Service Models for Roaming Mobile Device

ABSTRACT

A method for providing cellular access to a mobile device when the device is out of a home network operated by a home wireless service provider. The method includes presenting an option to initiate a process to establish a temporary roaming agreement between the home wireless service provider and a foreign wireless service provider operating a foreign network in a location of the mobile device outside of the home network. The method also includes receiving a selection of the option, accessing a web application associated with a negotiation server in response to the selection, providing subscriber credentials to the negotiation server for use by the negotiation server to negotiate the temporary roaming agreement, and allowing the mobile device to access a foreign network operated by the foreign wireless service provider in accordance with the temporary roaming agreement.

TECHNICAL FIELD

The present disclosure relates generally to roaming services and, moreparticularly, to service models for roaming mobile devices.

BACKGROUND

Wireless Service Providers (WSPs) offer various wireless service modelsto their subscribers. Many of these service models are dictated byregulations. For example, most WSPs in the United States offer servicecontracts with preconfigured roaming agreements and mobile devices thatare locked. A locked mobile device prevents a subscriber from using themobile device on other WSP networks.

Most mobile devices sold in the United States are pre-locked by the WSP.Nearly all WSPs subsidize the price of mobile devices in exchange forvoice/data service contracts. Recently, some unlocked mobile devices,such as smartphones, are being sold for a much higher price without thesubsidy. Many subscribers are willing to pay a premium price for anunlocked device, while others choose, as is more commonly the case, tounlock their device through the use of software tools, without thepermission of the WSP. In response to the use of such software tools,more WSPs are offering subscribers the option to unlock their device,often for a fee, even though it means a subscriber can use that phonewith another WSP. Some WSPs unlock devices after a subscriber's accounthas been active for a specific time period or the service contract termhas been fulfilled. Other WSPs may offer to unlock the subscriber'smobile device while a service contract is active, depending upon thedetails of the subscriber's service contract.

One method WSPs use to unlock mobile devices is sending an unlock codewith step-by-step instructions to the subscriber's mobile device.Another method WSPs use to unlock mobile devices is asking a subscriberto send his or her mobile device to the WSP for unlocking. Yet anothermethod WSPs use to unlock mobile devices is providing kiosks that areconfigured with software to unlock the mobile device.

The present device locking model that many WSPs use can cause majorinconveniences when the subscriber travels to foreign countries and,particularly, foreign countries in which the subscriber's home WSP hasno roaming agreements with a foreign WSP. Under these circumstances, theonly choice for the subscriber is to purchase a prepaid mobile device orprepaid SIM (Subscriber Identity Module) in the foreign country. Thiscreates a few potential problems. For example, the subscriber can nolonger invoke all services to which he or she is subscribed in theirhome wireless network, and the subscriber is encumbered with having tocarry multiple mobile devices with cellular access being available onlythrough the prepaid mobile device.

An advantage to the subscriber of having an unlocked mobile device isthe ability for the unlocked mobile device to be used in countries otherthan the subscriber's home country, often at a fraction of the cost ofbuying a local prepaid SIM card. Otherwise, the subscriber is leftpaying high international roaming fees.

In 2G networks, the SIM card and SIM application are bound together, sothat the common phrase “SIM Card” is a physical circuit card with theSIM application. In 3G networks, a UICC (Universal Integrated CircuitCard) is used. A UICC ensures the integrity and security of asubscriber's personal data. The memory capacity of a typical UICC is afew hundred kilobytes, although the memory capacity of UICCs isincreasing due to the number of applications that need to be stored inthe UICC. For example, a UICC may contain a USIM (Universal SIM)application for UMTS (Universal Mobile Telecommunications System)networks, a CDMA (Code Division Multiple Access) SIM (CSIM) for CDMAnetworks, and a SIM application for GSM (Global System for Mobilecommunications) networks, making it possible for the same UICC toprovide access to different 2G and/or 3G networks.

When a subscriber is in a foreign country and attempts to make a call,the subscriber has a few options. If there is no roaming agreementestablished between the local WSP(s) and the home WSP, the subscriber isunable to use his or her mobile device to make the call. In this case,the subscriber can purchase a prepaid mobile device with a new SIM cardthat is configured to provide cellular access in the foreign country.This scenario presents a few problems. If the country or the area thesubscriber is visiting is unsafe, the subscriber may not want to ventureout in public to purchase a new mobile device for worry of theirpersonal safety. Also, it is inconvenient for the subscriber to purchaseanother mobile device to be used only locally in the foreign country. Ifthe subscriber is staying for a short time in a foreign country, buyinga locally-compatible mobile device may not be practical, financially orotherwise. Likewise, if the subscriber is traveling to several foreigncountries, and stopping in each country for only a few days or perhapseven longer, buying a locally-compatible mobile device for each countrymay not be a feasible communications solution.

If, however, there is a roaming agreement between the local serviceprovider and the home WSP, the mobile device will permit the subscriberto make the call and the bill will be settled between the two WSPs.Prior to the roaming service being authorized, the subscriber will beauthenticated by the home WSP. For prepaid roaming agreements, thecall-related data must be exchanged in real-time between the local WSPand the home WSP by using a special CAMEL (Customized Applications forMobile networks Enhanced Logic)-based platform, to prevent the balanceof the roaming subscriber's account from becoming overdrawn.

SUMMARY

Various aspects of the present disclosure address the aforementionedproblems that arise when a mobile device is out of a home WSP's coveragearea and no roaming partners are available in the mobile device'slocation. These solutions provide benefits to home WSPs, subscribers,and third party participating entities.

According to one embodiment of the present disclosure, when a mobiledevice is out of the home WSP's coverage area and no roaming partnersare available in the mobile device's location, the subscriber isprovided the option to establish a temporary lease agreement on the UICCof the subscriber's mobile device with a foreign WSP. According toanother embodiment, under the same conditions, the subscriber isprovided the option to establish a temporary roaming agreement with theforeign WSP. According to another embodiment, under the same conditions,the subscriber is provided the option to unlock their mobile devicetemporarily and use a pay-as-you-go service plan with the foreign WSP.

Home WSPs can benefit from the disclosed solutions by avoiding mobiledevices from being illegally unlocked, resulting in a loss of revenue.Another benefit is that WSPs are able to allow subscribers to continueto use the same mobile device while the mobile device is in a locationwhere no previous roaming agreement is available. This results in animproved subscriber experience and higher subscriber retention. WSPs mayalso benefit from higher revenues, in part by offering services that maypersuade subscribers from switching to a foreign WSP when the subscriberis located in a location serviced by the foreign WSP.

Subscribers can benefit from the disclosed solutions by enjoying greaterconvenience in no longer needing to purchase another mobile device in aregion where no roaming agreement is available. Subscribers can alsobenefit from receiving the same service features as in the subscriber'shome region in a region where no roaming is available. Another benefitto subscribers is having the capability to negotiate charging policies.Yet another benefit to subscribers is having the option to agree to atemporary roaming agreement with a foreign WSP via a third party entity,thereby eliminating the need for the subscriber to visit a retailer inan unsafe location. Similar benefits are provided by a temporary leaseagreement. Still another benefit to subscribers is having the option toagree to a temporary unlocking agreement for a pay-as-you-go serviceplan that is provisioned over-the-air.

Third party entities, such as online clearing house or negotiationservice providers, for example, can benefit from the disclosed solutionsby receiving additional service and revenue opportunities from WSPs.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1. illustrates certain elements of a cellular communicationssystem.

FIG. 2 illustrates an exemplary method for providing a subscriber theoption to engage in a temporary roaming agreement or a temporary mobiledevice unlocking agreement for a roaming mobile device.

FIG. 3 illustrates an exemplary method for negotiating a temporaryroaming agreement.

FIG. 4 illustrates an exemplary method for negotiating a temporarymobile device unlocking agreement.

FIG. 5 illustrates an exemplary method for providing a subscriber theoption to engage in a temporary lease agreement or a temporary mobiledevice unlocking agreement for a roaming mobile device.

FIG. 6 illustrates an exemplary method for negotiating a temporary leaseagreement.

FIG. 7 illustrates certain elements of an exemplary UICC architecture.

FIG. 8 illustrates an exemplary mobile device and components thereof.

FIG. 9 illustrates an exemplary cellular communications network in whichthe cellular communications system of FIG. 1 can be implemented.

DETAILED DESCRIPTION

As required, detailed embodiments of the present disclosure are providedherein. The disclosed embodiments are merely examples that may beembodied in various and alternative forms, and combinations thereof. Asused herein, for example, exemplary, and similar terms, referexpansively to embodiments that serve as an illustration, specimen,model or pattern. The figures are not necessarily to scale and somefeatures may be exaggerated or minimized, such as to show details ofparticular components. In some instances, well-known components,systems, materials or methods have not been described in detail in orderto avoid obscuring the devices and methods of the present disclosure.Therefore, specific structural and functional details disclosed hereinare not to be interpreted as limiting, but merely as a basis for theclaims and as a representative basis for teaching one skilled in the artto variously employ the present disclosure.

