Patents Issued in April 14, 2022
  • Publication number: 20220116736
    Abstract: In exemplary embodiments, an AI (Artificial Intelligence) enabled system is developed, configured, and/or intended to facilitate the offensive, defensive, and logistical capabilities of a person engaged in warfare in some direct form. This encompasses scenarios ranging from the solo unit behind enemy lines, the operational deployment of forces and resources, to strategic theater. Exemplary embodiments include building or configuring a highly advanced and aware system, facilitated by AI, driven by cloud and edge computing, to allow decisions and tactical advantage be deployed and calculated at the level it needs first. Exemplary embodiments may be configured to address both the kinetic real world as well as digital cyberspace, incorporate offensive and defensive technology, and be primarily driven by the concept to augment forces to support and counter threats as well as malicious enemy AI.
    Type: Application
    Filed: December 3, 2021
    Publication date: April 14, 2022
    Inventors: David H. WILLIAMS, Adam H. WILLIAMS
  • Publication number: 20220116737
    Abstract: Methods and systems are described for providing content based on context. An example method may comprise receiving, from a user device, a request comprising data indicative of a location of the user device. The method may comprise determining, based on receiving the request, user information associated with a user of the user device. The method may comprise generating, based on the user information and the data indicative of the location, an information profile relevant to a context of the user at the location. The method may comprise transmitting, to the user device, the information profile.
    Type: Application
    Filed: December 23, 2021
    Publication date: April 14, 2022
    Inventors: John M. White, Timothy Regnier, Jonathan Smelquist, Kyle Jeske, Serguei Roupassov
  • Publication number: 20220116738
    Abstract: Methods and systems for power tool geofence tracking. One embodiment provides a method for power tool geofence tracking and dashboard display. The method includes determining, using an electronic processor with a transceiver, a location of one or more power tool devices and generating, using the electronic processor, a dashboard to simultaneously display a location-based inventory, indication of number of missing tool, and geofence setup of power tool devices within the inventory. The method also includes displaying, using the electronic processor, the dashboard on an electronic display.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Cory J. McCutchin, Chad E. Jones, Ryan D. Garlock, Christina M. Balda
  • Publication number: 20220116739
    Abstract: Software for proximity positioning that performs the following operations: (i) receiving at least one parameter via an advertising channel of a first protocol, wherein the at least one parameter is encoded in an advertising packet of the first protocol, and wherein the first protocol supports a first proximity positioning technology; (ii) extracting the encoded at least one parameter from the advertising packet; and (iii) performing, by a second proximity positioning technology different from the first proximity positioning technology, a measurement of distance based, at least in part, on the at least one parameter.
    Type: Application
    Filed: October 13, 2020
    Publication date: April 14, 2022
    Inventors: Yong Yin, Jia Tian Zhong, Dong Hui Liu, Peng Hui Jiang, Xing Xing Shen, Li Cao, Jia Yu
  • Publication number: 20220116740
    Abstract: Systems and methods for allowing separate parties to identify each other through the use of matching computer-coordinated identifiers are discussed. In some cases, the methods include using a processor of a computer system to identify a first computer device configured to provide a first perceptible identifier, using the processor to identify a second computer device that is configured to provide a second perceptible identifier, and using the processor to send the first perceptible identifier to the first computer device and the second perceptible identifier to the second computer device, wherein the first and second perceptible identifiers correspond with each other to provide a two-sided, computer-coordinated verification. In some cases, the described methods include modifying the first and second identifiers as the first and second computer devices come into proximity with each other. Other implementations are discussed.
    Type: Application
    Filed: July 19, 2021
    Publication date: April 14, 2022
    Inventors: Spencer Brown, Joseph Almasy, Jason Baty
  • Publication number: 20220116741
    Abstract: Systems and methods are provided to permit groups of recreational vehicle riders and others the ability to quickly create and join groups without prior knowledge of the contact information of everyone in the group. In one embodiment, groups are joinable based on the proximity information of the prospective member and the current group members.
    Type: Application
    Filed: August 20, 2021
    Publication date: April 14, 2022
    Inventors: Gray I. Rentz, Adam C. Koosmann, Nathan A. Good, Jacob H. Larson, Rebecca C. Deitz, David J. Koenig
  • Publication number: 20220116742
    Abstract: System and methods for automated data collection and reporting while operating a vehicle on the road using a device. The device automatically determines when to collect, store, process and transmit data. Additionally, a system and method for further storing, transmitting, processing, organizing and accessing the information with respect to the collected data.
