Patents Issued in April 14, 2022
-
Publication number: 20220116736Abstract: In exemplary embodiments, an AI (Artificial Intelligence) enabled system is developed, configured, and/or intended to facilitate the offensive, defensive, and logistical capabilities of a person engaged in warfare in some direct form. This encompasses scenarios ranging from the solo unit behind enemy lines, the operational deployment of forces and resources, to strategic theater. Exemplary embodiments include building or configuring a highly advanced and aware system, facilitated by AI, driven by cloud and edge computing, to allow decisions and tactical advantage be deployed and calculated at the level it needs first. Exemplary embodiments may be configured to address both the kinetic real world as well as digital cyberspace, incorporate offensive and defensive technology, and be primarily driven by the concept to augment forces to support and counter threats as well as malicious enemy AI.Type: ApplicationFiled: December 3, 2021Publication date: April 14, 2022Inventors: David H. WILLIAMS, Adam H. WILLIAMS
-
Publication number: 20220116737Abstract: Methods and systems are described for providing content based on context. An example method may comprise receiving, from a user device, a request comprising data indicative of a location of the user device. The method may comprise determining, based on receiving the request, user information associated with a user of the user device. The method may comprise generating, based on the user information and the data indicative of the location, an information profile relevant to a context of the user at the location. The method may comprise transmitting, to the user device, the information profile.Type: ApplicationFiled: December 23, 2021Publication date: April 14, 2022Inventors: John M. White, Timothy Regnier, Jonathan Smelquist, Kyle Jeske, Serguei Roupassov
-
Publication number: 20220116738Abstract: Methods and systems for power tool geofence tracking. One embodiment provides a method for power tool geofence tracking and dashboard display. The method includes determining, using an electronic processor with a transceiver, a location of one or more power tool devices and generating, using the electronic processor, a dashboard to simultaneously display a location-based inventory, indication of number of missing tool, and geofence setup of power tool devices within the inventory. The method also includes displaying, using the electronic processor, the dashboard on an electronic display.Type: ApplicationFiled: December 21, 2021Publication date: April 14, 2022Inventors: Cory J. McCutchin, Chad E. Jones, Ryan D. Garlock, Christina M. Balda
-
Publication number: 20220116739Abstract: Software for proximity positioning that performs the following operations: (i) receiving at least one parameter via an advertising channel of a first protocol, wherein the at least one parameter is encoded in an advertising packet of the first protocol, and wherein the first protocol supports a first proximity positioning technology; (ii) extracting the encoded at least one parameter from the advertising packet; and (iii) performing, by a second proximity positioning technology different from the first proximity positioning technology, a measurement of distance based, at least in part, on the at least one parameter.Type: ApplicationFiled: October 13, 2020Publication date: April 14, 2022Inventors: Yong Yin, Jia Tian Zhong, Dong Hui Liu, Peng Hui Jiang, Xing Xing Shen, Li Cao, Jia Yu
-
Publication number: 20220116740Abstract: Systems and methods for allowing separate parties to identify each other through the use of matching computer-coordinated identifiers are discussed. In some cases, the methods include using a processor of a computer system to identify a first computer device configured to provide a first perceptible identifier, using the processor to identify a second computer device that is configured to provide a second perceptible identifier, and using the processor to send the first perceptible identifier to the first computer device and the second perceptible identifier to the second computer device, wherein the first and second perceptible identifiers correspond with each other to provide a two-sided, computer-coordinated verification. In some cases, the described methods include modifying the first and second identifiers as the first and second computer devices come into proximity with each other. Other implementations are discussed.Type: ApplicationFiled: July 19, 2021Publication date: April 14, 2022Inventors: Spencer Brown, Joseph Almasy, Jason Baty
-
Publication number: 20220116741Abstract: Systems and methods are provided to permit groups of recreational vehicle riders and others the ability to quickly create and join groups without prior knowledge of the contact information of everyone in the group. In one embodiment, groups are joinable based on the proximity information of the prospective member and the current group members.Type: ApplicationFiled: August 20, 2021Publication date: April 14, 2022Inventors: Gray I. Rentz, Adam C. Koosmann, Nathan A. Good, Jacob H. Larson, Rebecca C. Deitz, David J. Koenig
-
SYSTEM AND METHOD FOR OPTIMIZING COLLECTION AND TRANSMISSION OF SURVEYING DATA ACROSS A ROAD NETWORK
Publication number: 20220116742Abstract: System and methods for automated data collection and reporting while operating a vehicle on the road using a device. The device automatically determines when to collect, store, process and transmit data. Additionally, a system and method for further storing, transmitting, processing, organizing and accessing the information with respect to the collected data.Type: ApplicationFiled: December 22, 2021Publication date: April 14, 2022Inventors: Royi TAL, Thomas BAKONYI, Redenthor IBANA -
