Apparatus and methods for distributing credentials of mobile network operators

ABSTRACT

A system that incorporates teachings of the subject disclosure may include, for example, a method for detecting, by a first device including a least one processor and a first Universal Integrated Circuit Card (UICC), a second device having a second UICC, detecting, by the first device, that the second UICC is unprovisioned, selecting, by the first device, one of a plurality of selectable options, where the selection identifies a first Mobile Network Operator (MNO) selected from a plurality of MNOs, receiving, by the first device, first credential information of the first MNO, and transmitting, by the first device, to the second device the first credential information for enabling the second device to facilitate establishment of communication services with network equipment of the first MNO according to the first credential information. Other embodiments are disclosed.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of and claims priority to U.S. patentapplication Ser. No. 13/526,696 filed Jun. 19, 2012 by Christopher etal., entitled “Apparatus and Methods for Distributing Credentials ofMobile Network Operators.” All sections of the aforementionedapplication is incorporated herein by reference in its entirety.

FIELD OF THE DISCLOSURE

The subject disclosure relates generally to an apparatus and methods fordistributing credentials of mobile network operators.

BACKGROUND

Mobile Network Operators (MNOs) generally provide each subscriber aUniversal Integrated Circuit Card (UICC), commonly known as a SubscriberIdentity Module or SIM card, which enables authentication and access toa mobile network and provides identifiers that allow equipment of theMNO to account for service usage and to bill the subscriber accordingly.The SIM card is removable by the subscriber and can be inserted in anycompatible device, providing continuity of network access service fromdevice to device. A user can switch to another MNO by physicallyswapping SIM cards in their device.

In an environment involving machine-to-machine communications, it iscommon for a UICC to be placed in harsh environments such as acommunication device located in an automobile engine, or atop astreetlight, which is not easily accessible. In such applications theUICC is often embedded in the communication device and not physicallyreplaceable. When a subscriber of a device utilizing an embedded UICCwishes to switch to another MNO, the subscriber may have to replace thedevice if the embedded UICC is not configured to be re-provisioned.

BRIEF DESCRIPTION OF THE DRAWINGS

Reference will now be made to the accompanying drawings, which are notnecessarily drawn to scale, and wherein:

FIG. 1 depicts an illustrative embodiment of a communication device;

FIG. 2 depicts an illustrative embodiment of a system including mobilenetwork operators (MNOs) and communication devices communicativelycoupled thereto;

FIG. 3 depicts an illustrative embodiment of a mapping of servicesprovided by the MNOs and software applications operating from one ormore of the communication devices of FIG. 2;

FIG. 4 depicts an illustrative embodiment of a communication deviceutilizing a Universal Integrated Circuit Card (UICC) to supporting amongother things enablement of software applications operating from thecommunication device;

FIG. 5 depicts an illustrative embodiment of a method for transitioningbetween the MNOs of FIG. 2;

FIG. 6 depicts an illustrative embodiment of a system for provisioningend user terminals including a UICC to utilize services of one of aplurality of MNOs;

FIG. 7 depicts an illustrative embodiment of a method for provisioningthe UICC of the end user terminal of FIG. 6;

FIG. 8 depicts an illustrative embodiment of a system for peer-to-peerprovisioning of a UICC of a device to utilize services of one of aplurality of MNOs;

FIGS. 9-10 depict illustrative embodiments of methods for provisioningand distributing MNO credentials to devices in the peer-to-peerconfiguration of FIG. 8; and

FIG. 11 is a diagrammatic representation of a machine in the form of acomputer system within which a set of instructions, when executed, maycause the machine to perform any one or more of the methods describedherein.

DETAILED DESCRIPTION

The subject disclosure describes, among other things, illustrativeembodiments for distributing credentials of mobile network operators.Other embodiments are contemplated by the subject disclosure.

One embodiment of the subject disclosure includes computer-readablestorage medium including computer instructions which, responsive tobeing executed by at least one processor, cause the at least oneprocessor to perform operations including receiving, by equipment of afirst MNO, a request initiated by a first portable communication devicefor selecting one or more services provided by at least one of aplurality of MNOs, transmitting, by the equipment of the first MNO,information for presenting at a user interface of the first portablecommunication device a plurality of selectable options for selecting theone or more services from the plurality of MNOs, and detecting, by theequipment of the first MNO, a selection from the plurality of selectableoptions, where the selection identifies a second MNO selected from theplurality of MNOs. Responsive to executing the computer instructions theat least one processor can also perform operations including receiving,by the equipment of the first MNO, credential information of the secondMNO, and transmitting, by the equipment of the first MNO, to the firstportable communication device the credential information of the secondMNO.

One embodiment of the subject disclosure includes a method forfacilitating, by a system including at least one processor,establishment of communications with a source mobile communicationdevice, receiving, by the system, credentials of a plurality of mobilenetwork operators, and transmitting, by the system, to the sourcecommunication device the credentials of the plurality of mobile networkoperators for enabling the source mobile communication device todistribute credentials of one or more mobile network operators of theplurality of mobile network operators to recipient communication deviceseach including a universal integrated circuit card.

One embodiment of the subject disclosure includes a method forreceiving, by a system including at least one processor, a requestinitiated by a first communication device for selecting one or moreservices provided by at least one of a plurality of network operators,transmitting, by the system, information for presenting at a userinterface of the first communication device a plurality of selectableoptions for selecting the one or more services from the plurality ofnetwork operators, detecting, by the system, a selection from theplurality of selectable options, wherein the selection identifies afirst network operator selected from the plurality of network operators,receiving, by the system, credential information of the first networkoperator, and transmitting, by the system, to the first communicationdevice the credential information of the first network operator.

One embodiment of the subject disclosure includes a first communicationdevice including a memory storing computer instructions, and a processorcoupled to the memory. The processor responsive to executing thecomputer instructions can perform operations including detecting asecond communication device with an unprovisioned UICC, presenting at auser interface of the first communication device a plurality ofselectable options for selecting one or more services provided by one ofa plurality of MNOs, detecting a selection from the plurality ofselectable options, wherein the selection identifies a first MNOselected from the plurality of MNOs, receiving first credentialinformation of the first MNO, and transmitting to the secondcommunication device the first credential information for storage in theUICC of the second communication device and for enabling the secondcommunication device to facilitate establishment of communicationservices with network equipment of the first MNO according to the firstcredential information.

One embodiment of the subject disclosure includes a method fordetecting, by a first device including a least one processor and a firstUICC, a second device having a second UICC, detecting, by the firstdevice, that the second UICC is unprovisioned, selecting, by the firstdevice, one of a plurality of selectable options, wherein the selectionidentifies a first network operator selected from a plurality of networkoperators, receiving, by the first device, first credential informationof the first network operator, and transmitting, by the first device, tothe second device the first credential information for enabling thesecond device to facilitate establishment of communication services withnetwork equipment of the first network operator according to the firstcredential information.

One embodiment of the subject disclosure includes a computer-readablestorage medium, including computer instructions which, responsive tobeing executed by at least one processor, cause the at least oneprocessor to perform operations including facilitating, by a firstportable device, establishment of a peer-to-peer communication sessionwith a second portable device with a second integrated circuit card,selecting, by the first portable device, one of a plurality ofselectable options, where the selection identifies a first networkoperator selected from a plurality of network operators, identifying, bythe first portable device, first credential information of the firstnetwork operator, and transmitting, by the first portable device first,to the second device the first credential information for storage in thesecond integrated circuit card and for enabling the second device tofacilitate establishment of communication services with networkequipment of the first network operator according to the firstcredential information.