    Type: Application
    Filed: December 22, 2021
    Publication date: April 14, 2022
    Inventors: Royi TAL, Thomas BAKONYI, Redenthor IBANA
  • Publication number: 20220116743
    Abstract: The present application discloses systems, methods, and computer-readable media that can utilize a handheld-movement-detection model to detect whether a computing device is moved by hand or otherwise by a person within a vehicle. For instance, the disclosed systems can receive movement data from a computing device and generate filtered signals. Subsequently, the disclosed systems can utilize the handheld-movement-detection model to convert the filtered signals into a binary movement-classification signal (based on a signal threshold) to indicate the presence of handheld movement of a device. Furthermore, the disclosed systems can also utilize movement data from a computing device to detect whether the computing device is mounted and/or to detect vehicular movements.
    Type: Application
    Filed: October 14, 2020
    Publication date: April 14, 2022
    Inventors: Alya Abbott, Alexander Wesley Contryman, Devjit Chakravarti, Julien van Hout, Zhan Zhang, Gautam Kedia
  • Publication number: 20220116744
    Abstract: Embodiments described herein provide efficient beam pattern feedback from a user equipment (UE) to a receiving device to help reduce overhead of providing beam pattern information for position determination while maintaining high position determination accuracy. Embodiments include providing beam weights and template elemental game patterns, an elemental gain formula and parameters, and/or template beam patterns with boresight to a remote device, enabling the remote device to determine beam shape.
    Type: Application
    Filed: September 23, 2021
    Publication date: April 14, 2022
    Inventors: Vasanthan RAGHAVAN, Sony AKKARAKARAN, Juergen CEZANNE
  • Publication number: 20220116745
    Abstract: Techniques for obfuscating and deploying digital assets (e.g., mobile applications) are provided to mitigate the risk of unauthorized disclosure. An asset can be received that is to be deployed to a plurality of mobile devices, each of the mobile devices associated with a corresponding account having account attributes. A deployment group of one or more mobile devices for deploying the asset can be identified based on a set of one or more obfuscation parameters, comprising account attributes shared among the one or more mobile devices within the deployment group. A customized obfuscation scheme to be applied to the asset can be determined based at least in part on the set of obfuscation parameters. The customized obfuscation scheme can be applied to the asset to generate an obfuscated asset. The obfuscated asset can be transmitted and/or updated over a network to the one or more mobile devices within the deployment group.
    Type: Application
    Filed: December 17, 2021
    Publication date: April 14, 2022
    Inventors: James Gordon, Roopesh Joshi, David Horton, Johan Van Tilburg
  • Publication number: 20220116746
    Abstract: The present disclosure provides a special effect synchronization method, device, and a storage medium; wherein the method comprises: receiving a synchronization request for synchronizing the special effect file sent by a special effect preview end; based on the synchronization request, when determining that a direct connection condition is satisfied, establishing a communication link with the special effect preview end in a direct connection mode; receiving an acquisition request for the target special effect file through the communication link; synchronizing the target special effect file to the special effect preview end based on the acquisition request.
    Type: Application
    Filed: December 22, 2021
    Publication date: April 14, 2022
    Inventors: Ruifeng MA, Le GAO
  • Publication number: 20220116747
    Abstract: A method and apparatus for modifying call timer thresholds for a push-to-talk (PTT) call is provided herein. During operation, a speed of a radio is received, and the call timer thresholds are modified based on the speed of the radio.
    Type: Application
    Filed: October 12, 2020
    Publication date: April 14, 2022
    Inventors: ANOOP SEHGAL PARAS RAM, SHEAU WEI CH'NG, HUEY NEE CHEAH, JIN HOE PHUA
  • Publication number: 20220116748
    Abstract: A push-to-talk device is provided. The push-to-talk device includes a communication interface, a storage configured to store identification information of a plurality of push-to-talk devices included in a network group, and an operation processor electrically connected to the communication interface and the storage. The operation processor is configured to (a) designate one or more push-to-talk devices that are allowed to subscribe to a first message among the plurality of push-to-talk devices, and (b) transmit the first message to the plurality of push-to-talk devices by using a publisher-subscriber pattern through the communication interface.
    Type: Application
    Filed: December 23, 2021
    Publication date: April 14, 2022
    Applicant: UNIONPLACE CO., LTD.
    Inventor: Seongcheol BANG
  • Publication number: 20220116749
    Abstract: The invention relates to a method for managing wirelessly incoming messages on a device, or messages generated by a unit of the device, wherein such an incoming message, or message generated by a unit of the device, is checked according to a predetermined criterion for relevance to a particular person, and wherein the message is only output when relevance is thereby established and, when irrelevance is thereby established, instead the mere presence of the message is signaled.
