Abstract: A method at a first device for enabling a device-to-device wireless link, the method detecting whether a presence signal of a second device is received over a first time period, the presence signal of the second device having a time-slot boundary; and if the presence signal of the second device is not detected, initiating a time-slot boundary by the first device including: transmitting a first presence signal of the first device in a selected time-slot; and checking for an acknowledgment to the first presence signal.
Type:
Application
Filed:
January 4, 2023
Publication date:
May 11, 2023
Applicant:
BlackBerry Limited
Inventors:
Nam NGUYEN, Yufei Wu BLANKENSHIP, Sagar DHAKAL
Abstract: An improved handheld electronic device and an associated method are provided in which time data regarding certain aspects of a messaging conversation on a handheld electronic device are made available to a user. Such time data is provided, for instance, in situations where an interruption has occurred during a messaging conversation. Time data can also be provided to a user on demand in certain circumstances.
Type:
Application
Filed:
January 10, 2023
Publication date:
May 11, 2023
Applicant:
BlackBerry Limited
Inventors:
Gerhard Dietrick KLASSEN, Christopher R. WORMALD, Lawrence Edward KUHL
Abstract: A computer-implemented method is disclosed. The method includes: receiving, via a mobile device that is in a pre-authorization state, user input for initiating a procedure for account authorization at an online image repository; in response to receiving the user input, configuring the mobile device to initiate access to an account at the online image repository based on creating an authorization token associated with the online image repository; and storing, at the mobile device, the authorization token.
Abstract: Methods and devices for determining whether a computing device has been compromised. File tree structure information for the computing device is obtained that details at least a portion of a tree-based structure of folders and files in a memory on the computing device. It is then determined from the file tree structure information that the computing device is compromised and, based on the determination that the computing device has been compromised, an action is taken.
Type:
Grant
Filed:
August 15, 2019
Date of Patent:
May 9, 2023
Assignee:
BlackBerry Limited
Inventors:
Chang Fung Yang, Chi Hing Ng, Robert Joseph Lombardi, Johnathan George White
Abstract: In some examples, a controller receives information of a route of a vehicle, and selects a first parameter set from among a plurality of parameter sets based on the route of the vehicle, the plurality of parameter sets corresponding to different conditions of usage of the vehicle, where each parameter set of the plurality of parameter sets includes one or more parameters that control adjustment of one or more respective adjustable elements of the vehicle. The controller causes application of the first parameter set to control a setting of the one or more adjustable elements of the vehicle.
Type:
Grant
Filed:
September 24, 2019
Date of Patent:
May 9, 2023
Assignee:
BlackBerry Limited
Inventors:
Edward Snow Willis, Christopher Scott Travers, Conrad Delbert Seaman, Claude Jean-Frederic Arzelier, Stephen McCann, Michael Peter Montemurro
Abstract: A method within a network of facilitating identification and usage of alternative communication channels by a wireless device operating using a first communication channel is described. The method enables use of as secondary channel by non-primary users of that channel for prescribed times and within prescribed geographic locations.
Type:
Grant
Filed:
December 3, 2020
Date of Patent:
May 9, 2023
Assignee:
BlackBerry Limited
Inventors:
Stephen McCann, Michael Peter Montemurro, James Randolph Winter Lepp
Abstract: A method for updating communication parameters on a mobile device, the method including sending a communication from the mobile device to a server, the communication including a location of the mobile device; receiving at the mobile device, responsive to the communication, a new communication parameter; reconfiguring the mobile device with the new communication parameter; and sending a second communication from the mobile device to the server, the second communication using the new communication parameter.
Type:
Grant
Filed:
February 12, 2021
Date of Patent:
May 9, 2023
Assignee:
BlackBerry Limited
Inventors:
Jason Wayne Jantzi, Scott Leonard Dill, Jesse William Bennett, Mark Edward Reaume, Mahendra Fuleshwar Prasad, Alexander Karl Levato, Yu Gao
Abstract: Methods and devices for encoding a point cloud. A bit sequence signaling an occupancy pattern for sub-volumes of a volume is coded using binary entropy coding. Contexts may be based on neighbour configuration and a partial sequence of previously-coded bits of the bit sequence. A determination is made as to whether to apply a context reduction operation and, if so, the operation reduces the number of available contexts. Example context reduction operations include reducing neighbour configurations based on shielding by sub-volumes associated with previously-coded bits, special handling for empty neighbour configurations, and statistics-based context consolidation.
Abstract: A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient.
Abstract: Methods and devices for coding point clouds using direct coding mode to code coordinates of a point within a sub-volume associated with a current node instead of a pattern of occupancy for child nodes. Eligibility for use of direct coding is based on occupancy data from another node. If eligible, then a flag is represented in the bitstream to signal whether direct coding is applied to points in the sub-volume or not.
Abstract: A method and mobile transceiver having advanced network selection are provided. In accordance with one embodiment, there is provided a method of operating a mobile transceiver, comprising: determining whether a current location of the mobile transceiver corresponds to a waypoint in a pre-programmed travel itinerary, the travel itinerary being stored in a memory of the mobile transceiver and defining a plurality of waypoints along a planned route, each of the waypoints defining a location, the waypoints including an origin endpoint, a destination endpoint and intermediate locations between the origin endpoint and destination endpoint; in response to a determination that the current location corresponds to a waypoint in the travel itinerary: activating a predetermined wireless transceiver from a plurality of wireless transceivers from a low power mode in accordance with the waypoint corresponding to the current location or a wake-up event.
