41 |
Information processing method and electronic device |
US14217666 |
2014-03-18 |
US09462408B2 |
2016-10-04 |
Hui Wang |
The present invention discloses an information processing method. The method comprises: obtaining a control operation for the first application indicating N applications are to be installed on a second electronic device; controlling the wireless communication module to serve as a wireless Access Point (AP) having a signal coverage that covers at least the second electronic device; obtaining response information from the second electronic device and establishing a direct communication channel with the second electronic device at a radio link layer; and transmitting installation data packages associated with the N applications to the second electronic device via the communication channel. The present invention also discloses an electronic device. With the present invention, the efficiency of content transfer from an old mobile phone and a new mobile phone can be improved. |
42 |
METHOD, SOFTWARE AND APPARATUS FOR PERFORMING ACTIONS ON A WIRELESS DEVICE USING ACTION LISTS AND VERSIONING |
US15177127 |
2016-06-08 |
US20160286335A1 |
2016-09-29 |
Sudheer Koganti; Stephen Sprigg; Amy McGaraghan; Brian Minear; Phil Nguyen |
A system and method for performing actions on a wireless device using action lists and versioning. The system includes receiving, over a network, a remote action list version number, the remote action list version number associated with a remote action list containing an instruction for the wireless device. The system further includes determining whether the remote action list version number is different from a local action list version number. The system also includes sending, over a network, a request for the remote action list in response to determining the remote action list version number is different from the local action list version number. Also, the system includes receiving, over a network, the remote action list. |
43 |
System and method for persisting mobile agents within a mobile region of interest |
US14444074 |
2014-07-28 |
US09451382B1 |
2016-09-20 |
Robert W. Peterson; Mark Gerard |
Mobile agents can be deployed to mobile devices within specific regions of interest to achieve specific goals in respect of events occurring in the region of interest. In order to ensure that the agent can persist within the region of interest until the agent goals are achieved, the agent is configured to locate other devices within the region of interest and to propagate itself, by moving or copying itself, to those other devices. The region of interest may be a mobile and/or dynamic region of interest defined by, for example, a proximity to one or more mobile wireless access points or by an overlapping peer-to-peer communication range of a plurality of mobile devices that are configured to support the agent. |
44 |
METHODS FOR RAPIDLY PROVISIONING APPLICATION FUNCTIONALITY TO A MOBILE COMMUNICATION DEVICE |
US15165659 |
2016-05-26 |
US20160267477A1 |
2016-09-15 |
JOHN G. MCDONALD |
Systems and methods for rapidly provisioning functionality to one or more mobile communication devices are disclosed. The method may comprise generating, prior to a request for the functionality, a globally unique identifier (“GUID”) encryption key, wherein the GUID comprises a unique identifier that may be associated with a transaction account customer, generating a value associated with the GUID, deriving, based on the value, a plurality of base encryption keys associated with the value, creating, a perso-script, wherein the perso-script comprises a file associated with data associated with a customer, and/or creating a proto-script, wherein the proto-script comprises the perso-script prepended by a script to rotate the plurality of base encryption keys. |
45 |
Remotely provisioned wireless proxy |
US14219609 |
2014-03-19 |
US09420398B2 |
2016-08-16 |
Kevin Tsurutome; Bob Barcklay; Robert Wang |
A remotely provisioned proxy within a wireless/mobile phone that proxies a wireless communication path between a disconnected piconet (e.g., BLUETOOTH™) device and a network resource such as a universal resource locator (URL) via a mating mobile phone. Thus, an application proxy module embodied within the mobile phone provides managed access of a piconet device connected to the mating mobile phone to remote services. A disconnected piconet device uses the full data bandwidth available to a wireless phone, without the need for the disconnected piconet device to include its own separate wireless front end, or to require use of a modem within the mobile phone. Thus, using a mobile phone with application proxy, the user need not pay for the luxury of a tethered data plan. |
46 |
Provisioning an embedded subscriber identity module |
US14459212 |
2014-08-13 |
US09408012B2 |
2016-08-02 |
Li Li; Arun G. Mathias; Ben-Heng Juang |
Provisioning an embedded subscriber identity module (eSIM) in a user equipment (UE) device with personalized subscriber information. A request may be transmitted for personalized subscriber information. The personalized subscriber information may be received. The personalized subscriber information may be installed in an eSIM in the UE device. |
47 |
On-device movement of an existing mobile number |
US14306719 |
2014-06-17 |
US09402146B2 |
2016-07-26 |
Taussif Khan; Ruben Cuadrat; Zhengfang Chen; Pugazholi Thyagarasan |
An un-provisioned user device may send, via a cellular network, a request associated with receiving a service provided by a service provider. The user device may receive, via the cellular network, a response indicating that the user device has limited access to the cellular network. The user device may identify, based on a user account with which the user device is to be associated, a particular existing mobile directory number (MDN), associated with the user account, that is to be moved to the user device. The user device may send, via the cellular network, a movement request to move the particular existing MDN to the user device. The movement request may be sent to cause the particular existing MDN to be associated with the user device such that the user device is provisioned to receive the service using the particular existing MDN. |