    Type: Application
    Filed: October 7, 2021
    Publication date: April 14, 2022
    Applicant: Volkswagen Aktiengesellschaft
    Inventor: Sebastian Ehmann
  • Publication number: 20220116750
    Abstract: A method for configuration enhancements on Access Point Name (APN) or Data Network Name (DNN) selection in a User Equipment (UE) is provided. The UE receives a message from a mobile communication network. In particular, the message includes information on an input source of an APN value or a DNN value. Based on the information, the UE uses the APN value or the DNN value to request establishment of a Packet Data Network (PDN) connection or a Protocol Data Unit (PDU) session with the mobile communication network.
    Type: Application
    Filed: August 3, 2021
    Publication date: April 14, 2022
    Inventor: Rohit NAIK
  • Publication number: 20220116751
    Abstract: A system comprising a computer-readable storage medium storing at least one program and a computer-implemented method that enables short message service (SMS) text messaging to be integrated into existing applications is presented. Consistent with some embodiments, the method may include receiving a request from a client application to transmit a message to a recipient device. The method may further include adding the message transmission request to an outbound queue based on determining the message transmission request is valid. In response to successfully validating the request, the method causes transmission of the message to the recipient device.
    Type: Application
    Filed: December 20, 2021
    Publication date: April 14, 2022
    Inventor: Eric P. Ruttenbur
  • Publication number: 20220116752
    Abstract: A method is performed by a control center that resides in a home network. Upon receiving, from access networks, attach requests from user equipments (UEs) when the UEs attempt to connect to the access networks, the control center computes a baseline attach failure rate for the attach requests. The control center initially sets a billing type for a UE of a subscriber to usage based billing. Upon receiving, from the access networks, attach requests from the UE when the UE attempts to connect to the access networks, the control center computes an individual attach failure rate for fulfilling the attach requests from the UE. The control center determines whether the individual attach failure rate for the UE exceeds the baseline attach failure rate. When the individual attach failure rate exceeds the baseline attach failure rate, the control center automatically switches the billing type for the UE to flat rate billing.
    Type: Application
    Filed: October 13, 2020
    Publication date: April 14, 2022
    Inventors: Arindam Gupta, Tara Khoiwal
  • Publication number: 20220116753
    Abstract: Methods and apparatuses are disclosed for facilitating roaming of terminal device. According to an embodiment, a session management node operable in a home network receives, from another session management node operable in a visiting network, a quality of service (QoS) policy per a roaming agreement between the visiting network and the home network during establishment of a protocol data unit (PDU) session for a terminal device. The session management node retrieves, from a subscriber management node, subscribed QoS parameters of the terminal device. The session management node obtains a result that is generated based on the QoS policy per the roaming agreement and the subscribed QoS parameters of the terminal device.
    Type: Application
    Filed: January 9, 2020
    Publication date: April 14, 2022
    Inventors: Juying GAN, Qian CHEN, Stefan ROMMER
  • Publication number: 20220116754
    Abstract: The present disclosure relates to a method of charging packets in a mobile network using a combined packet gateway (PGW) and serving gateway (SGW) which includes receiving a data packet; determining at least one of a rating group and a service rule associated with the data packet; and determining a state of a user device associated with the data packet. When the determined state of the user device comprises a connected state, the method includes charging the data packet, including updating an amount of credit in an account associated with the user device based on the at least one of the rating group and the service rule, and sending the data packet to an enodeB. When the determined state of the user device comprises an idle state, the method includes preventing delivery of the data packet to the enodeB such that the data packet is not charged.
    Type: Application
    Filed: December 20, 2021
    Publication date: April 14, 2022
    Inventor: Srinivas KAPPLA
  • Publication number: 20220116755
    Abstract: A machine-readable storage medium includes instructions stored thereupon, which when executed by processing circuitry of a computing node operable to implement a V2X information service (VIS) in a MEC network, cause the processing circuitry to perform operations comprising detecting a subscription request to an information service. The subscription request originates from a MEC application instantiated on a MEC host and includes at least one filtering criterion indicative of an information-processing configuration of the MEC application. The subscription request with the at least one filtering criterion is forwarded to a plurality of providers of the information service. A response message received from at least one of the providers is decoded. The response message indicates an acceptance of the subscription request by the at least one provider. An acknowledgment message is encoded for transmission to the MEC application, indicating the acceptance of the subscription request by the at least one provider.
