Patents Issued in November 12, 2020
-
Publication number: 20200359177Abstract: A controller, which is a communication device, includes: a transfer unit including a function of transferring data received from a first terminal to another communication device via wireless communication; and a determination unit configured to determine whether first information is included in the data received by the transfer unit, the first information indicating that the data is to be multicast. The transfer unit is further configured to multicast the data to a second terminal when the determination unit determines that the first information is included in the data, the second terminal and the first terminal being different terminals.Type: ApplicationFiled: July 27, 2020Publication date: November 12, 2020Inventor: Yutaka MURAKAMI
-
Publication number: 20200359178Abstract: Embodiments include a system, method, and computer program product for providing seamless PTT services to a user. In an embodiment, a push-to-talk (PTT) component provides, to the user, PTT services with a talk group through connectivity to a data channel in a mobile network. A voice monitoring component monitors attributes of data connectivity on the data channel to determine when a voice quality falls below a threshold. When the voice quality is determined to fall below the threshold, a connectivity component requests the user to switch the connectivity to a voice channel. Then, the connectivity component dials a telephone number through the voice channel to access a voice conference bridge that provides the PTT services. To provide the PTT services, the voice conference bridge sets up a routing path to a session initiation protocol (SIP) session for the talk group, and routes voice communication through the SIP session.Type: ApplicationFiled: July 27, 2020Publication date: November 12, 2020Inventors: Joseph R. MAZZARELLA, Michael S. WENGROVITZ
-
Publication number: 20200359179Abstract: When a Rich Communications Services (RCS) data file is to be provided to a terminating user equipment (UE) that is on a different mobile communications network than an originating UE, the network address, or uniform resource locator (URL), of the RCS data file may be modified to indicate that the RCS data file is to traverse a network-to-network interface (NNI). An RCS system on the originating mobile communications network may identify if the terminating UE is on the same or different mobile communications network. If the terminating UE is on a different mobile communications network, then the RCS system may modify the URL to indicate the originating and terminating mobile communications networks and send the URL to an RCS system of the terminating mobile communications network. The modified URL enables retrieval of the RCS data file network by a content system of the terminating mobile communications network.Type: ApplicationFiled: March 23, 2020Publication date: November 12, 2020Inventors: Neha Shah, Maziar Fallah, Adrian T. Synal
-
Publication number: 20200359180Abstract: Methods, systems, and computer storage media for a wearable device are presented. The wearable device includes a wearable device with a wearable housing configured as a ring, the wearable housing being wearable on a finger. A transceiver embedded in a band portion of the ring and configured to communicate a plurality of data items with a base station to initiate a transaction, the transceiver being associated with unique identification information, the plurality of data items being storable in memory.Type: ApplicationFiled: July 23, 2020Publication date: November 12, 2020Inventor: Joseph Nicholi Prencipe
-
Publication number: 20200359181Abstract: An information processing apparatus includes: a location information acquisition unit configured to acquire location information of each of a plurality of vehicles; a vehicle specifying unit configured to specify, based on the location information, a vehicle that has passed through a geographical location or area of a target, from which imaging data captured by the imaging device is collected; and a command transmission unit configured to transmit a command that requests transmission of the imaging data to the specified vehicle among the plurality of vehicles.Type: ApplicationFiled: March 27, 2020Publication date: November 12, 2020Applicant: TOYOTA JIDOSHA KABUSHIKI KAISHAInventor: Yasuyuki KUSUMOTO
-
Publication number: 20200359182Abstract: Methods and systems are provided for auto-configuring a newly purchased user equipment (UE) device with content consumption material that is associated with a user. These methods and systems are provided by way of receiving, in response to the user having purchased the UE device, purchase information (e.g., a credit card number) and a UE device identifier (e.g., a serial number of a purchased UE device). After receipt of this information, a database is searched to identify a user account that is associated with the purchase information. The user account identifies content consumption material that has been processed by other UE devices to enable the user to consume content. A communication is then transmitted to the UE device that causes the UE device to be configured with the identified content consumption material.Type: ApplicationFiled: June 30, 2020Publication date: November 12, 2020Inventor: Gregory James Lundell
-
