Patent application number | Description | Published |
20090083847 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 03-26-2009 |
20090083850 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 03-26-2009 |
20090171670 | Systems and methods for altering speech during cellular phone use - The present invention includes systems and methods for altering a cellular phone user's speech so that the speech can be less bothersome to third parties in the surrounding area and so that the user has more privacy. Sound cancellation can be used to cancel, reduce, or modify the user's voice so third parties cannot hear the voice as easily or so that the user's voice cannot be understood. Furthermore, the user device can encourage the user to speak in a lower voice. The user device can accomplish this encouragement by indicating to the user their level of speech. In this manner, the user knows when he may lower his voice and yet still provide an adequate volume of speech for the cellular phone. Additionally, the user device can encourage the user to speak in a lower voice by audibly playing back the user's voice in real time. | 07-02-2009 |
20140112555 | Embedded Authentication Systems in an Electronic Device - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 04-24-2014 |
20140115694 | Embedded Authentication Systems in an Electronic Device - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 04-24-2014 |
20140115695 | Embedded Authentication Systems in an Electronic Device - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 04-24-2014 |
20140115696 | Embedded Authentication Systems in an Electronic Device - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 04-24-2014 |
20140304809 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - An electronic device with a display and a fingerprint sensor may authenticate a user for a respective function. While a respective function of the device is in a locked state, the device displays a graphical element on the display, the graphical element indicating a first direction of finger movement that enables unlocking of the respective function. While displaying the graphical element, the device detects an input that includes movement of a finger in the first direction over the fingerprint sensor and determines whether the input meets unlock criteria based at least in part on fingerprint information of the finger detected by the fingerprint sensor during the input. In accordance with a determination that the input meets the unlock criteria, the device unlocks the respective function; and in accordance with a determination that the input does not meet the unlock criteria, the device maintains the respective function in the locked state. | 10-09-2014 |
20140380465 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - An electronic device with a display and a fingerprint sensor may authenticate a user for a respective function. While access to one or more resources of the device is restricted, the device displays an irregular arrangement of shapes on the touch-sensitive display. The device receives input based on the displayed irregular arrangement of the shapes. In accordance with a determination that the input meets input pattern criteria, the device provides access to the one or more restricted resources. In accordance with a determination that the input does not meet the input pattern criteria, the devices forgoes providing access to the one or more restricted resources of the device. | 12-25-2014 |
Patent application number | Description | Published |
20090108951 | METHODS AND APPARATUS FOR REDUCING PEAK-TO-RMS AMPLITUDE RATIO IN COMMUNICATION SIGNALS - A pulse amplitude modulation (PAM) signal generator that injects a copy of a pulse into the PAM baseband signal prior to frequency upconversion and power amplification. The pulse comprises a function of, or an extra copy of, a pulse in the PAM baseband signal. The pulse injector analyzes the PAM baseband signal for times when a predetermined threshold is exceeded and forms a pulse that is constructed and arranged to reduce the amplitude of the PAM baseband signal to a desired peak amplitude when the pulse is added to the PAM baseband signal. | 04-30-2009 |
20090257526 | METHODS AND APPARATUS FOR CONDITIONING COMMUNICATIONS SIGNALS BASED ON DETECTION OF HIGH-FREQUENCY EVENTS IN POLAR DOMAIN - Methods and apparatus for conditioning communications signals based on detection of high-frequency in the polar domain. High-frequency events detected in a phase-difference component of a complex baseband signal in the polar domain are detected and used as a basis for performing hole-blowing on the complex baseband signal in the quadrature domain and/or nonlinear filtering either or both the magnitude and phase-difference components in the polar domain. Alternatively, high-frequency events detected in the phase-difference signal that correlate in time with low-magnitude events detected in a magnitude component of the complex baseband signal are used as a basis for performing hole-blowing on the complex baseband signal in the quadrature domain and/or nonlinear filtering either or both the magnitude and phase-difference components in the polar domain. | 10-15-2009 |
20090257528 | QUADRATURE MODULATION WITHOUT CARRIER - Transmitters, receivers and associated methods are disclosed for providing phase and amplitude modulation in a carrier-less communication system (e.g., an ultra-wide band communication system). An approximate quadrature signal is provided by delaying the in-phase signal by an amount determined by various criteria, such as the bandwidths of the component signals, minimizing the mean square error between an approximate quadrature signal and the true quadrature signal, and minimizing the auto-correlation function of the in-phase signal. | 10-15-2009 |