Publication number: 20220116743Abstract: The present application discloses systems, methods, and computer-readable media that can utilize a handheld-movement-detection model to detect whether a computing device is moved by hand or otherwise by a person within a vehicle. For instance, the disclosed systems can receive movement data from a computing device and generate filtered signals. Subsequently, the disclosed systems can utilize the handheld-movement-detection model to convert the filtered signals into a binary movement-classification signal (based on a signal threshold) to indicate the presence of handheld movement of a device. Furthermore, the disclosed systems can also utilize movement data from a computing device to detect whether the computing device is mounted and/or to detect vehicular movements.Type: ApplicationFiled: October 14, 2020Publication date: April 14, 2022Inventors: Alya Abbott, Alexander Wesley Contryman, Devjit Chakravarti, Julien van Hout, Zhan Zhang, Gautam Kedia
-
Publication number: 20220116744Abstract: Embodiments described herein provide efficient beam pattern feedback from a user equipment (UE) to a receiving device to help reduce overhead of providing beam pattern information for position determination while maintaining high position determination accuracy. Embodiments include providing beam weights and template elemental game patterns, an elemental gain formula and parameters, and/or template beam patterns with boresight to a remote device, enabling the remote device to determine beam shape.Type: ApplicationFiled: September 23, 2021Publication date: April 14, 2022Inventors: Vasanthan RAGHAVAN, Sony AKKARAKARAN, Juergen CEZANNE
-
Publication number: 20220116745Abstract: Techniques for obfuscating and deploying digital assets (e.g., mobile applications) are provided to mitigate the risk of unauthorized disclosure. An asset can be received that is to be deployed to a plurality of mobile devices, each of the mobile devices associated with a corresponding account having account attributes. A deployment group of one or more mobile devices for deploying the asset can be identified based on a set of one or more obfuscation parameters, comprising account attributes shared among the one or more mobile devices within the deployment group. A customized obfuscation scheme to be applied to the asset can be determined based at least in part on the set of obfuscation parameters. The customized obfuscation scheme can be applied to the asset to generate an obfuscated asset. The obfuscated asset can be transmitted and/or updated over a network to the one or more mobile devices within the deployment group.Type: ApplicationFiled: December 17, 2021Publication date: April 14, 2022Inventors: James Gordon, Roopesh Joshi, David Horton, Johan Van Tilburg
-
Publication number: 20220116746Abstract: The present disclosure provides a special effect synchronization method, device, and a storage medium; wherein the method comprises: receiving a synchronization request for synchronizing the special effect file sent by a special effect preview end; based on the synchronization request, when determining that a direct connection condition is satisfied, establishing a communication link with the special effect preview end in a direct connection mode; receiving an acquisition request for the target special effect file through the communication link; synchronizing the target special effect file to the special effect preview end based on the acquisition request.Type: ApplicationFiled: December 22, 2021Publication date: April 14, 2022Inventors: Ruifeng MA, Le GAO
-
Publication number: 20220116747Abstract: A method and apparatus for modifying call timer thresholds for a push-to-talk (PTT) call is provided herein. During operation, a speed of a radio is received, and the call timer thresholds are modified based on the speed of the radio.Type: ApplicationFiled: October 12, 2020Publication date: April 14, 2022Inventors: ANOOP SEHGAL PARAS RAM, SHEAU WEI CH'NG, HUEY NEE CHEAH, JIN HOE PHUA
-
Publication number: 20220116748Abstract: A push-to-talk device is provided. The push-to-talk device includes a communication interface, a storage configured to store identification information of a plurality of push-to-talk devices included in a network group, and an operation processor electrically connected to the communication interface and the storage. The operation processor is configured to (a) designate one or more push-to-talk devices that are allowed to subscribe to a first message among the plurality of push-to-talk devices, and (b) transmit the first message to the plurality of push-to-talk devices by using a publisher-subscriber pattern through the communication interface.Type: ApplicationFiled: December 23, 2021Publication date: April 14, 2022Applicant: UNIONPLACE CO., LTD.Inventor: Seongcheol BANG
-
Publication number: 20220116749Abstract: The invention relates to a method for managing wirelessly incoming messages on a device, or messages generated by a unit of the device, wherein such an incoming message, or message generated by a unit of the device, is checked according to a predetermined criterion for relevance to a particular person, and wherein the message is only output when relevance is thereby established and, when irrelevance is thereby established, instead the mere presence of the message is signaled.Type: ApplicationFiled: October 7, 2021Publication date: April 14, 2022Applicant: Volkswagen AktiengesellschaftInventor: Sebastian Ehmann
-
