Abstract: This specification discloses computer-based systems, methods, devices, and other techniques for estimating the pose of a device, including estimating the pose based on images captured by a set of image sensors disposed around the device's periphery. Some implementations include a system that obtains visual data representing at least one image captured by one or more image sensors of a mobile device. The at least one image show an environment of the mobile device, and the one or more image sensors are located at respective corners of the mobile device, or at other locations around its periphery. The system processes the visual data to determine a pose of the mobile device. Further, the system can determine a location of the mobile device in the environment based on the pose, and can present an indication of the location of the mobile device in the environment.
Abstract: Among other things, techniques are described for provisioning and authentication of devices in vehicles. In one aspect, a device in a vehicle establishes a communication session with a network server that manages provisioning of devices corresponding to an enterprise associated with the vehicle. The device receives instructions from the network server to generate cryptographic keys, and in response, generates a public and private key pair. The device sends, to the network server, a certificate signing request that includes the public key and an identifier of the device. In response, the device receives a digital security certificate for the device, and a security certificate of a signing certificate authority. The device authenticates the security certificate of the certificate authority using a known enterprise root certificate, and upon successful authentication, stores the device security certificate and the security certificate of the signing certificate authority.
Abstract: In various embodiments, a wireless device processor may determine a threat score for a first cell, determine whether the first cell threat score is below a first threat score threshold, update a good neighbor cell data structure using neighbor cell information from the first cell in response to determining that the first cell threat score is below the first threat score threshold, performing cell reselection to a second cell, determine whether the second cell transmits a system information block message indicating fake neighbor cell information, and increase a threat score for the second cell in response to determining that the second cell provides the SIB message indicating fake neighbor cell information and that a good neighbor cell data structure includes an indication of one or more good neighbor cells that are within the time threshold and the location threshold and doing countermeasures in a response to the determination.
Abstract: Techniques for efficient roaming of clients between access points (APs) of a wireless data communications network are described. A first AP receives a request for a first client device to join the network. The request specifies at least a unique identifier for the first client device. An identifier for a second AP is identified by processing the unique identifier using a predefined hash function. The second AP is one of at least two APs configured to each redundantly store network state information relating to the first client device. A network address of the second AP is determined. A first request to is transmitted to the network address, for network state information including a pairwise master key (PMK) and profile information. The PMK and the profile information are received. The first client device is authenticated and a connection is established between the first client device and the network.
Abstract: User equipment is registered with a visited public land mobile network, VPLMN, in a process including: producing at the user equipment a concealed identifier; producing at the user equipment a freshness code; and sending by the user equipment to the VPLMN the concealed identifier and the freshness code; receiving by the user equipment an identity request from the VPLMN indicating that the long-term identifier must be transmitted to the VPLMN in a non-concealed form; receiving by the user equipment from the VPLMN a permission authenticator; and verifying at the user equipment if the permission authenticator has been formed with a cryptographic authentication of the home public land mobile network, HPLMN, and the user equipment or a subscription module at the user equipment indicating permission to transmit the long-term identifier to the VPLMN in the non-concealed form and if yes, transmitting the long-term identifier to the VPLMN in the non-concealed form.
Abstract: The present invention relates to the coordination of simultaneous multi-RAT camping in in a wireless communication network that provides radio access for a terminal device via at least a first and second wireless radio access operating with different radio access technologies.
Type:
Grant
Filed:
September 29, 2020
Date of Patent:
December 7, 2021
Assignee:
TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
Inventors:
Johan Rune, Icaro L. J. Da Silva, Gunnar Mildh, Jose Luis Pradas
Abstract: The present disclosure provides for power conservation in truly wireless earbuds or other paired wireless devices, by switching a secondary device into a power save mode when the devices are not receiving traffic from the host. In this power-save mode the devices are put into a lower duty cycle than conventional configuration. The primary and secondary devices communicate over a backchannel communication link at a very low duty cycle, in some examples below lower bounds specified for standard communication with other devices. The primary earbud may be responsible for letting the secondary earbud know when to leave power-save mode and resume regular operation.
Abstract: Disclosed are a data transmission method, apparatus and system, a network element, a storage medium and a processor. The system includes a first network element and a second network element. The first network element is configured with an anchor link of a radio bearer for a terminal, and the second network element is configured with a first secondary link and a second secondary link of the radio bearer; where the anchor link includes a packet data convergence protocol (PDCP) entity and a first radio link control (RLC) entity, the first secondary link includes a second RLC entity, and the second secondary link includes a third RLC entity; and where a data transmission is performed between the PDCP entity and the first RLC entity, the second RLC entity and the third RLC entity.
Abstract: The present invention relates to a system for determining whether subscribers of mobile network operators are line holders for the line being used by them or not. The data collection unit, the data interpretation unit, the learning unit, the estimation unit and the database are included within the inventive system.