The systems and methods of the present disclosure may be implemented inwireless networks that use exemplary telecommunications standards, suchas Global System for Mobile communications (GSM) and a Universal MobileTelecommunications System (UMTS). It should be understood, however, thatthe systems and methods may be implemented in wireless networks that useany existing or yet to be developed telecommunications technology. Someexamples of other suitable telecommunications technologies include, butare not limited to, networks utilizing Time Division Multiple Access(TDMA), Frequency Division Multiple Access (FDMA), Wideband CodeDivision Multiple Access (WCDMA), Orthogonal Frequency DivisionMultiplexing (OFDM), and various other 2G, 2.5G, 3G, and above (e.g., 4Gand beyond) technologies. Examples of suitable data bearers include, butare not limited to, General Packet Radio Service (GPRS), Enhanced Datarates for Global Evolution (EDGE), the High-Speed Packet Access (HSPA)protocol family, such as, High-Speed Downlink Packet Access (HSPDA),Enhanced Uplink (EUL) or otherwise termed High-Speed Uplink PacketAccess (HSUPA), Evolved HSPA (HSPA+), and various other current andfuture data bearers.

While the methods described herein may, at times, be described in ageneral context of computer-executable instructions, the methods of thepresent disclosure can also be implemented in combination with otherprogram modules and/or as a combination of hardware and software. Theterm application, or variants thereof, is used expansively herein toinclude routines, program modules, programs, components, datastructures, algorithms, and the like. Applications can be implemented onvarious system configurations, including servers, network systems,single-processor or multiprocessor systems, minicomputers, mainframecomputers, personal computers, hand-held computing devices, mobiledevices, microprocessor-based, programmable consumer electronics,combinations thereof, and the like.

Referring now to FIG. 1, a cellular communications system 100 forproviding cellular service to a roaming mobile device 102 isillustrated. The roaming mobile device 102 is configured to communicatewith a home network 104 provided by a home WSP (Wireless ServiceProvider). When the mobile device 102 travels outside of the homenetwork 104, the mobile device 102 detects all foreign networks 106,108, 110 (denoted Foreign Network₁, . . . Foreign Network_(N), where Nis a positive integer) provided by one or more foreign WSPs. A foreignnetwork may be in another country, requiring international roaming, ormay simply be a network operated by another WSP in the same country.Moreover, a foreign WSP may operate networks in another country or inthe same country.

At present, when subscribers travel to a different country with theirmobile device, the subscriber's home network may not have coverage inthe visited country. WSPs often establish roaming agreements withforeign WSPs so that their subscribers are still able to make andreceive calls while roaming onto another WSP's network (foreignnetwork), in the visited country. When a subscriber powers on theirmobile device in the visited country, the mobile device receives radiosignals from one or more foreign network operating in that country.After one of the foreign networks is selected by the mobile device, thecorresponding local WSP authenticates the subscriber's mobile devicewith the subscriber's home WSP, for example, including determiningwhether the subscriber is a valid subscriber with roaming capabilityenabled for their account. If the home WSP responds with a positiveauthentication, the subscriber is permitted to use his or her mobiledevice on the local WSP network. For billing, the local WSP will keep arecord of all calls and other activity from the subscriber's mobiledevice and send the record along with the corresponding charges to thesubscriber's home WSP. The home WSP aggregates these charges and billsthem to the subscriber.

At present, when a subscriber is out of the home network 104 and noroaming partner is available in the visited country or location, thesubscriber is required to purchase a prepaid mobile device from aretailer that offers a foreign WSP's service in order to make andreceive calls. The embodiments disclosed herein eliminate this problemand provide methods for the subscriber to use their mobile device tocommunicate on a foreign network 106, 108, 110 without the foreignnetwork 106, 108, 110 being a roaming partner network of thesubscriber's home WSP.

According to one embodiment of the present disclosure, when a mobiledevice is out of the home WSP's coverage area and no roaming partnersare available in the mobile device's location, the subscriber isprovided the option to establish a temporary lease agreement with alocal WSP. According to another embodiment, under the same conditions,the subscriber is provided the option to unlock their mobile devicetemporarily and use a pay-as-you-go service plan with the local WSP.According to still another embodiment, under the same conditions, thesubscriber is provided the option to establish a temporary roamingagreement with the local WSP.

In the aforementioned embodiments, the mobile device 102 connects to theInternet 112 via a WIFI access point 114, if the mobile device 102 isconfigured with a WIFI transceiver and a WIFI access point is available.The WIFI access point may provide wireless Internet access by using oneor more IEEE 802.11x protocols. The WIFI access point may providewireless Internet access for free or for a charge. The WIFI access pointmay provide wireless Internet access with or without securitymechanisms, such as, WPA, WPA2, WEP, combinations thereof, or the like.

If the mobile device 102 is not configured with a WIFI transceiver or noWIFI access is available, the subscriber could use a computer 120 toaccess the Internet 112 via a modem 122. The modem 122 may be any typeincluding, but not limited to, cable modem, DSL modem, dial-up modem, orthe like. Moreover, while WIFI access is specifically mentioned here andlater in some of the figures, WIFI access is not meant to limit asecondary communications capability of the mobile device 102.Alternatively, the mobile device 102 may include a WIMAX transceiver orother non-cellular technology transceiver by which the mobile device 102can access the Internet 112.

As also shown in FIG. 1, the cellular communications system 100 includesa negotiation server 116. The negotiation system 116 is accessible via aWIFI-enabled mobile device (in one embodiment, the mobile device 102) orthe computer 120 through a web application 118 associated with thenegotiation server 116. In some embodiments, the negotiation server 116is a third party server, such as one operated by a third party clearinghouse. The negotiation server 116 searches for available foreignnetworks, selects a viable foreign network (of the foreign networks 106,108, 110) for providing cellular access to the mobile device 102,negotiates a temporary roaming agreement or a temporary lease agreementbetween the WSPs of a foreign network and the home network 104, andprovides confirmation details for the agreement to the subscriber. Thenegotiation server 116 is described in greater detail below withreference to FIGS. 3 and 6.

The web application 118 is designed according to the needs of the entityoperating the negotiation server 116. The web application 118 isaccessed via a web browser installed on the mobile device 102 or thecomputer 120. The web application 118 may be hosted in abrowser-controlled environment (e.g., a Java applet) or coded in abrowser-supported language (e.g., JavaScript possibly combined with amarkup language such as HTML) and reliant on the web browser to renderthe web application 118 executable.

In some embodiments, the mobile device 102 is configured with an iMDANM(intelligent Mobile Device Access Network Manager), which is describedin greater detail with reference to FIG. 7 and briefly introduced here.The iMDANM is resident on the mobile device 102 in a memory or in a UICC(Universal Integrated Circuit Card). In some embodiments, the iMDANM ispre-loaded by a WSP.

When a service contract is executed with a WSP, the WSP sendscontractual information, including subscriber information, chargingrules, and roaming information to the iMDANM. Alternatively, the iMDANMwill retrieve the contractual information from the WSP's web portal, orover-the-air, and store it locally in the mobile device 102. In someembodiments, the iMDANM will periodically update locally-storedinformation whenever the subscriber powers on the mobile device 102. Insome embodiments, the iMDANM also retrieves an unlocking code from theWSP. The unlocking code is used in temporary unlocking methods that aredescribed in greater detail with particular reference to FIG. 4. In someembodiments, the iMDANM also retrieves a locking code from the WSP thatis used to re-lock the mobile device 102 upon expiration of a temporaryunlocking agreement. Alternatively, the locking code is preprogrammedinto the iMDANM or another portion of the UICC. In some embodiments, thelocking and/or unlocking code is encrypted to prevent misuse.

FIG. 2 illustrates an exemplary method 200 for providing a subscriberoptions to engage in a temporary roaming agreement or a temporary mobiledevice unlocking agreement when the subscriber is outside of their homenetwork. It should be understood that the steps of the method 200 arenot necessarily presented in any particular order and that performanceof some or all the steps in an alternative order is possible and iscontemplated. The steps have been presented in the demonstrated orderfor ease of description and illustration. Steps can be added, omittedand/or performed simultaneously without departing from the scope of theappended claims. It should also be understood that the illustratedmethod 200 can be ended at any time. In certain embodiments, some or allsteps of this process, and/or substantially equivalent steps can beperformed by execution of computer-readable instructions stored orincluded on a computer-readable medium, such as a memory of the mobiledevice 102.