One embodiment of the subject disclosure includes a method forfacilitating, by a recipient device including at least one processor anda UICC, establishment of a peer-to-peer communication session with asource device, notifying, by the recipient device, the source device ofa provisioning state of the UICC, and receiving, by the recipientdevice, from the source device first credential information of a firstMNO selected by the source device from a plurality of MNOs according tothe provisioning state of the UICC. In one embodiment, the source deviceand recipient device can be portable communication devices. In anotherembodiment, the peer-to-peer communication session can be a personalarea network. In yet another embodiment, the source device can beconfigured to store credentials of the plurality of MNOs enabling thefirst device to distribute credentials of one or more MNOs of theplurality of MNOs to UICCs of recipient devices. In another embodiment,the source device can be configured to receive the first credential fromone of equipment of one of the plurality of MNOs, equipment of a vendorof communication devices, or equipment of a manufacturer of at least aportion of the communication devices.

One embodiment of the subject disclosure includes a Universal IntegratedCircuit Card (UICC) including a memory storing computer instructions,and processor coupled to the memory. The processor responsive toexecuting the computer instructions can perform operations includingretrieving from the memory first credential information for initiatingMNO selection services by way of a default MNO, facilitatingestablishment of communication services with network equipment of thedefault MNO according to the first credential information, initiating acommunication session with service equipment by way of the networkequipment of the default MNO, presenting at a user interface of a devicecoupled to the UICC a plurality of selectable options for selecting oneof a plurality of MNOs from which to receive communication services,detecting a selection from the plurality of selectable options, whereinthe selection identifies a first MNO selected from the plurality ofMNOs, transmitting to the service equipment information descriptive ofthe selection of the first MNO, receiving from the service equipmentsecond credential information, and facilitating establishment ofcommunication services with network equipment of the first MNO accordingto the second credential information.

One embodiment of the subject disclosure includes a computer-readablestorage medium including computer instructions which, responsive tobeing executed by at least one processor of a UICC, cause the at leastone processor to perform operations including identifying firstcredential information associated with a default MNO, facilitatingestablishment of communication services with network equipment of thedefault MNO according to the first credential information, initiating acommunication session with service equipment by way of the networkequipment of the default MNO, receiving from the service equipmentsecond credential information associated with a first MNO selected byequipment of a commercial enterprise, and facilitating establishment ofcommunication services with network equipment of the first MNO accordingto the second credential information.

One embodiment of the subject disclosure includes a method forfacilitating, by a system including at least one processor,establishment of a communication session with a device coupled to aUniversal Integrated Circuit Card (UICC) by way of network equipment ofa default Mobile Network Operator (MNO), receiving, by the system,information descriptive of an MNO selection, selecting, by the system,from a database of credentials of a plurality of MNOs first credentialinformation according to the received information, where the firstcredential information is associated with a first MNO of the pluralityof MNOs, and transmitting, by the system, the first credentialinformation to the UICC over the communication session by way of thedevice to cause the UICC to facilitate establishment of communicationswith network equipment of the first MNO according to the firstcredential information.

One embodiment of the subject disclosure includes a UICC having a memorystoring computer instructions, and a processor coupled to the memory.The processor responsive to executing the computer instructions canperform operations including storing parametric information descriptiveof operational features of a plurality of software applicationsexecutable by the UICC or a device communicatively coupled to the UICC,where the plurality of software applications when executed makes use ofservices provided by equipment of a first MNO. When executing thecomputer instructions, the processor can also perform operationsincluding detecting an event indicating that the plurality of softwareapplications are to utilize services provided by equipment of a secondMNO, transmitting to the equipment of the second MNO the parametricinformation descriptive of the operational features of the plurality ofsoftware applications to configure the services provided by theequipment of the second MNO to interoperate with the plurality ofsoftware applications when executed, and causing or enabling executionof a first software application of the plurality of softwareapplications to interact with at least one of the configured servicesprovided by the equipment of the second MNO.

One embodiment of the subject disclosure includes a computer-readablestorage medium including computer instructions which, responsive tobeing executed by at least one processor of a UICC, cause the at leastone processor to perform operations including storing parametricinformation descriptive of operational features of a plurality ofsoftware applications, where the plurality of software applications whenexecuted makes use of services provided by equipment of a first MNO.When executing the computer instructions, the at least one processor canalso perform operations including detecting an event indicating that theplurality of software applications are to utilize services provided byequipment of a second MNO, and transmitting to the equipment of thesecond MNO the parametric information descriptive of the operationalfeatures of the plurality of software applications to configure theservices provided by the equipment of the second MNO to interoperatewith the plurality of software applications.

One embodiment of the subject disclosure includes a method for storing,by a Universal Integrated Circuit Card (UICC) including at least oneprocessor, parametric information descriptive of operational features ofa plurality of software applications, where the plurality of softwareapplications when executed makes use of services provided by equipmentof a first MNO. The method can further include detecting, by the UICC,an event indicating that the plurality of software applications are toutilize services provided by equipment of a second MNO, and causing, bythe UICC, a transmission of the parametric information descriptive ofthe operational features of the plurality of software applications tothe equipment of the second MNO.

FIG. 1 depicts an illustrative embodiment of a communication device 100.The communication device 100 can represent a number of possible devicetypes such as, for example, a cellular telephone, a personal digitalassistance, a smart phone, a tablet, a portable computer such as alaptop, an industrial device for providing telemetry information to acentral station for monitoring, diagnostics, mitigation or othersuitable functions. Multiple variants of the communication device 100are thus contemplated by the subject disclosure.

The communication device 100 can comprise a wireline and/or wirelesstransceiver 102 (herein transceiver 102), a user interface (UI) 104, apower supply 114, a location receiver 116, a motion sensor 118, anorientation sensor 120, a UICC 121, and a controller 106 for interactingwith or managing operations thereof. The transceiver 102 can supportshort-range or long-range wireless access technologies such asBluetooth, ZigBee, WiFi, Digital Enhanced Cordless Telecommunications(DECT), or cellular communication technologies, just to mention a few.Cellular technologies can include, for example, CDMA-1X, UMTS/HSDPA,GSM/GPRS, TDMA/EDGE, EV/DO, WiMAX, software defined radio (SDR), LongTerm Evolution (LTE), as well as other next generation wirelesscommunication technologies as they arise. The transceiver 102 can alsobe adapted to support circuit-switched wireline access technologies(such as Public Switched Telephone Network or PSTN), packet-switchedwireline access technologies (such as TCP/IP, VoIP, IP MultimediaSubsystems or IMS, etc.), and combinations thereof.

The UI 104 can include a depressible or touch-sensitive keypad 108 witha navigation mechanism such as a roller ball, a joystick, a mouse, or anavigation disk for manipulating operations of the communication device100. The keypad 108 can be an integral part of a housing assembly of thecommunication device 100 or an independent device communicativelycoupled thereto by a tethered wireline interface (such as a USB cable)or a wireless interface supporting for example Bluetooth. The keypad 108can represent a numeric keypad commonly used by phones, and/or a QWERTYkeypad with alphanumeric keys.

