Patent application number | Description | Published |
20130227646 | METHODS AND APPARATUS FOR LARGE SCALE DISTRIBUTION OF ELECTRONIC ACCESS CLIENTS - Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs) | 08-29-2013 |
20130344855 | METHODS AND APPARATUS FOR AUTOMATED COMMUNICATIONS FORWARDING - Methods and apparatus for the automated updating of forwarding preferences for communications in a telecommunications network. In one embodiment, the network includes a wireless (e.g., cellular) network with user mobile user devices configured to detect a change to their configuration (such as a user changing out SIM cards or virtual access clients). In response, the device causes an update to its associated communication forwarding preferences to reflect the change. If the configuration alteration meets certain criteria (e.g., changes the phone number at which the device may be reached), the device sends a forwarding message instructing a network entity (e.g., routing server) to direct communications addressed to the old phone number to the new phone number. Thus, a user with two or more user profiles (such as two different carrier accounts) may be reached at any number associated with any of the profiles, even if only one profile is currently active. | 12-26-2013 |
20140073375 | METHODS AND APPARATUS FOR MANAGING DATA WITHIN A SECURE ELEMENT - Apparatus and methods for managing and sharing data across multiple access control clients in devices. In one embodiment, the access control clients comprise electronic Subscriber Identity Modules (eSIMs) disposed on a embedded Universal Integrated Circuit Card (eUICC). Each eSIM contains its own data. An Advanced Subscriber Identity Toolkit application maintained within the eUICC facilitates managing and sharing multiple eSIMs' data for various purposes such as sharing phonebook contacts or facilitating automatic switch-over between the multiple eSIMs (such as based on user context). | 03-13-2014 |
Patent application number | Description | Published |
20110269463 | METHODS AND APPARATUS FOR PRESERVING BATTERY RESOURCES IN A MOBILE COMMUNICATION DEVICE - Preserving battery resources in a wireless device in communication with a wireless network by dynamically aligning a RRC connection status of a mobile wireless communication device in communication with a wireless network with a data traffic profile. The data traffic profile indicating a pattern of data transfer between the mobile wireless communication device and the wireless network. | 11-03-2011 |
20130143615 | MOBILE DEVICE NETWORK SIGNALING MANAGEMENT - A mobile wireless device maintains a radio sector database. When receiving no response or a negative response from a radio sector to a transmitted signaling message, the mobile wireless device adds or updates the radio sector database. When receiving a positive response from the radio sector, the mobile wireless device deletes the radio sector from the radio sector database. Before transmitting signaling messages to a radio sector, the mobile device determines a time delay value if the radio sector is in the radio sector database. The mobile wireless device discards the signaling message when an elapsed time since a most recently transmitted signaling message to the radio sector does not exceed the determined time delay value. In an embodiment, each radio sector in the radio sector database includes a failure count value, and the determined time delay value depends on the failure count value. | 06-06-2013 |
20130303122 | Provisioning an Embedded Subscriber Identity Module - Provisioning an embedded subscriber identity module (eSIM) in a user equipment (UE) device with personalized subscriber information. A request may be transmitted for personalized subscriber information. The personalized subscriber information may be received. The personalized subscriber information may be installed in an eSIM in the UE device. | 11-14-2013 |
20130332764 | INTELLIGENT INTER-PROCESSOR COMMUNICATION WITH POWER OPTIMIZATION - One embodiment of the present invention provides a system that facilitates intelligent inter-processor communication with power optimization. The system comprises a memory, a first router, a second router, a first physical link coupled between the first router and the second router, and a second physical link coupled between the first router and the second router. Furthermore, the system comprises a first communication bus implemented on the first physical link, as well as a second communication bus implemented on the second physical link. Note that the second communication bus provides lower power consumption and lower bandwidth than the first communication bus. During operation, the system receives a packet at the first router, wherein the packet is destined for the second router. Next, the system selects either the first communication bus or the second communication bus over which to route the packet. Finally, the system routes the packet according to the selection. | 12-12-2013 |
20140031033 | ENHANCEMENT TO PLMN SELECTION PROCESS WHILE ROAMING - A method and apparatus for a mobile wireless device configured to adaptively scan for a preferred wireless network while roaming is described. In one embodiment, at least a portion of a database including characteristic information regarding wireless networks can be stored within the mobile wireless device. Network characteristic information can include mobile country codes, mobile network codes, location area codes and cell-IDs. When the mobile wireless device is connected to a network that is not a preferred network, the mobile wireless device can use the database information in conjunction with characteristics from a connected wireless network to determine when to scan for the preferred wireless network. | 01-30-2014 |