The method 200 begins and flow is to block 202, whereat the mobiledevice 102 travels outside the home network 104 and into an areaserviced by one or more foreign networks 110 operated by one or moreforeign WSPs. At block 204, the mobile device 102 detects all foreignnetworks including any roaming partner networks.

If, at block 206, a roaming partner network is determined to beavailable, flow proceeds to block 208, whereat the mobile device 102attaches to the available roaming partner network and the method 200ends. If, however, no roaming partner network is available, asdetermined at block 206, flow proceeds to block 210, whereat the mobiledevice 102 provides the subscriber with options to (I) gain access to aforeign network 110 using a temporary roaming agreement or (II) gainaccess to a foreign network using a temporary unlocking agreement. Insome embodiments, the mobile device 102 presents these options to thesubscriber on a display of the mobile device 102 or audibly through aspeaker of the mobile device 102. An exemplary mobile device, such asthe mobile device 102, and components thereof is described in detailbelow with reference to FIG. 8.

At block 212, the mobile device 102 receives a selection from thesubscriber via a user interface of the mobile device 102 and respondsaccordingly. If option (I) is selected, flow is to the method 300illustrated in FIG. 3. If option (II) is selected, flow is to the method400 illustrated in FIG. 4.

FIG. 3 illustrates an exemplary method 300 for negotiating a temporaryroaming agreement upon selection of option (I) at block 212 of FIG. 2.It should be understood that the steps of the method 300 are notnecessarily presented in any particular order and that performance ofsome or all the steps in an alternative order is possible and iscontemplated. The steps have been presented in the demonstrated orderfor ease of description and illustration. Steps can be added, omittedand/or performed simultaneously without departing from the scope of theappended claims. For example, the method 300 illustrates steps that canbe performed without the steps illustrated in method 200. It should alsobe understood that the illustrated method 300 can be ended at any time.In certain embodiments, some or all steps of this process, and/orsubstantially equivalent steps can be performed by execution ofcomputer-readable instructions stored or included on a computer-readablemedium, such as, in part or in full, a memory of the mobile device 102and/or a memory of the negotiation server 116, where appropriate.

The method 300 begins and flow is to determination block 302, whereat itis determined whether WIFI is available to the mobile device 102. IfWIFI is available, flow is to block 304, whereat the mobile device 102accesses the negotiation server 116 so that the iMDANM in the mobiledevice 102 can provide subscriber credentials to the negotiation server116. Otherwise, flow is to block 306, whereat the subscriber uses thecomputer 120 to access the negotiation server 116 to provide thecredentials. WIFI may be unavailable, for example, due to the mobiledevice 102 not being configured to communicate via WIFI (e.g., if themobile device 102 lacks a WIFI transceiver or required software), due tothe unavailability of a WIFI network, or due to the unavailability of aWIFI network that meets the subscriber's needs (e.g., cost, proximity).

In some embodiments, the negotiation server 116 requires one or morecredentials and authenticates the credentials prior to processing arequest to negotiate a temporary roaming agreement. The negotiationserver 116 authenticates the credentials with the subscriber's home WSP.Subscriber credentials include, but are not limited to, home WSPinformation, telephone number, IMEI (International Mobile EquipmentIdentity), current location of the mobile device 102 (e.g., zip code,area code, country code, latitude/longitude coordinates, city, state,province, region, country), duration of the temporary roaming agreement(e.g., duration requested by the subscriber, duration requested by thehome WSP), credit amount agreed upon between the subscriber and the homeWSP (e.g., as part of a service contract; credit is designated only fora temporary roaming agreement or a combination of services including thetemporary roaming agreement; credit is open for any service, overage, orfee), and a maximum allotted credit amount for an invoked serviceincluding, but not limited to, services rendered under a temporaryroaming agreement to define a secured charging policy.

The negotiation server 116 receives the subscriber credentials and, atblock 308, searches for all available foreign networks 110. As disclosedat block 204 in FIG. 2, the mobile device 102 is in some embodimentsable to detect all foreign networks operating in the visited location.Accordingly, in those embodiments, at block 310, the negotiation server116 can request the mobile device 102 via the iMDANM or the subscribervia the computer 120 to provide foreign network information, includingnetwork identification information, such as name and technology type(e.g., GSM or UMTS). The negotiation server 116 may request thisinformation instead of conducting the search at block 308 or in additionto conducting the search. In some embodiments, the iMDANM or thesubscriber provides foreign network information at will and not inresponse to a request from the negotiation server 116. In someembodiments, the iMDANM is configured to automatically provide anyforeign network information found at block 204, for example, whenproviding subscriber credentials to the negotiation server 116.

At block 312, the negotiation server 116 finds and selects a foreignnetwork 110. At block 314, the negotiation server 116 negotiates atemporary roaming agreement between the home WSP and the foreign WSPoperating the selected foreign network 110. In some embodiments, thenegotiation process includes the negotiation server 116 providing anysubscriber requested charging policies to the home WSP, which direct itscharging system (e.g., by way of a policy charging rule function) toenable dynamic charging rule validation for each invoked service. Insome embodiments, a subscriber account is pre-billed by the home WSP tocover roaming fees and other usage charges that the home WSP may bebilled for by the foreign WSP. Alternatively, the subscriber's creditamount (e.g., an eWallet) is debited to cover any roaming fee and otherusage charges. In some embodiments, the subscriber is provided theoption to change the charging agreement and policies after temporaryroaming has been initially granted.

At block 316, the negotiation server 116 provides confirmation detailsto the subscriber by way of an SMS (Short Messaging Service) message,USSD (Unstructured Supplementary Service Data) message, email, or otherelectronic communication. It is contemplated that the negotiation server116 may alternatively or additionally send a physical copy of theconfirmation details to the subscriber's address or to the home WSP,which may forward the physical copy to the subscriber's address. In someembodiments, the confirmation details include a confirmation code, thepre-billed amount or the debited amount depending upon the paymentmethod used, a password or other security mechanism the subscriber needsto access the foreign network 110, and the duration of the establishedtemporary roaming agreement. The confirmation code may be used by thesubscriber to retrieve additional details about the transaction and/orroaming agreement through a customer service portal, such as a websiteor customer service number. Alternatively, no confirmation details aresent to the subscriber.

At block 318, the mobile device 102 accesses the foreign network 110under the temporary roaming agreement. In some embodiments, the mobiledevice 102 is no longer capable of accessing the foreign network 110after the temporary roaming agreement has expired. In some embodiments,the subscriber is warned by the foreign network 110 of the expirationand may be prompted to extend the temporary roaming agreement or allowthe agreement to expire. In still other embodiments, the subscriber isprovided the option to cancel or force early expiration of the temporaryroaming agreement. In these embodiments, the subscriber may or may notbe refunded any fees for the remaining portion of the agreement basedupon the charging policies established for the subscriber. The method300 ends.

FIG. 4 illustrates an exemplary method for negotiating a temporarymobile device unlocking agreement upon selection of option (II) at block212 of FIG. 2. It should be understood that the steps of the method 400are not necessarily presented in any particular order and thatperformance of some or all the steps in an alternative order is possibleand is contemplated. The steps have been presented in the demonstratedorder for ease of description and illustration. Steps can be added,omitted and/or performed simultaneously without departing from the scopeof the appended claims. For example, the method 400 illustrates stepsthat can be performed without the steps illustrated in method 200. Itshould also be understood that the illustrated method 400 can be endedat any time. In certain embodiments, some or all steps of this process,and/or substantially equivalent steps can be performed by execution ofcomputer-readable instructions stored or included on a computer-readablemedium, such as, in part or in full, a memory of the mobile device 102and/or a memory of the negotiation server 116, where appropriate.

The method 400 begins and flow is to determination block 402, whereat itis determined whether WIFI is available to the mobile device 102. IfWIFI is available, flow is to block 404, whereat the mobile device 102accesses a web site of the home network WSP so that the iMDANM in themobile device 102 can provide subscriber credentials to the web site.Otherwise, flow is to block 406, whereat the subscriber uses thecomputer 120 to access the web site to provide the credentials. WIFI maybe unavailable, for example, due to the mobile device 102 not beingconfigured to communicate via WIFI (e.g., if the mobile device 102 lacksa WIFI transceiver or the required software), due to the unavailabilityof a WIFI network, or due to the unavailability of a WIFI network thatmeets the subscriber's needs (e.g., cost, proximity).

In some embodiments, the web site requires one or more subscribercredentials. Subscriber credentials include, but are not limited to,home WSP information, telephone number, IMEI (International MobileEquipment Identity), current location of the mobile device 102 (e.g.,zip code, area code, country code, latitude/longitude coordinates, city,state, province, region, country), and duration of the temporaryunlocking agreement (e.g., duration requested by the subscriber,duration requested by the home WSP). At block 408, the web site verifiesthe subscriber credentials.