    Type: Application
    Filed: December 22, 2021
    Publication date: April 14, 2022
    Inventors: Miltiadis Filippou, Dario Sabella
  • Publication number: 20220116756
    Abstract: A system allows an end-user to locate and gain access to an access-controlled facility or resource, such as a restroom, phone charging station, or Wi-Fi hot spot. Some implementations of the system monitor the formation and concentration of individuals into crowds that may place a higher demand on facilities and resources located near the crowd. The system may distribute mobile facilities to areas that offer convenient access to potential developing crowds, and when the system determines that there is a disparity between available resources and crowd demand reaches a certain level it may deploy one or more mobile facilities to positions proximate to that crowd. A mobile facility may also be requested on demand by a user or organizer, and some implementations provide cost sharing mechanisms and other user benefits related to requesting and accessing the facility.
    Type: Application
    Filed: December 23, 2021
    Publication date: April 14, 2022
    Inventor: Frances Heller
  • Publication number: 20220116757
    Abstract: Logic to cause transmission of a first generic attribute profile (GATT) advertisement comprising a first address associated with the service provider. Logic to generate a second non-GATT advertisement comprising a second address, an encoded personalized identifier (ID), and a payload comprising the first address. Logic to cause transmission of the second non-GATT advertisement. Logic to receive, from a scanner device, a request for the service associated with the first address. Logic to receive a first GATT advertisement for a service provider comprising a first address associated with the service provider. Logic to receive a second non-GATT advertisement comprising a second address, an encoded personalized ID, and a payload, wherein the payload comprises the first address. Logic to decode the encoded personalized ID and associate the personalized ID with the service provider. And logic to request, from an advertisement device that transmitted the first GATT advertisement.
    Type: Application
    Filed: December 23, 2021
    Publication date: April 14, 2022
    Applicant: Intel Corporation
    Inventors: Izoslav Tchigevsky, Arnaud Pierres, Oren Haggai, Muthu Kumar, Karthik Malurpatna Chamaraj, Hakan Magnus Eriksson
  • Publication number: 20220116758
    Abstract: A service invoking method, an apparatus, and the like are applied to a terminal device, such as a smartphone or an automated driving device. The method includes: When detecting a user input, the terminal device obtains at least one scenario feature used to describe a scenario in which the terminal device is currently located, determines, based on the user input and the at least one scenario feature, a first parameter associated with a service, and invokes the service based on the first parameter. Therefore, the foregoing method may be used to provide a service for a user based on user habits in different scenarios, to improve user experience.
    Type: Application
    Filed: December 23, 2021
    Publication date: April 14, 2022
    Inventors: Duan LI, Jingzhou DU, Peng GAO, Xueyan HUANG
  • Publication number: 20220116759
    Abstract: According to certain embodiments, an electronic device comprises a first communication circuit configured to support a first communication protocol; a display; and at least one processor operatively connected to the first communication circuit and the display, wherein the at least one processor is configured to: configure a cluster with at least one external electronic based on the first communication protocol device through the first communication circuit, receive through the first communication circuit, from the at least one external electronic device, information identifying at least one short-range communication device connected to the at least one external electronic device via a second communication protocol, and control the display to display at least one indicator of the at least one short-range communication device based on the information received from the at least one external electronic device.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Jongmu CHOI, Doosuk KANG, Inshik SHIN, Buseop JUNG, Bokun CHOI, Sungjun CHOI
  • Publication number: 20220116760
    Abstract: This disclosure describes systems, methods, and devices for a mechanism for detecting attacks on frequency offset in a wireless network. A device may receive a packet from a reflector device, wherein the packet comprises an access code and a coded sequence of bits. The device may also receive a tone signal from the reflector device. The device may then calculate a first frequency offset estimation associated with the packet and calculate a second frequency offset estimation associated with the tone signal. The device may then calculate a difference between the first frequency offset estimation and the second frequency offset estimation. The device may further identify an allowable threshold range of the difference.
    Type: Application
    Filed: December 24, 2021
    Publication date: April 14, 2022
    Inventors: Michael Bogdanov, Yael Anati
  • Publication number: 20220116761
    Abstract: Systems and methods for computer-aided, session-based operational and organizational responses to asynchronously occurring events. A “session” is a collection of client-server connections, each client connection being an endpoint device in a pool of devices under the control of the members of a defined operational response team cooperating to address an event. The session provides an organizational framework for information sharing, including using context roles to identify the proper recipients for data and messages. The information and data is shared to participating recipients in the session in real-time as the operational response is conducted, and as new data and information is generated, that data is added to the session with a timestamp. Once the response is concluded, the sessions can be closed, encapsulating the data, which can then be “played” back to re-experience the response as it played out, such as for audit, analysis, and review purposes.