The UI 104 can further include a display 110 such as monochrome or colorLCD (Liquid Crystal Display), OLED (Organic Light Emitting Diode) orother suitable display technology for conveying images to an end user ofthe communication device 100. In an embodiment where the display 110 istouch-sensitive, a portion or all of the keypad 108 can be presented byway of the display 110 with navigation features. The display 110 can bean integral part of the housing assembly of the communication device 100or an independent device communicatively coupled to the communicationdevice 100 by a tethered wireline interface (such as a cable) or awireless interface.

The UI 104 can also include an audio system 112 that utilizes commonaudio technology for conveying low volume audio (such as audio heardonly in the proximity of a human ear) and high volume audio (such asspeakerphone for hands free operation). The audio system 112 can furtherinclude a microphone for receiving audible signals of an end user. Theaudio system 112 can also be used for voice recognition applications.The UI 104 can further include an image sensor 113 such as a chargedcoupled device (CCD) camera for capturing still or moving images.

The power supply 114 can utilize common power management technologiessuch as replaceable and rechargeable batteries, supply regulationtechnologies, and/or charging system technologies for supplying energyto the components of the communication device 100 to facilitatelong-range or short-range portable applications. Alternatively, thecharging system can utilize external power sources such as DC powersupplied over a physical interface such as a USB port or other suitabletethering technologies.

The location receiver 116 can utilize location technology such as aglobal positioning system (GPS) receiver capable of assisted GPS foridentifying a location of the communication device 100 based on signalsgenerated by a constellation of GPS satellites, which can be used forfacilitating location services such as navigation. The motion sensor 118can utilize motion sensing technology such as an accelerometer, agyroscope, or other suitable motion sensing technology to detect motionof the communication device 100 in three-dimensional space. Theorientation sensor 120 can utilize orientation sensing technology suchas a magnetometer to detect the orientation of the communication device100 (north, south, west, and east, as well as combined orientations indegrees, minutes, or other suitable orientation metrics).

The UICC 121 can be utilized for storing data to enable thecommunication device 100 to, among other things, establishcommunications with a communication network such as a cellular basestation, support enablement of software applications stored in the UICCor a memory of the communication device 100 that makes use of servicesprovided by the communication network. The data stored in the UICC 121can include, for example, an International Mobile Subscriber Identity(IMSI), a personal phone book, executable software applicationspurchased by the subscriber, a mapping of services between the softwareapplications and services of a communication network, MNO policy files,and other information as will be described below.

Depending on the communication protocol or the applicable use of theUICC 121, the UICC 121 can be referred to as a subscriber identitymodule (SIM), a Removable User Identity Module (RUIM), an embedded UICC(eUICC), an embedded SIM (eSIM), and so on. An eUICC or eSIM canrepresent UICC devices that are integrated by soldering the device ontoa printed circuit board of the communication device 100, by attachingthe device to a housing assembly of the communication 100, or bysoftware integration of the UICC functions in an existing processor ofthe communication device 100. Present and next generation physical andoperational variants of the UICC 121 are contemplated by the presentdisclosure.

The controller 106 can utilize computing technologies such as amicroprocessor, a digital signal processor (DSP), and/or a videoprocessor with associated storage memory such as Flash, ROM, RAM, SRAM,DRAM or other storage technologies for executing computer instructions,controlling, and processing data supplied by the aforementionedcomponents of the communication device 100.

The controller 106 can be communicatively coupled to a device 115 thatcan supply telemetry data (e.g., an automobile, a utility meter, etc).In one embodiment, the communication device 100 can be an integral partof the device 115. In another embodiment, the communication device 100can be co-located and communicatively coupled to the device 115 by wayof a physical or wireless communication interface.

FIG. 2 depicts a system 200 with illustrative embodiments of thecommunication device 100. In one embodiment, the communication device100 can represent a consumer device such as a cellular telephone 202, acomputer or laptop 204. In a commercial setting, the communicationdevice 100 can be communicatively coupled to a vending machine 206, autility meter 208, a parking meter 210, a commercial transport vehicle212, or an automobile 214. In these latter embodiments, the UICC 121 canbe an embedded (non-removable) device. The embodiments of thecommunication device 100 shown in FIG. 2 can be operable to facilitateestablishment of communications with mobile network operator (MNO) 201or MNO 203. MNO 201 and MNO 203 can operate according to common wirelessaccess protocols such as Global System for Mobile or GSM, Code DivisionMultiple Access or CDMA, Time Division Multiple Access or TDMA,Universal Mobile Telecommunications or UMTS, World interoperability forMicrowave or WiMAX, Software Defined Radio or SDR, Long Term Evolutionor LTE, and so on.

MNO 201 or MNO 203 provide wireless communication services to subscriberdevices in large regions such as cities, states, and nationally. MNO 201and MNO 203 are generally independently operated businesses.Consequently, the services provided by MNO 201 and MNO 203 may differ inways that may cause interoperability issues when the softwareapplications supported by UICC 121 of a communication device 100 attemptto utilize the services of a new MNO.

FIG. 3 depicts an illustrative embodiment of a mapping of servicesprovided by the MNOs to software applications operating from thecommunication devices of FIG. 2. MNO services can include, for example,text messaging services such as Short Messaging Service (SMS),multimedia messaging such as Multimedia Messaging Service (MMS),location services, identity services, third party services, cloudservices, and authentication services by way of public keyinfrastructure (PKI) certificates, just to mention a few. Softwareapplications executed from the communication devices of FIG. 2 can makeuse of the MNO services. For example, a software application fortracking weather can make use of SMS messages for alerts, and locationservices to identify weather conditions relative to the location of thecommunication device. Cloud phonebook software applications can utilizeCloud services of the MNO (e.g., an enterprise directory or personaldirectories stored on a webserver).

Mobile payment or ecommerce services can make use of SMS messaging,identity services, and third party services (e.g., PayPal™). Subscriberto subscriber messaging applications can make use of SMS and MMSmessaging. Protected content that relies on Digital Rights Management(DRM) rules can make use of identify services and PM certificateservices of the MNO. In a commercial setting where telemetry data orother useful metrics are being monitored by commercial enterprises, suchenterprises may have arrangements with the MNO to link subscriberdevices in the field (e.g., at a vending machine, utility meter, etc. asshown in FIG. 2) with processing devices of the commercial enterprisesuch as servers.

Subscribers such as consumers and business enterprises can invest insoftware applications such as described above. When a subscriber choosesto switch to a new MNO, the services of the new MNO may not operate inthe same manner as the prior MNO, thereby causing interoperabilityissues with the software applications supported by the UICC 121. In oneembodiment, the interoperability issues can be resolved with acommunication device 400 configured with a UICC 404 that supports, amongother things, operations of software applications operating from thecommunication device 400 as shown in FIG. 4.

Communication device 400 depicts an end user terminal 402 utilizing anUICC 404 with a service continuity application (SCA) 406. The SCA 406can comprise a processing engine 408 that executes software modules suchas a notification engine module 410, an MNO policy file system module412, an event listener module 414, and a local application registrymodule 416 which can link to local software applications 418 executableby the UICC 402, and software applications 420 external to the UICC 402and executable by a processor of the end user terminal 402.