Type:
Grant
Filed:
August 7, 2020
Date of Patent:
April 25, 2023
Assignee:
BlackBerry Limited
Inventors:
Jose Eduardo Korneluk, Sergio Javier Berriz
Abstract: In some implementations, a method of wireless communications between a wireless communications network and wireless user equipment includes receiving, using a primary Time Division Duplex (TDD) configuration, data on a primary component carrier in a first frequency band. Using a secondary TDD configuration, data on a secondary component carrier is received in a second frequency band different from the first frequency band. A Hybrid Automatic Repeat Request (HARQ) for data received on the secondary component carrier is transmitted using a supplemental TDD configuration. A transmission or retransmission on the secondary component carrier uses a supplemental TDD configuration as well. The supplemental TDD configuration is different from the secondary TDD configuration. Furthermore, an uplink supplemental configuration may be different from a downlink supplemental configuration.
Abstract: The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.
Type:
Grant
Filed:
March 29, 2022
Date of Patent:
April 25, 2023
Assignee:
BlackBerry Limited
Inventors:
Adrian Buckley, Andrew Michael Allen, Michael Eoin Buckley
Abstract: Described are methods and devices to identify vulnerabilities in a software package that includes two or more build files. The build files include at least an application file and one or more resource files. The method includes scanning the build files to identify strings. Strings that appear in one of the resource files and are not referenced in the application file are labelled orphaned. Strings that appear in the application file and are node defined in any of the resources files are labelled hardcoded. The identity of hardcoded and orphaned strings is output as potential vulnerabilities or data leakage points.
Abstract: A method and system to signal transmission layers or dedicated reference signal ports to be used in a multiple input multiple output system, the method including providing a downlink control signal containing information for transmission layers or dedicated reference signal ports utilized, the dedicated reference signal ports being associated with the transmission layers; and using the information to demodulate data on each transmission layer.
Type:
Application
Filed:
December 13, 2022
Publication date:
April 20, 2023
Applicant:
BlackBerry Limited
Inventors:
Zhijun Cai, Sean Michael McBeath, Hua Xu, Yongkang Jia, Youn Hyoung Heo, Andrew Mark Earnshaw, Mo-Han Fong, Robert Mark Harrison
Abstract: In an access device associated with a first network cell, a method for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, and identifying, in a message to the UE, a plurality of second network cells providing the service.
Type:
Application
Filed:
December 21, 2022
Publication date:
April 20, 2023
Applicant:
BlackBerry Limited
Inventors:
Richard Charles BURBIDGE, Takashi SUZUKI, David Philip HOLE, Johanna Lisa DWYER, Venkata Ratnakar Rao Rayavarapu, Maiyuran Wijayanathan, Stephen McCann, Andrew Mark EARNSHAW, Chen Ho CHIN
Abstract: A method at a network element for processing a first message destined for an intelligent transportation system station, the method including receiving from a sending entity, or generating, the first message at the network element; based on a source or contents of the first message, performing one of: discarding the first message; or modifying the first message to provide an indication to the intelligent transportation system station of checks the intelligent transportation system does not need to perform, thereby creating a second message; and forwarding the second message to the intelligent transportation system station.
Type:
Grant
Filed:
March 15, 2022
Date of Patent:
April 18, 2023
Assignee:
BlackBerry Limited
Inventors:
Stephen John Barrett, John Octavius Goyo
Abstract: Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.
Type:
Grant
Filed:
August 15, 2019
Date of Patent:
April 18, 2023
Assignee:
BlackBerry Limited
Inventors:
Chang Fung Yang, Robert Joseph Lombardi, Chi Hing Ng, Johnathan George White
Abstract: Methods and devices for manipulating an image are described. The method comprises receiving image data, the image data including a first image obtained from a first camera and a second image obtained from a second camera, the first camera and the second camera being oriented in a common direction; identifying one or more boundaries of an object in the image data by analyzing the first image and the second image; and displaying a manipulated image based on the image data, wherein the manipulated image includes manipulation of at least a portion of the first image based on boundaries of the object.
Abstract: Systems and methods to configure sidelink resources in a dual connectivity operation are provided. In some aspect, a method comprising: transmitting, from a user equipment (UE), a first message to a first evolved Node B (eNB), wherein the first message indicates a request to establish a sidelink communication; receiving, at the UE, a second message from the first eNB, wherein the second message indicates a frequency that is used by a secondary evolved Node B (SeNB); transmitting, from the UE, a measurement result to the first eNB; and receiving, at the UE, sidelink configuration information from the first eNB, wherein the sidelink configuration information indicates sidelink resources managed by the secondary eNB.
Type:
Grant
Filed:
November 4, 2021
Date of Patent:
April 18, 2023
Assignee:
BlackBerry Limited
Inventors:
Eswar Vutukuri, Rene Faurie, Stephen John Barrett, Gordon Peter Young, Adrian Buckley