Publication number: 20200359183Abstract: A method includes detecting a user-input instruction for displaying a user interface for notification management and displaying the user interface for notification management. The user interface for notification management includes a classification option, receiving a user-input instruction for selecting the classification option, displaying at least two application types, detecting a user-input instruction for selecting an option of one application type of the at least two application types, displaying, in a same user interface, an identifier of at least one application corresponding to the selected application type displaying a setting option of a UI prompt manner of a notification message for each of the at least one application, detecting an operation of a user on the setting option of the UI prompt manner of the at least one application, and saving the setting option of the UI prompt manner of the at least one application after the user operation.Type: ApplicationFiled: July 24, 2020Publication date: November 12, 2020Inventor: Yanyan Mao
-
Publication number: 20200359184Abstract: A temporary EID (TEID) is generated based on an indicator of a hash algorithm, a nonce, and a hash generated using the hash algorithm. The hash is generated based on the indicator, nonce, and EID of a mobile device. The TEID is sent to the mobile network operator to identify the mobile device in lieu of using the device's EID. The TEID is stored in a data store and an eSIM profile for the mobile device is associated the TEID. The mobile device sends to an eSIM server the device's EID over a secure communications channel. The eSIM server generates a hash using the indicator and nonce contained in the stored TEID and the EID of the mobile device. The eSIM server verifies that the generated hash matches the hash contained in the TEID stored in the data store. If the hash matches, the eSIM server sends, to the mobile device, subscription credentials for accessing the mobile network in accordance with the data plan.Type: ApplicationFiled: July 30, 2020Publication date: November 12, 2020Inventor: John David BRUNER
-
Publication number: 20200359185Abstract: Disclosed herein is a method and device for identifying a service entity in an Machine-to-Machine (M2M) system. The method for an M2M device for requesting a service includes transmitting a message requesting information on a service entity to a registry, obtaining the information on the service entity and using the service through the service entity.Type: ApplicationFiled: May 8, 2020Publication date: November 12, 2020Inventor: Jae Seung Song
-
Publication number: 20200359186Abstract: A system for content sharing and methods for making and using the same. The content sharing system enables a smooth and easy exchange of electronic data.Type: ApplicationFiled: May 8, 2020Publication date: November 12, 2020Inventor: Gaurav Goel
-
Publication number: 20200359187Abstract: A snake cam is provided with a camera mounted to a housing via a shaft. The shaft may be flexible or rigid. The housing includes components needed for operation of the camera but that need not be in close physical proximity to the camera, thus allowing the camera itself to have a relatively small size, which facilitates placement thereof in small places. The housing may include a wireless communication module, through which a mobile device may be connected to the snake cam. The mobile device may then be used to access or control one or more features of the snake cam.Type: ApplicationFiled: May 26, 2020Publication date: November 12, 2020Inventor: Calvin Shiening Wang
-
Publication number: 20200359188Abstract: The described embodiments transfer an activity from a source electronic device to a companion electronic device. The source electronic device receives activity information describing an activity performed in a first application at the source electronic device, determines an activity identifier for the activity information, and broadcasts an activity advertisement comprising the activity identifier. Upon receiving the activity advertisement, the companion electronic device determines whether a second application that is associated with the first application is available at the companion electronic device. If the second application is available, the companion electronic device requests extended activity data from the source electronic device. The source electronic device responds by sending extended activity data from the first application to the companion electronic device.Type: ApplicationFiled: July 30, 2020Publication date: November 12, 2020Applicant: Apple Inc.Inventors: Christopher S. Linn, Keith Stattenfield, Alexander J. Dunn
-
Publication number: 20200359189Abstract: An electronic device is provided.Type: ApplicationFiled: April 30, 2020Publication date: November 12, 2020Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Sukun YOON, Cheulhee HAHM
-
Publication number: 20200359190Abstract: A method for detecting and distributing alert data based upon both receiving alert data encoded in a terrestrial television broadcast transmission and receiving an identification of a location of a device includes receiving, by a first device in a plurality of devices in a mesh network, a terrestrial broadcast signal including at least one datacast packet. A second device in the plurality of devices receives a satellite transmission identifying a location of the second device. The method includes confirming, by a notification engine executed by a third device in the plurality of devices in the mesh network, receipt of both the satellite transmission and alert data encoded in the terrestrial broadcast signal. The method includes activating, by the notification engine, at least one alert module in the mesh network, upon confirmation of the receipt of both the satellite transmission and the alert data encoded in the terrestrial broadcast signal.Type: ApplicationFiled: May 1, 2020Publication date: November 12, 2020Inventors: Steven D. Hastings, Nathan O. Ford