48 |
Method and apparatus for characterizing context of a mobile device |
US13269178 |
2011-10-07 |
US09398396B2 |
2016-07-19 |
Leonard Henry Grokop; Anthony Sarah; Vidya Narayanan |
Information about a context of a mobile device is inferred using measurements from light detectors of the mobile device. The light detectors may be located on multiple different sides of the mobile device. In some embodiments, measurements from one or more cameras may be used to infer context. |
49 |
Systems and methods for rapidly provisioning functionality to one or more mobile communication devices |
US14177014 |
2014-02-10 |
US09384485B1 |
2016-07-05 |
John G. McDonald |
Systems and methods for rapidly provisioning functionality to one or more mobile communication devices are disclosed. The method may comprise generating, prior to a request for the functionality, a globally unique identifier (“GUID”) encryption key, wherein the GUID comprises a unique identifier that may be associated with a transaction account customer, generating a value associated with the GUID, deriving, based on the value, a plurality of base encryption keys associated with the value, creating, a perso-script, wherein the perso-script comprises a file associated with data associated with a customer, and/or creating a proto-script, wherein the proto-script comprises the perso-script prepended by a script to rotate the plurality of base encryption keys. |
50 |
MANAGEMENT OF NETWORK TECHNOLOGY SELECTION AND DISPLAY IN MULTI-TECHNOLOGY WIRELESS ENVIRONMENTS |
US15006217 |
2016-01-26 |
US20160157042A1 |
2016-06-02 |
Arthur Brisebois; Sharat Chander; Yung Choi-Grogan |
Utilization of radio network technology and display thereof are managed when multiple services and radio network technologies are available to a multi-technology mobile device. The management relies at least in part on a subscriber profile that comprises a network selection profile constructed through market policy, subscriber policy, and application policy for radio technology utilization. Network preference(s) profile is generated on per subscriber, or per subscriber type, basis and is conveyed to a subscriber station over the air. Initial subscriber profile can be delivered at a time of provisioning a multi-technology mobile device, and updated based at least upon subscriber demand, a schedule established by a network operator or service provider, or an event related to coverage area relocation or contracted services. Radio technology preferences and display of associated technologies available to a multi-technology mobile device can be dynamically controlled on a per-call and/or per-application basis. |
51 |
Application control method and apparatus for mobile terminal, earphone device and application control system |
US14186874 |
2014-02-21 |
US09319823B2 |
2016-04-19 |
Jaemin Seo; Hyejeon Jung; Eunjoon Kim |
The present disclosure relates to controlling an application in a mobile terminal. The present disclosure includes an application control method and apparatus for a mobile terminal, earphone device, and application control system. The method for application control in a mobile terminal may include detecting connection of earphones having a sensor for sensing earphone wearing, sending, upon detection of earphone connection, an interrogation signal to the sensor of the earphones, receiving a response signal, corresponding to the interrogation signal, from the earphones, determining whether the earphones are worn by a user on the basis of the response signal, and controlling, when the earphones are not worn, an application being executed to stop output of an audio signal to the earphones. |
52 |
Remotely Provisioned Wireless Proxy |
US14971289 |
2015-12-16 |
US20160100272A1 |
2016-04-07 |
Kevin Tsurutome; Bob Barcklay; Robert Wang |
A remotely provisioned proxy within a wireless/mobile phone that proxies a wireless communication path between a disconnected piconet (e.g., BLUETOOTH™) device and a network resource such as a universal resource locator (URL) via a mating mobile phone. Thus, an application proxy module embodied within the mobile phone provides managed access of a piconet device connected to the mating mobile phone to remote services. A disconnected piconet device uses the full data bandwidth available to a wireless phone, without the need for the disconnected piconet device to include its own separate wireless front end, or to require use of a modem within the mobile phone. Thus, using a mobile phone with application proxy, the user need not pay for the luxury of a tethered data plan. |
53 |
CRYPTOGRAPHIC PROTOCOL FOR PORTABLE DEVICES |
US14949509 |
2015-11-23 |
US20160080372A1 |
2016-03-17 |
Karl Martin; Evgene Vahlis |
Embodiments are directed towards communicating using a mobile device that performs actions including. A mobile device may be provisioned with an access point such that a provisioning key and a provisioning token for each of the provisioned access points may be stored on the mobile device. The mobile device may be determined to be in the presence of a provisioned access point based on the provisioning key and an advertising nonce. The advertising nonce may be encrypted with the provisioning key. A communication channel between the mobile device and the access point may be established based on a session nonce, the advertising nonce, and the provisioning key. A session key may be generated based in part on the advertising nonce and a message counter. And, encrypted message packets that include a message and a message authentication tag may be communicated to the access point. |
54 |
Management of network technology selection and display in multi-technology wireless environments |
US13968087 |
2013-08-15 |
US09282421B2 |
2016-03-08 |
Arthur Brisebois; Sharat Chander; Yung Choi-Grogan |