Publication number: 20220116750Abstract: A method for configuration enhancements on Access Point Name (APN) or Data Network Name (DNN) selection in a User Equipment (UE) is provided. The UE receives a message from a mobile communication network. In particular, the message includes information on an input source of an APN value or a DNN value. Based on the information, the UE uses the APN value or the DNN value to request establishment of a Packet Data Network (PDN) connection or a Protocol Data Unit (PDU) session with the mobile communication network.Type: ApplicationFiled: August 3, 2021Publication date: April 14, 2022Inventor: Rohit NAIK
-
Publication number: 20220116751Abstract: A system comprising a computer-readable storage medium storing at least one program and a computer-implemented method that enables short message service (SMS) text messaging to be integrated into existing applications is presented. Consistent with some embodiments, the method may include receiving a request from a client application to transmit a message to a recipient device. The method may further include adding the message transmission request to an outbound queue based on determining the message transmission request is valid. In response to successfully validating the request, the method causes transmission of the message to the recipient device.Type: ApplicationFiled: December 20, 2021Publication date: April 14, 2022Inventor: Eric P. Ruttenbur
-
Publication number: 20220116752Abstract: A method is performed by a control center that resides in a home network. Upon receiving, from access networks, attach requests from user equipments (UEs) when the UEs attempt to connect to the access networks, the control center computes a baseline attach failure rate for the attach requests. The control center initially sets a billing type for a UE of a subscriber to usage based billing. Upon receiving, from the access networks, attach requests from the UE when the UE attempts to connect to the access networks, the control center computes an individual attach failure rate for fulfilling the attach requests from the UE. The control center determines whether the individual attach failure rate for the UE exceeds the baseline attach failure rate. When the individual attach failure rate exceeds the baseline attach failure rate, the control center automatically switches the billing type for the UE to flat rate billing.Type: ApplicationFiled: October 13, 2020Publication date: April 14, 2022Inventors: Arindam Gupta, Tara Khoiwal
-
Publication number: 20220116753Abstract: Methods and apparatuses are disclosed for facilitating roaming of terminal device. According to an embodiment, a session management node operable in a home network receives, from another session management node operable in a visiting network, a quality of service (QoS) policy per a roaming agreement between the visiting network and the home network during establishment of a protocol data unit (PDU) session for a terminal device. The session management node retrieves, from a subscriber management node, subscribed QoS parameters of the terminal device. The session management node obtains a result that is generated based on the QoS policy per the roaming agreement and the subscribed QoS parameters of the terminal device.Type: ApplicationFiled: January 9, 2020Publication date: April 14, 2022Inventors: Juying GAN, Qian CHEN, Stefan ROMMER
-
Publication number: 20220116754Abstract: The present disclosure relates to a method of charging packets in a mobile network using a combined packet gateway (PGW) and serving gateway (SGW) which includes receiving a data packet; determining at least one of a rating group and a service rule associated with the data packet; and determining a state of a user device associated with the data packet. When the determined state of the user device comprises a connected state, the method includes charging the data packet, including updating an amount of credit in an account associated with the user device based on the at least one of the rating group and the service rule, and sending the data packet to an enodeB. When the determined state of the user device comprises an idle state, the method includes preventing delivery of the data packet to the enodeB such that the data packet is not charged.Type: ApplicationFiled: December 20, 2021Publication date: April 14, 2022Inventor: Srinivas KAPPLA
-
Publication number: 20220116755Abstract: A machine-readable storage medium includes instructions stored thereupon, which when executed by processing circuitry of a computing node operable to implement a V2X information service (VIS) in a MEC network, cause the processing circuitry to perform operations comprising detecting a subscription request to an information service. The subscription request originates from a MEC application instantiated on a MEC host and includes at least one filtering criterion indicative of an information-processing configuration of the MEC application. The subscription request with the at least one filtering criterion is forwarded to a plurality of providers of the information service. A response message received from at least one of the providers is decoded. The response message indicates an acceptance of the subscription request by the at least one provider. An acknowledgment message is encoded for transmission to the MEC application, indicating the acceptance of the subscription request by the at least one provider.Type: ApplicationFiled: December 22, 2021Publication date: April 14, 2022Inventors: Miltiadis Filippou, Dario Sabella
-
