Patent application number | Description | Published |
20090093467 | THERAPEUTIC COMPOSITIONS AND METHODS - The invention includes methods, compositions, and kits useful for treating a viral infection by administering 6-(3-chloro-2-fluorobenzyl)-1-[(2S)-1-hydroxy-3-methylbutan-2-yl]-7-methoxy-4-oxo-1,4-dihydroquinoline-3-carboxylic acid or a pharmaceutically acceptable salt thereof, with atazanavir or a pharmaceutically acceptable salt thereof, and optionally with a compound that inhibits cytochrome P-450, or a pharmaceutically acceptable salt thereof. | 04-09-2009 |
20090093482 | THERAPEUTIC COMPOSITIONS AND METHODS - The invention includes methods, compositions, and kits useful for treating a viral infection by coadministering 6-(3-chloro-2-fluorobenzyl)-1-[(2S)-1-hydroxy-3-methylbutan-2-yl]-7-methoxy-4-oxo-1,4-dihydroquinoline-3-carboxylic acid or a pharmaceutically acceptable salt thereof, with lopinavir or a pharmaceutically acceptable salt thereof. | 04-09-2009 |
20140343062 | METHOD OF TREATING A VIRAL INFECTION USING ELVITEGRAVIR COMBINATIONS - The invention includes methods, compositions, and kits useful for treating a viral infection by coadministering 6-(3-chloro-2-fluorobenzyl)-1-[(2S)-1-hydroxy-3-methylbutan-2-yl]-7-methoxy-4-oxo-1,4-dihydroquinoline-3-carboxylic acid or a pharmaceutically acceptable salt thereof, with lopinavir or a pharmaceutically acceptable salt thereof. | 11-20-2014 |
20140343063 | METHOD OF TREATING A VIRAL INFECTION USING ELVITEGRAVIR COMBINATIONS - The invention includes methods, compositions, and kits useful for treating a viral infection by administering 6-(3-chloro-2-fluorobenzyl)-1-[(2S)-1-hydroxy-3-methylbutan-2-yl]-7-methoxy-4-oxo-1,4-dihydroquinoline-3-carboxylic acid or a pharmaceutically acceptable salt thereof, with atazanavir or a pharmaceutically acceptable salt thereof, and optionally with a compound that inhibits cytochrome P-450, or a pharmaceutically acceptable salt thereof. | 11-20-2014 |
Patent application number | Description | Published |
20120135710 | APPARATUS AND METHODS FOR RECORDATION OF DEVICE HISTORY ACROSS MULTIPLE SOFTWARE EMULATIONS - Apparatus and methods for maintaining hardware history profiles for a software-based emulator. In one embodiment, the disclosed software-based emulator monitors the history of the actual hardware device in a secondary device history, the history of the emulated hardware is presented within a primary device history. However, the primary device history is linked to the secondary device history, and receives the device wear history therefrom. In another aspect of the present invention, wear-leveling strategies are disclosed for handling various update sizes. Unlike existing solutions which are optimized for a single SIM that receives small data updates; various embodiments of the present invention are suitable for handling varying data sizes. | 05-31-2012 |
20120331292 | ELECTRONIC ACCESS CLIENT DISTRIBUTION APPARATUS AND METHODS - Apparatus and methods for distributing access control clients. In one exemplary embodiment, a network infrastructure is disclosed that enables delivery of electronic subscriber identity modules (eSIMs) to secure elements (e.g., electronic Universal Integrated Circuit Cards (eUICCs), etc.) The network architecture includes one or more of: (i) eSIM appliances, (ii) secure eSIM storages, (iii) eSIM managers, (iv) eUICC appliances, (v) eUICC managers, (vi) service provider consoles, (vii) account managers, (viii) Mobile Network Operator (MNO) systems, (ix) eUICCs that are local to one or more devices, and (x) depots. Moreover, each depot may include: (xi) eSIM inventory managers, (xii) system directory services, (xiii) communications managers, and/or (xiv) pending eSIM storages. Functions of the disclosed infrastructure can be flexibly partitioned and/or adapted such that individual parties can host portions of the infrastructure. Exemplary embodiments of the present invention can provide redundancy, thus ensuring maximal uptime for the overall network (or the portion thereof). | 12-27-2012 |
20150031336 | System and Method for Providing Telephony Services over WiFi for Non-Cellular Devices - A method performed by a provisioning server, the method including receiving registration data from a client station, transmitting activation data to a telephony service provider, the activation data generated as a function of the registration data, the activation data being used to generate telephony data for the user, the telephony data including access data to utilize a telephony network of the telephony service provider and transmitting the telephony data to the client station, wherein select portions of the telephony data and select portions of the activation data verify the client station as an authenticated device to utilize the telephony network. | 01-29-2015 |