The functional modules of the SCA 406 can be described as follows:

The processing engine 408 mediates interactions between functionalmodules of the SCA 406 and directs configuration updates to softwareapplications resident in the UICC 402 or externally controlled by theUICC 402. The processing engine 408 can also send configuration updatesto an MNO via a provisioning service 430, and an application trustservice 432 having access to a global application registry 434 toidentify software applications trusted by the MNO.

The notification engine module 410 can trigger external actions such asa device management session with the MNO's core network to initiatedevice provisioning, or information to be displayed to the user, such asownership transfer instructions or advice on trust status of softwareapplications.

The policy file system module 412 stores files provided by the MNOcontaining information necessary to ensure service continuity of usersoftware applications such as network service configuration parameters,access and management permissions for user software applicationsutilizing MNO services, DRM rights certificate updates, and ownershiptransfer instructions.

The event listener module 414 detects a change from one MNO to another,as well as changes to the local application registry 416 indicatingsoftware applications were added or deleted.

The local application registry module 416 contains a mapping between allinstalled software applications and the network services andconfiguration parameters they require.

The SCA 406 can be installed in the end user terminal 402 by way of anembedded UICC 404 or removable UICC 404. The SCA 406 can be configuredto monitor for MNO switch events. This is accomplished in the eventlistener module 414. The event listener module 414 is also responsibleto react to application change events (add, delete, update, etc.) inorder to trigger the processing/reprocessing of service continuityrules.

Software applications installed in the end user terminal 402 can beregistered with the local application registry module 416. Uponreceiving triggering events from the event listener module 414, theprocessing engine 408 can perform a trust lookup with the MNO trustservice 432 to request the updated trust level for all local andexternal software applications 418, 420 operating from the UICC 404 orend user terminal 402 based on the MNO's own trust model. A softwareapplication can be considered trusted by one MNO but can be considereduntrusted by another depending on factors determined by the MNO such as,for example, bandwidth utilization of the application, an identity ofthe author of the application, compliance with DRM rules, or othercriteria deemed important to service personnel of the MNO.

The MNO provisioning service 430 can generate a new Device Policy Update(DPA) file during the transition process. MNO DPA files can be storedlocally in the UICC 404 and can be updated based on the MNO switch eventand an application change event detected by the MNO provisioning service430. The processing engine 408 can be configured to cross referenceinstalled software applications with an MNO Policy File to determinedependencies, and rules and to update the configuration settings of thesoftware application.

Upon processing the rules and making all the necessary configurationupdates to the affected software applications as defined by a policyfile supplied by the MNO, the processing engine 408 can cause thenotification engine module 410, as required, to trigger mechanisms tonotify a user of the end user terminal 402, the MNO or third partiesabout the changes applied to the software application's configuration,and or trigger a device management session to initiate further deviceprovisioning with provisioning service 430 of the MNO.

It should be noted that the end user terminal 402 depicted in FIG. 4 canbe replaced with an integrated fixed-location communication devicesituated, for example, in the vending machine 206, the utility meter208, the parking meter 210 or the vehicles 212 or 214 shown in FIG. 2.

FIG. 5 depicts an illustrative embodiment of a method 500 fortransitioning between services provided by the MNOs 202 and 204 of FIG.2 utilizing, for example, the communication device 400 of FIG. 4. Method500 can begin with step 502 in which the UICC 404 stores servicemappings and parametric information in the local registry module 416.The mappings can represent service to software application mappingssimilar to those shown in FIG. 3. The parametric information canrepresent configuration information which is used by an MNO service toconfigure the service to interoperate with one or more of the softwareapplications 418 and 420. The parametric information can also representconfiguration information used to configure the software applications418 and 420 in accordance with service policy information stored in thefile system 412. In step 504, the UICC 404 can cause or enable all orsome of the software applications 418 and 420 to be executed. At step506, the UICC 404 can track when a software application update has takenplace.

A software application update can represent a deletion of an existingsoftware application, a modification, version update, or reconfigurationof an existing software application, or an addition of a new softwareapplication. The update of a software application can result from userinput, external messages received by the end user terminal 402, or othersuitable techniques for updating software applications supported by theUICC 404. If a software application update is detected at step 506, theUICC 404 can proceed to update the registry 416, and if needed, informthe MNO of the update by way of, for example, the provisioning service430 and/or the application trust service 432.

If a software update has not been detected, the UICC 404 can proceed tostep 510 where it monitors events for transitioning between MNOs (e.g.,transitioning from MNO 202 to MNO 204 of FIG. 2). The transition betweenMNOs can be initiated by the subscriber at any time by, for example,establishing a new agreement with an MNO. If a transition event is notdetected at step 510, the UICC 404 continues to execute or enablesoftware applications as requested at step 504 and monitor softwareupdates at step 506. If an MNO transition is detected, the UICC 404 canproceed to step 516 where the UICC transmits to the second MNO via theend user terminal 402 parametric information descriptive of softwareapplications resident in the UICC 404 and external to the UICC 404.

The parametric information can include, for example, the names,versions, model no's, serial no's, or other identification data of thesoftware applications along with information descriptive of the MNOservices desired by each software application, and the operationalfeatures, conditions, or requirements necessary to configure the MNOservices to interoperate with the software applications. At step 518,the second MNO can review by way of the application trust service 432the identity of the software applications and determine if the softwareapplications are trusted by the second MNO. Trust criteria can beestablished by the second MNO. Software applications that were trustedby the first MNO may not be trusted by the second MNO because, forexample, personnel of the second MNO have determined that allowing aparticular software application can cause network congestion,interoperability issues with the services of the second MNO, or thesoftware application is not recognized by the second MNO, or has knowndefects that have not been mitigated to the satisfaction of personnel ofthe second MNO. Other criteria may be defined by the second MNO. Suchcriteria can be updated periodically and result in a previously trustedsoftware application no longer being trusted.

If a software application is not trusted, the UICC 404 can proceed tostep 520 where it generates a notification by way of, for example, thenotification engine module 410. The notification may be submitted to theuser of the end user terminal 402. The user can be presented, forexample, with a GUI that informs the user that some services cannot besupported by the second MNO. For any and all software applications thathave been determined to be trusted by the second MNO at step 518, thesecond MNO proceeds to step 522 where it configures its services byproviding appropriate parametric information to the UICC 404.

At step 524, the second MNO transmits policy and parametric informationto the UICC 404 which it stores in the MNO Policy files 412 at step 526.The policy information can represent usage policies for defining properusage of services provided by the MNO, while the parametric informationcan include operational information such as server addresses foraccessing services of the MNO. In the same step, the UICC 404 canutilize configuration information provided in the policy files to updatethe local registry module 416 and thereby configure operationalparameters of the software applications. The configuration of theservices of the second MNO and the policy information used to configurethe software applications supported by the UICC 404 enables the softwareapplications and the MNO services to be interoperable. At step 528, theUICC 404 can execute one or more local software applications 418requested by user input or by automated schedules. Alternatively, theUICC 404 can enable by way of the configuration information stored inthe registry 416 one or more external software applications 420 forexecution by a processor of the end user terminal 402 according to userinput detected thereby. If interactions between the MNO services and thesoftware applications do not cause execution errors or trigger alarms ateither the second MNO or the software applications, then the UICC 404can proceed to step 534 to update the registry module 416 with newmappings and updated parametric data descriptive of the requirements setby the second MNO via the policy files.

