Patents by Inventor Jorgen Hult
Jorgen Hult has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11979806Abstract: An OTA Edge system, constructed to: (1) receive polling requests, dedicated to an OTA Core system, from one or several mobile end de-vices; wherein an offload filter implemented in the OTA Edge system and constructed to: (2) accept polling requests from mobile end devices for which contents are present on the OTA Core system, and (2?) reject polling re-quests from mobile end devices for which no contents are present on the OTA Core system.Type: GrantFiled: October 24, 2019Date of Patent: May 7, 2024Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Jorgen Hult, Par Thorstensson, Tommy Thorstensson, Anders Kokeritz, Mats Bolander, Joachim Eklund, Mudit Gaur, Michael Ohlsson
-
Publication number: 20210409919Abstract: An OTA Edge system, constructed to: (1) receive polling requests, dedicated to an OTA Core system, from one or several mobile end devices; wherein an offload filter implemented in the OTA Edge system and constructed to: (2) accept polling requests from mobile end devices for which contents are present on the OTA Core system, and (2?) reject polling requests from mobile end devices for which no contents are present on the OTA Core system.Type: ApplicationFiled: October 24, 2019Publication date: December 30, 2021Inventors: Jorgen HULT, Par THORSTENSSON, Tommy THORSTENSSON, Anders KOKERITZ, Mats BOLANDER, Joachim EKLUND, Mudit GAUR, Michael OHLSSON
-
Patent number: 10966081Abstract: A system for registering an MSISDN with a device hosting the UICC and in which the UICC is or can be operated includes a UICC provisioning server operated by an UICC different from the MNO. A Local Profile Assistant LPA is installed within the device or the UICC, and enables establishment of secured data sessions between the UICC and the UICC provisioning server. A modem is installed within the device or UICC. The modem enables communication of the device within a mobile network operator MNO mobile network. An MSISDN retrieval logic is associated with the LPA. A logic is constructed to perform a retrieval sequence with the foregoing components and data.Type: GrantFiled: December 20, 2018Date of Patent: March 30, 2021Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Jorgen Hult, Markus Haubner, Nils Nitsch, Waleed Badawy, Ulrich Huber, Anders Kokeritz, Hrushikesh Chidley, Rikard Forselius, Gero Galka
-
Publication number: 20210006969Abstract: A system for registering an MSISDN with a device hosting the UICC and in which the UICC is or can be operated includes a UICC provisioning server operated by an UICC different from the MNO. A Local Profile Assistant LPA is installed within the device or the UICC, and enables establishment of secured data sessions between the UICC and the UICC provisioning server. A modem is installed within the device or UICC. The modem enables communication of the device within a mobile network operator MNO mobile network. An MSISDN retrieval logic is associated with the LPA. A logic is constructed to perform a retrieval sequence with the foregoing components and data.Type: ApplicationFiled: December 20, 2018Publication date: January 7, 2021Inventors: Jorgen HULT, Markus HAUBNER, Nils NITSCH, Waleed BADAWY, Ulrich HUBER, Anders KOKERITZ, Hrushikesh CHIDLEY, Rikard FORSELIUS, Gero GALKA
-
Patent number: 9521543Abstract: A method of providing a secure element of a mobile terminal with a subscription profile in which the mobile terminal is configured to communicate with a cellular communications network and the subscription profile comprises a network specific portion related to the cellular communications network or a different cellular communications network as well as a hardware specific portion related to the hardware of the mobile terminal and/or the secure element. The method comprises the steps of: assembling the subscription profile, wherein the network specific portion of the subscription profile is provided by a first server and the hardware specific portion of the subscription profile is provided by a second server; and providing the subscription profile over-the-air to the secure element. A corresponding secure element, mobile terminal and subscription management backend system involves features of the method.Type: GrantFiled: December 17, 2013Date of Patent: December 13, 2016Assignee: Giesecke & Devrient GmbHInventors: Dieter Weiss, Klaus Vedder, Michael Meyer, Michael Tagscherer, Jens Rudolph, Ulrich Dietz, Jari Nyholm, Thomas Larsson, Jorgen Hult
-
Publication number: 20150350881Abstract: A method of providing a secure element of a mobile terminal with a subscription profile in which the mobile terminal is configured to communicate with a cellular communications network and the subscription profile comprises a network specific portion related to the cellular communications network or a different cellular communications network as well as a hardware specific portion related to the hardware of the mobile terminal and/or the secure element. The method comprises the steps of: assembling the subscription profile, wherein the network specific portion of the subscription profile is provided by a first server and the hardware specific portion of the subscription profile is provided by a second server; and providing the subscription profile over-the-air to the secure element. A corresponding secure element, mobile terminal and subscription management backend system involves features of the method.Type: ApplicationFiled: December 17, 2013Publication date: December 3, 2015Applicant: Giesecke & Devrient GmbHInventors: Dieter WEISS, Klaus VEDDER, Michael MEYER, Michael TAGSCHERER, Jens RUDOLPH, Ulrich DIETZ, Jari NYHOLM, Thomas LARSSON, Jorgen HULT
-
Patent number: 9173105Abstract: A method includes preventing fraudulent use of a security module in a device, and the security module is designed to perform the following steps of: retrieving a device identifier of the device from the device; checking whether negative allowance information is stored in the security module for the retrieved device identifier and transmit a security module identifier of the security module and the retrieved device identifier to a server; and receiving a response from the server regarding whether the security module is allowed to operate with the identified device and store negative allowance information in the security module for the retrieved device identifier, if the security module is not allowed to operate with the identified device according to the server response. A security module may execute the method, and a system may include the device and the server.Type: GrantFiled: November 6, 2012Date of Patent: October 27, 2015Assignee: GIESECKE & DEVRIENT GMBHInventors: Jan Bosved, Jorgen Hult
-
Publication number: 20150220319Abstract: A method for updating a firmware of a security module in equipment comprises a device and the security module arranged such that data can be exchanged between the security module and the device. A first message is received by the security module and indicates the availability of a firmware update provided by a provider and wherein the first message contains a transaction number individual for the security module. A second message is transferred from the equipment to the provider and the firmware update is requested from the provider. The second message contains the individual transaction number to enable the provider to conduct an identification of the security module. The firmware update is transferred from the provider to the equipment based on the individual transaction number, and is stored in a memory of the device. The firmware is unpacked by a boot loader of the equipment or the security module.Type: ApplicationFiled: July 23, 2013Publication date: August 6, 2015Inventors: Dieter Weiss, Klaus Vedder, Michael Meyer, Michael Tagscherer, Jens Rudolph, Ulrich Dietz, Jari Nyholm, Thomas Larsson, Jörgen Hult
-
Publication number: 20140308926Abstract: A method includes preventing fraudulent use of a security module in a device, and the security module is designed to perform the following steps of: retrieving a device identifier of the device from the device; checking whether negative allowance information is stored in the security module for the retrieved device identifier and transmit a security module identifier of the security module and the retrieved device identifier to a server; and receiving a response from the server regarding whether the security module is allowed to operate with the identified device and store negative allowance information in the security module for the retrieved device identifier, if the security module is not allowed to operate with the identified device according to the server response. A security module may execute the method, and a system may include the device and the server.Type: ApplicationFiled: November 6, 2012Publication date: October 16, 2014Inventors: Jan Bosved, Jorgen Hult