首页 / 国际专利分类库 / 电学 / 电通信技术 / 无线通信网络 / { 专门适用于无线网络的移动应用}业务或设施{ / .{应用服务的构造或重新配置,例如OMA DM.(网络管理入H04L12/24,涉及软件传送或者参数配置的网络应用的装置或者通信协议,例如小程序入H04L67/34;程序调入或者初始化入G06F9/455;移动代理程序入G06F9/4862)}
序号 专利名 申请号 申请日 公开(公告)号 公开(公告)日 发明人
41 Information processing method and electronic device US14217666 2014-03-18 US09462408B2 2016-10-04 Hui Wang
The present invention discloses an information processing method. The method comprises: obtaining a control operation for the first application indicating N applications are to be installed on a second electronic device; controlling the wireless communication module to serve as a wireless Access Point (AP) having a signal coverage that covers at least the second electronic device; obtaining response information from the second electronic device and establishing a direct communication channel with the second electronic device at a radio link layer; and transmitting installation data packages associated with the N applications to the second electronic device via the communication channel. The present invention also discloses an electronic device. With the present invention, the efficiency of content transfer from an old mobile phone and a new mobile phone can be improved.
42 METHOD, SOFTWARE AND APPARATUS FOR PERFORMING ACTIONS ON A WIRELESS DEVICE USING ACTION LISTS AND VERSIONING US15177127 2016-06-08 US20160286335A1 2016-09-29 Sudheer Koganti; Stephen Sprigg; Amy McGaraghan; Brian Minear; Phil Nguyen
A system and method for performing actions on a wireless device using action lists and versioning. The system includes receiving, over a network, a remote action list version number, the remote action list version number associated with a remote action list containing an instruction for the wireless device. The system further includes determining whether the remote action list version number is different from a local action list version number. The system also includes sending, over a network, a request for the remote action list in response to determining the remote action list version number is different from the local action list version number. Also, the system includes receiving, over a network, the remote action list.
43 System and method for persisting mobile agents within a mobile region of interest US14444074 2014-07-28 US09451382B1 2016-09-20 Robert W. Peterson; Mark Gerard
Mobile agents can be deployed to mobile devices within specific regions of interest to achieve specific goals in respect of events occurring in the region of interest. In order to ensure that the agent can persist within the region of interest until the agent goals are achieved, the agent is configured to locate other devices within the region of interest and to propagate itself, by moving or copying itself, to those other devices. The region of interest may be a mobile and/or dynamic region of interest defined by, for example, a proximity to one or more mobile wireless access points or by an overlapping peer-to-peer communication range of a plurality of mobile devices that are configured to support the agent.
44 METHODS FOR RAPIDLY PROVISIONING APPLICATION FUNCTIONALITY TO A MOBILE COMMUNICATION DEVICE US15165659 2016-05-26 US20160267477A1 2016-09-15 JOHN G. MCDONALD
Systems and methods for rapidly provisioning functionality to one or more mobile communication devices are disclosed. The method may comprise generating, prior to a request for the functionality, a globally unique identifier (“GUID”) encryption key, wherein the GUID comprises a unique identifier that may be associated with a transaction account customer, generating a value associated with the GUID, deriving, based on the value, a plurality of base encryption keys associated with the value, creating, a perso-script, wherein the perso-script comprises a file associated with data associated with a customer, and/or creating a proto-script, wherein the proto-script comprises the perso-script prepended by a script to rotate the plurality of base encryption keys.
45 Remotely provisioned wireless proxy US14219609 2014-03-19 US09420398B2 2016-08-16 Kevin Tsurutome; Bob Barcklay; Robert Wang
A remotely provisioned proxy within a wireless/mobile phone that proxies a wireless communication path between a disconnected piconet (e.g., BLUETOOTH™) device and a network resource such as a universal resource locator (URL) via a mating mobile phone. Thus, an application proxy module embodied within the mobile phone provides managed access of a piconet device connected to the mating mobile phone to remote services. A disconnected piconet device uses the full data bandwidth available to a wireless phone, without the need for the disconnected piconet device to include its own separate wireless front end, or to require use of a modem within the mobile phone. Thus, using a mobile phone with application proxy, the user need not pay for the luxury of a tethered data plan.
46 Provisioning an embedded subscriber identity module US14459212 2014-08-13 US09408012B2 2016-08-02 Li Li; Arun G. Mathias; Ben-Heng Juang
Provisioning an embedded subscriber identity module (eSIM) in a user equipment (UE) device with personalized subscriber information. A request may be transmitted for personalized subscriber information. The personalized subscriber information may be received. The personalized subscriber information may be installed in an eSIM in the UE device.