    Type: Application
    Filed: December 20, 2021
    Publication date: April 14, 2022
    Inventors: John J. Dames, Michael S. Biviano
  • Publication number: 20220116762
    Abstract: A terminal software upgrade method can be applied to a terminal that is installed with a near-field communication sensing circuit. The terminal software upgrade method can include: in response to a distance between a near-field communication instruction writing circuit and the terminal reaching an effective communication distance of a near-field communication, writing instruction information sent by the near-field communication instruction writing circuit into the near-field communication sensing circuit, wherein the instruction information comprises at least boot-up instruction information and upgrade configuration information; and controlling the terminal to boot up via the near-field communication sensing circuit, based on the boot-up instruction information, and upgrading software of the terminal based on the upgrade configuration information.
    Type: Application
    Filed: May 30, 2021
    Publication date: April 14, 2022
    Applicant: BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.
    Inventors: Guangjun QIAO, Bing ZHAO, Shuxiao ZHANG
  • Publication number: 20220116763
    Abstract: A method and system for provisioning an embedded SIM (eSIM) with an enhanced SIM profile are provided. The method includes creating an eSIM card with a single enhanced SIM profile on a connected device, wherein the created eSIM includes at least an applet; initiating a subscription management data exchange between the eSIM card and various components of a cellular network; initiating a bootstrap control of the applet to restart the eSIM; and configuring the eSIM with the plurality of multi-international mobile subscriber identity (multi-IMSI) profiles and actions related to IMSI profiles, wherein the configuration is performed using over-the-air (OTA) configuration, thereby configuring the enhanced SIM profile with plurality IMSI profiles.
    Type: Application
    Filed: October 13, 2021
    Publication date: April 14, 2022
    Applicant: Flo Live Israel Ltd.
    Inventors: Oren BOUSKILA, Eran DOTAN ROSENBERG
  • Publication number: 20220116764
    Abstract: A method of wireless communication by a user equipment (UE) receives a machine learning model from a base station. The UE reports, to the base station, a machine learning processing capability. The UE also transmits, to the base station, gradient updates or weight updates to the machine learning model. A base station transmits a machine learning model to a number of UEs. The base station receives, from each of the number of UEs, a machine learning processing capability report. The base station groups a number of UEs in accordance with the machine learning processing capability reports, to receive gradient updates to the machine learning model.
    Type: Application
    Filed: October 7, 2021
    Publication date: April 14, 2022
    Inventors: Hamed PEZESHKI, Tao LUO, Taesang YOO
  • Publication number: 20220116765
    Abstract: A system and a method are provided for a client device for use with a Wi-Fi network device, a first external server, and a second external server. The client device includes a memory having a non-critical portion configured to store non-critical data and a keychain storage portion configured to store encrypted data and a processor configured to execute instructions stored on the memory to cause the client device to: wirelessly associate with the Wi-Fi network device; store Wi-Fi network device data associated with configuring the Wi-Fi network device in the first external server; migrate the Wi-Fi network device data from the first external server to the second external server via the client device; and store migration status information in the keychain storage portion of the memory.
    Type: Application
    Filed: August 24, 2021
    Publication date: April 14, 2022
    Inventors: Jalagandeswari GANAPATHY, Muralidharan NARAYANAN
  • Publication number: 20220116766
    Abstract: The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates in a Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE). According to various embodiments, a network node in a wireless communication system may include: receiving, from an application function (AF) via a network exposure function (NEF), user equipment (UE) radio capability information on UE radio capability identifier (ID) and at least one UE radio capability mapping to the UE radio capability ID; receiving, from an access and mobility management function (AMF), a request for information on at least one UE radio capability mapping to a specific UE radio capability ID; and transmitting, to the AMF, the information on at least one UE radio capability mapping to the specific UE radio capability ID.
    Type: Application
    Filed: December 23, 2021
    Publication date: April 14, 2022
    Inventors: Sunghoon KIM, Andrew BENNETT
  • Publication number: 20220116767
    Abstract: Some aspects of this disclosure relate to apparatuses and methods for implementing wireless devices. A service is provided by a first application operating on a publisher device to a second application operating on a subscriber device over a first data path between the two devices in a NAN network. The publisher device includes a first recovery manager to receive an indication from a wireless controller of the publisher device or a distress message from a second recovery manager of the subscriber device. The received indication or distress message indicates that the first data path has been interrupted. The first recovery manager stores, in a memory, data generated by the first application. A second data path is established between the publisher device and the subscriber device. The first recovery manager sends the stored data to the second application that operates on a subscriber device.