20110269423 | WIRELESS NETWORK AUTHENTICATION APPARATUS AND METHODS - Apparatus and methods for authenticating and granting a client device (e.g., cellular telephone) access to a network. In one embodiment, a network service provider such as a cellular telephone company may distribute user access (e.g., Universal Subscriber Identity Module or “USIM”) credentials to a services manager via a USIM vendor. The services manager may maintain a list of authorized users. A user at a client may authenticate to the services manager. Once authenticated, the services manager may provide the user with a set of USIM credentials. When the user desires to use wireless network services, the user equipment may establish a wireless link between the user equipment and the network service provider. During authentication operations, the user equipment may use the USIM credentials to authenticate to the network service provider. Following successful authentication, the network service provider may provide the user equipment with wireless services. | 11-03-2011 |
20110286496 | QUADRATURE MODULATION WITHOUT CARRIER - Transmitters, receivers and associated methods are disclosed for providing phase and amplitude modulation in a carrier-less communication system (e.g., an ultra-wide band communication system). An approximate quadrature signal is provided by delaying the in-phase signal by an amount determined by various criteria, such as the bandwidths of the component signals, minimizing the mean square error between an approximate quadrature signal and the true quadrature signal, and minimizing the auto-correlation function of the in-phase signal. | 11-24-2011 |
20110306318 | APPARATUS AND METHODS FOR PROVISIONING SUBSCRIBER IDENTITY DATA IN A WIRELESS NETWORK - Apparatus and methods for provisioning wireless devices for operation in one or more networks. In one embodiment, a provisioning service may provide access client (e.g., Subscriber Identity Module) data to a secure element in the wireless user device. The device may be preloaded with a provisioning SIM profile. The device may use the provisioning profile to roam onto a carrier, and communicate with a provisioning service, which may present the user with a list of available wireless carriers, such as carriers that service the user's current geographic location. In response to a user selection, the provisioning service may load a SIM profile associated with the selected carrier onto the secure element. The loaded SIM profile can be used to obtain wireless service from the selected carrier. The user may add multiple SIM profiles, and/or may delete SIM profiles. | 12-15-2011 |
20120047227 | VIRTUAL ACCESS MODULE DISTRIBUTION APPARATUS AND METHODS - Apparatus and methods for distributing electronic access client modules for use with electronic devices. In one embodiment, the access client modules are virtual subscriber identity modules (VSIMs) that can be downloaded from online services for use with cellular-equipped devices such as smartphones. The online services may include a point of sale (POS) system that sells electronic devices to users. A broker may be used to facilitate the selection of a virtual subscriber identity module. A provisioning service may also be used to provision the selected VSIM. | 02-23-2012 |
20120108204 | MANAGEMENT SYSTEMS FOR MULTIPLE ACCESS CONTROL ENTITIES - Methods and apparatus for managing multiple user access control entities or clients. For example, in one embodiment, a “wallet” of electronic subscriber identity modules (eSIMs) may be stored and used at a user device and/or distributed to other devices for use thereon. In another embodiment, a networked server may store and distribute eSIM to a plurality of user devices in communication therewith. A database of available eSIM is maintained at the wallet entity and/or at the network which enables request for a particular eSIM to be processed and various rules for the distribution thereof to be implemented. Security precautions are implemented to protect both user and network carrier specific data as the data is transmitted between networked entities. Solutions for eSIM backup and restoration are also described. | 05-03-2012 |
20120108295 | ACCESS DATA PROVISIONING APPARATUS AND METHODS - Methods and apparatus for activating a purchased or previously deployed device by a subscriber. In one embodiment, activation includes authenticating the device to a service provider or carrier, and providing the device with data necessary for enabling the service to the device. In one variant, a user device is activated at a retail store, with the assistance of a carrier representative. In another variant, user equipment is activated via a communications network without the assistance of a representative. In yet another variant, the user equipment is activated via the Internet without the assistance of a representative. The provision of access data includes pre-assigning eSIM from a population of unassigned eSIMs to certain devices for various carrier networks. Alternatively, the eSIM may be assigned on an as-needed basis. Unassigned and/or unused eSIMs can be released (or sold back to the vendor) and/or reused. Solutions for eSIM backup and restoration are also described. | 05-03-2012 |