47 On-device movement of an existing mobile number US14306719 2014-06-17 US09402146B2 2016-07-26 Taussif Khan; Ruben Cuadrat; Zhengfang Chen; Pugazholi Thyagarasan
An un-provisioned user device may send, via a cellular network, a request associated with receiving a service provided by a service provider. The user device may receive, via the cellular network, a response indicating that the user device has limited access to the cellular network. The user device may identify, based on a user account with which the user device is to be associated, a particular existing mobile directory number (MDN), associated with the user account, that is to be moved to the user device. The user device may send, via the cellular network, a movement request to move the particular existing MDN to the user device. The movement request may be sent to cause the particular existing MDN to be associated with the user device such that the user device is provisioned to receive the service using the particular existing MDN.
48 Method and apparatus for characterizing context of a mobile device US13269178 2011-10-07 US09398396B2 2016-07-19 Leonard Henry Grokop; Anthony Sarah; Vidya Narayanan
Information about a context of a mobile device is inferred using measurements from light detectors of the mobile device. The light detectors may be located on multiple different sides of the mobile device. In some embodiments, measurements from one or more cameras may be used to infer context.
49 Systems and methods for rapidly provisioning functionality to one or more mobile communication devices US14177014 2014-02-10 US09384485B1 2016-07-05 John G. McDonald
Systems and methods for rapidly provisioning functionality to one or more mobile communication devices are disclosed. The method may comprise generating, prior to a request for the functionality, a globally unique identifier (“GUID”) encryption key, wherein the GUID comprises a unique identifier that may be associated with a transaction account customer, generating a value associated with the GUID, deriving, based on the value, a plurality of base encryption keys associated with the value, creating, a perso-script, wherein the perso-script comprises a file associated with data associated with a customer, and/or creating a proto-script, wherein the proto-script comprises the perso-script prepended by a script to rotate the plurality of base encryption keys.
50 MANAGEMENT OF NETWORK TECHNOLOGY SELECTION AND DISPLAY IN MULTI-TECHNOLOGY WIRELESS ENVIRONMENTS US15006217 2016-01-26 US20160157042A1 2016-06-02 Arthur Brisebois; Sharat Chander; Yung Choi-Grogan
Utilization of radio network technology and display thereof are managed when multiple services and radio network technologies are available to a multi-technology mobile device. The management relies at least in part on a subscriber profile that comprises a network selection profile constructed through market policy, subscriber policy, and application policy for radio technology utilization. Network preference(s) profile is generated on per subscriber, or per subscriber type, basis and is conveyed to a subscriber station over the air. Initial subscriber profile can be delivered at a time of provisioning a multi-technology mobile device, and updated based at least upon subscriber demand, a schedule established by a network operator or service provider, or an event related to coverage area relocation or contracted services. Radio technology preferences and display of associated technologies available to a multi-technology mobile device can be dynamically controlled on a per-call and/or per-application basis.
51 Application control method and apparatus for mobile terminal, earphone device and application control system US14186874 2014-02-21 US09319823B2 2016-04-19 Jaemin Seo; Hyejeon Jung; Eunjoon Kim
The present disclosure relates to controlling an application in a mobile terminal. The present disclosure includes an application control method and apparatus for a mobile terminal, earphone device, and application control system. The method for application control in a mobile terminal may include detecting connection of earphones having a sensor for sensing earphone wearing, sending, upon detection of earphone connection, an interrogation signal to the sensor of the earphones, receiving a response signal, corresponding to the interrogation signal, from the earphones, determining whether the earphones are worn by a user on the basis of the response signal, and controlling, when the earphones are not worn, an application being executed to stop output of an audio signal to the earphones.
52 Remotely Provisioned Wireless Proxy US14971289 2015-12-16 US20160100272A1 2016-04-07 Kevin Tsurutome; Bob Barcklay; Robert Wang
A remotely provisioned proxy within a wireless/mobile phone that proxies a wireless communication path between a disconnected piconet (e.g., BLUETOOTH™) device and a network resource such as a universal resource locator (URL) via a mating mobile phone. Thus, an application proxy module embodied within the mobile phone provides managed access of a piconet device connected to the mating mobile phone to remote services. A disconnected piconet device uses the full data bandwidth available to a wireless phone, without the need for the disconnected piconet device to include its own separate wireless front end, or to require use of a modem within the mobile phone. Thus, using a mobile phone with application proxy, the user need not pay for the luxury of a tethered data plan.
53 CRYPTOGRAPHIC PROTOCOL FOR PORTABLE DEVICES US14949509 2015-11-23 US20160080372A1 2016-03-17 Karl Martin; Evgene Vahlis
Embodiments are directed towards communicating using a mobile device that performs actions including. A mobile device may be provisioned with an access point such that a provisioning key and a provisioning token for each of the provisioned access points may be stored on the mobile device. The mobile device may be determined to be in the presence of a provisioned access point based on the provisioning key and an advertising nonce. The advertising nonce may be encrypted with the provisioning key. A communication channel between the mobile device and the access point may be established based on a session nonce, the advertising nonce, and the provisioning key. A session key may be generated based in part on the advertising nonce and a message counter. And, encrypted message packets that include a message and a message authentication tag may be communicated to the access point.