Utilization of radio network technology and display thereof are managed when multiple services and radio network technologies are available to a multi-technology mobile device. The management relies at least in part on a subscriber profile that comprises a network selection profile constructed through market policy, subscriber policy, and application policy for radio technology utilization. Network preference(s) profile is generated on per subscriber, or per subscriber type, basis and is conveyed to a subscriber station over the air. Initial subscriber profile can be delivered at a time of provisioning a multi-technology mobile device, and updated based at least upon subscriber demand, a schedule established by a network operator or service provider, or an event related to coverage area relocation or contracted services. Radio technology preferences and display of associated technologies available to a multi-technology mobile device can be dynamically controlled on a per-call and/or per-application basis. |
55 |
Secondary open mobile alliance device management platform |
US14171774 |
2014-02-03 |
US09264842B1 |
2016-02-16 |
Bret D. Sumner; Simon Youngs |
A device management (DM) server. The server comprises a memory, a processor, and an application programming interface (API), wherein the secondary DM server makes available a subset of the functionality of a DM server and when accessed through a portal, initiates a DM session with a short message service (SMS) system type message, notifies the mobile communication devices associated with a trusted third party of secondary DM server via the short message service system type message, and makes available firmware to be downloaded from a sandbox of the secondary DM server and tested by a limited number of the mobile communication devices associated with the third party, wherein the sandbox is an area in a memory to isolate untested firmware or firmware under test from the environment outside the sandbox. |
56 |
Global platform for managing subscriber identity modules |
US14543629 |
2014-11-17 |
US09247415B2 |
2016-01-26 |
Scott Barkley; Amit Gupta; Daniel G. Collins; Jahangir Mohammed |
A method of operating a mobile wireless network comprising: receiving, by a provisioning server, a signal from a mobile wireless network specifying a location of a first mobile device having a first International Mobile Subscriber Identity (IMSI) and operating in the mobile wireless network under a first condition, the mobile wireless network including a plurality of mobile switching centers (MSCs) and a plurality of mobile devices operating in the mobile wireless network; provisioning the first IMSI in the first HLR based on a state transition rule from a first provisioning state to a second provisioning state; provisioning a second IMSI in the first HLR based on the state transition rule from a third provisioning state to the first provisioning state; and transmitting data identifying the second IMSI to the first mobile device to allow the first mobile device to operate in the mobile wireless network under a second condition. |
57 |
Method of determining user intent to use services based on proximity |
US13782269 |
2013-03-01 |
US09247373B2 |
2016-01-26 |
Kyle N. Golsch |
A method for accessing functionality of a mobile electronic device through a vehicle system onboard a motor vehicle. The method includes making functionality of the mobile electronic device accessible through the vehicle system based on where a sensor that the mobile electronic device is paired with is physically located about the vehicle. |
58 |
Wireless Device Configured to Operate Under a Plurality of Different Brands and a Plurality of Different Networks and Configured to be Customized to One Brand and One Network |
US14858691 |
2015-09-18 |
US20160014541A1 |
2016-01-14 |
Satish Ramprasad; Sergio Rivera |
A process of configuring an electronic device and an electronic device configured to operate under a plurality of different brands. The brand to be utilized are designated at the point-of-sale, during activation, by the seller, and/or by the user. The electronic device including a processor configured to execute instructions and a display device configured to generate an interface based in part in response to the processor. The electronic device further including a memory configured to store the instructions to operate the electronic device. The processor further configured to execute a component to designate a brand to be utilized at the point-of-sale, during activation, by the seller, and/or by the user. |
59 |
NETWORK SELECTION FOR A GIVEN APPLICATION OR CONTEXT |
US14301164 |
2014-06-10 |
US20150358757A1 |
2015-12-10 |
Brent Ford; Issa Khoury |
A network usage manager in an operating system executing on a mobile device is configured to enable selection among different cellular data connections by application (“app”) or by app class so that end users can tailor cellular network allocation, app performance, and costs to meet their specific needs while mobile operators can improve network utilization and provide more comprehensive data plan offerings. The network usage manager applies app usage policies to select among different cellular data connections which may be supported on the mobile device using single or multiple SIM/UICC (Subscriber Identity Module/Universal Integrated Circuit Card) cards. The app usage policies can be set for a given app or class of app on the mobile device so that, for example, apps that implement background synchronization processes can use typically less expensive, lower bandwidth connections while typically more expensive, higher bandwidth connections are selected for data intensive apps. |
60 |
System and method for adapting an electronic device for different desired persona |
US14545585 |
2015-05-26 |
US20150304792A1 |
2015-10-22 |
Winston Henderson; Wayne M. Kennard |
A system and method are described for automatically or manually adapting the user interface of a mobile electronic device (“MED”) for a desired persona of the system user. This will permit the system user to provide a desired personal image to the outside world. The ability of a system user to adapt the MED for a system user's persona will include the changing the user interface consistent with the persona the system user desires to represent internally and externally. This will also permit the system user to change the external connections of his/her MED consistent with that persona, which will remain the active persona until the system user decides to change the persona. |