20130122824 | SYSTEMS AND METHODS FOR PROTECTING MICROELECTROMECHANICAL SYSTEMS SWITCHES FROM RADIO-FREQUENCY SIGNALS USING SWITCHING CIRCUITRY - Electronic devices may be provided that contain wireless communication circuitry. The wireless communications circuitry may include microelectromechanical systems (MEMS) switches that receive radio-frequency antenna signals from antennas. The wireless communications circuitry may include switching circuitry interposed between the MEMS switches and the antennas. The switching circuitry may protect the MEMS switches from radio-frequency signals that are received by the antennas by temporarily isolating the MEMS switches from the radio-frequency signals during MEMS switch configuration processes. The switching circuitry may include a crossbar switch formed from solid state circuitry. The wireless communications circuitry may include control circuitry that controls the MEMS switches and the switching circuitry. The control circuitry may direct the switching circuitry to temporarily disconnect a selected MEMS switch from the antennas and direct the selected MEMS switch to switch from a first configuration to a second configuration while the MEMS switch is disconnected from the antennas. | 05-16-2013 |
20140016673 | QUADRATURE MODULATION WITHOUT CARRIER - Transmitters, receivers and associated methods are disclosed for providing phase and amplitude modulation in a carrier-less communication system (e.g., an ultra-wide band communication system). An approximate quadrature signal is provided by delaying the in-phase signal by an amount determined by various criteria, such as the bandwidths of the component signals, minimizing the mean square error between an approximate quadrature signal and the true quadrature signal, and minimizing the auto-correlation function of the in-phase signal. | 01-16-2014 |
20140099925 | METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK - Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security. | 04-10-2014 |
20140241175 | Methods for Determining Relative Locations of Multiple Nodes in a Wireless Network - A wireless communications network may include multiple nodes, one of which is selected as a master node. The nodes may take turns broadcasting respective packets according to a predetermined broadcast schedule. During any given broadcast iteration, each node may broadcast a packet while the other remaining nodes receive the broadcast packet in parallel. In response to receiving the broadcast packet, each node may be configured to obtain desired estimated timing values. The estimated timing values may be transmitted back to the master node for use in computing time-of-flight information. Frequency-synchronization operations may be periodically performed to help reduce timing errors. The time-of-flight information, along with other location-based metrics, may be used in determining the relative positions of the multiple nodes in the network. | 08-28-2014 |
20140248854 | WIRELESS NETWORK AUTHENTICATION APPARATUS AND METHODS - Apparatus and methods for authenticating and granting a client device (e.g., cellular telephone) access to a network. In one embodiment, a network service provider such as a cellular telephone company may distribute user access (e.g., Universal Subscriber Identity Module or “USIM”) credentials to a service manager via a USIM vendor. The services manager may maintain a list of authorized users. A user at a client may authenticate to the services manager. Once authenticated, the services manager may provide the user with a set of USIM credentials. When the user desires to use wireless network services, the user equipment may establish a wireless link between the user equipment and the network service provider. During authentication operations, the user equipment may use the USIM credentials to authenticate to the network service provider. Following successful authentication, the network service provider may provide the user equipment with wireless services. | 09-04-2014 |
20140248924 | APPARATUS AND METHODS FOR RECORDATION OF DEVICE HISTORY ACROSS MULTIPLE SOFTWARE EMULATIONS - Apparatus and method for maintaining hardware history profiles for a software-based emulator. In one embodiment, the disclosed software-based emulator monitors the history of the actual hardware device in a secondary device history, the history of the emulated hardware is presented within a primary device history. However, the primary device history is linked to the secondary device history, and receives the device wear history therefrom. In another aspect of the present invention, wear-leveling strategies are disclosed for handling various update sizes. Unlike existing solutions which are optimized for a single SIM that receives small data updates; various embodiments of the present invention are suitable for handling varying data sizes. | 09-04-2014 |
20140349705 | VIRTUAL ACCESS MODULE DISTRIBUTION APPARATUS AND METHODS - Apparatus and methods for distributing electronic access client modules for use with electronic devices. In one embodiment, the access client modules are virtual subscriber identity modules (VSIMs) that can be downloaded from online services for use with cellular-equipped devices such as smartphones. The online services may include a point of sale (POS) system that sells electronic devices to users. A broker may be used to facilitate the selection of a virtual subscriber identity module. A provisioning service may also be used to provision the selected VSIM. | 11-27-2014 |