The UICC 404 can also be configured to present at step 536 a GUI toprompt the subscriber if necessary. The prompt can present, for example,a new fee schedule for utilizing the MNO services if a fee agreement wasnot pre-arranged, or if new service options are offered by the secondMNO. The prompt can also confirm to the subscriber that the transitionwas successful and that the software applications are successfullyutilizing the MNO services. If, on the other hand, one or more softwareapplications did not successfully interoperate with the MNO services,the new MNO can notify the UICC 404 at step 532 that an error hasoccurred. The UICC 404 can be configured to notify the subscriber of theissue and remain communicatively coupled to the second MNO while othersoftware applications not having interoperability issues continue to beserviced by the second MNO. The subscriber can, among other things,contact personnel of the second MNO to address the error.

The foregoing embodiments provide a suitable solution for maintaininginteroperability between MNO services and software applications during atransition between MNOs without requiring a replacement of the UICC.

FIG. 6 depicts an illustrative embodiment of a system 700 forprovisioning end user terminals including a UICC to utilize services ofone of a plurality of MNOs. FIG. 7 depicts an illustrative embodiment ofa method 700 for provisioning the UICC of the end user terminal of FIG.6. Method 700 begins with step 702 in which a bootstrap UICC retrievescredentials of a default MNO. In the present context the term“bootstrap” can represent an initial provisioning of the UICC withcredentials of one or more default MNOs (bootstrap MNOs). Thecredentials of the default MNOs can be stored in the UICC at the timethe UICC is manufactured, installed in end user terminal, or provisionedwith a default setting by other suitable means.

At step 704, the UICC can cause the end user terminal to facilitatecommunications with the default MNO according to the credentials. Atstep 706, the UICC can initiate a secure communication session withservice equipment that stores and distributes MNO credentials. Theservice equipment can be equipment of a UICC vendor, equipment of thedefault MNO, or equipment of a third party responsible for maintaining,and distributing MNO credentials. At step 708, the service equipmentsends MNO options to the UICC via the secure communication session, orto equipment of an enterprise for presenting selectable options forMNOs. In one embodiment, the UICC causes the end user terminal topresent at a user interface (e.g., display) selectable MNO options to auser of the end user terminal. Alternatively, in a commercial setting,the equipment of the enterprise presents selectable MNO options topersonnel at a computer terminal. The enterprise personnel can be taskedto manage selection of MNOs for end user terminals of the enterprisebased on usage policies of the enterprise.

At step 714, the service equipment can detect one or more MNO selectionsand proceed to step 716 to retrieve credentials of the selected MNO(s)and transmit the credentials to the UICC. In an enterprise setting, theenterprise personnel may select more than one MNO for backup purposes(e.g., preferred MNO and backup MNO). Accordingly, when a preferred MNOexperiences a communication fault, the UICC can be configured withcredentials of a backup MNO. Such a configuration enables enterprisecustomers to increase the reliability of communication services providedto end user terminals of the enterprise. At step 718, the UICC updatesthe registry with the received credentials of the MNO(s). At step 718,the end user terminal utilizes the UICC to facilitate termination ofcommunication services with the default MNO and thereafter initiates instep 722 communication services with the selected MNO according to thecredentials provided in the registry of the UICC. If a backup MNO isprovided, the end user terminal or the UICC can monitor communicationfaults with the preferred MNO at step 724, and if a fault is detected,cause the end user terminal to transition to the backup MNO at step 726.

Contemporaneous with steps 718-720, the service or enterprise equipmentat step 720 can be configured to send a request to the selected MNO(s)to activate subscription services for the end user terminal utilizingthe UICC. At step 732, the default MNO updates network elements such asthe Service Routing Point (SRP) and the Network Identity Register (NIR)to remove the UICC from its records, thereby removing the bootstrapsettings. In addition, the default MNO at step 734 can record a chargefor provisioning the UICC. The charge can be applied to a subscriberassociated with the end user terminal or the enterprise controlling theMNO selection for end user terminals.

It should be noted that FIGS. 6-7 can be modified for additionalapplications. For example, the term “end user terminal” referred to inFIGS. 6 and 7 can be replaced with a non-portable terminal that may beutilized in an industrial setting such as a device attached to anautomobile for delivering telemetry data to a central station, a vendingmachine for tracking consumer usage, and so on. Additionally, thetechniques described in method 500 for maintaining continuity ofservices can be applied to the embodiments of method 700. Similarly, theembodiments of method 700 can be utilized to supplement the embodimentsof method 500.

FIG. 8 depicts an illustrative embodiment of a system 800 forpeer-to-peer provisioning of devices to utilize services of one of aplurality of MNOs. FIG. 9 depicts an illustrative embodiment of a method900 for provisioning devices of FIG. 8 in the illustrated peer-to-peerconfiguration. Method 900 begins with step 902 where a firstcommunication device 810 detects a presence of secondary communicationdevices 820 or 830. The presence detection can be based on apeer-to-peer session such as a Bluetooth communication session, or WiFicommunication session. Alternatively, presence may be detected from anexplicit request received from the secondary communication devices 820or 830 over a wireless access technology such as Bluetooth, WiFi, orother suitable technologies such as cellular communications insituations where, for example, the secondary communication devices 820and 830 are utilizing the bootstrap embodiments described by FIGS. 6-7.

The first communication device 810 in the present illustration can be asmartphone. It is contemplated, however, that the first communicationdevice 810 can be any type communication device with wireless accesscapabilities. Secondary communication device 820 can represent a tabletdevice with wireless communication capabilities. Secondary communicationdevice 830 can represent a communication device embedded in anautomobile. It is contemplated that the secondary communication devices810 and 820 can be any type of communication device with wireless accesscapabilities. In another embodiment, it is contemplated thatcommunications between the first and secondary communication devices810, 820 and 830 can be tethered over a cable interface such as a USB orproprietary cable interface. Combinations of wireless or wired accessbetween the first and secondary communication devices 810, 820 and 830is also contemplated.

For illustration purposes only, secondary communication device 820 willbe referred to in the descriptions that follow for method steps 904-928.It should be understood that method steps 904-928 are similarlyapplicable for secondary communication device 830. With this in mind,first communication device 810 can determine in step 904 whether a UICCutilized by the secondary communication device 820 has been provisioned.If it has, then the first communication device 810 can proceed to step902 and await detecting a presence of another device such as secondarycommunication device 830. If, however, the UICC of the secondarycommunication device 820 is determined to be unprovisioned by the firstcommunication device 810 at step 904, then the first communicationdevice 810 can proceed to either step 906 or 908.

In one embodiment, the first communication device 810 can proceed tostep 906 if the first communication device 810 does not have previouslystored selectable options of MNOs other than the one the firstcommunication device 810 operates from. In step 906, the UICC of thefirst communication device 810 can establish a secure communication linkwith service equipment 806 shown in FIG. 8 by way of the MNO the firstcommunication device 810 is receiving services from, which will beassumed to be MNO 802 (or MNO 1) for illustration purposes only. Theservice equipment 806 can be used for securely storing and managing thedistribution of MNO credentials. The service equipment 806 can bemanaged by one or more MNOs under a cooperation arrangement between theMNOs. Upon establishing the secure link with the service equipment 806,the UICC of the first communication device 810 can request and therebyreceive a plurality of selectable options of MNOs to present thesecondary communication device 820.