At block 410, the web site optionally prompts the subscriber to select amethod by which to receive an unlock code. The web site may alsooptionally prompt the subscriber for any subscriber credentials notreceived from the iMDANM or entered by the subscriber through thecomputer 120. In some embodiments, an email including an encryptedunlocking code is sent to the subscriber email account. In thisembodiment, the iMDANM is configured to decrypt the encrypted unlockingcode after it is received at the mobile device 102. In some embodiments,the iMDANM is configured to scan a received email for the unlocking codewithout further subscriber interaction. In other embodiments, thesubscriber must manually enter the unlocking code.

In some embodiments, the email includes a two-dimensional barcode that,when read by a barcode reader, reveals the unlocking code. In thisembodiment, the subscriber accesses the email through the computer 120or another device with email access and uses a built-in camera on themobile device 102 and barcode reader software installed on the mobiledevice 102 to scan the barcode image to retrieve the unlocking code. Inother embodiments, the mobile device 102 communicates with the computer120 or another device with email access via USB (Universal Serial Bus),IEEE 1394 (Firewire), BLUETOOTH, IEEE 802.3, IEEE 802.11x, RFID (RadioFrequency Identification), NFC (Near-Field Communication), proprietaryconnection, combinations thereof, or the like to receive the unlockingcode.

At block 412, the web site and subscriber complete a transaction for thetemporary unlocking agreement. The web site requests the subscriber toselect a payment method if one has not already been pre-selected, forexample, in previous agreements to use the subscriber's eWallet or otherelectronic payment method, such billing the subscriber's wirelessaccount, credit card, or debit card. In some embodiments, regardless ofthe selected payment method, the web site charges the subscriber tocover an unlocking fee and security deposit for the temporary unlockingagreement and grants the temporary unlocking agreement. In someembodiments, temporary unlocking agreements are built into asubscriber's service contract and, as such, the home WSP does not chargeany additional fees. In other embodiments, temporary unlockingagreements are provided free-of-charge for all subscribers or forsubscribers meeting a specific qualification requirement or set ofqualification requirements, such as account standing, time active,and/or whether the subscriber is subscribed to or willing to subscribeto additional services provided by the home WSP or its affiliates.

At block 414, the web site sends a communication including the unlockingcode to the mobile device 102 via any of the aforementioned methods. Atblock 416, the mobile device 102 receives the communication to retrievethe unlocking code. At block 418, the iMDANM temporarily unlocks themobile device 102. After the successful temporary unlocking of themobile device 102, the subscriber can go to a local wireless store andpurchase a pre-paid SIM card to replace the one in the mobile device 102to access the foreign network of choice. The method 400 ends.

In some embodiments, the mobile device 102 is no longer capable ofaccessing the foreign network 110 after the temporary unlockingagreement has expired. In other embodiments, the subscriber is warned bythe foreign network 110 or by the iMDANM of the expiration and may beprompted to extend the temporary unlocking agreement or allow theagreement to expire. In still other embodiments, the subscriber isprovided the option to cancel or force early expiration of the temporaryunlocking agreement. In these embodiments, the subscriber may or may notbe refunded any fees for the remaining portion of the agreement basedupon the charging policies established for the subscriber. In someembodiments, after the temporary unlocking agreement expires or isotherwise canceled, the iMDANM uses the previously stored code to lockthe mobile device 102.

FIG. 5 illustrates an exemplary method 500 for providing a subscriberthe option to engage in a temporary lease agreement or a temporarymobile device unlocking agreement when the subscriber is outside oftheir home network. It should be understood that the steps of the method500 are not necessarily presented in any particular order and thatperformance of some or all the steps in an alternative order is possibleand is contemplated. The steps have been presented in the demonstratedorder for ease of description and illustration. Steps can be added,omitted and/or performed simultaneously without departing from the scopeof the appended claims. It should also be understood that theillustrated method 500 can be ended at any time. In certain embodiments,some or all steps of this process, and/or substantially equivalent stepscan be performed by execution of computer-readable instructions storedor included on a computer-readable medium, such as a memory of themobile device 102.

The method 500 begins and flow is to block 502, whereat the mobiledevice 102 travels outside the home network 104 and into an areaserviced by one or more foreign networks 110 operated by one or moreforeign WSPs. At block 504, the mobile device 102 detects all foreignnetworks including any roaming partner networks.

If, at block 506, a roaming partner network is determined to beavailable, flow proceeds to block 508, whereat the mobile device 102attaches to the available roaming partner network and the method 500ends. If, however, no roaming partner network is available, asdetermined at block 506, flow proceeds to block 510, whereat the mobiledevice 102 provides the subscriber with options to (I) gain access to aforeign network 110 using a temporary lease agreement or (II) gainaccess to a foreign network using a temporary unlocking agreement. Insome embodiments, the mobile device 102 presents these options to thesubscriber on a display of the mobile device 102 or audibly through aspeaker of the mobile device 102. An exemplary mobile device, such asthe mobile device 102, and components thereof is described in detailbelow with reference to FIG. 8.

At block 512, the mobile device 102 receives a selection from thesubscriber via a user interface of the mobile device 102 and respondsaccordingly. If option (I) is selected, flow is to FIG. 6 and theillustrated method 600, described below. If option (II) is selected,flow is to FIG. 4 and the illustrated method 400, described above.

FIG. 6 illustrates an exemplary method 600 for negotiating a temporarylease agreement upon selection of option (I) at block 512 of FIG. 5. Itshould be understood that the steps of the method 600 are notnecessarily presented in any particular order and that performance ofsome or all the steps in an alternative order is possible and iscontemplated. The steps have been presented in the demonstrated orderfor ease of description and illustration. Steps can be added, omittedand/or performed simultaneously without departing from the scope of theappended claims. For example, the method 600 illustrates steps that canbe performed without the steps illustrated in method 500. It should alsobe understood that the illustrated method 600 can be ended at any time.In certain embodiments, some or all steps of this process, and/orsubstantially equivalent steps can be performed by execution ofcomputer-readable instructions stored or included on a computer-readablemedium, such as, in part or in full, a memory of the mobile device 102and/or a memory of the negotiation server 116, where appropriate.

The method 600 relates to an embodiment wherein the iMDANM includes alogical X-SIM application (X can be C, U, or any other notation) leasingmodel to allow a foreign WSP to provision pre-paid X-SIM card keys andattributes, as is customary for a regular SIM for that foreign WSP onthe iMDANM of a roaming mobile device (e.g., the mobile device 102). Inthis service model, the home WSP that owns the UICC associated with thesubscriber leases a memory portion of the UICC to the foreign WSP forsecure provisioning of the foreign WSP's service credentials to theleased memory portion of the UICC. The iMDANM provides subscribermanagement functions via a software client installed on the mobiledevice 102 for allowing the subscriber to delete or add new WSPs. Insome embodiments, the subscriber signs up for an NFC-based mobilepayment credit card offered by the home WSP and a credit card provider,so the foreign WSP can charge the subscriber for using their networkservices, such as voice, messaging, and/or data service. The iMADNMsoftware client provides a user interface that prompts the subscriberfor his or her consent for the foreign WSP to charge their credit card.Other payment options, such as those disclosed above, are contemplatedfor use under this service model, as well.

The method 600 begins and flows to determination block 602, whereat itis determined whether WIFI is available to the mobile device 602. IfWIFI is available, flow is to block 604, whereat the mobile device 102accesses the negotiation server 116 such that the iMDANM in the mobiledevice 102 can provide subscriber credentials to the negotiation server116. Otherwise, flow is to block 606, whereat the subscriber uses thecomputer 120 to access the negotiation server 116 to provide thecredentials. WIFI may be unavailable, for example, due to the mobiledevice 102 not being configured to communicate via WIFI (e.g., if themobile device 102 lacks a WIFI transceiver or the required software),due to the unavailability of a WIFI network, or due to theunavailability of a WIFI network that meets the subscriber's needs(e.g., cost, proximity).

In some embodiments, the negotiation server 116 requires one or morespecific credentials and authenticating the specific credentials priorto processing a request to negotiate a temporary lease agreement. Thenegotiation sever 116 authenticates the subscriber credentials with thesubscriber's home WSP. Subscriber credentials include, but are notlimited to, home WSP information, telephone number, IMEI, currentlocation of the mobile device 102 (e.g., zip code, area code, countrycode, latitude/longitude coordinates, city, state, province, region,country), duration of the temporary lease agreement (e.g., durationrequested by the subscriber, duration requested by the home WSP), creditamount agreed upon between the subscriber and the home WSP (e.g., aspart of a service contract; credit is designated only for a temporarylease agreement or a combination of services including the temporarylease agreement; credit is open for any service, overage, or fee), amaximum allotted credit amount for an invoked service including, but notlimited to, services rendered under a temporary lease agreement todefine a secured charging policy.