    Type: Application
    Filed: October 8, 2021
    Publication date: April 14, 2022
    Applicant: Apple Inc.
    Inventors: Lawrie Kurian, Archish Y. Rangan, Manav Gabhawala, Prasad Vasantha Gopinathan, Tashbeeb Haque, Yong Liu
  • Publication number: 20220116768
    Abstract: Systems, apparatuses, and methods are described for detecting network service failure and potential source of failure in a communication network employing registration requests. A current quantity of registration requests may be compared against an expected quantity of registration requests, and a network alert may be sent based on the comparison.
    Type: Application
    Filed: November 29, 2021
    Publication date: April 14, 2022
    Applicant: Comcast Cable Communications, LLC
    Inventors: Yubin Li, Jiongkuan Hou
  • Publication number: 20220116769
    Abstract: Apparatuses, methods, and systems are disclosed for supporting a notification procedure during 5G registration over a non-3GPP access network. One apparatus includes a transceiver that communicates with a mobile communication network (“MCN”) via a trusted non-3GPP access network (“TNAN”) and a processor that receives a message that starts an EAP session with an access gateway in the TNAN. Here, the EAP session facilitates the establishment of a NAS signaling connection between the apparatus and the MCN and to encapsulate NAS messages exchanged between the apparatus and an AMF in the MCN. The processor receives an EAP notification request from the access gateway before the EAP session is completed. Here, the EAP notification request including at least one access parameter. The processor sends an EAP notification response and completes the EAP session.
    Type: Application
    Filed: April 6, 2020
    Publication date: April 14, 2022
    Inventor: Apostolis Salkintzis
  • Publication number: 20220116770
    Abstract: A first apparatus includes a processor, a memory, and communication circuitry. The first apparatus is connected to a communications network via its communication circuitry. The first apparatus further includes computer-executable instructions stored in the memory of the first apparatus which, when executed by the processor of the first apparatus, cause the first apparatus to: receive voice content or other biometric content of a user; prepare a message including the voice or other biometric content; send the message to the communications network or a second apparatus through a control plane of the communications network in order to authenticate and authorize the first apparatus and the user; receive a response message from the communications network or the second apparatus, wherein the response message includes authentication and authorization results for the first apparatus and identification information that identifies the user.
    Type: Application
    Filed: December 10, 2019
    Publication date: April 14, 2022
    Inventors: Hongkun LI, Michael STARSINIC, Rocco DI GIROLAMO, Catalina MLADIN, Chonggang WANG, Quang LY, Dale Seed
  • Publication number: 20220116771
    Abstract: Devices, systems and methods use a first communication interface to connect with a local device via a first protocol and use a second communication interface to connect with a server via a second protocol. Embodiments relay secure communications between the local device and the server for authentication of the at least one local device by the server and responsive to authentication of the local device by the server, transmit information for storage in a secure memory of the authenticated local device.
    Type: Application
    Filed: October 6, 2021
    Publication date: April 14, 2022
    Applicant: Cypress Semiconductor Corporation
    Inventors: Hui Luo, Hongwei Kong, Kaiping Li, Sungeun Lee, Sridhar Prakasam
  • Publication number: 20220116772
    Abstract: A surgical device is provided. The surgical device includes a tubular outer shaft having a longitudinal axis and an angled guide positioned on a first end of the surgical device. The angled guide may be angled relative to the longitudinal axis of the outer shaft. The surgical device includes an elongated inner shaft having a second end and a third end. The inner shaft is removably coupled to the outer shaft and configured to axially translate through the outer shaft. The surgical device includes pivotal device having at least one joint and an access tool. The at least one joint may be pivotally coupled to the third end of the inner shaft and to an end of the access tool. The pivotal device may be configured to axially translate through the angled guide into a deployed position.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Applicant: Warsaw Orthopedic, Inc.
    Inventors: ADRIAAN J. KUYLER, Benjamin D. Cowan
  • Publication number: 20220116773
    Abstract: A method, performed by a user equipment (UE), of managing secondary platform bundles (SPBs), includes receiving an end user selection for managing a state of at least one SPB among SPBs installed in a smart secure platform (SSP) module; checking bundle management information required to manage the state of the at least one SPB based on the end user selection; determining whether end user intent confirmation is required to manage the state of the at least one SPB according to the end user selection based on the bundle management information; and managing the state of the at least one SPB based on a result of the determining.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Hyewon LEE, Kangjin YOON, Duckey LEE, Jonghoe KOO
  • Publication number: 20220116774
    Abstract: Methods and systems for authentication and establishment of secure connection for accessing edge computing services are provided. The method includes dynamically deriving a pre-shared key (PSK) and use the dynamically derived PSK for the authentication, while performing or before performing a secure connection establishment or while or before establishing a secure interface between a user equipment (UE), and a server, wherein the UE includes an Edge Enabler Client (EEC), and the server is an Edge Configuration Server (ECS). The method further includes deriving the PSK based on an Authentication and Key Management for Applications (AKMA) application key.