-
Publication number: 20200359191Abstract: A method in a network node (115) comprises receiving (615, 715, 820, 920, 1015, 1304), from a user equipment (UE) (110) configured in an inactive state (605, 705, 805, 905, 1005), a request to resume a connection as part of a non-access stratum procedure. The method comprises resuming (620, 720, 825, 925, 1020, 1308) the connection in response to the request. The method comprises obtaining (645, 745, 845, 945, 1045, 1312) an indication that signaling associated with the non-access stratum procedure is complete.Type: ApplicationFiled: December 13, 2017Publication date: November 12, 2020Inventors: Patrick RUGELAND, Gunnar MILDH
-
Publication number: 20200359192Abstract: According to one embodiment of the present disclosure, the method by means of which a mobility management entity (MME) determines the communication mode of a terminal in a communication system includes the steps of: receiving, from the terminal, an access request including information on the position of the terminal; transmitting a message to a home subscriber server (HSS) on the basis of the received access request; receiving, from the HSS, specific position information for setting a first mode; comparing the information on the position of the terminal with the specific position information; and determining the communication mode of the terminal according to the result of the comparison. According to the present disclosure, the frequent transmission of small amounts of data can be supported in an efficient manner.Type: ApplicationFiled: July 27, 2020Publication date: November 12, 2020Inventors: Han Na Lim, Song Yean Cho, Jung Je Son, Sang Soo Jeong, Soeng Hun Kim, Sang Bum Kim, Jae Hyuk Jang, Kyeong In Jeong
-
Publication number: 20200359193Abstract: Disclosed are a method for determining the mobility state of user equipment (UE), UE and a computer storage medium. The method comprises: when a UE enters a connected state for a short time, keeping maintaining a movement state evaluation variable, and determining a movement state thereof based on the movement state evaluation variable.Type: ApplicationFiled: July 23, 2020Publication date: November 12, 2020Applicant: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.Inventor: Hai TANG
-
Publication number: 20200359194Abstract: In one embodiment of the present invention, a method for enabling a UDM (Unified Data Management) to perform a registration related procedure of an AMF (Access and Mobility Management Function) in a wireless communication system comprises the steps of: receiving, by the UDM, a message related to serving AMF registration of a UE, which includes access type information and ID (Identity) information, from a first AMF; transmitting, by the UDM, a deregistration related message to a second AMF when the second AMF exists, wherein the second AMF is registered as a serving AMF of the UE and related to the access type information.Type: ApplicationFiled: June 8, 2020Publication date: November 12, 2020Inventors: Laeyoung KIM, Hyunsook KIM, Jinsook RYU, Sangmin PARK, Myungjune YOUN
-
Publication number: 20200359195Abstract: A network function performs a method to identify an invalid subscription concealed identifier, SUCI. When the network function receives a message containing a SUCI, it determines a size of the SUCI contained in the received message, and also determines an expected size of the SUCI in the received message. The network function then determines whether the size of the SUCI contained in the received message satisfies a criterion associated with the expected size. If the size of the SUCI contained in the received message does not satisfy the criterion associated with the expected size, the network function determines that the SUCI in the received message is invalid, and it rejects the SUCI in the received message if it is determined to be invalid.Type: ApplicationFiled: December 20, 2018Publication date: November 12, 2020Inventors: Prajwol Kumar Nakarmi, Pasi Saarinen
-
Publication number: 20200359196Abstract: The present disclosure relates to a user equipment and a method for operating multi-universal subscriber identity module in a wireless communication system. The method includes receiving parameters of a first paging cycle configuration in a first broadcast information from a first network entity and receiving parameters of a second paging cycle configuration in a second broadcast information from a second network entity. Subsequently, the method includes detecting one of a collision of a paging occasion of the first paging cycle configuration and a paging occasion of the second paging cycle configuration, a collision of a paging occasion of first paging cycle configuration and time-critical information broadcast from the second network entity and a collision of a paging occasion of second paging cycle configuration and time-critical information broadcast from the first network entity.Type: ApplicationFiled: May 8, 2020Publication date: November 12, 2020Inventors: MOHANRAJA BALASUBRAMANIAM, NIKHIL PATNI, ROHAN RAJ, LALIT KUMAR PATHAK, TUSHAR VRIND, LALITH KUMAR, MANGESH ABHIMANYU INGALE