20150271216 | Apparatus, Systems and Methods for Providing Telephony Services to Multiple Devices - Described are call handling methods performed by a carrier network or client stations. A method performed by a carrier network includes designating rules for call handling for an account, receiving first and second voice calls for the account, wherein the voice calls may be either an incoming calls or originated calls and handling the first and second voice calls for the account based on the rules. A method performed by a client station includes receiving a first invitation to a first call, responding to the first invitation causing the first call to be active, receiving a second invitation to a second call while the first call remains active and responding to the second invitation causing the second call to be active and the first call to be on hold, the client station is prevented from originating a call when one call is active and one call is on hold. | 09-24-2015 |
Patent application number | Description | Published |
20100124192 | SYSTEM AND METHOD FOR ENABLING RADIO OPERATIONS ON A WIRELESS COMPUTING DEVICE - Embodiments of the invention provide for a wireless computing device that comprises a set of one or more radio components to transmit and receive wireless communications on the device. Additionally, the wireless computing device includes processing and memory resources that individually or in combination provide multiple wireless applications, a radio object, and an arbitration component. The multiple wireless applications are each capable of generating a user-interface for enabling user-input in connection with wireless activities performed with that wireless application. The radio object interfaces the multiple applications with the set of one or more radio components. The arbitration component is configured to arbitrate at least one of (i) requests made by each of the wireless applications to the radio object for access to one or more of the radio components in the set, or (ii) responses from the radio object to requests made by each of the wireless applications. | 05-20-2010 |
20100285817 | APPARATUS AND METHODS FOR PROVIDING LOCATION-BASED SERVICES TO A MOBILE COMPUTING DEVICE HAVING A DUAL PROCESSOR ARCHITECTURE - Various embodiments of systems and techniques for providing location-based services (LBS) to a mobile computing device having a dual processor architecture are described. In one or more embodiments, the mobile computing device may comprise or implement hardware and/or software configured to enable LBS and data communications sessions using a single active data stack at any particular point in time. Other embodiments are described and claimed. | 11-11-2010 |
20110177811 | REGISTRATION WITH A MOBILE TELECOMMUNICATIONS SERVICE PROVIDER - A method performed by a mobile device to register for cellular data connection service provided by a mobile telecommunications service provider. The mobile device determines that it does not have a valid cellular data connection subscription with the mobile telecommunications service provider. Responsive to that determination, the mobile device connects to a cellular data connection service registration site to allow a user of the mobile device to register for data connection service provided by the mobile telecommunications service provider. The mobile device is limited to accessing the data connection service registration site until the user registers for data connection service. | 07-21-2011 |
20110250909 | REGISTERING CLIENT COMPUTING DEVICES FOR ONLINE COMMUNICATION SESSIONS - Registering a client computing device for online communication sessions. A registration server receives a message that has a push token that is unique to the client computing device and a phone number of the client computing device from an SMS (Short Message Service) transit device, which received an SMS message having the push token from the client computing device and determined the phone number of the client computing device from that SMS message. The registration server associates the push token and the phone number and stores it in a registration data store, which is used for inviting users for online communication sessions. | 10-13-2011 |
20110258426 | BOOTING AND CONFIGURING A SUBSYSTEM SECURELY FROM NON-LOCAL STORAGE - According to one aspect, a multifunctional computing device having a wireless communications processor (e.g., cellular processor) and an application processor (e.g., general-purpose processor such as a CPU) share a storage device that is associated with or attached to the application processor. An example of such a multifunctional computing device may be a Smartphone device having a cellular phone and handheld computer functionalities. There is no specific storage device directly associated with or attached to the wireless communications processor (hereinafter simply referred to as a wireless processor). Instead, the wireless processor communicates with the application processor via a high speed communications link, such as a USB link, to access code and data stored in the storage device (e.g., flash memory device) associated with the application processor. | 10-20-2011 |