20140064095 | APPARATUS AND METHOD FOR OPTIMIZING COMMUNICATIONS AT AN INTERMITTENT COMMUNICATION LINK - Apparatus and methods for optimizing communications at a communication processor that exchanges communications across a communication link on behalf of an application processor or other local endstation of the communications, wherein the communication link is intermittently inoperative. The application processor is a source or destination of communication packets that traverse the link, while the communication processor transmits and receives the packets for the application processor. Packets are queued at the communication processor for transmit while the link is temporarily inoperative. A filter operates to select obsolete packets for discard. Obsolete packets may include packets for which a subsequent FIN packet (or other termination notice) is received, and may also include packets that have associated deadlines that expire or that will expire before they can be delivered. Obsolete packets may further include packets that have been retransmitted while the link is inoperative. | 03-06-2014 |
20140064167 | INTER-CHIP DATA COMMUNICATIONS WITH POWER-STATE TRANSITION MANAGEMENT - A method includes inter-chip data communications between a power-managed integrated circuit (IC) and a peer IC. The peer IC generates a data frame and prepends a discardable preamble of a predefined size to a payload of the data frame. The predefined size is a size not less than a size of data discarded by the power-managed IC upon the power-managed IC receiving a data frame while in a low-power state. The peer IC transmits the data frame to the power-managed IC. The power-managed IC, while in a low-power state, may receive the data frame from the peer IC and in response to receiving the data frame, begin exiting the low-power state. The power-managed IC, while exiting the low-power state, may discard a portion of the data frame such as for example, some or all of the discardable preamble, without discarding payload. | 03-06-2014 |
20140099925 | METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK - Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security. | 04-10-2014 |
20140181471 | Adaptive Data Collection Practices in a Multi-Processor Device - Adaptive data collection practices in a multi-processor device. The device may include a first processor and a second processor. The first processor may operate in any of a plurality of power states. The first processor may indicate to the second processor when it transitions to a different power state. The second processor may collect information relating to its operation. The second processor may collect the information according to different information collecting modes depending on in which power state the first processor is operating. Less information may be collected in an information collecting mode corresponding to a lower power state of the first processor than in an information collecting mode corresponding to a higher power state of the first processor. | 06-26-2014 |
20140223074 | NON-VOLATILE MEMORY MONITORING - The invention provides a technique for managing write operations issued to a non-volatile memory included in a wireless device. A monitor software application executes on the wireless device and is configured to determine that a number of write operations issued to the non-volatile memory is greater than or equal to a write operation threshold associated with the non-volatile memory. In response, at least one application is isolated as the application responsible for issuing excessive write operations. The isolation can be carried out locally on the wireless device, or the isolation can be carried out remotely at a server by sending information about the write operations to the server. The monitor then limits additional write operations from being issued to the non-volatile memory so as to protect the non-volatile memory from becoming corrupted or inoperable. | 08-07-2014 |
20140349617 | PROVISIONING AN EMBEDDED SUBSCRIBER IDENTITY MODULE - Provisioning an embedded subscriber identity module (eSIM) in a user equipment (UE) device with personalized subscriber information. A request may be transmitted for personalized subscriber information. The personalized subscriber information may be received. The personalized subscriber information may be installed in an eSIM in the UE device. | 11-27-2014 |
20140364162 | Determination of Device Body Location - In some implementations, a mobile device can analyze motion sensor data and proximity sensor data during a voice call to determine whether the mobile device is on a stationary object or worn on a user's body (e.g., in the lap or pocket of a user of the mobile device). The mobile device can adjust the transmit power level of the telephony transceiver during the voice call based on the determination. | 12-11-2014 |