At step 908, the first communication device 810 presents the pluralityof selectable options at a display device of the first communicationdevice 810. If the first communication device 810 has previouslyreceived from the service equipment 806 selectable MNO options which ithas stored in memory, then step 906 can be skipped. The selectable MNOoptions can be as shown in FIG. 8. The selectable MNO options caninclude a first selectable option 812 for MNO 1 with correspondingservice plans A through N, a second selectable option 814 for MNO 2 withcorresponding service plans A through N, and more if additional MNO'sare available. If an MNO and service plan selection is detected at step910, the first communication device can proceed to either step 912 or914. If the first communication device 810 has not received MNOcredentials for the selected option on previous occasions, then thefirst communication device 810 can proceed to step 914 where it receivesthe credentials of the selected MNO and service plan from the serviceequipment 806 by way of MNO 802. If, however, the first communicationdevice 810 has previously received and stored the requested MNOcredentials, then step 914 can be skipped and the first communicationdevice 810 can proceed to step 912 where it retrieves the credentialsfrom its local memory.

At step 916, the first communication device 810 transmits thecredentials to the secondary communication device 820 over a secure linkof the peer-to-peer communication session established therebetween atstep 902. In one embodiment, a subscriber account of the firstcommunication device 810 can be updated at step 918 according to the MNOand service plan selected for the secondary communication device 820.This step can, for example, result in the subscriber account beingupgraded to a family account managed and billed to the subscriber of thefirst communication device 810. Contemporaneous with updating thesubscriber account, the secondary communication device 820 can provisionat step 924 the UICC with the received credentials in a manner asdescribed in whole or in part by the previously described embodiments ofmethods 500 and 700. Once provisioned, the UICC of the secondarycommunication device 820 can facilitate establishment of communicationservices with the selected MNO at step 926 according to the givencredentials, service policies and parametric information shared betweenthe selected MNO and the UICC of the secondary communication device 820.If the selected MNO is, for example, MNO 804, then the secondarycommunication device 820 will utilize the services of MNO 804 asprescribed by the service policies provided by MNO 804. Similar resultswould occur if the selected MNO is MNO 802.

At step 920 the first communication device 810 can further establishusage controls on the services provided by the secondary communicationdevice 820. The usage controls can, for example, establish time of dayusage limits (e.g., communication services available only from 8 am-5pm), number of days or time usage limits (e.g., communication servicesterminate after X days or minutes), data plan limits (e.g., data serviceterminates after 200 Mbytes on particular days or every day), warningnotices for exceeding planned limits, termination of service triggers,and so on. Additionally, the subscriber can be allowed to upgrade,modify, or terminate services provided to the secondary communicationdevice 820 from the account of the subscriber, which may be controlledfrom a portal, the first communication device 810, or some other deviceaccessible to the subscriber. In one embodiment, the subscriber of thefirst communication device 810 can monitor usage of services of theselected MNO by the secondary communication device at step 922 byreceiving at the first communication device 810 (or another deviceidentified by the subscriber) periodic reports from the selected MNO.

In one embodiment, the services provided to the secondary communicationdevice 820 by the selected MNO can be updated at step 928 by user inputdetected at the first communication device 810 or by automatic triggersset at the first communication device 810, or triggers provisioned at aserver communicatively coupled to the selected MNO that can control andupdate services provided to the secondary communication device 820 asrequested by the subscriber of the first communication device 810.

FIG. 10 depicts an illustrative embodiment of a method 1000 fordistributing MNO credentials. Method 1000 begins with step 1002 in whichservice equipment 806 receives a request for selectable options ofservices of one or more MNOs. In one embodiment, the service equipment806 can represent a subscription manager that distributes MNOcredentials. The service equipment 806 can be operated by one or moredisparate or unaffiliated entities 840. In one embodiment, the serviceequipment 806 can be operated by the MNOs under a cooperative agreementin which each MNO shares its credentials with other MNOs and theaggregate of credentials is stored by the service equipment 806 or adatabase accessible by the service equipment 806. In this embodiment, acommunication device can access the service equipment 806 by way of anyMNO to which the communication device is communicatively coupled to,such as, for example, a bootstrap MNO.

In another embodiment, the service equipment 806 can be operated by avendor of UICC's or communication devices including a UICC. A vendor canrepresent, for example, a retailer of communication devices, an originalequip manufacturer of the UICC's or communication devices or both, adistributor of communication devices, a wholesaler of communicationdevices, a software vendor of software applications or operatingsystems, or any other suitable entity that in some fashion distributes,sells, or otherwise supplies communication devices, UICC's, or both toother entities or end users.

In yet another embodiment, the service equipment 806 can be operated bya manufacturer of components used by the communication devices, such as,for example, manufacturers of chipsets used by the communicationdevices. Such chipsets can represent, for example, the transceiverportion and/or baseband controller portion of the communication device,or other suitable components. Such a manufacturer may also supply withthe chipset a hardware or software implementation of a UICC with thechipset. The UICC portion can also be provisioned in whole or in part atthe time that it is manufactured by the manufacturer.

There can be other embodiments for entities or parties that may operatethe service equipment 806. For example, operation of the serviceequipment 806 may be delegated under a service agreement to anunaffiliated third party used by any of the aforementioned entities 840.Accordingly, other entities or parties who may directly or indirectlymanage operations of the service equipment 806 of FIG. 8 arecontemplated by the present disclosure.

Referring back to FIG. 10, at step 1004, the service equipment 806 canbe configured to transmit selectable MNO options to the requestingcommunication device. The requesting communication device can utilizethis information for selecting MNO services for itself or forprovisioning a secondary communication device in a peer-to-peerconfiguration as illustrated in FIG. 8. If the service equipment detectsat step 1006 a selection of one or more MNOs, the service equipment 806proceeds to step 1008 or 1010. At step 1008, the service equipment 806can retrieve the credentials from a database of MNOs that may be localor remote to the service equipment 806. In another embodiment, theservice equipment 806 can submit at step 1010 one or more requests tothe selected MNOs and receive from the selected MNOs their respectivecredentials. In either embodiment, the service equipment 806 can beconfigured to transmit to the requesting communication device at step1012 the credentials of the selected MNOs.

In one embodiment, the requesting communication device can store at step1014 the credentials and selectable options for future use. Thecredentials and selectable MNO options can be stored in the UICC of therequesting communication device or another suitable memory location. Bystoring this information, the requesting communication device canprovision secondary communication devices in future instances withoutsubmitting requests to the service equipment 806. Alternatively, step1014 can be skipped, and one of steps 1016 or 1018 can be performed bythe requesting communication device. At step 1016, the requestingcommunication device can update the registry of its own UICC with thereceived credentials when the selected MNO(s) were intended for use bythe requesting communication device. If, on the other hand, the selectedMNO(s) were intended for use by a secondary communication device, therequesting communication device can proceed to step 1018 and provisionthe UICC of the secondary communication device with the receivedcredentials in a peer-to-peer communication session such as illustratedin FIG. 8.