20120077496 | REGISTRATION WITH A MOBILE TELECOMMUNICATIONS SERVICE PROVIDER - A method performed by a mobile device to register for cellular data connection service provided by a mobile telecommunications service provider. In one embodiment, the mobile device transmits a probe, through a wireless cellular network, to a main Access Point Name (APN), and the probe is configured to determine whether the mobile device has a valid cellular data connection subscription. The mobile device determines, from a response to the probe, that it does not have a valid cellular data connection subscription with the mobile telecommunications service provider. Responsive to that determination, the mobile device connects to a cellular data connection service registration site to allow a user of the mobile device to register for data connection service provided by the mobile telecommunications service provider. The mobile device is limited to accessing the data connection service registration site until the user registers for data connection service. | 03-29-2012 |
20120270508 | SYSTEM AND METHOD FOR ENABLING RADIO OPERATIONS ON A WIRELESS COMPUTING DEVICE - Embodiments of the invention provide for a wireless computing device that comprises a set of one or more radio components to transmit and receive wireless communications on the device. Additionally, the wireless computing device includes processing and memory resources that individually or in combination provide multiple wireless applications, a radio object, and an arbitration component. The multiple wireless applications are each capable of generating a user-interface for enabling user-input in connection with wireless activities performed with that wireless application. The radio object interfaces the multiple applications with the set of one or more radio components. The arbitration component is configured to arbitrate at least one of (i) requests made by each of the wireless applications to the radio object for access to one or more of the radio components in the set, or (ii) responses from the radio object to requests made by each of the wireless applications. | 10-25-2012 |
20130115948 | METHOD AND APPARATUS FOR USING A WIRELESS COMMUNICATION DEVICE WITH MULTIPLE SERVICE PROVIDERS - Configuring a mobile wireless communication device using a carrier service configuration profile selected from a set of stored carrier service configuration profiles. Carrier service configuration profiles are selected based on one or more combinations of identifier values stored in the mobile wireless communication device. Carrier service configuration profiles are priority ranked based on a specificity of the one or more combinations of identifier values. | 05-09-2013 |
20130227646 | METHODS AND APPARATUS FOR LARGE SCALE DISTRIBUTION OF ELECTRONIC ACCESS CLIENTS - Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs) | 08-29-2013 |
20130231146 | REGISTERING CLIENT COMPUTING DEVICES FOR ONLINE COMMUNICATION SESSIONS - Registering a client computing device for online communication sessions. A registration server receives a message that has a push token that is unique to the client computing device and a phone number of the client computing device from an SMS (Short Message Service) transit device, which received an SMS message having the push token from the client computing device and determined the phone number of the client computing device from that SMS message. The registration server associates the push token and the phone number and stores it in a registration data store, which is used for inviting users for online communication sessions. | 09-05-2013 |
20130344855 | METHODS AND APPARATUS FOR AUTOMATED COMMUNICATIONS FORWARDING - Methods and apparatus for the automated updating of forwarding preferences for communications in a telecommunications network. In one embodiment, the network includes a wireless (e.g., cellular) network with user mobile user devices configured to detect a change to their configuration (such as a user changing out SIM cards or virtual access clients). In response, the device causes an update to its associated communication forwarding preferences to reflect the change. If the configuration alteration meets certain criteria (e.g., changes the phone number at which the device may be reached), the device sends a forwarding message instructing a network entity (e.g., routing server) to direct communications addressed to the old phone number to the new phone number. Thus, a user with two or more user profiles (such as two different carrier accounts) may be reached at any number associated with any of the profiles, even if only one profile is currently active. | 12-26-2013 |
