Patents by Inventor Arun G. Mathias

Arun G. Mathias has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9380454
    Abstract: Configuring a mobile wireless communication device using a carrier service configuration profile selected from a set of stored carrier service configuration profiles. Carrier service configuration profiles are selected based on one or more combinations of identifier values stored in the mobile wireless communication device. Carrier service configuration profiles are priority ranked based on a specificity of the one or more combinations of identifier values.
    Type: Grant
    Filed: June 6, 2014
    Date of Patent: June 28, 2016
    Assignee: Apple Inc.
    Inventors: Robert Kukuchka, Shuvo Chatterjee, Arun G. Mathias, Matthew Klahn
  • Patent number: 9380558
    Abstract: A mobile wireless device maintains registration on two parallel wireless communication networks that each use different wireless communication protocols. In response to a first connection request received from a first wireless network, the mobile wireless device tunes a single receiver contained therein from the first wireless network to a second wireless network. Subsequently in response to a second connection request received from the second wireless network, the mobile wireless device connects to the second wireless network.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: June 28, 2016
    Assignee: Apple Inc.
    Inventors: Arun G. Mathias, Madhusudan Chaudhary, Jianxiong Shi
  • Patent number: 9344832
    Abstract: Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
    Type: Grant
    Filed: February 23, 2015
    Date of Patent: May 17, 2016
    Assignee: Apple Inc.
    Inventors: Stephan V. Schell, Arun G. Mathias, Jerrold Von Hauck, David T. Haggerty, Kevin McLaughlin, Ben-Heng Juang, Li Li
  • Publication number: 20160132030
    Abstract: Automated behaviors in an environment can be implemented based on aggregation of individual user routines. For example, mobile devices used by users in the environment can provide information about the users' behavior patterns to a coordinator device that can be located in the environment. The coordinator device can analyze the information to detect an aggregate pattern that involves multiple mobile devices and/or multiple users. Based on a detected aggregate patterns, the coordinator can identify behaviors to automate.
    Type: Application
    Filed: September 16, 2015
    Publication date: May 12, 2016
    Inventors: Lukas M. Marti, Kevin P. McLaughlin, Arun G. Mathias, Ronald Keryuan Huang
  • Patent number: 9326322
    Abstract: Apparatus and methods for distributing electronic access client modules for use with electronic devices. In one embodiment, the access client modules are virtual subscriber identity modules (VSIMs) that can be downloaded from online services for use with cellular-equipped devices such as smartphones. The online services may include a point of sale (POS) system that sells electronic devices to users. A broker may be used to facilitate the selection of a virtual subscriber identity module. A provisioning service may also be used to provision the selected VSIM.
    Type: Grant
    Filed: May 27, 2014
    Date of Patent: April 26, 2016
    Assignee: Apple Inc.
    Inventors: David T. Haggerty, Jerrold Von Hauck, Stephan V. Schell, Arun G. Mathias
  • Patent number: 9307489
    Abstract: Methods and apparatus for preferring connections between networks. In one embodiment, a mobile device is capable of hybrid network operation (e.g. LTE and CDMA 1× operation), allowing the mobile device to be registered to a CDMA 1× network for voice calls while receiving and sending data traffic over a LTE network. However, any data sent by the LTE network may be lost if the data was transmitted during a tune-away to the CDMA 1× network to perform maintenance operations. In one variant, the mobile device can disable the idle voice connection to the CDMA 1× network based on a request from resident applications requiring real-time data streaming, which are more likely to experience data loss. Consequently, potential data loss due to a network tune-away is prevented, thereby improving data performance of the resident applications. In another embodiment, an adaptive transmit receive mode can be selectively disabled/enabled for data traffic.
    Type: Grant
    Filed: February 20, 2013
    Date of Patent: April 5, 2016
    Assignee: Apple Inc.
    Inventors: Vikram B. Yerrabommanahalli, Arun G. Mathias, Matthew S. Klahn
  • Publication number: 20160091872
    Abstract: An automated environment can include an accessory device that operates according to an automation rule, to take a prescribed action when a triggering condition occurs. A controller device for the automated environment can determine a user's regular routine and can detect when the user is deviating from the regular routine. The controller device can communicate with accessory devices in the automated environment to modify their behavior relative to the automation rules.