    Type: Application
    Filed: October 8, 2021
    Publication date: April 14, 2022
    Inventors: Rajavelsamy RAJADURAI, Nishant GUPTA, Rohini RAJENDRAN, Nivedya Parambath SASI
  • Publication number: 20220116775
    Abstract: A method for automatically allowing access to a WI-FI network by a mobile device can be applied to a mobile device and a WI-FI access point (AP). The mobile device includes a first microphone, first wireless communicating unit, and first processing unit. The first microphone obtains ambient sound, and the first wireless communicating unit can transmit accessing request. The mobile device can receive a password-generating command from a found WI-FI AP. The WI-FI AP comprises second microphone, second wireless communicating unit, and second processing unit. The second microphone also obtains ambient sound. The second wireless communicating unit receives the accessing request and transmits the password-generating command. The second processing unit generates an AP password according to the ambient sound and can compare a device password received from the mobile device. The mobile device is allowed to access the WI-FI AP when the device password matches with the AP password.
    Type: Application
    Filed: December 22, 2021
    Publication date: April 14, 2022
    Inventor: SHIH-JUNG YEN
  • Publication number: 20220116776
    Abstract: Methods, systems, apparatus, and computer-readable storage devices for anonymous device authentication. A method includes: accessing, by the electronic device, data stored by the electronic device that identifies authentication keys the electronic device accepts as valid; sending, by the electronic device to a second electronic device, an authentication request that identifies a set of authentication keys including at least some of authentication keys the electronic device accepts as valid; and receiving, by the electronic device, response data that the second electronic device provides in response to the authentication request. The response data (i) identifies a particular authentication key from the set of authentication keys identified by the authentication request, and (ii) includes a signature generated using the particular authentication key.
    Type: Application
    Filed: June 30, 2020
    Publication date: April 14, 2022
    Inventors: Randall Spangler, Kiavash Faraji
  • Publication number: 20220116777
    Abstract: A system and method for authentication of a secure element cooperating with a Mobile Equipment forming a terminal in a telecommunication network is provided. The telecommunication network comprises a SEAF and a AUSF/UDM/ARPF. The method includes generating an anchor key (KSEAF_SRT) for the communication between the terminal and the SEAF according to 3GPP TS 33.501, wherein the anchor key (KSEAF_SRT) is indirectly derived from a key (KSRT) obtained by deriving from the long-term key K and a secure registration token SRT sent by the terminal to the AUSF/UDM/ARPF and concealed with the AUSF/UDM/ARPF public key along with its SUPI in the SUCI. Other embodiments are disclosed.
    Type: Application
    Filed: January 16, 2020
    Publication date: April 14, 2022
    Applicant: THALES DIS FRANCE SA
    Inventors: Ly-Thanh PHAN, Mireille PAULIAC
  • Publication number: 20220116778
    Abstract: The invention provides a method for managing access to a network resource on a network from a mobile device, the method including the steps of intercepting a data stream from the mobile device attempting to access the network resource, extracting information from the intercepted data stream relating to at least one of the mobile device or a user of the mobile device, accessing at least one of enterprise service based information and third party information regarding at least one of the mobile device or the user of the mobile device, determining whether the mobile device is authorized to access the network resource, preparing an access decision that specifies whether the mobile device is authorized to access the network resource, and storing the access decision in a database on the network.
    Type: Application
    Filed: August 16, 2021
    Publication date: April 14, 2022
    Applicant: McAfee, LLC
    Inventors: Norm Laudermilch, William Supernor, Roman Boroday, David Moshe Goldschlag
  • Publication number: 20220116779
    Abstract: Embodiments of the present invention adapt interconnect systems to apply automated rules and analytics to the Authentication, Authorization, and Accounting (“AAA”) messages between providers that are handled by the interconnect system. The automated rules and analytics interpret or convert the administrative messages into a measure of technical performance of the visited network in relation to a corresponding home network provider. As part of this process, the system establishes a procedure that matches messages involving a device to be related and produces a data structure and corresponding data that is stored and reflects the performance or other salient data points. The structure of the data is set of extracted and calculated data that is derived from the messages and is assembled to reflect operation at the level of each administrative messaging session, involving a request to the home network provider to join a visited network.
