module in response to the period of no use being present; andcause an updating action affecting the activity status of the subscriberidentity module on the basis of the prediction such that the period ofno use is ended and the subscriber identity module is kept alive, theupdating action affecting the activity status of the subscriber identitymodule on the basis of the prediction including at least one of thefollowing: causing a top up of a credit of the subscriber identitymodule in order to keep the subscriber identity module alive; causing aphone call with the subscriber identity module in order to keep thesubscriber identity module alive; causing a phone call to the subscriberidentity module in order to keep the subscriber identity module alive;causing a data transfer with the subscriber identity module in order tokeep the subscriber identity module alive; causing an activation of thesubscriber identity module before an expiration of a time limit for theactivation in order to keep the subscriber identity module alive;causing a top up of the credit of the subscriber identity module inorder to take the subscriber identity module into use; and causing anorder of a new subscriber identity module in order to replace thesubscriber identity module that is about to expire.
 2. The server ofclaim 1, wherein the one or more memories further store instructions,that, when executed by the one or more processors, cause the server to:cause transmission of alarm data to the user informing of the predictedfuture activity status change of the subscriber identity module.
 3. Theserver of claim 2, wherein the one or more memories further storeinstructions, that, when executed by the one or more processors, causethe server to: cause reception, in response to the alarm data, ofinstructions from the user authorizing the action affecting the activitystatus of the subscriber identity module.
 4. The server of claim 1,wherein the set of the subscriber identity modules comprises prepaidsubscriber identity modules obtained from various mobile phoneoperators.
 5. The server of claim 1, wherein the mobile terminalcomprises at least one of the following: a mobile wirelesscommunications terminal, an accessory of a mobile wirelesscommunications terminal, a combination of the mobile wirelesscommunications terminal and into the accessory of the mobile wirelesscommunications terminal, an accessory of a mobile terminal, acombination of the mobile terminal and the accessory of the mobileterminal, a Universal Serial Bus (USB) modem.
 6. The server of claim 1,wherein the server comprises at least one of the following: a computer,a server computer, a cluster of computers, a computer system, any one ofthe previous operated by a service provider providing the set of thesubscriber identity modules.