-
Publication number: 20200359197Abstract: Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may identify one or more multi-panel capabilities for multi-panel operation of a plurality of panels associated with the UE. The UE may transmit, to a base station (BS), an indication of the one or more multi-panel capabilities. Numerous other aspects are provided.Type: ApplicationFiled: May 7, 2020Publication date: November 12, 2020Inventors: Kiran VENUGOPAL, Yan ZHOU, Jung Ho RYU, Tianyang BAI, Junyi LI, Tao LUO
-
Publication number: 20200359198Abstract: Methods and Devices that provide mechanisms for an air interface capability exchange are disclosed. The air interface capability exchange enables a user equipment device to signal its air interface configuration capabilities to a network device to facilitate software configurable air interface (SoftAI) optimization. The air interface capability exchange involves a UE device signaling information regarding an air interface configuration capability type of the device's air interface. The air interface configuration capability type identifies whether the device supports multiple air interface configurations of the air interface. The UE device may also transmit information regarding air interface configuration options that it supports. The network device may determine a configuration for the UE device's air interface based at least in part on the information provided by the UE device.Type: ApplicationFiled: July 23, 2020Publication date: November 12, 2020Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: KELVIN KAR KIN AU, JIANGLEI MA
-
Publication number: 20200359199Abstract: There is provided a terminal including a processor that includes, in capability information, a frequency separation between a lower edge of a component carrier with a lowest frequency for supported carrier aggregation and an upper edge of a component carrier with a highest frequency for the supported carrier aggregation; and a transmitter that transmits the capability information to a base station.Type: ApplicationFiled: December 6, 2018Publication date: November 12, 2020Applicant: NTT DOCOMO, INC.Inventors: Hideaki Takahashi, Hiromasa Umeda, Kei Andou
-
Publication number: 20200359200Abstract: At switch-on or when recovering from lack of coverage, a UE determines first frequency bands corresponding to an initial MCC of a country in which the UE currently is located (402). The frequency bands include a first set of frequency bands associated with a network carrier to which the UE is subscribed and a second set of frequency bands not associated with the network carrier (404). The UE scans the first set of frequency bands (406). In response to detecting a new MCC and determining that no service is available within the first set of frequency bands (408), the UE scans a third set of frequency bands preferred by the UE within a second plurality of frequency bands corresponding to the new MCC (410). In response to determining that no service is available within the third set of frequency bands, the UE scans the second set of frequency bands (412).Type: ApplicationFiled: April 30, 2020Publication date: November 12, 2020Inventors: Lynn Lu, Shivank Nayak, Rukun Mao, Qin Zhang
-
Publication number: 20200359201Abstract: Apparatuses, methods and computer programs for a first transportation vehicle and a second transportation vehicle. The method for the first transportation vehicle includes generating an environmental perception message based on a perception model of an environment of the first transportation vehicle, wherein the perception model includes detected objects; transmitting the environmental perception message to one or more transportation vehicles located in a vicinity of the first transportation vehicle; determining one or more second transportation vehicles among the detected objects; and transmitting one or more wireless messages to the one or more second transportation vehicles. The one or more second transportation vehicles are addressed as destination of the one or more wireless messages by referencing one or more objects of the detected objects corresponding to the one or more second transportation vehicles within the environmental perception message.Type: ApplicationFiled: May 10, 2020Publication date: November 12, 2020Inventor: Ahmad EL ASSAAD
-
Publication number: 20200359202Abstract: A message protection method and an apparatus are disclosed. The method includes: When a terminal prepares to hand over from a first-standard system to a second-standard system, the terminal may not have a security context of the second-standard system after handover. Therefore, in the method of the present disclosure, the terminal performs integrity protection on a registration request message and a location update request message by using an integrity key in a security context of the first-standard system before handover. Both the registration request message and the location update request message are messages for triggering handover. Therefore, in the method, security protection is implemented on the message for triggering handover, thereby helping improve communication security.Type: ApplicationFiled: July 29, 2020Publication date: November 12, 2020Inventors: Kai PAN, He LI, Jing CHEN