20140220955 | SYSTEM AND METHOD FOR ENABLING RADIO OPERATIONS ON A WIRELESS COMPUTING DEVICE - Embodiments of the invention provide for a wireless computing device that comprises a set of one or more radio components to transmit and receive wireless communications on the device. Additionally, the wireless computing device includes processing and memory resources that individually or in combination provide multiple wireless applications, a radio object, and an arbitration component. The multiple wireless applications are each capable of generating a user-interface for enabling user-input in connection with wireless activities performed with that wireless application. The radio object interfaces the multiple applications with the set of one or more radio components. The arbitration component is configured to arbitrate at least one of (i) requests made by each of the wireless applications to the radio object for access to one or more of the radio components in the set, or (ii) responses from the radio object to requests made by each of the wireless applications. | 08-07-2014 |
20140248924 | APPARATUS AND METHODS FOR RECORDATION OF DEVICE HISTORY ACROSS MULTIPLE SOFTWARE EMULATIONS - Apparatus and method for maintaining hardware history profiles for a software-based emulator. In one embodiment, the disclosed software-based emulator monitors the history of the actual hardware device in a secondary device history, the history of the emulated hardware is presented within a primary device history. However, the primary device history is linked to the secondary device history, and receives the device wear history therefrom. In another aspect of the present invention, wear-leveling strategies are disclosed for handling various update sizes. Unlike existing solutions which are optimized for a single SIM that receives small data updates; various embodiments of the present invention are suitable for handling varying data sizes. | 09-04-2014 |
20150031413 | ELECTRONIC ACCESS CLIENT DISTRIBUTION APPARATUS AND METHODS - Apparatus and methods for distributing access control clients. In one exemplary embodiment, a network infrastructure is disclosed that enables delivery of electronic subscriber identity modules (eSIMs) to secure elements (e.g., electronic Universal Integrated Circuit Cards (eUICCs), etc.) The network architecture includes one or more of: (i) eSIM appliances, (ii) secure eSIM storages, (iii) eSIM managers, (iv) eUICC appliances, (v) eUICC managers, (vi) service provider consoles, (vii) account managers, (viii) Mobile Network Operator (MNO) systems, (ix) eUICCs that are local to one or more devices, and (x) depots. Moreover, each depot may include: (xi) eSIM inventory managers, (xii) system directory services, (xiii) communications managers, and/or (xiv) pending eSIM storages. Functions of the disclosed infrastructure can be flexibly partitioned and/or adapted such that individual parties can host portions of the infrastructure. Exemplary embodiments of the present invention can provide redundancy, thus ensuring maximal uptime for the overall network (or the portion thereof). | 01-29-2015 |
20150180822 | REGISTERING CLIENT COMPUTING DEVICES FOR ONLINE COMMUNICATION SESSIONS - Registering a client computing device for online communication sessions. A registration server receives a message that has a push token that is unique to the client computing device and a phone number of the client computing device from an SMS (Short Message Service) transit device, which received an SMS message having the push token from the client computing device and determined the phone number of the client computing device from that SMS message. The registration server associates the push token and the phone number and stores it in a registration data store, which is used for inviting users for online communication sessions. | 06-25-2015 |
Patent application number | Description | Published |
20120047227 | VIRTUAL ACCESS MODULE DISTRIBUTION APPARATUS AND METHODS - Apparatus and methods for distributing electronic access client modules for use with electronic devices. In one embodiment, the access client modules are virtual subscriber identity modules (VSIMs) that can be downloaded from online services for use with cellular-equipped devices such as smartphones. The online services may include a point of sale (POS) system that sells electronic devices to users. A broker may be used to facilitate the selection of a virtual subscriber identity module. A provisioning service may also be used to provision the selected VSIM. | 02-23-2012 |
20120258707 | MULTIPLE NETWORK MOBILE DEVICE CONNECTION MANAGEMENT - A mobile wireless device maintains registration on two parallel wireless communication networks that each use different wireless communication protocols. In response to a first connection request received from a first wireless network, the mobile wireless device tunes a single receiver contained therein from the first wireless network to a second wireless network. Subsequently in response to a second connection request received from the second wireless network, the mobile wireless device connects to the second wireless network. | 10-11-2012 |