The negotiation server 116 receives the subscriber credentials and, atblock 608, searches for all available foreign networks 110. As disclosedat block 504 in FIG. 5, the mobile device 102 has already detected allforeign networks operating in the visited location. Accordingly, in someembodiments, at block 610, the negotiation server 116 requests themobile device 102 via the iMDANM or the subscriber via the computer 120to provide foreign network information including network identificationinformation, such as name and technology type (e.g., GSM or UMTS). Thenegotiation server 116 may request this information instead ofconducting the search at block 608 or in addition to conducting thesearch. In some embodiments, the iMDANM or the subscriber providesforeign network information at will and not in response to a requestfrom the negotiation server 116. In some embodiments, the iMDANM isconfigured to automatically provide any foreign network informationfound at block 504, for example, when providing subscriber credentialsto the negotiation server 116.

At block 612, the negotiation server 116 selects a foreign network 110.At block 614, the negotiation server 116 starts a background process tonegotiate a temporary X-SIM application lease agreement between theselected foreign WSP and the home WSP. The subscriber's account ispre-billed by the home WSP to cover switching service charges that thehome WSP may be billed for by the foreign WSP. Alternatively, thesubscriber's credit amount (e.g., an eWallet) is debited to cover anyservice charges. In some embodiments, the subscriber is provided theoption to change the charging agreement and policies after temporarylease has been initially granted. The foreign WSP and the home WSP signan X-SIM application lease agreement that includes the payment methodand amount that the foreign WSP needs to pay to the home WSP for use ofthe home WSP's UICC. In some embodiments, the payment method is anyNFC-based payment method, such as an NFC-enabled credit card or debitcard, a prepaid method. Although the subscriber is being served by theforeign WSP, the subscriber can still invoke all local applicationsresident on the UICC, such as address book, productivity applications,games, and the like. At block 616, the transaction is completed.

At block 618, the mobile device 102 accesses the foreign network 110under the temporary lease agreement. In some embodiments, the mobiledevice 102 is no longer capable of accessing the foreign network 110after the temporary lease agreement has expired. In some embodiments,the subscriber is warned by the foreign network 110 of the expirationand may be prompted to extend the temporary lease agreement or allow theagreement to expire. In still other embodiments, the subscriber isprovided the option to cancel or force early expiration of the temporarylease agreement. In these embodiments, the subscriber may or may not berefunded any fees for the remaining portion of the agreement based uponthe charging policies established for the subscriber. The method 600ends.

In some embodiments, a web access server also resides in the UICC, suchthat the iMDANM is capable of providing a web-based GUI (Graphical UserInterface) to allow the user to configure charging rules (e.g., onlyallow certain amount to be charged per day or per session, etc.). Anexemplary web access server is illustrated in FIG. 7, described below.

FIG. 7 illustrates certain elements of an exemplary UICC architecture700. The illustrated architecture 700 includes an application layer 702,a security layer 704, an operating system layer 706, and a filestructure layer 708. The illustrated application layer 702 includevarious SIM applications 710, 712, 714, 716 and other applications 718(e.g., payment applications, address book applications, etc.). Theapplication layer 702 also includes an iMDANM application 720, an X-SIMapplication 722, and a web access application 724, as described above.

The illustrated security layer 704 includes an NFC interface 726 forproviding NFC payment capabilities to the UICC and accesscontrol/authentication software for authenticating transactions betweenthe UICC and an external device or network. The illustrated O/S layerincludes O/S core and utility applications 730 that provide basic O/Sfunctionality, utility, and maintenance functions to the UICC, such asmemory management, resource management, communication management,application management, or the like, for example.

The illustrated file structure layer 708 includes an O/S data store 732for storing O/S data used by the O/S core and utility applications 730,a profiles and other application data store 734 for storing user profiledata and application data for the applications in the application layer702, an address book data store 736, an encrypted data store 738 forstoring an unlocking code, such as the unlocking code described above, adata logs store 740 for storing data logs including network activitylogs, and a foreign network data store 742 for storing data related toany foreign network used under a lease agreement, unlocking agreement,or roaming agreement.

When a UICC-equipped mobile device is sold by the home WSP to asubscriber, several of the illustrated components are provisioned by thehome WSP. For example, the SIM applications 710, 712, 714, 716, 718 andother applications, where appropriate, and the iMDANM 720 areprovisioned by the home WSP and updated as needed. The X-SIM 722 and theforeign network data store 742 are also provisioned with emptied contextand are hidden from the subscriber or foreign WSPs. Certain criticaldata are encrypted and stored in a secured data region, illustrated asthe encrypted data store 738. An unlocking code and/or locking code arealso stored in this data store, as described above.

When a subscriber moves outside of a home network coverage area to anarea where no roaming partners are available, the iMDANM 720 will offereither a lease agreement option or an unlocking agreement option to thesubscriber, as described above with reference to FIG. 5. Whennegotiations for an agreement succeed, the subscriber is provisionedwith the foreign WSP's service option and the mobile device isauthenticated by the foreign WSP. The foreign WSP is only given accessto write into the X-SIM application 722 and the foreign network datastore 742. The foreign WSP cannot access the encrypted data store 738.The subscriber can, however, still invoke any services residing on theUICC that do not require a home WSP's connection for access.

Referring now to FIG. 8, a schematic block diagram of an exemplarymobile device 800 is illustrated. In some embodiments, the mobile device102 illustrated in FIG. 1 is configured like the mobile device 800, nowdescribed in detail. Although connections are not shown between thecomponents illustrated in FIG. 8, the components can interact with eachother to carry out device functions. In some embodiments, for example,the components are arranged so as to communicate via one or more busses(not shown). It should be understood that FIG. 8 and the followingdescription are intended to provide a general understanding of asuitable environment in which the various aspects of some embodiments ofthe present disclosure can be implemented.

In some embodiments, the mobile device 800 is a multimode headset andhas a variety of computer readable media, including, for example,volatile media, non-volatile media, removable media, and non-removablemedia. The term computer-readable media and variants thereof, as used inthe specification and claims, refer to storage media and communicationmedia. In some embodiments, storage media includes volatile and/ornon-volatile, removable, and/or non-removable media. For example,storage media includes random access memory (RAM), read-only memory(ROM), electrically erasable programmable read-only memory (EEPROM),solid state memory or other memory technology, CD ROM, DVD, or otheroptical disk storage, magnetic tape, magnetic disk storage or othermagnetic storage devices, or any other medium that can be used to storethe desired information and that can be accessed by the mobile device800.

As illustrated in FIG. 8, the mobile device 800 includes a display 802for displaying multimedia such as, for example, application graphicaluser interfaces (GUIs), text, images, video, telephony functions, suchas Caller ID data, setup functions, menus, voicemail message waitingidentifiers (MWIs), music, metadata, messages, wallpaper, graphics,Internet content, device status, preferences settings, map and locationdata, profile (e.g., vibrate, silent, loud) selection, and the like. Thedisplay 802 may display visual voicemail data in visual voicemailheaders. The visual voicemail headers may include the date, time,message length, message status (i.e., new-unread, read, saved, ordeleted), and calling line identity (CLI) information. The illustratedmobile device 800 also includes a processor 804 for processing dataand/or executing computer-executable instructions of one or moreapplications 808, and a memory 806 for storing data and/or one or moreof the applications.

In some embodiments, the application(s) 808 include a user interface(UI) application 810. The UI application 810 interfaces with a client812 (e.g., an operating system (O/S)) to facilitate user interactionwith device functionality and data. In some embodiments, the client 812is one of Symbian O/S, Microsoft® Windows® Mobile O/S (available fromMicrosoft Corporation of Redmond, Wash.), Palm® webOS™ (available fromPalm Corporation of Sunnyvale, Calif.), Palm® O/S (available from PalmCorporation), RIM® BlackBerry® O/S (available from Research In MotionLimited of Waterloo, Ontario, Canada), Apple® iPhone® O/S (availablefrom Apple Corporation of Cupertino, Calif.), or Google Android™ O/S(available from Google Inc. of Mountain View, Calif.). These operatingsystems are merely exemplary of the operating systems that may be usedin accordance with the embodiments disclosed herein.