-
Publication number: 20200359203Abstract: A security establishment method includes generating a pair of keys via mutual authentication between a terminal device (110) and a serving network, and the terminal device (110) and the serving network sharing KASME by using the generated pair of keys (Steps S50 and S100), the terminal device (110) and a roaming destination network of the terminal device (110) generating, by using the KASME, KSEAF mapped with SEAF (50) (Steps S140 and S150), and the terminal device (110) and the roaming destination network generating, by using at least the KSEAF and SUPI used to recognize a subscriber in the serving network, KAMF mapped with AMF (60) (Steps S140 and S150).Type: ApplicationFiled: October 10, 2018Publication date: November 12, 2020Applicant: NTT DOCOMO, INC.Inventors: Hiroshi Aono, Alf Zugenmaier
-
Publication number: 20200359204Abstract: Embodiments described herein provide for a satellite device that can be associated with a user account of a minor aged (e.g., child or adolescent) user that does not have a smartphone that can be used as a companion device to the satellite device. The satellite device can be configured to be used as a primary device, without reliance upon a paired smartphone. Certain information can be synchronized with the satellite device via the association with the family account. During initial configuration, a set of cryptographic keys can be generated to associate the account of the satellite device with the set of accounts in the family. The satellite device can then access calendars, media, or other data that is shared with user accounts within a family of user accounts.Type: ApplicationFiled: May 1, 2020Publication date: November 12, 2020Inventors: Tyler D. Hawkins, David S. Clark, Reed E. Olsen, Paul W. Salzman
-
Publication number: 20200359205Abstract: Illustrative embodiments include a headless medical device (S) for performing implementing a medical resource or function (F) in context with a configuration device (D) and an optional host device (H) for locking or unlocking a lock status (L) of the headless medical device respective to action requests relating to the medical resource or function.Type: ApplicationFiled: January 25, 2019Publication date: November 12, 2020Inventors: Walter DEES, Ton BROUWER, Franciscus Antonius Maria VAN DE LAAR
-
Publication number: 20200359206Abstract: A method (1300), performed by a wireless device, is disclosed. The method is for managing radio resources in the wireless device and comprises receiving a message configuring a radio bearer for use by the wireless device (1302), checking the message for a ciphering configuration setting enabling or disabling ciphering for the radio bearer (1304), and performing at least one of enabling or disabling ciphering for the radio bearer in accordance with the received message (1306). Also disclosed are a method (1500) performed by a base station for configuring radio resources for use by a wireless device, a wireless device (1400), a user equipment and a base station (1600). FIG.Type: ApplicationFiled: February 11, 2019Publication date: November 12, 2020Inventors: Patrik Rugeland, Gunnar Mildh, HÃ¥kan Palm
-
Publication number: 20200359207Abstract: Methods, systems, and devices for communications are described. A device or a group of devices may generate data. The group of devices may receive a group profile from a node that identifies the devices to be included, and the group profile may include a function to be evaluated at each of the devices. The node may also provision evaluation parameters which may allow the device to provide authenticated aggregate data to a requesting third party, without sharing the data between the devices, thus concurrently maintaining individual data privacy and data provenance.Type: ApplicationFiled: May 4, 2020Publication date: November 12, 2020Inventors: Soo Bum Lee, Jay Rodney Walton, John Wallace Nasielski, Gavin Bernard Horn
-
Publication number: 20200359208Abstract: A security negotiation method includes receiving, by a terminal, security negotiation information from a centralized unit control plane (CU-CP)/a centralized unit user plane (CU-UP), where the security negotiation information includes an integrity protection indication identifier of the CU-UP, and determining, by the terminal based on the integrity protection indication identifier, whether to enable user-plane integrity protection of the terminal.Type: ApplicationFiled: July 23, 2020Publication date: November 12, 2020Inventors: Rong Wu, Bo Zhang, Shuaishuai Tan
-
Publication number: 20200359209Abstract: The invention provides a method and system for Bluetooth-based multi-end-to-multi-end communication, including: obtaining, through a short-term connection-oriented communication, a UUID of a device that needs to receive private data, corresponding the UUID to a private label according to a private label allocation table and storing the UUID in a mapping table within a broadcast host; and looking-up the mapping table, if data to be sent contains private information targeted for a specific receiving object group, then determining whether encryption is required; if encryption is required, then performing dynamical encryption based on the private label and proceeding to a step of Bluetooth broadcast payload sending; and performing corresponding non-private data hosting encapsulation or private data hosting encapsulation for the data to be sent and broadcasting the data.Type: ApplicationFiled: July 27, 2020Publication date: November 12, 2020Inventor: Fengping ZHAO