54 Management of network technology selection and display in multi-technology wireless environments US13968087 2013-08-15 US09282421B2 2016-03-08 Arthur Brisebois; Sharat Chander; Yung Choi-Grogan
Utilization of radio network technology and display thereof are managed when multiple services and radio network technologies are available to a multi-technology mobile device. The management relies at least in part on a subscriber profile that comprises a network selection profile constructed through market policy, subscriber policy, and application policy for radio technology utilization. Network preference(s) profile is generated on per subscriber, or per subscriber type, basis and is conveyed to a subscriber station over the air. Initial subscriber profile can be delivered at a time of provisioning a multi-technology mobile device, and updated based at least upon subscriber demand, a schedule established by a network operator or service provider, or an event related to coverage area relocation or contracted services. Radio technology preferences and display of associated technologies available to a multi-technology mobile device can be dynamically controlled on a per-call and/or per-application basis.
55 Secondary open mobile alliance device management platform US14171774 2014-02-03 US09264842B1 2016-02-16 Bret D. Sumner; Simon Youngs
A device management (DM) server. The server comprises a memory, a processor, and an application programming interface (API), wherein the secondary DM server makes available a subset of the functionality of a DM server and when accessed through a portal, initiates a DM session with a short message service (SMS) system type message, notifies the mobile communication devices associated with a trusted third party of secondary DM server via the short message service system type message, and makes available firmware to be downloaded from a sandbox of the secondary DM server and tested by a limited number of the mobile communication devices associated with the third party, wherein the sandbox is an area in a memory to isolate untested firmware or firmware under test from the environment outside the sandbox.
56 Global platform for managing subscriber identity modules US14543629 2014-11-17 US09247415B2 2016-01-26 Scott Barkley; Amit Gupta; Daniel G. Collins; Jahangir Mohammed
A method of operating a mobile wireless network comprising: receiving, by a provisioning server, a signal from a mobile wireless network specifying a location of a first mobile device having a first International Mobile Subscriber Identity (IMSI) and operating in the mobile wireless network under a first condition, the mobile wireless network including a plurality of mobile switching centers (MSCs) and a plurality of mobile devices operating in the mobile wireless network; provisioning the first IMSI in the first HLR based on a state transition rule from a first provisioning state to a second provisioning state; provisioning a second IMSI in the first HLR based on the state transition rule from a third provisioning state to the first provisioning state; and transmitting data identifying the second IMSI to the first mobile device to allow the first mobile device to operate in the mobile wireless network under a second condition.
57 Method of determining user intent to use services based on proximity US13782269 2013-03-01 US09247373B2 2016-01-26 Kyle N. Golsch
A method for accessing functionality of a mobile electronic device through a vehicle system onboard a motor vehicle. The method includes making functionality of the mobile electronic device accessible through the vehicle system based on where a sensor that the mobile electronic device is paired with is physically located about the vehicle.
58 Wireless Device Configured to Operate Under a Plurality of Different Brands and a Plurality of Different Networks and Configured to be Customized to One Brand and One Network US14858691 2015-09-18 US20160014541A1 2016-01-14 Satish Ramprasad; Sergio Rivera
A process of configuring an electronic device and an electronic device configured to operate under a plurality of different brands. The brand to be utilized are designated at the point-of-sale, during activation, by the seller, and/or by the user. The electronic device including a processor configured to execute instructions and a display device configured to generate an interface based in part in response to the processor. The electronic device further including a memory configured to store the instructions to operate the electronic device. The processor further configured to execute a component to designate a brand to be utilized at the point-of-sale, during activation, by the seller, and/or by the user.
59 NETWORK SELECTION FOR A GIVEN APPLICATION OR CONTEXT US14301164 2014-06-10 US20150358757A1 2015-12-10 Brent Ford; Issa Khoury
A network usage manager in an operating system executing on a mobile device is configured to enable selection among different cellular data connections by application (“app”) or by app class so that end users can tailor cellular network allocation, app performance, and costs to meet their specific needs while mobile operators can improve network utilization and provide more comprehensive data plan offerings. The network usage manager applies app usage policies to select among different cellular data connections which may be supported on the mobile device using single or multiple SIM/UICC (Subscriber Identity Module/Universal Integrated Circuit Card) cards. The app usage policies can be set for a given app or class of app on the mobile device so that, for example, apps that implement background synchronization processes can use typically less expensive, lower bandwidth connections while typically more expensive, higher bandwidth connections are selected for data intensive apps.
60 System and method for adapting an electronic device for different desired persona US14545585 2015-05-26 US20150304792A1 2015-10-22 Winston Henderson; Wayne M. Kennard
A system and method are described for automatically or manually adapting the user interface of a mobile electronic device (“MED”) for a desired persona of the system user. This will permit the system user to provide a desired personal image to the outside world. The ability of a system user to adapt the MED for a system user's persona will include the changing the user interface consistent with the persona the system user desires to represent internally and externally. This will also permit the system user to change the external connections of his/her MED consistent with that persona, which will remain the active persona until the system user decides to change the persona.
QQ群二维码
意见反馈