Publication number: 20220116756Abstract: A system allows an end-user to locate and gain access to an access-controlled facility or resource, such as a restroom, phone charging station, or Wi-Fi hot spot. Some implementations of the system monitor the formation and concentration of individuals into crowds that may place a higher demand on facilities and resources located near the crowd. The system may distribute mobile facilities to areas that offer convenient access to potential developing crowds, and when the system determines that there is a disparity between available resources and crowd demand reaches a certain level it may deploy one or more mobile facilities to positions proximate to that crowd. A mobile facility may also be requested on demand by a user or organizer, and some implementations provide cost sharing mechanisms and other user benefits related to requesting and accessing the facility.Type: ApplicationFiled: December 23, 2021Publication date: April 14, 2022Inventor: Frances Heller
-
Publication number: 20220116757Abstract: Logic to cause transmission of a first generic attribute profile (GATT) advertisement comprising a first address associated with the service provider. Logic to generate a second non-GATT advertisement comprising a second address, an encoded personalized identifier (ID), and a payload comprising the first address. Logic to cause transmission of the second non-GATT advertisement. Logic to receive, from a scanner device, a request for the service associated with the first address. Logic to receive a first GATT advertisement for a service provider comprising a first address associated with the service provider. Logic to receive a second non-GATT advertisement comprising a second address, an encoded personalized ID, and a payload, wherein the payload comprises the first address. Logic to decode the encoded personalized ID and associate the personalized ID with the service provider. And logic to request, from an advertisement device that transmitted the first GATT advertisement.Type: ApplicationFiled: December 23, 2021Publication date: April 14, 2022Applicant: Intel CorporationInventors: Izoslav Tchigevsky, Arnaud Pierres, Oren Haggai, Muthu Kumar, Karthik Malurpatna Chamaraj, Hakan Magnus Eriksson
-
Publication number: 20220116758Abstract: A service invoking method, an apparatus, and the like are applied to a terminal device, such as a smartphone or an automated driving device. The method includes: When detecting a user input, the terminal device obtains at least one scenario feature used to describe a scenario in which the terminal device is currently located, determines, based on the user input and the at least one scenario feature, a first parameter associated with a service, and invokes the service based on the first parameter. Therefore, the foregoing method may be used to provide a service for a user based on user habits in different scenarios, to improve user experience.Type: ApplicationFiled: December 23, 2021Publication date: April 14, 2022Inventors: Duan LI, Jingzhou DU, Peng GAO, Xueyan HUANG
-
Publication number: 20220116759Abstract: According to certain embodiments, an electronic device comprises a first communication circuit configured to support a first communication protocol; a display; and at least one processor operatively connected to the first communication circuit and the display, wherein the at least one processor is configured to: configure a cluster with at least one external electronic based on the first communication protocol device through the first communication circuit, receive through the first communication circuit, from the at least one external electronic device, information identifying at least one short-range communication device connected to the at least one external electronic device via a second communication protocol, and control the display to display at least one indicator of the at least one short-range communication device based on the information received from the at least one external electronic device.Type: ApplicationFiled: December 21, 2021Publication date: April 14, 2022Inventors: Jongmu CHOI, Doosuk KANG, Inshik SHIN, Buseop JUNG, Bokun CHOI, Sungjun CHOI
-
Publication number: 20220116760Abstract: This disclosure describes systems, methods, and devices for a mechanism for detecting attacks on frequency offset in a wireless network. A device may receive a packet from a reflector device, wherein the packet comprises an access code and a coded sequence of bits. The device may also receive a tone signal from the reflector device. The device may then calculate a first frequency offset estimation associated with the packet and calculate a second frequency offset estimation associated with the tone signal. The device may then calculate a difference between the first frequency offset estimation and the second frequency offset estimation. The device may further identify an allowable threshold range of the difference.Type: ApplicationFiled: December 24, 2021Publication date: April 14, 2022Inventors: Michael Bogdanov, Yael Anati
-
Publication number: 20220116761Abstract: Systems and methods for computer-aided, session-based operational and organizational responses to asynchronously occurring events. A “session” is a collection of client-server connections, each client connection being an endpoint device in a pool of devices under the control of the members of a defined operational response team cooperating to address an event. The session provides an organizational framework for information sharing, including using context roles to identify the proper recipients for data and messages. The information and data is shared to participating recipients in the session in real-time as the operational response is conducted, and as new data and information is generated, that data is added to the session with a timestamp. Once the response is concluded, the sessions can be closed, encapsulating the data, which can then be “played” back to re-experience the response as it played out, such as for audit, analysis, and review purposes.Type: ApplicationFiled: December 20, 2021Publication date: April 14, 2022Inventors: John J. Dames, Michael S. Biviano