-
Publication number: 20200359210Abstract: Secure communication in mobile digital pages is provided. The system receives an electronic document and validates the electronic document for storage in a cache server. The system receives a request for the electronic document and provides it to a viewer component on a client computing device. The viewer component loads the electronic document in an iframe. The viewer component executes a runtime component to receive, via a secure communication channel, a tag from the electronic document. The system receives the tag and selects a data value for transmission to the viewer component. The viewer components provides the data value to cause the runtime component to execute an action with the data value.Type: ApplicationFiled: August 27, 2019Publication date: November 12, 2020Inventors: Jay Akkad, Nikhil Rao, Anshul Gupta, David Wang, Ian Baker, Neil Dhillon
-
Publication number: 20200359211Abstract: A customer premise equipment (CPE) includes a control circuit, a storage device, and a wireless communication circuit. The storage device stores a virtual subscriber identity module (SIM). When the control circuit enables virtual SIM functionality on the CPE, the wireless communication circuit establishes a wireless communication link with a cellular telephone network via the virtual SIM.Type: ApplicationFiled: February 20, 2020Publication date: November 12, 2020Inventors: Wei-Lun Liu, Huei-Jing Yang, Ming-Pei Hsu
-
Publication number: 20200359212Abstract: A device may obtain, from a remote SIM provisioning (RSP) platform associated with a wireless network, a subscription identifier for a target device to be onboarded onto the wireless network. The device may generate a derived set of credentials for the target device based on an existing set of credentials in a SIM profile associated with the device. The device may generate a derived SIM profile that includes the subscription identifier obtained from the RSP platform and the derived set of credentials, and the device may cause the derived SIM profile to be provisioned onto an embedded Universal Integrated Circuit Card (eUICC) of the target device. Accordingly, the derived SIM profile may enable the target device to use the derived set of credentials to obtain authenticated access to the wireless network.Type: ApplicationFiled: May 7, 2019Publication date: November 12, 2020Inventors: Zhengfang CHEN, Taussif KHAN, Manuel Enrique CACERES, Warren HOJILLA UY
-
Publication number: 20200359213Abstract: A method for authorizing a non-IP data delivery service may include receiving a request from a user equipment device (UE) to attach to an access network based on a generic non-internet protocol (IP) access point name (APN), and performing an initial service authorization of the UE for a non-IP data delivery (NIDD) service with the generic non-IP APN. The method may further include generating a specific non-IP APN by combining the generic non-IP APN with an APN originating identifying anchor (OIA), where the APN OIA identifies an organization associated with the NIDD service. The method may include performing a secondary service authorization of the UE within the access network using the APN OIA, and notifying an application server (AS) of the UE availability for the NIDD service using the generic non-IP APN.Type: ApplicationFiled: May 10, 2019Publication date: November 12, 2020Inventors: Ye Huang, Arvind Aggarwal, Miguel A. Carames
-
Publication number: 20200359214Abstract: A method of authentication in ride hailing situations may include transmitting, to a server by a first device of a passenger, a request for a ride to a destination, receiving an indication that a second device of a driver accepted the ride, and communicating first location data of each respective device to the other respective device. The method may also include determining a first distance between the first and second device based on the first location data of the first and second device. Responsive to determining that the first distance satisfies a threshold condition, the method may also include communicating, via a first point-to-point communication between the first and second device, second location data of each respective device to the other respective device. Further, the method may include presenting, based on the second location data, directions for the first and second device to reach each other.Type: ApplicationFiled: November 1, 2019Publication date: November 12, 2020Applicant: Pointr LimitedInventors: Ismail Ege AKPINAR, Mehmet Bilgay AKHAN
-
Publication number: 20200359215Abstract: A method of authentication in ride hailing situations may include transmitting, to a server by a first device of a passenger, a request for a ride to a destination, receiving an indication that a second device of a driver accepted the ride, and communicating first location data of each respective device to the other respective device. The method may also include determining a first distance between the first and second device based on the first location data of the first and second device. Responsive to determining that the first distance satisfies a threshold condition, the method may also include communicating, via a first point-to-point communication between the first and second device, second location data of each respective device to the other respective device. Further, the method may include presenting, based on the second location data, directions for the first and second device to reach each other.Type: ApplicationFiled: November 11, 2019Publication date: November 12, 2020Applicant: Pointr LimitedInventors: Ismail Ege Akpinar, Mehmet Bilgay Akhan