Upon reviewing these embodiments, it would be evident to an artisan withordinary skill in the art that said embodiments can be modified,reduced, or enhanced without departing from the scope and spirit of theclaims described below. For example, the UICC 404 and its functionalmodules can be integrated as software components of a microprocessorutilized by the communication device. In this embodiment, themicroprocessor performs communication functions as well as the functionsdescribed above for the UICC without the additional hardware of a UICC.This embodiment can be referred to as a “soft” UICC configured accordingto the embodiments described herein. In the foregoing embodiments, theterm “MNO” can be replaced with a Landline Network Operator (LNO). AnLNO may support circuit switched or packet switched landlinecommunications. In one embodiment, an end user terminal 402 configuredwith a landline interface (see transceiver 102 of FIG. 1) may beaccessible by the LNO.

A UICC utilized by the end user terminal 402 with the landline interfacecan be configured to perform the functions of method 500 for maintainingservice continuity when transitioning between LNOs. In anotherembodiment, an end user terminal 402 capable of landline and wirelesscommunications, can include a UICC configured for maintaining servicecontinuity for LNO to MNO transitions, and vice-versa. Accordingly,method 500 can be adapted for maintaining service continuity betweennetwork operators of various access technologies. Other embodiments arecontemplated by the subject disclosure.

It should be understood that devices described in the exemplaryembodiments can be in communication with each other via various wirelessand/or wired methodologies. The methodologies can be links that aredescribed as coupled, connected and so forth, which can includeunidirectional and/or bidirectional communication over wireless pathsand/or wired paths that utilize one or more of various protocols ormethodologies, where the coupling and/or connection can be direct (e.g.,no intervening processing device) and/or indirect (e.g., an intermediaryprocessing device such as a router).

FIG. 11 depicts an exemplary diagrammatic representation of a machine inthe form of a computer system 1100 within which a set of instructions,when executed, may cause the machine to perform any one or more of themethods discussed above. One or more instances of the machine canoperate, for example, as the communication devices 100 and 400 of FIGS.1 and 4, and their respective subcomponents, such as the UICC. One ormore instances of the machine can also operate, for example, as devicesof FIGS. 6 and 8. In some embodiments, the machine may be connected(e.g., using a network) to other machines. In a networked deployment,the machine may operate in the capacity of a server or a client usermachine in server-client user network environment, or as a peer machinein a peer-to-peer (or distributed) network environment.

The machine may comprise a server computer, a client user computer, apersonal computer (PC), a tablet PC, a smart phone, a laptop computer, adesktop computer, a control system, a network router, switch or bridge,or any machine capable of executing a set of instructions (sequential orotherwise) that specify actions to be taken by that machine. It will beunderstood that a communication device of the subject disclosureincludes broadly any electronic device that provides voice, video ordata communication. Further, while a single machine is illustrated, theterm “machine” shall also be taken to include any collection of machinesthat individually or jointly execute a set (or multiple sets) ofinstructions to perform any one or more of the methods discussed herein.

The computer system 1100 may include a processor (or controller) 1102(e.g., a central processing unit (CPU), a graphics processing unit (GPU,or both), a main memory 1104 and a static memory 1106, which communicatewith each other via a bus 1108. The computer system 1100 may furtherinclude a video display unit 1110 (e.g., a liquid crystal display (LCD),a flat panel, or a solid state display. The computer system 1100 mayinclude an input device 1112 (e.g., a keyboard), a cursor control device1114 (e.g., a mouse), a disk drive unit 1116, a signal generation device1118 (e.g., a speaker or remote control) and a network interface device1120.

The disk drive unit 1116 may include a tangible computer-readablestorage medium 1122 on which is stored one or more sets of instructions(e.g., software 1124) embodying any one or more of the methods orfunctions described herein, including those methods illustrated above.The instructions 1124 may also reside, completely or at least partially,within the main memory 1104, the static memory 1106, and/or within theprocessor 1102 during execution thereof by the computer system 1100. Themain memory 1104 and the processor 1102 also may constitute tangiblecomputer-readable storage media.

Dedicated hardware implementations including, but not limited to,application specific integrated circuits, programmable logic arrays andother hardware devices can likewise be constructed to implement themethods described herein. Applications that may include the apparatusand systems of various embodiments broadly include a variety ofelectronic and computer systems. Some embodiments implement functions intwo or more specific interconnected hardware modules or devices withrelated control and data signals communicated between and through themodules, or as portions of an application-specific integrated circuit.Thus, the example system is applicable to software, firmware, andhardware implementations.

In accordance with various embodiments of the subject disclosure, themethods described herein are intended for operation as software programsrunning on a computer processor. Furthermore, software implementationscan include, but not limited to, distributed processing orcomponent/object distributed processing, parallel processing, or virtualmachine processing can also be constructed to implement the methodsdescribed herein.

While the tangible computer-readable storage medium 1122 is shown in anexample embodiment to be a single medium, the term “tangiblecomputer-readable storage medium” should be taken to include a singlemedium or multiple media (e.g., a centralized or distributed database,and/or associated caches and servers) that store the one or more sets ofinstructions. The term “tangible computer-readable storage medium” shallalso be taken to include any non-transitory medium that is capable ofstoring or encoding a set of instructions for execution by the machineand that cause the machine to perform any one or more of the methods ofthe subject disclosure.

The term “tangible computer-readable storage medium” shall accordinglybe taken to include, but not be limited to: solid-state memories such asa memory card or other package that houses one or more read-only(non-volatile) memories, random access memories, or other re-writable(volatile) memories, a magneto-optical or optical medium such as a diskor tape, or other tangible media which can be used to store information.Accordingly, the disclosure is considered to include any one or more ofa tangible computer-readable storage medium, as listed herein andincluding art-recognized equivalents and successor media, in which thesoftware implementations herein are stored.

Although the present specification describes components and functionsimplemented in the embodiments with reference to particular standardsand protocols, the disclosure is not limited to such standards andprotocols. Each of the standards for Internet and other packet switchednetwork transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) representexamples of the state of the art. Such standards are from time-to-timesuperseded by faster or more efficient equivalents having essentiallythe same functions. Wireless standards for device detection (e.g.,RFID), short-range communications (e.g., Bluetooth, WiFi, Zigbee), andlong-range communications (e.g., WiMAX, GSM, CDMA, LTE) are contemplatedfor use by computer system 1100.

The illustrations of embodiments described herein are intended toprovide a general understanding of the structure of various embodiments,and they are not intended to serve as a complete description of all theelements and features of apparatus and systems that might make use ofthe structures described herein. Many other embodiments will be apparentto those of skill in the art upon reviewing the above description. Otherembodiments may be utilized and derived therefrom, such that structuraland logical substitutions and changes may be made without departing fromthe scope of this disclosure. Figures are also merely representationaland may not be drawn to scale. Certain proportions thereof may beexaggerated, while others may be minimized Accordingly, thespecification and drawings are to be regarded in an illustrative ratherthan a restrictive sense.

Although specific embodiments have been illustrated and describedherein, it should be appreciated that any arrangement calculated toachieve the same purpose may be substituted for the specific embodimentsshown. This disclosure is intended to cover any and all adaptations orvariations of various embodiments. Combinations of the aboveembodiments, and other embodiments not specifically described herein,are contemplated by the subject disclosure.

The Abstract of the Disclosure is provided with the understanding thatit will not be used to interpret or limit the scope or meaning of theclaims. In addition, in the foregoing Detailed Description, it can beseen that various features are grouped together in a single embodimentfor the purpose of streamlining the disclosure. This method ofdisclosure is not to be interpreted as reflecting an intention that theclaimed embodiments require more features than are expressly recited ineach claim. Rather, as the following claims reflect, inventive subjectmatter lies in less than all features of a single disclosed embodiment.Thus the following claims are hereby incorporated into the DetailedDescription, with each claim standing on its own as a separately claimedsubject matter.