-
Publication number: 20220116762Abstract: A terminal software upgrade method can be applied to a terminal that is installed with a near-field communication sensing circuit. The terminal software upgrade method can include: in response to a distance between a near-field communication instruction writing circuit and the terminal reaching an effective communication distance of a near-field communication, writing instruction information sent by the near-field communication instruction writing circuit into the near-field communication sensing circuit, wherein the instruction information comprises at least boot-up instruction information and upgrade configuration information; and controlling the terminal to boot up via the near-field communication sensing circuit, based on the boot-up instruction information, and upgrading software of the terminal based on the upgrade configuration information.Type: ApplicationFiled: May 30, 2021Publication date: April 14, 2022Applicant: BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.Inventors: Guangjun QIAO, Bing ZHAO, Shuxiao ZHANG
-
Publication number: 20220116763Abstract: A method and system for provisioning an embedded SIM (eSIM) with an enhanced SIM profile are provided. The method includes creating an eSIM card with a single enhanced SIM profile on a connected device, wherein the created eSIM includes at least an applet; initiating a subscription management data exchange between the eSIM card and various components of a cellular network; initiating a bootstrap control of the applet to restart the eSIM; and configuring the eSIM with the plurality of multi-international mobile subscriber identity (multi-IMSI) profiles and actions related to IMSI profiles, wherein the configuration is performed using over-the-air (OTA) configuration, thereby configuring the enhanced SIM profile with plurality IMSI profiles.Type: ApplicationFiled: October 13, 2021Publication date: April 14, 2022Applicant: Flo Live Israel Ltd.Inventors: Oren BOUSKILA, Eran DOTAN ROSENBERG
-
Publication number: 20220116764Abstract: A method of wireless communication by a user equipment (UE) receives a machine learning model from a base station. The UE reports, to the base station, a machine learning processing capability. The UE also transmits, to the base station, gradient updates or weight updates to the machine learning model. A base station transmits a machine learning model to a number of UEs. The base station receives, from each of the number of UEs, a machine learning processing capability report. The base station groups a number of UEs in accordance with the machine learning processing capability reports, to receive gradient updates to the machine learning model.Type: ApplicationFiled: October 7, 2021Publication date: April 14, 2022Inventors: Hamed PEZESHKI, Tao LUO, Taesang YOO
-
Publication number: 20220116765Abstract: A system and a method are provided for a client device for use with a Wi-Fi network device, a first external server, and a second external server. The client device includes a memory having a non-critical portion configured to store non-critical data and a keychain storage portion configured to store encrypted data and a processor configured to execute instructions stored on the memory to cause the client device to: wirelessly associate with the Wi-Fi network device; store Wi-Fi network device data associated with configuring the Wi-Fi network device in the first external server; migrate the Wi-Fi network device data from the first external server to the second external server via the client device; and store migration status information in the keychain storage portion of the memory.Type: ApplicationFiled: August 24, 2021Publication date: April 14, 2022Inventors: Jalagandeswari GANAPATHY, Muralidharan NARAYANAN
-
Publication number: 20220116766Abstract: The present disclosure relates to a pre-5th-Generation (5G) or 5G communication system to be provided for supporting higher data rates in a Beyond 4th-Generation (4G) communication system such as Long Term Evolution (LTE). According to various embodiments, a network node in a wireless communication system may include: receiving, from an application function (AF) via a network exposure function (NEF), user equipment (UE) radio capability information on UE radio capability identifier (ID) and at least one UE radio capability mapping to the UE radio capability ID; receiving, from an access and mobility management function (AMF), a request for information on at least one UE radio capability mapping to a specific UE radio capability ID; and transmitting, to the AMF, the information on at least one UE radio capability mapping to the specific UE radio capability ID.Type: ApplicationFiled: December 23, 2021Publication date: April 14, 2022Inventors: Sunghoon KIM, Andrew BENNETT
-
Publication number: 20220116767Abstract: Some aspects of this disclosure relate to apparatuses and methods for implementing wireless devices. A service is provided by a first application operating on a publisher device to a second application operating on a subscriber device over a first data path between the two devices in a NAN network. The publisher device includes a first recovery manager to receive an indication from a wireless controller of the publisher device or a distress message from a second recovery manager of the subscriber device. The received indication or distress message indicates that the first data path has been interrupted. The first recovery manager stores, in a memory, data generated by the first application. A second data path is established between the publisher device and the subscriber device. The first recovery manager sends the stored data to the second application that operates on a subscriber device.Type: ApplicationFiled: October 8, 2021Publication date: April 14, 2022Applicant: Apple Inc.Inventors: Lawrie Kurian, Archish Y. Rangan, Manav Gabhawala, Prasad Vasantha Gopinathan, Tashbeeb Haque, Yong Liu