20150017910 | APPARATUS AND METHODS FOR NEAR-FIELD COMMUNICATION BASED DEVICE CONFIGURATION AND MANAGMENT - Methods and apparatus for activating a mobile device for use with a service provider. In one embodiment, a powered-off mobile device having an inserted Subscriber Identity Module (SIM) may be programmed with configuration data while “in box” (e.g., at a point of sale (POS), in a warehouse, etc.) using a near field communication (NFC) data interface. In another exemplary embodiment, information that is stored to a NFC accessible memory can be accessed when the device is non-functional e.g., to retrieve backup data. | 01-15-2015 |
Patent application number | Description | Published |
20080229259 | Design flow for shrinking circuits having non-shrinkable IP layout - A method for processing an integrated circuit is provided. The method includes providing a first integrated circuit having a first scale, wherein the first integrated circuit comprises a shrinkable circuit comprising a first intellectual property (IP) layout, and a non-shrinkable circuit comprising a second IP layout; and generating a second integrated circuit having a second scale smaller than the first scale. The step of generating the second integrated circuit includes shrinking the shrinkable integrated circuit to the second scale. The method further includes merging the second IP layout with the non-shrinkable circuit to generate a final integrated circuit. | 09-18-2008 |
20090326873 | INTEGRATED CIRCUIT DESIGN IN OPTICAL SHRINK TECHNOLOGY NODE - Disclosed is a system, method, and computer-readable medium for designing a circuit and/or IC chip to be provided using an optical shrink technology node. Initial design data may be provided in a first technology node and through the use of embedding scaling factors in one or more EDA tools of the design flow, a design (e.g., mask data) can be generated for the circuit in an optical shrink technology node. Examples of EDA tools in which embedded scaling factors may be provided are simulation models and extraction tools including LPE decks and RC extraction technology files. | 12-31-2009 |
20120084745 | Design Method for Non-Shrinkable IP Integration - A method of designing integrated circuits includes providing a design of an integrated circuit at a first scale, wherein the integrated circuit includes a shrinkable circuit including a first intellectual property (IP); and a non-shrinkable circuit including a second IP having a hierarchical structure. A marker layer is formed to cover the non-shrinkable circuit, wherein the shrinkable circuit is not covered by the marker layer. The electrical performance of the non-shrinkable circuit is simulated using a simulation tool, wherein the simulated non-shrinkable circuit is at a second scale smaller than the first scale. | 04-05-2012 |
Patent application number | Description | Published |
20100114893 | EVENT SEARCHING - Events can be searched by identifying a query that includes a time interval and a search component, determining a time increment associated with the time interval, and partitioning the time interval into partitions based on the time increment. For each partition, a relevance of each event in a collection of events that occur at a time in the partition is determined based on the query. A pre-determined number of the relevant events are displayed. | 05-06-2010 |
20110238754 | ORGANIZING SOCIAL ACTIVITY INFORMATION ON A SITE - A system and method for organizing social activity information on a website is disclosed. The system comprises a feed serving module and a presentation module. The feed serving module is configured to receive social activity of at least a first user from at least one third-parity source. The feed serving module aggregates the social activity information to form aggregated social activity information. The presentation module is communicatively coupled to the feed serving module and is configured to receive the aggregated social activity information from the feed serving module. The presentation module generates feed display associated with the aggregated social activity information and sends feed display to a client for display to a second user. | 09-29-2011 |
20120023534 | ORGANIZING SOCIAL ACTIVITY INFORMATION ON A SITE - A system and method for organizing social activity information on a website is disclosed. The system comprises a feed serving module and a presentation module. The feed serving module is configured to receive one or more user inputs for one or more activities associated with the social activity information. The feed serving module aggregates the social activity information based at least in part on the one or more user inputs to form aggregated social activity information. The presentation module is communicatively coupled to the feed serving module and is configured to receive the aggregated social activity information from the feed serving module. The presentation module generates a graphic associated with the aggregated social activity information and sends the graphic to a client. | 01-26-2012 |
20120179714 | EVENT SEARCHING - Events can be searched by identifying a query that includes a time interval and a search component, determining a time increment associated with the time interval, and partitioning the time interval into partitions based on the time increment. For each partition, a relevance of each event in a collection of events that occur at a time in the partition is determined based on the query. A pre-determined number of the relevant events are displayed. | 07-12-2012 |