-
Publication number: 20200359216Abstract: A method of authentication in ride hailing situations may include directing, by a first computing device of a passenger, the passenger to point a camera of the first computing device toward a location of a second computing device of a driver located in a vehicle, receiving data from the camera, wherein the data comprises streaming image frames including vehicle information pertaining to a vehicle included in the streaming image frames, analyzing the data to obtain the vehicle information, and determining whether the vehicle in the streaming image frames corresponds to an expected vehicle for the driver, the determination based on the vehicle information and expected vehicle information.Type: ApplicationFiled: February 10, 2020Publication date: November 12, 2020Applicant: Pointr LimitedInventors: Ismail Ege AKPINAR, Mehmet Bilgay AKHAN
-
Publication number: 20200359217Abstract: An electronic apparatus includes a display, a communication interface, a memory comprising at least one instruction, and a processor configured to execute the at least one instruction, and the processor, by executing the at least one instruction, is configured to, based on an external user terminal being discovered through the communication interface, control the display to display a marker including at least one of a text or an image for guiding an operation of a user to establish a communication connection with the external user terminal, based on authentication on the electronic apparatus being performed by capturing the electronic apparatus outputting the marker by the external user terminal, receive a signal confirming authentication on the electronic apparatus from the external user terminal, and establish a communication connection with the external user terminal in response to the signal.Type: ApplicationFiled: March 24, 2020Publication date: November 12, 2020Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Sungjun HWANG, Jiyeon MA, Donghun SHIN, Euijun KIM, Youngah LEE
-
Publication number: 20200359218Abstract: The disclosure relates to a 5th generation (5G) or pre-5G communication system for supporting a data transmission rate higher than that of a 4th generation (4G) system, such as long-term evolution (LTE). The disclosure relates to authentication and authorization for edge computing applications, and an operation method of a user equipment (UE) in a wireless communication system. The method may include transmitting, to a server, a first message including at least one of information related to the UE or a type of user agent, performing an authentication procedure for an edge computing service according to an authentication method determined based on the first message, receiving a second message indicating authority granted to the edge computing service, based on an authentication code generated by the server according to the performed authentication procedure, and using the edge computing service in a range corresponding to the granted authority.Type: ApplicationFiled: May 8, 2020Publication date: November 12, 2020Inventors: Jicheol LEE, Sunghoon KIM, Sangsoo JEONG
-
Publication number: 20200359219Abstract: A method of managing and verifying a certificate of a terminal is provided. The method includes obtaining certificate information that is usable when downloading and installing a specific bundle corresponding to at least one of a secondary platform bundle family identifier or a secondary platform bundle family custodian identifier, transmitting, to a secondary platform bundle manager, the certificate information corresponding to the at least one of the secondary platform bundle family identifier or the secondary platform bundle family custodian identifier of the specific bundle, and receiving, from the secondary platform bundle manager, at least one of a certificate of the secondary platform bundle manager, certificate information to be used by a smart secure platform (SSP), the secondary platform bundle family identifier, or the secondary platform bundle family custodian identifier.Type: ApplicationFiled: May 11, 2020Publication date: November 12, 2020Inventors: Kangjin YOON, Jonghoe KOO, Duckey LEE, Taehyung LIM
-
Publication number: 20200359220Abstract: A network access control method, apparatus, and device, where the method includes receiving a discovery request sent by a first network function (NF) instance, where the discovery request includes an identifier of a second public land mobile network (PLMN) and an NF type of a to-be-accessed NF instance. The method further includes: obtaining a to-be-accessed network slice identifier, and requesting a second network function management module (NFRF) corresponding to the identifier of the second PLMN for instance information of a second NF instance corresponding to the NF type of the to-be-accessed NF instance and the to-be-accessed network slice identifier; and sending the instance information to the first NF instance.Type: ApplicationFiled: July 29, 2020Publication date: November 12, 2020Inventor: Jingwang Ma