20130210415 | METHODS AND APPARATUS FOR INTELLIGENT WIRELESS TECHNOLOGY SELECTION - Methods and apparatus for intelligently selecting and operating one or more air interfaces of a mobile wireless device for e.g., call setup time reduction. In one embodiment, operation of a high speed cellular interface is selectively adjusted or disabled or switched out when not required so as to minimize call setup times by, e.g., using a different cellular interface to receive pages. In one implementation, the wireless device includes a high-speed cellular interface, a lower-speed cellular interface, and a WLAN (e.g., Wi-Fi) interface. | 08-15-2013 |
20130329567 | DELAYING NETWORK RESELECTION FOLLOWING PERFORMANCE OF A CIRCUIT SWITCHED FALLBACK PROCEDURE IN A CALL FAILURE SCENARIO - A method for delaying network reselection by a wireless communication device following a call failure is provided. The method can include determining an initiation of a voice call while connected to a first network. The method can further include participating in a circuit switched fallback (CSFB) procedure to transition from the first network to a second network in response to initiation of the voice call. The method can additionally include determining an occurrence of a call failure of the voice call. The method can also include, responsive to the call failure, barring reselection to the first network for a threshold barring period. | 12-12-2013 |
20140099925 | METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK - Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security. | 04-10-2014 |
20140223074 | NON-VOLATILE MEMORY MONITORING - The invention provides a technique for managing write operations issued to a non-volatile memory included in a wireless device. A monitor software application executes on the wireless device and is configured to determine that a number of write operations issued to the non-volatile memory is greater than or equal to a write operation threshold associated with the non-volatile memory. In response, at least one application is isolated as the application responsible for issuing excessive write operations. The isolation can be carried out locally on the wireless device, or the isolation can be carried out remotely at a server by sending information about the write operations to the server. The monitor then limits additional write operations from being issued to the non-volatile memory so as to protect the non-volatile memory from becoming corrupted or inoperable. | 08-07-2014 |
20140349617 | PROVISIONING AN EMBEDDED SUBSCRIBER IDENTITY MODULE - Provisioning an embedded subscriber identity module (eSIM) in a user equipment (UE) device with personalized subscriber information. A request may be transmitted for personalized subscriber information. The personalized subscriber information may be received. The personalized subscriber information may be installed in an eSIM in the UE device. | 11-27-2014 |
20140349634 | METHOD AND APPARATUS FOR USING A WIRELESS COMMUNICATION DEVICE WITH MULTIPLE SERVICE PROVIDERS - Configuring a mobile wireless communication device using a carrier service configuration profile selected from a set of stored carrier service configuration profiles. Carrier service configuration profiles are selected based on one or more combinations of identifier values stored in the mobile wireless communication device. Carrier service configuration profiles are priority ranked based on a specificity of the one or more combinations of identifier values. | 11-27-2014 |
20140349705 | VIRTUAL ACCESS MODULE DISTRIBUTION APPARATUS AND METHODS - Apparatus and methods for distributing electronic access client modules for use with electronic devices. In one embodiment, the access client modules are virtual subscriber identity modules (VSIMs) that can be downloaded from online services for use with cellular-equipped devices such as smartphones. The online services may include a point of sale (POS) system that sells electronic devices to users. A broker may be used to facilitate the selection of a virtual subscriber identity module. A provisioning service may also be used to provision the selected VSIM. | 11-27-2014 |
20150181433 | METHODS AND APPARATUS FOR MANAGING DATA WITHIN A SECURE ELEMENT - Apparatus and methods for managing and sharing data across multiple access control clients in devices. In one embodiment, the access control clients comprise electronic Subscriber Identity Modules (eSIMs) disposed on an embedded Universal Integrated Circuit Card (eUICC). Each eSIM contains its own data. An Advanced Subscriber Identity Toolkit application maintained within the eUICC facilitates managing and sharing multiple eSIMs' data for various purposes such as sharing phonebook contacts or facilitating automatic switch-over between the multiple eSIMs (such as based on user context). | 06-25-2015 |