    Type: Application
    Filed: August 30, 2021
    Publication date: April 14, 2022
    Inventors: Michael Sym, Craig Needels
  • Publication number: 20220116780
    Abstract: A device identifier access method and in the field of communications technologies. The method, implemented by a terminal, includes receiving request information for accessing a first device identifier by a target application; determining first access permission used when the target application accesses the first device identifier, where the first access permission includes one of the following: prohibiting access to the first device identifier, allowing access to a real value of the first device identifier, and allowing access to a dummy value of the first device identifier; and when the first access permission is allowing access to the dummy value of the first device identifier, returning the dummy value of the first device identifier to the target application.
    Type: Application
    Filed: October 22, 2021
    Publication date: April 14, 2022
    Inventors: Kao Zhao, Zhen Chen
  • Publication number: 20220116781
    Abstract: For example, an apparatus may be configured to cause an Access Point (AP) to generate an information element including licensed-channel information corresponding to a licensed sub 10 Gigahertz (GHz) (sub-10 GHz) wireless communication channel, which is restricted to private access, the licensed-channel information configured to indicate a central frequency of the licensed sub-10 GHz wireless communication channel, and a bandwidth of the licensed sub-10 GHz wireless communication channel; and to transmit a frame over an unlicensed sub-10 GHz wireless communication channel, which is not restricted to the private access, the unlicensed sub-10 GHz wireless communication channel different from the licensed sub-10 GHz wireless communication channel, the frame including the information element including the licensed-channel information.
    Type: Application
    Filed: December 22, 2021
    Publication date: April 14, 2022
    Applicant: Intel Corporation
    Inventors: Laurent Cariou, Thomas J. Kenney, Robert Stacey
  • Publication number: 20220116782
    Abstract: A system is provided for identifying compromised mobile devices from a network administrator's point of view. The provided system utilizes a graph-based inference approach that leverages an assumed correlation that devices sharing a similar set of installed applications will have a similar probability of being compromised. Stated differently, the provided system determines whether a given unknown device is compromised or not by analyzing its connections to known devices. Such connections are generated from a small set of known compromised mobile devices and the network traffic data of mobile devices collected by a service provider or network administrator. The proposed system is accordingly able to reliably detect unknown compromised devices without relying on device-specific features.
    Type: Application
    Filed: October 6, 2021
    Publication date: April 14, 2022
    Inventors: Mashael Al Sabah, Mohamed Nabeel, Euijin Choo, Issa M Khalil, Ting Yu, Wei Wang
  • Publication number: 20220116783
    Abstract: The invention is a system that provides cybersecurity comprising: several devices connected to a wireless network; a monitoring device that monitors all the devices connected to a wireless network; wherein the monitoring device can remove a device from the wireless network; wherein the monitoring device detects any new devices attempting to join the wireless network; wherein the monitoring device determines whether a new device should be allowed to join the wireless network; wherein the monitoring device calculates the physical location of any new device attempting to join the wireless network; wherein the monitoring device can use the physical location of any new device in order to determine whether the new device is new or anomalous; and wherein the monitoring device keeps a registry of an electronic signature from each of the devices the monitoring device has approved to be on the wireless network.
    Type: Application
    Filed: October 8, 2020
    Publication date: April 14, 2022
    Inventor: Surendra Goel
  • Publication number: 20220116784
    Abstract: A method performed by a wireless device includes receiving a Radio Resources Control Reject (RRCReject) message and determining whether to act on the RRCReject message based on a configuration of the wireless device. The method may also include receiving a configuration message that includes the configuration from a network node.
    Type: Application
    Filed: January 21, 2020
    Publication date: April 14, 2022
    Inventors: Icaro L.J. Da Silva, Magnus Stattin, Gunnar Mildh, Prajwol Kumar Nakarmi
  • Publication number: 20220116785
    Abstract: A system and method for verifying user interactions is disclosed. User profiles are associated with mobile devices 12. The mobile devices have data network connection means (e.g. a WiFi or mobile data connection to the internet). The data network connection may be subject to the availability of external infrastructure and is not therefore constantly available. The mobile devices also have short-range direct broadcast communication means (for example Bluetooth® radios). The short-range direct broadcast communication means does not rely on external infrastructure and therefore direct broadcast communication can be made from one device to another as long as the two devices are close enough together. The system and method allows a connection to be verified between two users who are physically in the same place, whether or not the users' devices both have a current data network connection.
    Type: Application
    Filed: July 22, 2019
    Publication date: April 14, 2022
    Inventors: Keith Banwaitt, Demetrio Filo-Camo