20140237098 | ORGANIZING SOCIAL ACTIVITY INFORMATION ON A SITE - A system and method for organizing social activity information on a website is disclosed. The system comprises a feed serving module and a presentation module. The feed serving module is configured to receive one or more user inputs for one or more activities associated with the social activity information. The feed serving module aggregates the social activity information based at least in part on the one or more user inputs to form aggregated social activity information. The presentation module is communicatively coupled to the feed serving module and is configured to receive the aggregated social activity information from the feed serving module. The presentation module generates a graphic associated with the aggregated social activity information and sends the graphic to a client. | 08-21-2014 |
Patent application number | Description | Published |
20100151364 | Method for identifying and using process window signature patterns for lithography process control - A method for identifying process window signature patterns in a device area of a mask is disclosed. The signature patterns collectively provide a unique response to changes in a set of process condition parameters to the lithography process. The signature patterns enable monitoring of associated process condition parameters for signs of process drift, analyzing of the process condition parameters to determine which are limiting and affecting the chip yields, analyzing the changes in the process condition parameters to determine the corrections that should be fed back into the lithography process or forwarded to an etch process, identifying specific masks that do not transfer the intended pattern to wafers as intended, and identifying groups of masks that share common characteristics and behave in a similar manner with respect to changes in process condition parameters when transferring the pattern to the wafer. | 06-17-2010 |
20120021343 | Process Window Signature Patterns for Lithography Process Control - A method for identifying process window signature patterns in a device area of a mask is disclosed. The signature patterns collectively provide a unique response to changes in a set of process condition parameters to the lithography process. The signature patterns enable monitoring of associated process condition parameters for signs of process drift, analyzing of the process condition parameters to determine which are limiting and affecting the chip yields, analyzing the changes in the process condition parameters to determine the corrections that should be fed back into the lithography process or forwarded to an etch process, identifying specific masks that do not transfer the intended pattern to wafers as intended, and identifying groups of masks that share common characteristics and behave in a similar manner with respect to changes in process condition parameters when transferring the pattern to the wafer. | 01-26-2012 |
20130150698 | EVENT-BASED BIO-SIGNAL CAPTURING SYSTEM - An event-based bio-signal capturing system is disclosed. At least one bio-signal capturing device captures a bio-signal measured from biological beings; and at least one event capturing device captures an event and generates a corresponding event marker. A data recording device acquires the bio-signal and the event marker, wherein the bio-signal and the event marker are acquired with corresponding time reference for subsequent event-based data analysis. | 06-13-2013 |
20140214192 | Apparatus For Design-Based Manufacturing Optimization In Semiconductor Fab - A design-based manufacturing optimization (DMO) server comprises a distributed computing system and a DMO software module incorporating with a design scanner to scan and analyze design data of a semiconductor device for optimizing manufacturing of the semiconductor device. The DMO software module sets up a pattern signature database and a manufacturing optimization database, generates design-based manufacturing recipes, interfaces with manufacturing equipment through a manufacturing interface module, and interfaces with electronic design automation suppliers for the design data through a design interface module. The DMO server executes the design-based manufacturing recipes for manufacturing optimization. | 07-31-2014 |
20140355867 | SYSTEM AND METHOD FOR IDENTIFYING SYSTEMATIC DEFECTS IN WAFER INSPECTION USING HIERARCHICAL GROUPING AND FILTERING - A number of wafers of a same semiconductor device are inspected to generate a plurality of candidate defect lists for identifying systematic defects. Each candidate defect list comprises a plurality of candidate defects obtained from inspecting one of the wafers. Each candidate defect is represented by a plurality of defect attributes including a defect location. The candidate defects in every one or more candidate defect lists are processed as a set by stage one grouping and filtering to generate a stage one defect list for each set. The candidate defects in all the stage one defect lists are then processed together by stage two grouping and filtering to generate a final defect lists for systematic defects. The defect attributes of each defect and a design pattern clip extracted from a design database based on the defect location are used in the hierarchical grouping and filtering. | 12-04-2014 |