Type:
Grant
Filed:
December 11, 2017
Date of Patent:
October 5, 2021
Assignee:
TURKCELL TEKNOLOJI ARASTIRMA VE GELISTIRME ANONIM SIRKETI
Abstract: Methods and apparatus enabling interruption of the use of communication resources by a first UE are disclosed. Interrupt requests (IR) sent from other UEs wishing to interrupt use of the communication resources by the first UE are monitored. If one or more IR are received, an interrupt requirement (IReg) is established, and the allocation of communication resources to the first UE is released in response to the IReq. In some embodiments, if a requirement for continuing use of the communication resources by the first UE is determined during a monitoring period, the IReq is reversed and the allocation of communication resources to the first UE is continued so that communication is not interrupted. Embodiments of the invention enable interruption of a high priority user by a co-ordinated or synchronised interrupt requests from UEs with lower priority.
Type:
Grant
Filed:
February 18, 2016
Date of Patent:
September 28, 2021
Inventors:
Stefan Wänstedt, Tommy Arngren, Peter Ökvist
Abstract: A guidance assistance apparatus includes: a memory that stores a set of instructions; and at least one processor configured to execute the set of instructions to: acquire a guidance route through which a guided person is to be guided from routes from a start-point position to an endpoint position; calculate, based on information relating to the routes, an influence level on the guided person in a case in which the guided person deviates from the acquired guidance route, with respect to each of branch places at which the guidance route branches into a route different from the guidance route; and output the calculated influence level.
Abstract: A method, system and computer program product for improving photographic results by composition analysis using deep-learning neural networks, by: detecting one or more objects in a camera view; classifying the objects to make one or more composition recommendations; and displaying the composition recommendations in the camera view, wherein the camera view is aligned with one of the composition recommendations to take a picture.
Type:
Grant
Filed:
December 7, 2018
Date of Patent:
August 24, 2021
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Abstract: A system and method for associating an address for an object is disclosed. A smart address server is provided with a processor and memory. The smart address server is configured to receive a geo location for the object, the geo location indicative of the latitude and longitude of the location of the object. The geo location of the object is converted into a zone, sector, and target portion to generate a ZST location indicator for the object. An elevation portion is appended to the ZST location, to generate a ZSTE location indicator for the object. An object ID is assigned to the object and the object ID is appended to the ZSTE location indicator to generate a smart address for the object. The generated smart address is stored in a data store.
Abstract: Methods and apparatus for managing multiple user access control entities or clients. For example, in one embodiment, a “wallet” of electronic subscriber identity modules (eSIMs) may be stored and used at a user device and/or distributed to other devices for use thereon. In another embodiment, a networked server may store and distribute eSIM to a plurality of user devices in communication therewith. A database of available eSIM is maintained at the wallet entity and/or at the network which enables request for a particular eSIM to be processed and various rules for the distribution thereof to be implemented. Security precautions are implemented to protect both user and network carrier specific data as the data is transmitted between networked entities. Solutions for eSIM backup and restoration are also described.
Abstract: A guidance assistance apparatus includes: a memory that stores a set of instructions; and at least one processor configured to execute the set of instructions to: acquire a guidance route through which a guided person is to be guided from routes from a start-point position to an endpoint position; calculate, based on information relating to the routes, an influence level on the guided person in a case in which the guided person deviates from the acquired guidance route, with respect to each of branch places at which the guidance route branches into a route different from the guidance route; and output the calculated influence level.
Abstract: An image processing method, an electronic device and a computer readable storage medium are described. The image processing method may include: obtaining an image to be detected, and inputting the image to be detected to a neural network; detecting the image to be detected via the neural network to obtain confidence levels of image categories for a background image in the image and confidence levels of object categories for a foreground target in the image; determining an image category of the background image according to the confidence levels of the image categories for the background image and a confidence level threshold; and determining an object category of the foreground target according to the confidence levels of the object categories for the foreground target and the confidence level threshold.
Type:
Grant
Filed:
January 16, 2019
Date of Patent:
April 27, 2021
Assignee:
GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
Abstract: A method and system for least cost routing for mobile telephone calls between the United States and Mexico in such a way so that the call is separated into several call legs and the international portion or call leg is routed via a low-cost or no-cost route independently of the local call legs, essentially achieving an international call with local call rates. This uses a SIM card that automatically identifies any incoming or outgoing call and provides the ability to convert the call from an expensive international and/or roaming call to a local (free) call. Several slight variations are disclosed, and all embodiments have an integrated money transfer service that can be used with a very simple low-cost basic mobile phone using IVR, SMS and voice recognition, or can be accessed via the web or via a smartphone app.
Type:
Grant
Filed:
July 19, 2019
Date of Patent:
March 16, 2021
Assignee:
CALL4MEXICO, LLC
Inventors:
Victoria Feldman, Slavek Fitinbiviesky, Yossi Avraham, Alex Pritsert, Ruben Ashel Miskevski, Patrick Cannon, Philip Chasmar
Abstract: Disclosed are methods, apparatus and systems for cell information acquisition and reporting. One method includes receiving a request for configuration information and a synchronization block, determining that the synchronization block is not associated with the configuration information, and transmitting a failure indication in response to the request. Another method includes receiving a request for configuration information and a first synchronization block, determining that the first synchronization block is not associated with the configuration information, and the first synchronization block comprises information related to a second synchronization block that is associated with the configuration information, and determining whether a radio frequency retuning operation can be performed in order to obtain the configuration information.