20150212745 | NON-VOLATILE MEMORY MONITORING - The invention provides a technique for managing write operations issued to a non-volatile memory included in a wireless device. A monitor software application executes on the wireless device and is configured to determine that a number of write operations issued to the non-volatile memory is greater than or equal to a write operation threshold associated with the non-volatile memory. In response, at least one application is isolated as the application responsible for issuing excessive write operations. The isolation can be carried out locally on the wireless device, or the isolation can be carried out remotely at a server by sending information about the write operations to the server. The monitor then limits additional write operations from being issued to the non-volatile memory so as to protect the non-volatile memory from becoming corrupted or inoperable. | 07-30-2015 |
20150312698 | METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK - Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security. | 10-29-2015 |
20150334673 | MULTIPLE NETWORK MOBILE DEVICE CONNECTION MANAGEMENT - A mobile wireless device maintains registration on two parallel wireless communication networks that each use different wireless communication protocols. In response to a first connection request received from a first wireless network, the mobile wireless device tunes a single receiver contained therein from the first wireless network to a second wireless network. Subsequently in response to a second connection request received from the second wireless network, the mobile wireless device connects to the second wireless network. | 11-19-2015 |
20150349826 | SUPPORTING SIM TOOLKIT APPLICATIONS IN EMBEDDED UICCs - Disclosed herein is a technique for enabling Subscriber Identity Module (SIM) toolkit commands to be properly routed within a mobile device that includes an embedded Universal Integrated Circuit Card (eUICC) configured to manage two or more electronic SIMs (eSIMs). Specifically, the technique involves a baseband component of the mobile device and the eUICC initially exchanging information about their eSIM capabilities to identify whether multiple eSIMs are active within the eUICC. During this exchange of information, the eUICC can generate a list of unique identifiers of the active eSIMs that are managed by the eUICC and provide the list of unique identifiers to the baseband component. In turn, the baseband component can update a configuration to manage the list of unique identifiers and use the list of unique identifiers to properly route SIM toolkit commands to the appropriate eSIM within the eUICC. | 12-03-2015 |
20150350877 | MITIGATING PAGING COLLISIONS IN DUAL STANDBY DEVICES - Disclosed herein is a technique for mitigating paging collisions in mobile devices. When a new electronic Subscriber Identity Module (eSIM) is to be provisioned on a mobile device, International Mobile Subscriber Identity (IMSI) information associated with each of the SIMs/eSIMs currently installed on the mobile device is obtained and provided to a provisioning server. In turn, the provisioning server utilizes the IMSI information to select a new eSIM associated with an IMSI that is unlikely to result in a paging collision when operated alongside the SIMs/eSIMs installed on the mobile device. The provisioning server provides the new eSIM to the mobile device, whereupon the mobile device installs the eSIM into the embedded Universal Integrated Circuit Card (eUICC) for operation. | 12-03-2015 |
20150350878 | ELECTRONIC SUBSCRIBER IDENTITY MODULE SELECTION - Embodiments are described for identifying and accessing an electronic subscriber identity module (eSIM) and associated content of the eSIM in a multiple eSIM configuration. An embedded Universal Integrated Circuit Card (eUICC) can include multiple eSIMs, where each eSIM can include its own file structures and applications. Some embodiments include a processor of a mobile device transmitting a special command to the eUICC, including an identification that uniquely identifies an eSIM in the eUICC. After selecting the eSIM, the processor can access file structures and applications of the selected eSIM. The processor can then use existing commands to access content in the selected eSIM. The special command can direct the eUICC to activate or deactivate content associated with the selected eSIM. Other embodiments include an eUICC platform operating system interacting with eSIMs associated with logical channels to facilitate identification and access to file structures and applications of the eSIMs. | 12-03-2015 |