The UI application 810 aids a user in entering message content, viewingreceived messages, managing voicemails in a visual voicemailapplication, answering/initiating calls, entering/deleting data,entering and setting user Ds and passwords for device access,configuring settings, manipulating address book content and/or settings,multimode interaction, interacting with other applications 814, and thelike. In some embodiments, the other applications 814 include, forexample, iMDANM software client, visual voicemail applications,messaging applications (e.g., SMS, EMS, MMS applications), presenceapplications, text-to-speech applications, speech-to-text applications,add-ons, plug-ins, email applications, music applications, videoapplications, camera applications, location service applications (LSAs),power conservation applications, game applications, productivityapplications, entertainment applications, enterprise applications,combinations thereof, and the like. The applications 808 are stored inthe memory 806 and/or in a firmware 816, and are executed by theprocessor 804. The firmware 816 may also store code for execution duringdevice 800 power up, for example.

The illustrated mobile device 800 also includes an input/output (I/O)interface 818 for input/output of data, such as, for example, voicemailaccount information requests, visual voicemail management, locationinformation, presence status information, user IDs, passwords, andapplication initiation (start-up) requests. In some embodiments, the I/Ointerface 818 is a hardwire connection, such as, for example, a USB,mini-USB, audio jack, PS2, IEEE 1394, serial, parallel, Ethernet (RJ48)port, RJ11 port, or the like. In some embodiments, the I/O interface 818accepts other I/O devices such as, for example, keyboards, keypads,mice, interface tethers, stylus pens, printers, thumb drives, touchscreens, multi-touch screens, touch pads, trackballs, joysticks,microphones, remote control devices, monitors, displays, liquid crystaldisplays (LCDs), combinations thereof, and the like. It should beappreciated that the I/O interface 818 may be used for communicationsbetween the mobile device 800 and a network or local device, instead of,or in addition to, a communications component 820.

The communications component 820 interfaces with the processor 804 tofacilitate wired/wireless communications with external systems. Exampleexternal systems include, but are not limited to, intranets, networkdatabases, network storage systems, cellular networks, location servers,presence servers, Voice over Internet Protocol (VoIP) networks, localarea networks (LANs), wide area networks (WANs), metropolitan areanetworks (MANs), personal area networks (PANs), and other networks. Insome embodiments, the external systems are implemented using WIFI,WIMAX, combinations and/or improvements thereof, and the like. In someembodiments, the communications component 820 includes a multimodecommunications subsystem for providing cellular communications viadifferent cellular technologies. In some embodiments, for example, afirst cellular transceiver 822 operates in one mode, such as, GSM, andan Nth cellular transceiver 824 operates in a different mode, such asUMTS. While only two cellular transceivers 822, 824 are illustrated, itshould be appreciated that a plurality of transceivers can be included.

The illustrated communications component 820 also includes analternative communications transceiver 826 for use by othercommunications technologies such as, for example, WIFI, WIMAX,BLUETOOTH, infrared, IRDA, NFC, RF, and the like. In some embodiments,the communications component 820 also facilitates reception fromterrestrial radio networks, digital satellite radio networks,Internet-based radio services networks, combinations thereof, and thelike.

The communications component 820 processes data from a network such as,for example, the Internet, an intranet (e.g., business intranet), a homebroadband network, a WIFI hotspot, and the like, via an ISP, DSLprovider, or broadband provider. In some embodiments, the communicationscomponent 820 facilitates the transmission of authentication informationfrom the mobile device 800 to a network for processing in accordancewith the methods described herein.

Audio capabilities for the mobile device 800 can be provided by an audioI/O component 828 that includes a speaker for the output of audiosignals and a microphone to collect audio signals.

The illustrated mobile device 800 also includes a slot interface 830 foraccommodating a UICC 832. Alternatively, the UICC 832 may bemanufactured into the device 800, thereby obviating the need for a slotinterface 830. In some embodiments, the UICC 832 is programmed by amanufacturer, a retailer, a user, a computer, a network operator, or thelike. In some embodiments, the UICC 832 is configured to store an iMDANMapplication. In some embodiments, the UICC 832 is configured to store anX-SIM application.

The illustrated mobile device 800 also includes an image capture andprocessing system 834 (image system). Photos may be obtained via anassociated image capture subsystem of the image system 834, for example,a camera. The illustrated mobile device 800 also includes a video system836 for capturing, processing, recording, modifying, and/or transmittingvideo content. Photos and videos obtained using the image system 834 andthe video system 836, respectively, may be added as message content toan MMS message and sent to another mobile device.

The illustrated mobile device 800 also includes a location component 838for sending and/or receiving signals such as, for example, GPS data,assisted GPS (A-GPS) data, WIFI/WIMAX and/or cellular networktriangulation data, combinations thereof, and the like, for determininga location of the mobile device 800. In some embodiments, the locationcomponent 838 interfaces with cellular network nodes, telephone lines,satellites, location transmitters and/or beacons, wireless networktransmitters and receivers, for example, WIFI hotspots, radiotransmitters, combinations thereof, and the like. Using the locationcomponent 838, the mobile device 800 obtains, generates, and/or receivesdata to identify its location, or transmits data used by other devicesto determine the location of the mobile device 800.

The illustrated mobile device 800 also includes a power source 840, suchas batteries and/or other power subsystem (AC or DC). The power source840 can interface with an external power system or charging equipmentvia a power I/O component 842.

FIG. 9 illustrates an exemplary cellular communications network 900 thatis representative of a home network or a foreign network, for example,the home network 104 and the foreign networks 106, 108, 110 illustratedin FIG. 1. The cellular communications network 900 includes two radioaccess networks (RANs). A first RAN, illustrated in the upper left handportion of FIG. 9, is dedicated to GSM-based network access. A secondRAN, illustrated in the lower left hand portion of FIG. 9, is dedicatedto UMTS-based network access. The innovative aspects of the presentdisclosure may be implemented in alternative networks that use otheraccess technologies, as described above. The first RAN is now described.

The illustrated communications network 900 includes a first MobileStation (MS) 902 and a second MS 904 that are each in communication witha Base Transceiver Station (BTS) 906 via the Um radio (air) interface.The BTSs 906 are terminating nodes for the radio interface in theillustrated first RAN. Each BTS 906 includes one or more transceiversand is responsible for ciphering of the radio interface.

In the illustrated embodiment, the first MS 902 is a mobile device, suchas the mobile devices 102, 800, and the second MS 904 is a portablecomputer, such as a laptop with an integrated or external, removable GSMaccess card or the computer 120. Each MS 902, 904 includes mobileequipment, such as, but not limited to, keyboards, screens, touchscreens, multi-touch screens, radio transceivers, circuit boards,processors, memory, a SIM, USIM, or UICC that contains subscriberinformation to enable network access to the wireless telecommunicationsnetwork 900, and the like.

Each BTS 906 is in communication with a Base Station Controller (BSC)908 via the Abis interface. Typically, a BSC has tens or even hundredsof BTSs under its control. The BSC 908 is configured to allocate radioresources to the MSs 902, 904, administer frequencies, and controlhandovers between BTSs 906 (except in the case of an inter-MobileSwitching Center (MSC) handover in which case control is in part theresponsibility of the MSC). One function of the BSC 908 is to act as aconcentrator, so that many different low capacity connections to the BTS906 become reduced to a smaller number of connections towards the MSC.Generally, this means that networks are often structured to have manyBSCs 908 distributed into regions near the BTSs 906 which are in turnconnected to large centralized MSC sites. Although illustrated as adistinct element, the functions provided by the BSC 908 mayalternatively be incorporated in the BTS 906 and, in such aconfiguration, the Abis interface is eliminated.

The BSC 908 is logically associated with a Packet Control Unit (PCU) 910when GPRS capabilities are employed. The PCU 910 is configured tosupport radio related aspects of GPRS when connected to a GSM network.The PCU 910 is in communication with a Serving GPRS Support Node (SGSN)912 via the Gb interface. The SGSN 912 records and tracks the locationof each mobile device (e.g., MSs 902, 904) in the wirelesstelecommunications network 900. The SGSN 912 also provides securityfunctions and access control functions.

The BSC 908 is also in communication with an MSC 914 via an A interface.The MSC 914 is configured to function as a telecommunications switch.The MSC 914 is in communication with location databases, such as aVisiting Location Register (VLR) 916 and a Home Location Register (HLR)917. The VLR 916 may be logically associated with the MSC 914 asillustrated or may be provided as a separate network element. The VLR916 is a database configured to store all subscriber data that isrequired for call processing and mobility management for mobilesubscribers that are currently located in an area controlled by the VLR916.

The HLR 917 is in communication with the MSC 914 and VLR 916 via the Dinterface. The HLR 917 is a database configured to provide routinginformation for mobile terminated calls and various messagingcommunications. The HLR 917 is also configured to maintain subscriberdata that is distributed to the relevant VLR (e.g., the VLR 916) or theSGSN 912 through the attach process and to provide mobility managementprocedures, such as location area and routing area updates. The HLR 917may be logically associated with an Authentication Center (AuC) asillustrated or may be provided as a separate network element. The AuC isconfigured to authenticate each UICC/SIM/USIM/X-SIM that attempts toconnect to the wireless telecommunications network 900, for example,when a mobile device is powered on. Once authenticated, the HLR 917 isallowed to manage the UICC/SIM/USIM/X-SIM and services provided to theMS 902, 904. The AuC also is capable of generating an encryption keythat is used to encrypt all wireless communications between the MS 902,904 and the communications network 900.