-
Publication number: 20220116768Abstract: Systems, apparatuses, and methods are described for detecting network service failure and potential source of failure in a communication network employing registration requests. A current quantity of registration requests may be compared against an expected quantity of registration requests, and a network alert may be sent based on the comparison.Type: ApplicationFiled: November 29, 2021Publication date: April 14, 2022Applicant: Comcast Cable Communications, LLCInventors: Yubin Li, Jiongkuan Hou
-
Publication number: 20220116769Abstract: Apparatuses, methods, and systems are disclosed for supporting a notification procedure during 5G registration over a non-3GPP access network. One apparatus includes a transceiver that communicates with a mobile communication network (“MCN”) via a trusted non-3GPP access network (“TNAN”) and a processor that receives a message that starts an EAP session with an access gateway in the TNAN. Here, the EAP session facilitates the establishment of a NAS signaling connection between the apparatus and the MCN and to encapsulate NAS messages exchanged between the apparatus and an AMF in the MCN. The processor receives an EAP notification request from the access gateway before the EAP session is completed. Here, the EAP notification request including at least one access parameter. The processor sends an EAP notification response and completes the EAP session.Type: ApplicationFiled: April 6, 2020Publication date: April 14, 2022Inventor: Apostolis Salkintzis
-
Publication number: 20220116770Abstract: A first apparatus includes a processor, a memory, and communication circuitry. The first apparatus is connected to a communications network via its communication circuitry. The first apparatus further includes computer-executable instructions stored in the memory of the first apparatus which, when executed by the processor of the first apparatus, cause the first apparatus to: receive voice content or other biometric content of a user; prepare a message including the voice or other biometric content; send the message to the communications network or a second apparatus through a control plane of the communications network in order to authenticate and authorize the first apparatus and the user; receive a response message from the communications network or the second apparatus, wherein the response message includes authentication and authorization results for the first apparatus and identification information that identifies the user.Type: ApplicationFiled: December 10, 2019Publication date: April 14, 2022Inventors: Hongkun LI, Michael STARSINIC, Rocco DI GIROLAMO, Catalina MLADIN, Chonggang WANG, Quang LY, Dale Seed
-
Publication number: 20220116771Abstract: Devices, systems and methods use a first communication interface to connect with a local device via a first protocol and use a second communication interface to connect with a server via a second protocol. Embodiments relay secure communications between the local device and the server for authentication of the at least one local device by the server and responsive to authentication of the local device by the server, transmit information for storage in a secure memory of the authenticated local device.Type: ApplicationFiled: October 6, 2021Publication date: April 14, 2022Applicant: Cypress Semiconductor CorporationInventors: Hui Luo, Hongwei Kong, Kaiping Li, Sungeun Lee, Sridhar Prakasam
-
Publication number: 20220116772Abstract: A surgical device is provided. The surgical device includes a tubular outer shaft having a longitudinal axis and an angled guide positioned on a first end of the surgical device. The angled guide may be angled relative to the longitudinal axis of the outer shaft. The surgical device includes an elongated inner shaft having a second end and a third end. The inner shaft is removably coupled to the outer shaft and configured to axially translate through the outer shaft. The surgical device includes pivotal device having at least one joint and an access tool. The at least one joint may be pivotally coupled to the third end of the inner shaft and to an end of the access tool. The pivotal device may be configured to axially translate through the angled guide into a deployed position.Type: ApplicationFiled: December 21, 2021Publication date: April 14, 2022Applicant: Warsaw Orthopedic, Inc.Inventors: ADRIAAN J. KUYLER, Benjamin D. Cowan
-
Publication number: 20220116773Abstract: A method, performed by a user equipment (UE), of managing secondary platform bundles (SPBs), includes receiving an end user selection for managing a state of at least one SPB among SPBs installed in a smart secure platform (SSP) module; checking bundle management information required to manage the state of the at least one SPB based on the end user selection; determining whether end user intent confirmation is required to manage the state of the at least one SPB according to the end user selection based on the bundle management information; and managing the state of the at least one SPB based on a result of the determining.Type: ApplicationFiled: December 21, 2021Publication date: April 14, 2022Inventors: Hyewon LEE, Kangjin YOON, Duckey LEE, Jonghoe KOO
-