20160063260 | POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL - A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities. | 03-03-2016 |
Patent application number | Description | Published |
20120108207 | METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK - Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security. | 05-03-2012 |
20130215846 | METHODS AND APPARATUS FOR PREFERRED DATA TRAFFIC (APPLICATION) MODE - Methods and apparatus for preferring connections between networks. In one embodiment, a mobile device is capable of hybrid network operation (e.g. LTE and CDMA | 08-22-2013 |
20140073375 | METHODS AND APPARATUS FOR MANAGING DATA WITHIN A SECURE ELEMENT - Apparatus and methods for managing and sharing data across multiple access control clients in devices. In one embodiment, the access control clients comprise electronic Subscriber Identity Modules (eSIMs) disposed on a embedded Universal Integrated Circuit Card (eUICC). Each eSIM contains its own data. An Advanced Subscriber Identity Toolkit application maintained within the eUICC facilitates managing and sharing multiple eSIMs' data for various purposes such as sharing phonebook contacts or facilitating automatic switch-over between the multiple eSIMs (such as based on user context). | 03-13-2014 |
20150017910 | APPARATUS AND METHODS FOR NEAR-FIELD COMMUNICATION BASED DEVICE CONFIGURATION AND MANAGMENT - Methods and apparatus for activating a mobile device for use with a service provider. In one embodiment, a powered-off mobile device having an inserted Subscriber Identity Module (SIM) may be programmed with configuration data while “in box” (e.g., at a point of sale (POS), in a warehouse, etc.) using a near field communication (NFC) data interface. In another exemplary embodiment, information that is stored to a NFC accessible memory can be accessed when the device is non-functional e.g., to retrieve backup data. | 01-15-2015 |
20150350339 | System and Method for Transferring a Call - Described are systems and methods for transferring calls between multiple stations. An exemplary system includes a first station and a second station that establishes a first communication session having a first call identification with the first station. The system further includes a third station and a network device that includes stored data indicating a relationship between the first station and the third station, the network device configured to receive the first call identification from the first station and transmit the first call identification to the third station based on the relationship, wherein the third station is configured to receive the first call identification and send an invite to the second station to replace the first communication session with the first station with a second communication session with the third station, the invite including the first call identification and a second call identification that identifies the second communication session. | 12-03-2015 |
Patent application number | Description | Published |
20120309377 | OVER-THE-AIR DEVICE CONFIGURATION - Methods, program products, and systems of over-the-air device configuration are disclosed. In general, in one aspect, a mobile device can determine, in an application subsystem of the mobile device, that the mobile device requests an initial setup. The application subsystem can send a request to a baseband subsystem of the mobile device. The request can include an indicator specifying that the baseband subsystem is to operate in a service configuration mode. The mobile device can request the configuration information from a registration server using the baseband subsystem that operates under the service configuration mode. Requesting the configuration information from the server can include connecting to the server over the air using a cellular network, through a specified carrier and under a specified data transfer cap. The mobile device can then configure the mobile device using configuration information received from the server. | 12-06-2012 |
20130303122 | Provisioning an Embedded Subscriber Identity Module - Provisioning an embedded subscriber identity module (eSIM) in a user equipment (UE) device with personalized subscriber information. A request may be transmitted for personalized subscriber information. The personalized subscriber information may be received. The personalized subscriber information may be installed in an eSIM in the UE device. | 11-14-2013 |