    Type: Application
    Filed: September 16, 2015
    Publication date: March 31, 2016
    Inventors: Lukas M. Marti, Robert W. Mayor, Arun G. Mathias, Ronald Keryuan Huang
  • Publication number: 20160091540
    Abstract: An automated environment can monitor its resource consumption at the environment level and detect anomalies. Resource consumption can be monitored using a sparse set of sensors that provide information about the total resource consumption of the automated environment. The sensor data can be analyzed together with information about a behavioral routine of users in the automated environment to define a baseline resource consumption pattern. Once a baseline resource consumption pattern is established, anomalies in resource consumption can be detected and reported to users.
    Type: Application
    Filed: September 16, 2015
    Publication date: March 31, 2016
    Inventors: Lukas M. Marti, Ronald Keryuan Huang, Arun G. Mathias, Kevin P. McLaughlin
  • Patent number: 9282514
    Abstract: Methods and apparatus for intelligently selecting and operating one or more air interfaces of a mobile wireless device for e.g., call setup time reduction. In one embodiment, operation of a high speed cellular interface is selectively adjusted or disabled or switched out when not required so as to minimize call setup times by, e.g., using a different cellular interface to receive pages. In one implementation, the wireless device includes a high-speed cellular interface, a lower-speed cellular interface, and a WLAN (e.g., Wi-Fi) interface.
    Type: Grant
    Filed: February 15, 2013
    Date of Patent: March 8, 2016
    Assignee: Apple Inc.
    Inventors: Arun G. Mathias, Matthew S. Klahn, Vikram B. Yerrabommanahalli, Anush Nadathur
  • Publication number: 20160063260
    Abstract: A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities.
    Type: Application
    Filed: July 31, 2015
    Publication date: March 3, 2016
    Inventors: Christopher B. SHARP, Yousuf H. VAID, Li LI, Jerrold Von HAUCK, Arun G. MATHIAS, Xiangying YANG, Kevin P. McLAUGHLIN
  • Patent number: 9247424
    Abstract: Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs).
    Type: Grant
    Filed: February 14, 2013
    Date of Patent: January 26, 2016
    Assignee: Apple Inc.
    Inventors: David T. Haggerty, Jerrold Von Hauck, Ben-Heng Juang, Li Li, Arun G. Mathias, Kevin McLaughlin, Avinash Narasimhan, Christopher Sharp, Yousuf H. Vaid, Xiangying Yang
  • Publication number: 20150350877
    Abstract: Disclosed herein is a technique for mitigating paging collisions in mobile devices. When a new electronic Subscriber Identity Module (eSIM) is to be provisioned on a mobile device, International Mobile Subscriber Identity (IMSI) information associated with each of the SIMs/eSIMs currently installed on the mobile device is obtained and provided to a provisioning server. In turn, the provisioning server utilizes the IMSI information to select a new eSIM associated with an IMSI that is unlikely to result in a paging collision when operated alongside the SIMs/eSIMs installed on the mobile device. The provisioning server provides the new eSIM to the mobile device, whereupon the mobile device installs the eSIM into the embedded Universal Integrated Circuit Card (eUICC) for operation.
    Type: Application
    Filed: September 26, 2014
    Publication date: December 3, 2015
    Inventors: Li LI, Arun G. MATHIAS
  • Publication number: 20150350339
    Abstract: Described are systems and methods for transferring calls between multiple stations. An exemplary system includes a first station and a second station that establishes a first communication session having a first call identification with the first station. The system further includes a third station and a network device that includes stored data indicating a relationship between the first station and the third station, the network device configured to receive the first call identification from the first station and transmit the first call identification to the third station based on the relationship, wherein the third station is configured to receive the first call identification and send an invite to the second station to replace the first communication session with the first station with a second communication session with the third station, the invite including the first call identification and a second call identification that identifies the second communication session.
    Type: Application
    Filed: September 29, 2014
    Publication date: December 3, 2015
    Inventors: Teck Yang LEE, Najeeb M. ABDULRAHIMAN, Vikram B. YERRABOMMANAHALLI, Arun G. MATHIAS
  • Publication number: 20150350878
    Abstract: Embodiments are described for identifying and accessing an electronic subscriber identity module (eSIM) and associated content of the eSIM in a multiple eSIM configuration. An embedded Universal Integrated Circuit Card (eUICC) can include multiple eSIMs, where each eSIM can include its own file structures and applications. Some embodiments include a processor of a mobile device transmitting a special command to the eUICC, including an identification that uniquely identifies an eSIM in the eUICC. After selecting the eSIM, the processor can access file structures and applications of the selected eSIM. The processor can then use existing commands to access content in the selected eSIM. The special command can direct the eUICC to activate or deactivate content associated with the selected eSIM. Other embodiments include an eUICC platform operating system interacting with eSIMs associated with logical channels to facilitate identification and access to file structures and applications of the eSIMs.