Publication number: 20220116774Abstract: Methods and systems for authentication and establishment of secure connection for accessing edge computing services are provided. The method includes dynamically deriving a pre-shared key (PSK) and use the dynamically derived PSK for the authentication, while performing or before performing a secure connection establishment or while or before establishing a secure interface between a user equipment (UE), and a server, wherein the UE includes an Edge Enabler Client (EEC), and the server is an Edge Configuration Server (ECS). The method further includes deriving the PSK based on an Authentication and Key Management for Applications (AKMA) application key.Type: ApplicationFiled: October 8, 2021Publication date: April 14, 2022Inventors: Rajavelsamy RAJADURAI, Nishant GUPTA, Rohini RAJENDRAN, Nivedya Parambath SASI
-
Publication number: 20220116775Abstract: A method for automatically allowing access to a WI-FI network by a mobile device can be applied to a mobile device and a WI-FI access point (AP). The mobile device includes a first microphone, first wireless communicating unit, and first processing unit. The first microphone obtains ambient sound, and the first wireless communicating unit can transmit accessing request. The mobile device can receive a password-generating command from a found WI-FI AP. The WI-FI AP comprises second microphone, second wireless communicating unit, and second processing unit. The second microphone also obtains ambient sound. The second wireless communicating unit receives the accessing request and transmits the password-generating command. The second processing unit generates an AP password according to the ambient sound and can compare a device password received from the mobile device. The mobile device is allowed to access the WI-FI AP when the device password matches with the AP password.Type: ApplicationFiled: December 22, 2021Publication date: April 14, 2022Inventor: SHIH-JUNG YEN
-
Publication number: 20220116776Abstract: Methods, systems, apparatus, and computer-readable storage devices for anonymous device authentication. A method includes: accessing, by the electronic device, data stored by the electronic device that identifies authentication keys the electronic device accepts as valid; sending, by the electronic device to a second electronic device, an authentication request that identifies a set of authentication keys including at least some of authentication keys the electronic device accepts as valid; and receiving, by the electronic device, response data that the second electronic device provides in response to the authentication request. The response data (i) identifies a particular authentication key from the set of authentication keys identified by the authentication request, and (ii) includes a signature generated using the particular authentication key.Type: ApplicationFiled: June 30, 2020Publication date: April 14, 2022Inventors: Randall Spangler, Kiavash Faraji
-
Publication number: 20220116777Abstract: A system and method for authentication of a secure element cooperating with a Mobile Equipment forming a terminal in a telecommunication network is provided. The telecommunication network comprises a SEAF and a AUSF/UDM/ARPF. The method includes generating an anchor key (KSEAF_SRT) for the communication between the terminal and the SEAF according to 3GPP TS 33.501, wherein the anchor key (KSEAF_SRT) is indirectly derived from a key (KSRT) obtained by deriving from the long-term key K and a secure registration token SRT sent by the terminal to the AUSF/UDM/ARPF and concealed with the AUSF/UDM/ARPF public key along with its SUPI in the SUCI. Other embodiments are disclosed.Type: ApplicationFiled: January 16, 2020Publication date: April 14, 2022Applicant: THALES DIS FRANCE SAInventors: Ly-Thanh PHAN, Mireille PAULIAC
-
Publication number: 20220116778Abstract: The invention provides a method for managing access to a network resource on a network from a mobile device, the method including the steps of intercepting a data stream from the mobile device attempting to access the network resource, extracting information from the intercepted data stream relating to at least one of the mobile device or a user of the mobile device, accessing at least one of enterprise service based information and third party information regarding at least one of the mobile device or the user of the mobile device, determining whether the mobile device is authorized to access the network resource, preparing an access decision that specifies whether the mobile device is authorized to access the network resource, and storing the access decision in a database on the network.Type: ApplicationFiled: August 16, 2021Publication date: April 14, 2022Applicant: McAfee, LLCInventors: Norm Laudermilch, William Supernor, Roman Boroday, David Moshe Goldschlag
-
Publication number: 20220116779Abstract: Embodiments of the present invention adapt interconnect systems to apply automated rules and analytics to the Authentication, Authorization, and Accounting (“AAA”) messages between providers that are handled by the interconnect system. The automated rules and analytics interpret or convert the administrative messages into a measure of technical performance of the visited network in relation to a corresponding home network provider. As part of this process, the system establishes a procedure that matches messages involving a device to be related and produces a data structure and corresponding data that is stored and reflects the performance or other salient data points. The structure of the data is set of extracted and calculated data that is derived from the messages and is assembled to reflect operation at the level of each administrative messaging session, involving a request to the home network provider to join a visited network.Type: ApplicationFiled: August 30, 2021Publication date: April 14, 2022Inventors: Michael Sym, Craig Needels
