Abstract: Information associated with a communication condition of at least one cell in a cluster of cells is received, where the communication condition is at least one selected from among a traffic pattern and interference. In response to the received information, a coordinating network node selects an uplink-downlink configuration for use by the cells in the cluster.
Abstract: Methods and systems for enabling activation of a wireless communication device to operate with a server on a wireless communication network. An activation request is pushed from the server to the device, the activation request being authenticated with a signature signed with a server certificate. After the device verifies the activation request using server certificate and signature, a mutually authenticated communication session is established between the device and the server for activation of the device on the server.
Type:
Application
Filed:
April 12, 2013
Publication date:
October 16, 2014
Applicant:
Research In Motion Limited
Inventors:
Alexander TRUSKOVSKY, Daryl Joseph MARTIN
Abstract: A method of manufacturing a fiber-reinforced composite material includes applying a paint layer including pigment to a woven fiber sheet and drying the paint layer on the woven fiber sheet, imbedding the woven fiber sheet in a resin at a temperature below a melting temperature of the pigment to yield a resin and fiber composite, and applying an ultraviolet protectant coating to the resin and fiber composite.
Type:
Application
Filed:
April 15, 2013
Publication date:
October 16, 2014
Applicant:
RESEARCH IN MOTION LIMITED
Inventors:
Uwe SEYBOTH, Simon COULSON, Kurt Johannes Gerd MEHLHORN
Abstract: The present disclosure presents a system, method and apparatus herein enabling secure coupling of a computing device, such as a mobile device with an endpoint, such as an application server. The computing device can include any electronic device such as a computer, a server, an application server, a mobile device or tablet. The endpoint can be any electronic device as well that is located within an enterprise network. In at least one embodiment, the secure coupling of the mobile device with a computing device can include a security gateway server. In one example, the security gateway server can be a tunnel service server. In another embodiment, an application server can include a tunnel service module to provide the secure coupling with the mobile device.
Type:
Application
Filed:
April 12, 2013
Publication date:
October 16, 2014
Applicant:
RESEARCH IN MOTION LIMITED
Inventors:
Jonathan Hong-Man SAU, Graham RUSSELL, Bruno Richard PREISS, Ronesh PURI
Abstract: Methods and devices for obtaining a fingerprint sample due to incidental contact with a fingerprint sensor when performing a gesture are described. In one aspect, an electronic device includes a touchscreen display and a fingerprint sensor adjacent the touchscreen display. One or more processors are associated with instructions that cause a fingerprint sample to be obtained and that cause a gesture to be detected. The gesture is characterized by input representing movement that is directed at or from the fingerprint sensor. The input is received, at least in part, at an end of the touchscreen display that is nearest the fingerprint sensor.
Abstract: The present disclosure provides for a stylus having at least one switch located within the stylus body and activated by relative lateral motion between the stylus tip and the stylus body. Haptic or audible feedback may be provided to a user when a switch, or combination of switches, changes state. The stylus may also include an axial switch and an axial force sensor.
Abstract: Methods are provided for reconstructing d-bit samples from coefficients, in an encoded video bit-stream, that had been encoded based on source samples having a bit-depth D, where D>d. A residual process, including inverse-quantization and inverse-transformation processes, is applied to the coefficients to compute (d+1)-bit residual samples. Then a prediction process, including clipping intermediate samples, is applied to the residual samples to compute d-bit reconstructed samples.
Abstract: A method includes displaying a first item on an electronic device and detecting a gesture requesting display of a list. In response to detecting the gesture, a first plurality of representations of items in the list is displayed in a first area while displaying at least a part of the first item in a second area. A characteristic of the gesture that identifies a second item from the list is detected. In response to detecting the characteristic of the gesture, a representation of the second item is displayed as a focused item in the first area. In response to detecting discontinuation of the gesture, the second item is displayed and display of the list is discontinued.
Type:
Application
Filed:
April 3, 2013
Publication date:
October 9, 2014
Applicant:
RESEARCH IN MOTION LIMITED
Inventors:
Per Åke Daniel JOHANSSON, Håkan CARLSSON, Anders LARSSON
Abstract: Methods are provided for reconstructing d-bit samples from coefficients, in an encoded video bit-stream, that had been encoded based on source samples having a bit-depth D, where D>d. A residual process, including inverse-quantization and inverse-transformation processes, is applied to the coefficients to compute (D+1)-bit residual samples. Then a prediction process, including (i) rounding and/or truncating intermediate samples and (ii) subsequently clipping intermediate samples, is applied to the residual samples to compute d-bit reconstructed samples.
Abstract: Using Near Field Communications (NFC) to provision a User Equipment (UE) with Subscriber Identity Module (SIM) data for accessing a wireless services provider's network. An NFC gesture initiates an NFC link between an NFC device and a UE containing NFC circuitry. The NFC link is used to transmit SIM data stored in a memory of the NFC device to the UE. The SIM data is received by the UE and stored in a memory of a SIM module in the UE. Thereafter, the SIM data is used to access the wireless network and obtain communication services therefrom.