    Type: Application
    Filed: September 30, 2014
    Publication date: December 3, 2015
    Inventors: Li Li, Ben-Heng Juang, Arun G. Mathias
  • Publication number: 20150349826
    Abstract: Disclosed herein is a technique for enabling Subscriber Identity Module (SIM) toolkit commands to be properly routed within a mobile device that includes an embedded Universal Integrated Circuit Card (eUICC) configured to manage two or more electronic SIMs (eSIMs). Specifically, the technique involves a baseband component of the mobile device and the eUICC initially exchanging information about their eSIM capabilities to identify whether multiple eSIMs are active within the eUICC. During this exchange of information, the eUICC can generate a list of unique identifiers of the active eSIMs that are managed by the eUICC and provide the list of unique identifiers to the baseband component. In turn, the baseband component can update a configuration to manage the list of unique identifiers and use the list of unique identifiers to properly route SIM toolkit commands to the appropriate eSIM within the eUICC.
    Type: Application
    Filed: May 22, 2015
    Publication date: December 3, 2015
    Inventors: Li LI, Arun G. MATHIAS
  • Publication number: 20150334673
    Abstract: A mobile wireless device maintains registration on two parallel wireless communication networks that each use different wireless communication protocols. In response to a first connection request received from a first wireless network, the mobile wireless device tunes a single receiver contained therein from the first wireless network to a second wireless network. Subsequently in response to a second connection request received from the second wireless network, the mobile wireless device connects to the second wireless network.
    Type: Application
    Filed: July 27, 2015
    Publication date: November 19, 2015
    Inventors: Arun G. MATHIAS, Madhusudan CHAUDHARY, Jianxiong SHI
  • Patent number: 9184801
    Abstract: Methods and apparatus for activating a mobile device for use with a service provider. In one embodiment, a powered-off mobile device having an inserted Subscriber Identity Module (SIM) may be programmed with configuration data while “in box” (e.g., at a point of sale (POS), in a warehouse, etc.) using a near field communication (NFC) data interface. In another exemplary embodiment, information that is stored to a NFC accessible memory can be accessed when the device is non-functional e.g., to retrieve backup data.
    Type: Grant
    Filed: July 12, 2013
    Date of Patent: November 10, 2015
    Assignee: Apple Inc.
    Inventors: Li Li, Ben-Heng Juang, Arun G. Mathias
  • Publication number: 20150312698
    Abstract: Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
    Type: Application
    Filed: February 23, 2015
    Publication date: October 29, 2015
    Inventors: Stephan V. SCHELL, Arun G. MATHIAS, Jerrold Von HAUCK, David T. HAGGERTY, Kevin McLAUGHLIN, Ben-Heng JUANG, Li LI
  • Patent number: 9098714
    Abstract: A policy-based framework is described. This policy-based framework may be used to specify the privileges for logical entities to perform operations associated with an access-control element (such as an electronic Subscriber Identity Module) located within a secure element in an electronic device. Note that different logical entities may have different privileges for different operations associated with the same or different access-control elements. Moreover, the policy-based framework may specify types of credentials that are used by the logical entities during authentication, so that different types of credentials may be used for different operations and/or by different logical entities. Furthermore, the policy-based framework may specify the security protocols and security levels that are used by the logical entities during authentication, so that different security protocols and security levels may be used for different operations and/or by different logical entities.
    Type: Grant
    Filed: November 21, 2013
    Date of Patent: August 4, 2015
    Assignee: Apple Inc.
    Inventors: Christopher B. Sharp, Yousuf H. Vaid, Li Li, Jerrold V. Hauck, Arun G. Mathias, Xiangying Yang, Kevin P. McLaughlin
  • Publication number: 20150212745
    Abstract: The invention provides a technique for managing write operations issued to a non-volatile memory included in a wireless device. A monitor software application executes on the wireless device and is configured to determine that a number of write operations issued to the non-volatile memory is greater than or equal to a write operation threshold associated with the non-volatile memory. In response, at least one application is isolated as the application responsible for issuing excessive write operations. The isolation can be carried out locally on the wireless device, or the isolation can be carried out remotely at a server by sending information about the write operations to the server. The monitor then limits additional write operations from being issued to the non-volatile memory so as to protect the non-volatile memory from becoming corrupted or inoperable.
    Type: Application
    Filed: April 8, 2015
    Publication date: July 30, 2015
    Inventors: Li LI, Ben-Heng JUANG, Arun G. MATHIAS