20150074780 | METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS - Disclosed herein is a technique for securely provisioning access control entities (e.g., electronic Subscriber Identity Module (eSIM) components) to a user equipment (UE) device. In one embodiment, a UE device is assigned a unique key and an endorsement certificate that can be used to provide updates or new eSIMs to the UE device. The UE device can trust eSIM material delivered by an unknown third-party eSIM vendor, based on a secure certificate transmission with the unique key. In another aspect, an operating system (OS) is partitioned into various sandboxes. During operation, the UE device can activate and execute the OS in the sandbox corresponding to a current wireless network. Personalization packages received while connected to the network only apply to that sandbox. Similarly, when loading an eSIM, the OS need only load the list of software necessary for the current run-time environment. Unused software can be subsequently activated. | 03-12-2015 |
20150099560 | METHODS AND APPARATUS FOR ACCESS DATA RECOVERY FROM A MALFUNCTIONING DEVICE - Methods and apparatus for recovering access data from a malfunctioning device. In one embodiment, trained service personnel are provided a specialized apparatus for retrieving access data from a malfunctioning device. For example, in the instance the device comprises a cellular device having an unrecoverable hardware failure, trained service personnel can connect to the secure element and retrieve the one or more electronic Subscriber Identity Modules (eSIMs) stored thereon. The eSIMs are then “reclaimed” and reprogrammed/distributed to a new device. In one implementation, security and integrity measures are taken to protect and control distribution of sensitive access data. | 04-09-2015 |
Patent application number | Description | Published |
20120108207 | METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK - Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security. | 05-03-2012 |
20120115441 | METHODS AND APPARATUS FOR ACCESS DATA RECOVERY FROM A MALFUNCTIONING DEVICE - Methods and apparatus for recovering access data from a malfunctioning device. In one embodiment, trained service personnel are provided a specialized apparatus for retrieving access data from a malfunctioning device. For example, in the instance the device comprises a cellular device having an unrecoverable hardware failure, trained service personnel can connect to the secure element and retrieve the one or more electronic Subscriber Identity Modules (eSIMs) stored thereon. The eSIMs are then “reclaimed” and reprogrammed/distributed to a new device. In one implementation, security and integrity measures are taken to protect and control distribution of sensitive access data. | 05-10-2012 |
20120117635 | SIMULACRUM OF PHYSICAL SECURITY DEVICE AND METHODS - A simulacrum security device and methods. In one embodiment, a simulacrum or likeness of a physical security device is provided for use in conjunction with a software emulation of the security device. In one implementation, a “faux SIM card” is provided that does not contain Subscriber Identification Module (SIM) information itself, but instead enables a user to download Electronic SIM (eSIM) information (e.g., from a network or eSIM server) which is loaded into a software emulation of a Universal Integrated Circuit Card (UICC) device. The faux card is printed with an activation code, scan pattern, or other activation or access information. The subscriber purchases the faux card, and enters the activation code into a device; the entered activation code enables the device to log onto a network, and download the appropriate eSIM data. Delivery of eSIM information as enabled by the faux card addresses deficiencies in existing SIM distribution schemes, provides users with an enhanced perception of security, and further addresses various legal requirements. | 05-10-2012 |
20120135710 | APPARATUS AND METHODS FOR RECORDATION OF DEVICE HISTORY ACROSS MULTIPLE SOFTWARE EMULATIONS - Apparatus and methods for maintaining hardware history profiles for a software-based emulator. In one embodiment, the disclosed software-based emulator monitors the history of the actual hardware device in a secondary device history, the history of the emulated hardware is presented within a primary device history. However, the primary device history is linked to the secondary device history, and receives the device wear history therefrom. In another aspect of the present invention, wear-leveling strategies are disclosed for handling various update sizes. Unlike existing solutions which are optimized for a single SIM that receives small data updates; various embodiments of the present invention are suitable for handling varying data sizes. | 05-31-2012 |
20130205390 | NETWORK ASSISTED FRAUD DETECTION APPARATUS AND METHODS - Methods and apparatus for detecting fraudulent device operation. In one exemplary embodiment of the present disclosure, a device is issued a user access control client that is uniquely associated with a shared secret that is securely stored within the network and the access control client. Subsequent efforts to activate or deactivate the access control client require verification of the shared secret. Each change in state includes a change to the shared secret. Consequently, requests for a change to state which do not have the proper shared secret will be disregarded, and/or flagged as fraudulent. | 08-08-2013 |