Abstract: A method, network node, and user equipments for providing parameters to a first user equipment served by the network element, the parameters describing at least a second user equipment for the purpose of the first user equipment initiating a device to device proximity discovery service with the second user equipment, the method collecting information for user equipments desiring device to device proximity discovery; creating a candidate user equipment list for a candidate tier based on the collected information at the network element, wherein each candidate tier comprises one or more thresholds based on timing advance values in use at the first or the at least the second user equipment; and providing the parameters describing at least a second user equipment to the first user equipment.
Type:
Application
Filed:
April 4, 2013
Publication date:
October 9, 2014
Applicant:
Research In Motion Limited
Inventors:
Joon Beom Kim, Changhoi Koo, Zhijun Cai
Abstract: A computing device is disclosed having two or more perimeters, where each perimeter is a logical separation of computing resources. A computing device and method are also disclosed for generating a data audit trail for data transfers between two perimeters.
Abstract: Methods and electronic devices for adjusting sensitivity of a proximity sensor are described. In an example aspect, the present application describes a method implemented by a processor of an electronic device for adjusting sensitivity of a proximity sensor associated with the electronic device. The proximity sensor is positioned biased towards a longitudinal side of the electronic device. The electronic device also includes an orientation sensor that generates orientation data based on an orientation of the electronic device. The method includes: obtaining orientation data from the orientation sensor; and increasing the sensitivity of the proximity sensor when the orientation of the electronic device is at a first tilted orientation based on the orientation data.
Abstract: Systems, methods, and apparatuses for data and/or control offloading and handover in heterogeneous wireless communication networks are provided. Data and/or control packets can be offloaded to a coordinating base station while a user equipment (UE) remains associated with its serving cell. The packets are still transferred between the serving base station and the core network, and the offloaded data and/or control packets are forwarded from the serving base station to the coordinating base station for transmission to the UE. Furthermore, during a handover process, the serving base station and coordinating base station may independently schedule and send a handover command to the UE to reduce the radio link failure rate.
Type:
Application
Filed:
April 3, 2013
Publication date:
October 9, 2014
Applicant:
Research In Motion Limited
Inventors:
Chandra Sekhar Bontu, Zhijun Cai, Yi Song
Abstract: An electric shielding enclosure that encloses a volume. The electric shielding enclosure includes a conductive structure that partially encloses the volume and that has an edge defining an opening into the volume. A conductive power pack surface is configured to fill at least a part of the opening and has a number of conductive connections. The conductive connections include a first conductive connection located in proximity to a first point of the edge, and a second conductive connection located in proximity to a second point of the edge, where the second point is across the opening from the first point. Each of the conductive connections within the conductive connections is electrically coupled to the conductive structure.
Abstract: Systems and methods are provided for switching collaborative applications. An example method comprises executing a first communication device and a second communication device associate with at least one contact, receiving an instruction to continue the collaborative session using the selected collaborative application that is different from the first collaborative application, determining whether the at least one contact is capable of continuing the collaborative session using the selected collaborative application, and terminating the first collaborative application.
Abstract: Data is communicated between a network node and a user equipment in a first frame according to a first uplink-downlink configuration. In response to a configuration change that causes a second frame following the first frame to be according to a second, different uplink-downlink configuration, an acknowledgement indication for the data is sent in the second frame.
Type:
Application
Filed:
April 2, 2013
Publication date:
October 2, 2014
Applicant:
RESEARCH IN MOTION LIMITED
Inventors:
Yiping Wang, Andrew Mark Earnshaw, Jun Li, David Nigel Freeman
Abstract: In some implementations, a method includes compensating for timing misalignment of subframes associated with at least one of first user equipment (UE) or a second UE. The first UE and the second UE are in an inter-device session (IDS) for direct UE-to-UE communication, and timing for the first UE and a timing for the second UE is derived from an eNode B (eNB).
Type:
Application
Filed:
April 1, 2013
Publication date:
October 2, 2014
Applicant:
Research In Motion Limited
Inventors:
Masoud Ebrahimi Tazeh Mahalleh, William Anthony Gage, Biswaroop Mukherjee, Robert Novak
Abstract: An electronic device is configured to determine a location of a stylus with respect to a display screen dependent upon first and second timing signals. A change in state of a reference pixel cell is detected using a photodetector located in close proximity to the reference pixel cell and a change in state of a pixel cell in proximity to the stylus, in response to a stylus photodetector signal received from a photodetector of the stylus. The location of the stylus with respect to the display screen is determined from the time difference between the change in state of the reference pixel cell and the change in state of the pixel cell in proximity to the stylus.
Abstract: A method and a relay service node to facilitate establishment of a secure connection between a first node within a restrictive access network, and a second node, the method accepting a control connection from the first node; accepting a second connection from the second node, and receiving, over the second connection, a message requesting secure connection establishment with the first node and providing an identifier for the first node; sending, over the control connection, a connection attempt request to establish a third connection from the first node; accepting the third connection from the first node; binding the second connection with the third connection; and forwarding the message requesting secure connection establishment with the first node to the first node.
Type:
Application
Filed:
March 28, 2013
Publication date:
October 2, 2014
Applicant:
RESEARCH IN MOTION LIMITED
Inventors:
Kaiduan XIE, Bruno Richard PREISS, Jonathan Hong-Man SAU, Roger Charles MEIKE