The MSC 914 is also in communication with a Gateway MSC (GMSC) 918 viathe B interface. The GMSC 918 is configured to provide an edge functionwithin a Public Land Mobile Network (PLMN). The GMSC 918 terminatessignaling and traffic from a Public Switched Telephone Network (PSTN)922 and an Integrated Service Digital Network (ISDN) 924, and convertsthe signaling and traffic to protocols employed by the mobile network.The GMSC 918 is in communication with the HLR/AuC 917 via the Cinterface to obtain routing information for mobile terminated callsoriginating from fixed network devices, such as landline telephones thatare in communication with the mobile network via the PSTN 922, forexample.

The MSC 914 is also in communication with an EIR (Equipment IdentityRegister) 928 via an F interface. The EIR 928 is a database that can beconfigured to identify subscriber devices that are permitted to accessthe wireless telecommunications network 900. An IMEI (InternationalMobile Equipment Identity) is a unique identifier that is allocated toeach mobile device and is used to identify subscriber devices in the EIR928. The IMEI includes a type approval code, a final assembly code, aserial number, and a spare digit. An IMEI is typically placed in the EIR928 once its operation has been certified for the infrastructure of thenetwork 900 in a laboratory or validation facility.

The SGSN 912 and the MSC 914 are also in communication with a gatewaymobile location center (GMLC) 929 via an Lg interface. The GMLC 929 cancommunicate with the HLR/AUc 917 via an Lh interface to acquire routinginformation.

The EIR 928 and the HLR/AuC 917 are each in communication with the SGSN912 via the Gf interface and the Gr interface, respectively. The SGSN912, in turn, is in communication with a GGSN (Gateway GPRS SupportNode) 930 via the Gn interface. The GGSN 930 is configured to provide anedge routing function within a GPRS network to external PDNs (PacketData Networks) 932, such as the Internet and one or more intranets, forexample. The GGSN 930 is in communication with the PDN 932 via the Giinterface. The GGSN 930 includes firewall and filtering functionality.The HLR/AuC 917 is in communication with the GGSN 930 via the Gcinterface.

The SGSN 912 is also in communication with another PLMN 934 via anexternal GGSN (not shown). The external GGSN provides access to theother PLMN 934. The other PLMN 934 may be, for example, a foreignnetwork, such as, a wireless telecommunications network operated byanother WSP or the same WSP.

The second RAN, illustrated in the lower left hand portion of FIG. 9, isdedicated to UMTS-based network access and is now described. Theillustrated wireless telecommunications network 900 also includes afirst UE (User Equipment) 936 and a second UE 938 that are each incommunication with a Node B 940 via the Uu radio (air) interface. TheNode B 940 is the terminating node for the radio interface in the secondRAN. Each Node B 940 includes one or more transceivers for transmissionand reception of data across the Uu radio interface. Each Node B 940 isconfigured to apply the codes to describe channels in a CDMA-based UMTSnetwork. Generally, the Node B 940 performs similar functions for theUMTS network that the BTS 906 performs for the GSM network.

In the illustrated embodiment, the first UE 936 is a mobile phone (e.g.,the mobile device 102, 800) and the second UE 938 is a portablecomputer, such as a laptop with an integrated or external, removableUMTS card or the computer 120. Each UE 936, 938 includes mobileequipment, such as keyboards, screens, touch screens, multi-touchscreens, radio transceivers, circuit boards, processors, a UICC or USIMstand-alone that contains subscriber information to enable networkaccess to the wireless telecommunications network 900, and the like.Generally, the UE's 936, 938 perform similar functions in the UMTSnetwork that the MS's 902, 904 perform in the GSM network.

Each Node B 940 is in communication with a Radio Network Controller(RNC) 942 via the lub interface. The RNC 942 is configured to allocateradio resources to the UE's 136, 138, administer frequencies, andcontrol handovers between Node Bs 940 (and others not shown). Althoughillustrated as a distinct element, the RNC 942 functions mayalternatively be located within the Node Bs 940. In this configurationthe lub interface is eliminated. Generally, the RNC 942 performs similarfunctions for the UMTS network that the BSC 908 performs for the GSMnetwork.

The RNC 942 is in communication with the MSC 914 via an lu-CS interface.The RNC 942 is also in communication with the SGSN 912 via an lu-PSinterface. The other network elements perform the same functions for theUMTS network as described above for the GSM network.

The communications network 900 also includes an IP Multimedia Subsystem(IMS) network 944. The IMS network 944 includes Call State ControlFunctions (CSCFs), such as, a Proxy-CSCF (P-CSCF), an Interrogating-CSCF(I-CSCF), and a Serving-CSCF (S-CSCF). A P-CSCF is the first contactpoint in the IMS network 944 for a UE and routes incoming communicationsto the I-CSCF. The I-CSCF determines which S-CSCF is serving thecommunication and routes the communication to that S-CSCF, whichperforms registration, session control, and application interfacefunctions. The P-CSCF and the I-CSCF are illustrated as a combinedI/P-CSCF 946 and the S-CSCF 948 is illustrated as a stand-alone element.Other CSCF configurations are contemplated.

The IMS network 944 also includes a Home Subscriber Server (HSS) 950,which is a master user database that supports the IMS network 944 corenetwork elements. The HSS 950 stores subscription-related information,such as subscriber account details and subscriber profiles, performsauthentication and authorization of the user, and provides informationabout a subscriber's location and IP address. It is similar to the GSMHLR and AuC, described above as the combination HLR/AuC 917.

The IMS network 944 also includes a Media Gateway Control Function(MGCF) 952, which provides call control protocol conversions between theISUP (ISDN User Part) protocol used by the PSTN 922 and the SIP (SessionInitiation Protocol) used by the IMS network 944.

Referring back to the SGSN 912, it is shown that the SGSN 912 is incommunication with a charging system 954 via a CAP interface. The GGSN930 is also in communication with the charging system 954, via an Rointerface. The charging system 954, in turn, is in communication with abilling system 956.

Briefly, the charging system 954 is responsible for offline and onlinecharging of subscriber accounts. The charging system 954 may be deployedto provide charging rule functions for prepaid and/or postpaid networkplatforms and for agreements developed between a home network WSP and aforeign WSP, such as a temporary lease agreement, a temporary unlockingagreement, or a temporary roaming agreement, as described herein. Thesingle charging system 954 is illustrated for simplicity, howeverseparate charging systems are contemplated and may be utilized ifdesired by the operating WSP.

As used herein, offline charging generally refers to a chargingmechanism where charging information does not affect, in real- or nearreal-time, the rendered service. As also used herein, online charginggenerally refers to a charging mechanism where charging information doesaffect, in real- or near real-time, the rendered service, thus requiringa direct interaction of the charging mechanism with the session/servicecontrol. Online charging is used in prepaid applications and real-timeprovisioning, for example.

The billing system 956 is responsible for billing postpaid customers andhandling payments received for service provisioned for both postpaid andprepaid accounts in the network 900. Like the charging system 954, thebilling system 956 may alternatively be designed as two separateentities for postpaid and prepaid applications.

As described above, in some embodiments, the charging system 954provides both online and offline charging functions. As such, in someembodiments, the charging system 954 includes an offline charging systemwhich itself includes a Charging Data Function (CDF) and a ChargingGateway Function (CGF). In some embodiments, the charging system 954additionally or alternatively includes an online charging system. Theonline and offline charging systems are both operable to transmit CallDetail Records (CDRs) to the billing system 956. The CDRs are generatedfor subscriber activity within the network 900 or a foreign network inwhich a mobile device is roaming under an established partner roamingagreement. In some embodiments, CDRs are received from a foreign networkthat has established a temporary agreement for roaming, unlocking,and/or leasing, as described herein.

The offline charging system communicates with one or more of thefollowing elements or functions to receive charging information: acircuit-switched network element, such as those illustrated anddescribed above in the circuit-switched portion of the network 900, aservice network element, a SIP application server, a Multimedia ResourceFunction Control (MRFC), the MGCF 952, a Break-out Gateway ControlFunction (BGCF), a P-CSCF/I-CSCF, a S-CSCF, a Wireless Local AreaNetwork (WLAN), the SGSN 912, and the GGSN 930. These and the otherillustrated elements are described in detail in the 3GPP technicalspecifications.