What is claimed is:
 1. A machine-readable storage device, comprisinginstructions which, responsive to being executed by a processor of afirst end user device, cause the processor to perform operationscomprising: providing, to equipment of a first mobile network operator,a request to select a service provided by a plurality of mobile networkoperators; receiving, from the equipment of the first mobile networkoperator, information indicating a plurality of selectable options forselecting the service; providing, to the equipment of the first mobilenetwork operator, a selection from the plurality of selectable options,wherein the selection identifies a second mobile network operator fromamong the plurality of mobile network operators; receiving, from theequipment of the first mobile network operator, credential informationof the second mobile network operator; determining that a seconduniversal integrated circuit card of a second end user device is notprovisioned with the service of the second mobile network operator; andproviding, to the second universal integrated circuit card of the secondend user device, the credential information of the second mobile networkoperator.
 2. The machine-readable storage device of claim 1, wherein aservice plan associated with the service of the second mobile networkoperator is received by the equipment of the first mobile networkoperator, and wherein the service plan is applied to use of the serviceby the second end user device.
 3. The machine-readable storage device ofclaim 1, wherein the selection identifies a service plan for the serviceof the second mobile network operator that is selected from among agroup of service plans, wherein the providing of the credentialinformation of the second mobile network operator to the seconduniversal integrated circuit card of the second end user device enablesthe second universal integrated circuit card to store the credentialinformation in the second universal integrated circuit card and toinitiate the service with equipment of the second mobile networkoperator according to the credential information and the service plan.4. The machine-readable storage device of claim 1, wherein the equipmentof the first mobile network operator obtains the credential informationfrom a database that stores credentials of the plurality of mobilenetwork operators.
 5. The machine-readable storage device of claim 4,wherein the database is shared by the plurality of mobile networkoperators enabling equipment of each of the plurality of mobile networkoperators to distribute credentials of the plurality of mobile networkoperators to universal integrated circuit cards of portable end userdevices.
 6. The machine-readable storage device of claim 1, wherein theequipment of the first mobile network operator obtains the credentialinformation from the second mobile network operator.
 7. Themachine-readable storage device of claim 1, wherein the first mobilenetwork operator and the second mobile network operator areindependently operated entities.
 8. A first end user device, comprising:a first universal integrated circuit card that stores default credentialinformation of a default mobile network operator; a processing systemincluding a processor and being coupled with the first universalintegrated circuit card; and a memory that stores executableinstructions that, when executed by the processing system, facilitateperformance of operations, comprising: providing, to equipment of thedefault mobile network operator, a request to select a service providedby a plurality of mobile network operators, wherein the providing of therequest to select is based on the default credential information, andwherein the default mobile network operator is a bootstrap mobilenetwork operator that enables network communications for activatingservices provided by other mobile network operators; receiving, from theequipment of the default mobile network operator, information indicatinga plurality of selectable options for selecting the service; providing,to the equipment of the default mobile network operator, a selectionfrom the plurality of selectable options, wherein the selectionidentifies a second mobile network operator from among the plurality ofmobile network operators; receiving, from the equipment of the defaultmobile network operator, second credential information of the secondmobile network operator; storing the second credential information inthe first universal integrated circuit card; and providing, to equipmentof the second mobile network operator, a request to activatesubscription services including the service provided by the secondmobile network operators, wherein the providing of the request toactivate is based on the second credential information.
 9. The first enduser device of claim 8, wherein the operations further comprise:determining that a second universal integrated circuit card of a secondend user device is not provisioned with the service of the second mobilenetwork operator; and providing, to the second universal integratedcircuit card of the second end user device, the second credentialinformation of the second mobile network operator.
 10. The first enduser device of claim 9, wherein the selection identifies a service planfor the service of the second mobile network operator that is selectedfrom among a group of service plans, wherein the providing of the secondcredential information of the second mobile network operator to thesecond universal integrated circuit card of the second end user deviceenables the second universal integrated circuit card to store the secondcredential information in the second universal integrated circuit cardand to initiate the service with equipment of the second mobile networkoperator according to the second credential information and the serviceplan.
 11. The first end user device of claim 8, wherein the equipment ofthe default mobile network operator obtains the second credentialinformation from a database that stores credentials of the plurality ofmobile network operators.
 12. The first end user device of claim 11,wherein the database is shared by the plurality of mobile networkoperators enabling equipment of each of the plurality of mobile networkoperators to distribute credentials of the plurality of mobile networkoperators to universal integrated circuit cards of portable end userdevices.
 13. The first end user device of claim 8, wherein the equipmentof the default mobile network operator obtains the second credentialinformation from the second mobile network operator.
 14. A method,comprising: receiving, by equipment of a default mobile networkoperator, a request initiated by a first end user device for selecting aservice, wherein the first end user device includes a first universalintegrated circuit card, wherein the receiving of the request is basedon default credential information stored in the first universalintegrated circuit card of the first end user device, and wherein thedefault mobile network operator is a bootstrap mobile network operatorthat enables network communications for activating services provided byother mobile network operators; transmitting, by the equipment of thedefault mobile network operator, information for presenting at a userinterface of the first end user device a plurality of selectable optionsto select the service from among a plurality of mobile networkoperators; receiving, by the equipment of the default mobile networkoperator from the first end user device, a selection from the pluralityof selectable options, wherein the selection identifies a second mobilenetwork operator from among the plurality of mobile network operators;obtaining, by the equipment of the default mobile network operator,second credential information of the second mobile network operator; andproviding, by the equipment of the default mobile network operator tothe first end user device, the second credential information of thesecond mobile network operator to enable the first end user device tostore the second credential information in the first universalintegrated circuit card and to activate subscription services includingthe service provided by the second mobile network operators.
 15. Themethod of claim 14, wherein the equipment of the default mobile networkoperator obtains the second credential information from a database thatstores credentials of the plurality of mobile network operators.
 16. Themethod of claim 15, wherein the database is shared by the plurality ofmobile network operators enabling equipment of each of the plurality ofmobile network operators to distribute credentials of the plurality ofmobile network operators to universal integrated circuit cards ofportable end user devices.
 17. The method of claim 14, wherein theequipment of the default mobile network operator obtains the secondcredential information from the second mobile network operator.
 18. Themethod of claim 14, wherein the default mobile network operator and thesecond mobile network operator are independently operated entities. 19.The method of claim 14, wherein the providing of the second credentialinformation of the second mobile network operator to the first end userdevice enables the first end user device to perform operationscomprising: determining that a second universal integrated circuit cardof a second end user device is not provisioned with the service of thesecond mobile network operator; and providing, to the second universalintegrated circuit card of the second end user device, the secondcredential information of the second mobile network operator.
 20. Themethod of claim 19, wherein the selection identifies a service plan forthe service of the second mobile network operator that is selected fromamong a group of service plans, wherein the providing of the secondcredential information of the second mobile network operator to thesecond universal integrated circuit card of the second end user deviceenables the second universal integrated circuit card to store the secondcredential information in the second universal integrated circuit cardand to initiate the service with equipment of the second mobile networkoperator according to the second credential information and the serviceplan.