20130328724 | Receive Only Mode for Clock Drift Correction - In some implementations, radio access technology (RAT) signals can be monitored and used to synchronize an internal clock of a mobile device to a network system clock without registering the mobile device to the network. In some implementations, a RAT processor can be configured to receive RAT signals and to prevent transmission of RAT signals. In some implementations, the internal clock can be associated with a GNSS processor and can be used to calculate a location of the mobile device. In some implementations, a RAT processor that is configured for a particular radio access technology can be configured to monitor signals associated with another radio access technology when synchronizing the internal clock. In some implementations, the RAT processor can monitor signals in response to a power event. The power event can be associated with powering a display of the mobile device. | 12-12-2013 |
20130332156 | Sensor Fusion to Improve Speech/Audio Processing in a Mobile Device - The disclosed system and method for a mobile device combines information derived from onboard sensors with conventional signal processing information derived from a speech or audio signal to assist in noise and echo cancellation. In some implementations, an Angle and Distance Processing (ADP) module is employed on a mobile device and configured to provide runtime angle and distance information to an adaptive beamformer for canceling noise signals, provides a means for building a table of filter coefficients for adaptive filters used in echo cancellation, provides faster and more accurate Automatic Gain Control (AGC), provides delay information for a classifier in a Voice Activity Detector (VAD), provides a means for automatic switching between a speakerphone and handset mode of the mobile device, or primary microphone and reference microphones and assists in separating echo path changes from double talk. | 12-12-2013 |
20130332764 | INTELLIGENT INTER-PROCESSOR COMMUNICATION WITH POWER OPTIMIZATION - One embodiment of the present invention provides a system that facilitates intelligent inter-processor communication with power optimization. The system comprises a memory, a first router, a second router, a first physical link coupled between the first router and the second router, and a second physical link coupled between the first router and the second router. Furthermore, the system comprises a first communication bus implemented on the first physical link, as well as a second communication bus implemented on the second physical link. Note that the second communication bus provides lower power consumption and lower bandwidth than the first communication bus. During operation, the system receives a packet at the first router, wherein the packet is destined for the second router. Next, the system selects either the first communication bus or the second communication bus over which to route the packet. Finally, the system routes the packet according to the selection. | 12-12-2013 |
20140064095 | APPARATUS AND METHOD FOR OPTIMIZING COMMUNICATIONS AT AN INTERMITTENT COMMUNICATION LINK - Apparatus and methods for optimizing communications at a communication processor that exchanges communications across a communication link on behalf of an application processor or other local endstation of the communications, wherein the communication link is intermittently inoperative. The application processor is a source or destination of communication packets that traverse the link, while the communication processor transmits and receives the packets for the application processor. Packets are queued at the communication processor for transmit while the link is temporarily inoperative. A filter operates to select obsolete packets for discard. Obsolete packets may include packets for which a subsequent FIN packet (or other termination notice) is received, and may also include packets that have associated deadlines that expire or that will expire before they can be delivered. Obsolete packets may further include packets that have been retransmitted while the link is inoperative. | 03-06-2014 |
20140143826 | POLICY-BASED TECHNIQUES FOR MANAGING ACCESS CONTROL - A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities. | 05-22-2014 |
20150092613 | Apparatus, System, and Method for Notifying a Mobile Station of an Incoming Circuit Switched Call During a Packet Switched Session - Apparatus, system, and method for notifying a mobile station of an incoming circuit switched call during a packet switched session. During the packet switched session, a mobile station may receive a call notification of the circuit switched call. The call notification may be received via a packet switched network associated with the packet switched session. Additionally, the call notification may identify a calling party. In response, an indication of the circuit switched call may be displayed to a user on a display of the mobile station. This indication of the circuit switched call may identify the calling party. Additionally, the indication may be displayed while maintaining the packet switched session. In response, the user may provide input to the mobile station regarding whether to accept the circuit switched call. Based on this input, the mobile station may accept or reject the circuit switched call. | 04-02-2015 |