20130210388 | METHODS AND APPARATUS FOR CORRECTING ERROR EVENTS ASSOCIATED WITH IDENTITY PROVISIONING - Methods and apparatus for correcting error events associated with identity provisioning. In one embodiment, repeated requests for access control clients are responded to with the execution of a provisioning feedback mechanism which is intended to prevent the unintentional (or even intentional) over-consumption or waste of network resources via the delivery of an excessive amount of access control clients. These provisioning feedback mechanisms include rate-limiting algorithms and/or methodologies which place a cost on the user. Apparatus for implementing the aforementioned provisioning feedback mechanisms are also disclosed and include specialized user equipment and/or network side equipment such as a subscriber identity module provisioning server (SPS). | 08-15-2013 |
Patent application number | Description | Published |
20100035598 | WIRELESS COMMUNICATION OUT OF RANGE INDICATION - With respect to a wireless network, an out of range warning provides an estimate of an amount of time remaining until a wireless device is out of range of the wireless network. In this way, the user is presented with an opportunity to take corrective measures, if desired. | 02-11-2010 |
20100083026 | INTER-PROCESSOR COMMUNICATION CHANNEL INCLUDING POWER-DOWN FUNCTIONALITY - Apparatuses and methods are disclosed for implementing an inter-processor communication channel including power-down functionality. In one embodiment, the apparatus may comprise a first integrated circuit (IC), a second IC coupled to the first IC via a communication interface, wherein the first IC is in one or more low power states and unable to monitor the communication interface. The apparatus may further comprise an inter-processor communication (IPC) channel coupled between the first and second ICs, wherein the IPC channel is separate from the communication interface and wherein the second IC generates at least one advisory signal to the first IC via the IPC channel. | 04-01-2010 |
20110300897 | USER INTERFACE TONE ECHO CANCELLATION - A multi-function communications device has a processor that generates a user interface audible tone signal. The device also has a downlink digital signal processor, and an uplink digital signal processor. A mixer has an input to receive the downlink signal and another input to receive the user interface tone signal. The uplink processor has an acoustic echo canceller having an input to receive the uplink signal and another input to receive an output from the mixer. The echo canceller may reduce the amount of both the far-end user's speech and the user interface tone that may be present in the uplink signal. The mixer may be positioned within the chain of audio signal processors, or it may be positioned outside the chain. Other embodiments are also described and claimed. | 12-08-2011 |
20120144224 | Adjusting a Device Clock Source to Reduce Wireless Communication Interference - Adjusting a clock source of a device clock to reduce wireless communication (e.g., radio frequency (RF)) interference within a device. The device clock may be derived from an input clock to a serial interface, e.g., coupled to a display, and may be initially driven by a first clock. Later, it may be determined that the serial interface clock is or will interfere with wireless communication. Accordingly, temporary clock signals may be provided to the device clock while the first clock is modified. Once modified, the modified clock signals may be provided to the device clock to reduce wireless communication interference. | 06-07-2012 |
20120260115 | Inter-Processor Communication Channel Including Power-Down Functionality - Apparatuses and methods are disclosed for implementing an inter-processor communication channel including power-down functionality. In one embodiment, the apparatus may comprise a first integrated circuit (IC), a second IC coupled to the first IC via a communication interface, wherein the first IC is in one or more low power states and unable to monitor the communication interface. The apparatus may further comprise an inter-processor communication (IPC) channel coupled between the first and second ICs, wherein the IPC channel is separate from the communication interface and wherein the second IC generates at least one advisory signal to the first IC via the IPC channel. | 10-11-2012 |
20130231158 | USER INTERFACE TONE ECHO CANCELLATION - A multi-function communications device has a processor that generates a user interface audible tone signal. The device also has a downlink digital signal processor, and an uplink digital signal processor. A mixer has an input to receive the downlink signal and another input to receive the user interface tone signal. The uplink processor has an acoustic echo canceller having an input to receive the uplink signal and another input to receive an output from the mixer. The echo canceller may reduce the amount of both the far-end user's speech and the user interface tone that may be present in the uplink signal. The mixer may be positioned within the chain of audio signal processors, or it may be positioned outside the chain. Other embodiments are also described and claimed. | 09-05-2013 |
20130332759 | Inter-Processor Communication Channel Including Power-Down Functionality - Apparatuses and methods are disclosed for implementing an inter-processor communication channel including power-down functionality. In one embodiment, the apparatus may comprise a first integrated circuit (IC), a second IC coupled to the first IC via a communication interface, wherein the first IC is in one or more low power states and unable to monitor the communication interface. The apparatus may further comprise an inter-processor communication (IPC) channel coupled between the first and second ICs, wherein the IPC channel is separate from the communication interface and wherein the second IC generates at least one advisory signal to the first IC via the IPC channel. | 12-12-2013 |