-
Publication number: 20200359221Abstract: A robocall management system is provided that identifies, classifies, and routes one or more robocalls on ingress into a telecommunications network. In some instances, a robocall may be received at an ingress point of the network and analyzed by the robocall management system. Analysis of the received call may access one or more types of identification, such as an identification token, and classify the robocall as permissible or impermissible based on the identification data. Additionally, the robocall management system may monitor a rate of received robocalls from a known robocall customer and compare the rate of robocalls made to a CPS threshold value associated with the customer. One or more routing actions may be executed on a received robocall based on the classification, including routing the robocall to the destination, selecting a routing path via the receiving network, and/or blocking the robocall at the ingress device.Type: ApplicationFiled: March 5, 2020Publication date: November 12, 2020Applicant: Level 3 Communications, LLCInventor: Adam C. Uzelac
-
Publication number: 20200359222Abstract: Methods, systems, and devices for communications are described. A device or a group of devices may generate data. The group of devices may receive a group profile from a node that identifies the devices to be included, and the group profile may include a function to be evaluated at each of the devices. The node may also provision evaluation parameters which may allow the device to provide authenticated aggregate data to a requesting third party, without sharing the data between the devices and without sharing the data with the node, thus concurrently maintaining individual data privacy and data provenance.Type: ApplicationFiled: May 4, 2020Publication date: November 12, 2020Inventors: Soo Bum Lee, Jay Rodney Walton, John Wallace Nasielski, Gavin Bernard Horn
-
Publication number: 20200359223Abstract: The disclosure relates to a pre-5th-generation (5G) or 5G communication system to be provided for supporting higher data rates beyond 4th-generation (4G) communication system, such as long term evolution (LTE). A method for operating a management device in a wireless communication system is provided. The method includes obtaining measurement results of a plurality of cells respectively, identifying an aggressor cell and a victim cell by atmospheric interference among the plurality of the cells, based on the measurement results, and performing interference control on at least one of the aggressor cell or the victim cell, wherein the measurement results include interference information related to a downlink signal of at least one other cell measured in an uplink resource duration of a measurement cell and cell information of the at least one other cell.Type: ApplicationFiled: May 7, 2020Publication date: November 12, 2020Inventors: Byunggook KIM, Okyoung CHOI, Sungnam HONG, Hojoong KWON, Myungkwang BYUN, Jiyun SEOL, Kiseob HONG
-
Publication number: 20200359224Abstract: The disclosed technology provides a system and method for provisioning network resource slices to wireless network operators where the network slices are supported by a single modular cell (e.g., a small cell) shared between, e.g., multiple different wireless network operators.Type: ApplicationFiled: April 10, 2020Publication date: November 12, 2020Inventor: Todd Gibson
-
Publication number: 20200359225Abstract: A method for cellular network operation includes establishing communications in a cellular network between a given user equipment (UE) and a base station, while applying between at least one virtualization platform and radio transceiver points (R-TP) a split of the radio protocols. A user data interface is established between the at least one virtualization platform and each R-TP. Is provided a header for transporting QoS information, including the suitable N-QCI (New QoS class Identifier) value from a set including a delay budget under 50ms, related to at least one data packet transmitted to the given UE by a specific application. The header and the data packet are tunneled to an R-TP, including a tunnel end identifier specific to the UE. The data packet is transmitted over the air to the given UE, and scheduled while considering the QOS information included in the provided header.Type: ApplicationFiled: July 29, 2020Publication date: November 12, 2020Inventor: Mariana Goldhamer
-
Publication number: 20200359226Abstract: A network slice management method, a management unit, and a system, where the method includes receiving, by a first management unit, a first management request, where the first management request carries requirement information of a network slice or indication information, and the indication information is used to obtain the requirement information of the network slice. The method further includes determining, by the first management unit, requirement information of a subnet that forms the network slice. According to the method, the first management unit can determine the corresponding requirement information of the subnet based on the requirement information of the network slice. This way, the network slice can be automatically deployed based on the requirement information of the network slice.Type: ApplicationFiled: May 22, 2020Publication date: November 12, 2020Inventors: Ruiyue Xu, Lan Zou, Yan Zhou, Yan Li, Jun Wang