-
Publication number: 20220116780Abstract: A device identifier access method and in the field of communications technologies. The method, implemented by a terminal, includes receiving request information for accessing a first device identifier by a target application; determining first access permission used when the target application accesses the first device identifier, where the first access permission includes one of the following: prohibiting access to the first device identifier, allowing access to a real value of the first device identifier, and allowing access to a dummy value of the first device identifier; and when the first access permission is allowing access to the dummy value of the first device identifier, returning the dummy value of the first device identifier to the target application.Type: ApplicationFiled: October 22, 2021Publication date: April 14, 2022Inventors: Kao Zhao, Zhen Chen
-
Publication number: 20220116781Abstract: For example, an apparatus may be configured to cause an Access Point (AP) to generate an information element including licensed-channel information corresponding to a licensed sub 10 Gigahertz (GHz) (sub-10 GHz) wireless communication channel, which is restricted to private access, the licensed-channel information configured to indicate a central frequency of the licensed sub-10 GHz wireless communication channel, and a bandwidth of the licensed sub-10 GHz wireless communication channel; and to transmit a frame over an unlicensed sub-10 GHz wireless communication channel, which is not restricted to the private access, the unlicensed sub-10 GHz wireless communication channel different from the licensed sub-10 GHz wireless communication channel, the frame including the information element including the licensed-channel information.Type: ApplicationFiled: December 22, 2021Publication date: April 14, 2022Applicant: Intel CorporationInventors: Laurent Cariou, Thomas J. Kenney, Robert Stacey
-
Publication number: 20220116782Abstract: A system is provided for identifying compromised mobile devices from a network administrator's point of view. The provided system utilizes a graph-based inference approach that leverages an assumed correlation that devices sharing a similar set of installed applications will have a similar probability of being compromised. Stated differently, the provided system determines whether a given unknown device is compromised or not by analyzing its connections to known devices. Such connections are generated from a small set of known compromised mobile devices and the network traffic data of mobile devices collected by a service provider or network administrator. The proposed system is accordingly able to reliably detect unknown compromised devices without relying on device-specific features.Type: ApplicationFiled: October 6, 2021Publication date: April 14, 2022Inventors: Mashael Al Sabah, Mohamed Nabeel, Euijin Choo, Issa M Khalil, Ting Yu, Wei Wang
-
Publication number: 20220116783Abstract: The invention is a system that provides cybersecurity comprising: several devices connected to a wireless network; a monitoring device that monitors all the devices connected to a wireless network; wherein the monitoring device can remove a device from the wireless network; wherein the monitoring device detects any new devices attempting to join the wireless network; wherein the monitoring device determines whether a new device should be allowed to join the wireless network; wherein the monitoring device calculates the physical location of any new device attempting to join the wireless network; wherein the monitoring device can use the physical location of any new device in order to determine whether the new device is new or anomalous; and wherein the monitoring device keeps a registry of an electronic signature from each of the devices the monitoring device has approved to be on the wireless network.Type: ApplicationFiled: October 8, 2020Publication date: April 14, 2022Inventor: Surendra Goel
-
Publication number: 20220116784Abstract: A method performed by a wireless device includes receiving a Radio Resources Control Reject (RRCReject) message and determining whether to act on the RRCReject message based on a configuration of the wireless device. The method may also include receiving a configuration message that includes the configuration from a network node.Type: ApplicationFiled: January 21, 2020Publication date: April 14, 2022Inventors: Icaro L.J. Da Silva, Magnus Stattin, Gunnar Mildh, Prajwol Kumar Nakarmi
-
Publication number: 20220116785Abstract: A system and method for verifying user interactions is disclosed. User profiles are associated with mobile devices 12. The mobile devices have data network connection means (e.g. a WiFi or mobile data connection to the internet). The data network connection may be subject to the availability of external infrastructure and is not therefore constantly available. The mobile devices also have short-range direct broadcast communication means (for example Bluetooth® radios). The short-range direct broadcast communication means does not rely on external infrastructure and therefore direct broadcast communication can be made from one device to another as long as the two devices are close enough together. The system and method allows a connection to be verified between two users who are physically in the same place, whether or not the users' devices both have a current data network connection.Type: ApplicationFiled: July 22, 2019Publication date: April 14, 2022Inventors: Keith Banwaitt, Demetrio Filo-Camo