The online charging system includes online charging functions, such as asession-based charging function, an event-based charging function,and/or a volume-based charging function. A charging gateway function isin communication with the online charging system via a Ga interface andto a post-processing system via a Bo interface. The post-processingsystem, in some embodiments, is a billing system, such as the billingsystem 956. A rating function is in communication with the onlinecharging functions via a Re interface. The rating function includestariff information including, for example, all the purchase values forthe various goods and services provided by a WSP.

A charging trigger function is in communication with the offlinecharging system and the online charging system via an Rf interface andan Ro interface, respectively. The charging trigger function may beimplemented into any of the previously described service elements andmay be configured to trigger a charging routine for a particular serviceor good.

The offline charging system includes a charging data function that is incommunication with a charging gateway function via a Ga interface. Theonline charging system includes an online charging function that is incommunication with an account balance management function, a ratingfunction, and a charging gateway function. The charging gatewayfunctions are in communication with the billing system 956 via a Bx orBo interface.

An offline charging gateway function is in communication with an offlinerating function that may be stored within the billing system 956. Theoffline rating function is responsible for rating services for postpaidsubscribers when the postpaid subscriber's bill is to reflect anycharges the customer incurs during the billing period, such as thoseincurred within the subscriber's home network or a visited foreignnetwork. Each of the charging gateway functions includes call detailrecords or more broadly termed, charge detail records to reflect allcharges not just voice call charges. Although the online and offlinegateway functions and rating functions are described as separateelements, a combined architecture is also contemplated.

The billing system 956 includes the offline rating function that is incommunication with the offline charging gateway function via a Bxinterface. The offline rating function is in communication with a rateplans database that is configured to store and manage rate plans forpostpaid subscription services. The rate plans database is incommunication with a call center, Interactive Voice Response (IVR)system and/or other customer care systems to facilitate customer servicefunctions regarding rate plans for voice and/or data services. Theoffline rating function is also in communication with a bill calculatorthat is provided to calculate postpaid bills and process invoices to besent via email, mail, or another method to a postpaid subscriber at theend of a billing period. A prepaid accounts database may also beprovided to maintain prepaid subscriber accounts, such as by monitoringminute and data block allocations for a subscriber account andinstructing the network 900 to no longer allow a subscriber to accessthe network 900 when that subscriber's minute and/or data blockallocation, as appropriate, has reached a zero balance.

Other network elements that are not shown may be incorporated into theillustrated network 900 to facilitate various features described herein.For example, a call center and/or an IVR (Interactive Voice Response)may be used to offer customer care services, such as account setup,account activation, account closure, account contact informationupdates, balance inquiries, prepaid deposits, bill-pay, and likeservices via a human operator and automated system, respectively. Thecall center and/or IVR may be in communication with externalcircuit-switched networks, such as the PSTN 922 and/or the ISDN 924 ormay be in direct communication with the MSC 914.

A PoS (Point-of-Sale) system may also be incorporated into theillustrated network 900. The PoS system may operate at a physical store(or other location) or through an Internet web site. The POS systemallows a subscriber to purchase services and mobile devices.

The law does not require and it is economically prohibitive toillustrate and teach every possible embodiment of the present claims.Hence, the above-described embodiments are merely exemplaryillustrations of implementations set forth for a clear understanding ofthe principles of the disclosure. Variations, modifications, andcombinations may be made to the above-described embodiments withoutdeparting from the scope of the claims. All such variations,modifications, and combinations are included herein by the scope of thisdisclosure and the following claims.

1. A method for providing cellular access to a mobile device when themobile device is out of a home network operated by a home wirelessservice provider, the method comprising: presenting, at the mobiledevice, an option to initiate a process to establish a temporary roamingagreement between the home wireless service provider and a foreignwireless service provider operating a foreign network in a location ofthe mobile device outside of the home network; receiving, at the mobiledevice, a selection of the option via a user interface of the mobiledevice; the mobile device accessing a web application associated with anegotiation server via an Internet connection provided by a non-cellularsecondary network in response to the selection; providing, by the mobiledevice, subscriber credentials associated with the subscriber to thenegotiation server for use by the negotiation server to negotiate thetemporary roaming agreement between the home wireless service providerand the foreign wireless service provider; and allowing the mobiledevice to access the foreign network in accordance with the temporaryroaming agreement.
 2. The method of claim 1, wherein the subscribercredentials include at least one credential selected from the list ofcredentials consisting of: home wireless service provider identificationinformation, a telephone number of the mobile device, a UICC serialnumber, a current location of the mobile device, a duration of thetemporary roaming agreement, and a maximum allotted credit amount. 3.The method of claim 2, wherein allowing the mobile device to access theforeign network comprises allowing the mobile device to access theforeign network for the duration of the temporary roaming agreement. 4.The method of claim 2, wherein at least some of the subscribercredentials are pre-loaded into the mobile device by the home wirelessservice provider.
 5. The method of claim 1, further comprisingreceiving, at the mobile device, a confirmation code confirming that thetemporary roaming agreement is active.
 6. A method for providingcellular access to a mobile device when the mobile device is out of ahome network operated by a home wireless service provider, the methodcomprising: receiving, at a negotiation server, a request to initiate atemporary roaming agreement; searching, at the negotiation server, forall available foreign networks; selecting, at the negotiation server, aforeign network of the available foreign networks; negotiating, at thenegotiation server, the temporary roaming agreement between the homewireless service provider and a foreign wireless service provideroperating the foreign network; and allowing the mobile device to accessthe foreign network under the temporary roaming agreement.
 7. The methodof claim 6, wherein receiving the request to initiate the temporaryroaming agreement comprises receiving, at the negotiation server, therequest from the mobile device.
 8. The method of claim 7, wherein therequest received from the mobile device was generated in response to auser selecting an option for the temporary roaming agreement.
 9. Themethod of claim 7, wherein the request is received from the mobiledevice via a non-cellular network at a web application associated withthe negotiation server.
 10. The method of claim 7, further comprisingreceiving, at the negotiation server, subscriber credentials provided bythe mobile device.
 11. The method of claim 10, wherein receiving, at thenegotiation server, the subscriber credentials comprises receiving, atthe negotiation server, at least one credential selected from the listof credentials consisting of: of home wireless service provideridentification information, a telephone number of the mobile device, aUICC serial number, a current location of the mobile device, a durationof the temporary roaming agreement, and a maximum allotted creditamount.
 12. The method of claim 6, wherein receiving the request toinitiate the temporary roaming agreement comprises receiving, at thenegotiation server, the request from an Internet-connected device towhich a subscriber associated with the mobile device has access to enterthe request.
 13. The method of claim 12, wherein the request receivedfrom the Internet-connected device was generated in response to a userselecting an option for the temporary roaming agreement from a webapplication associated with the negotiation server.
 14. The method ofclaim 12, further comprising receiving, at the negotiation server,subscriber credentials provided by the subscriber through theInternet-connected device.
 15. The method of claim 14, whereinreceiving, at the negotiation server, the subscriber credentialscomprises receiving, at the negotiation server, at least one credentialselected from the list of credentials consisting of: home wirelessservice provider identification information, a telephone number of themobile device, a UICC serial number, a current location of the mobiledevice, a duration of the temporary roaming agreement, and a maximumallotted credit amount.
 16. A method for providing cellular access to amobile device when the mobile device is out of a home network operatedby a home wireless service provider that has no pre-arranged roamingagreements with any foreign wireless service provider in a location ofthe mobile device, the method comprising: implementing an intelligentMobile Device Access Network Manager (iMDANM) application on a UniversalIntegrated Circuit Card (UICC) of the mobile device, the iMDANMapplication being configured to receive an unlocking code to unlock themobile device so that the mobile device can access a wireless serviceoffered by a foreign network operated by a foreign wireless serviceprovider.
 17. The method of claim 16, further comprising receiving, atthe mobile device, a communication from the home wireless serviceprovider, the communication comprising an email message including theunlocking code.
 18. The method of claim 17, wherein: receiving, at themobile device the email message including the unlocking code comprisesreceiving, at the mobile device the email message with the unlockingcode in an encrypted format; and the iMDANM application of the mobiledevice is configured to decrypt the unlocking code using a decryptionkey.
 19. The method of claim 16, further comprising scanning, at themobile device, a barcode received in an email at an Internet-connecteddevice using a camera of the mobile device, wherein the unlocking codeis obtained by way of the scanning.
 20. The method of claim 16, furthercomprising: receiving, at the mobile device, the unlocking code from anInternet-connected device via Universal Serial Bus (USB), IEEE 1394,BLUETOOTH, IEEE 802.3, adhoc WIFI, Radio Frequency Identification(RFID), Near-Field Communication (NFC), infrared, or infrared DataAssociation (iRDA); wherein the Internet-connected device receives theunlocking code from the home service provider via the Internet.