Abstract:
Disclosed herein is a technique for selecting a bootstrap electronic Subscriber Identity Module (eSIM) from among multiple bootstrap eSIMs stored in a secure element of a mobile device. Specifically, the technique involves selecting the bootstrap eSIM based on location information associated with the mobile device. When the mobile device is located at a first location (for example, a first country) a first bootstrap eSIM associated with a Mobile Network Operator (MNO) local to the first country is selected. Similarly, when the mobile device is located at a second location (for example, a second country), a second bootstrap eSIM associated with an MNO local to the second country is selected.
Abstract:
A mobile wireless device maintains registration on two parallel wireless communication networks that each use different wireless communication protocols. In response to a first connection request received from a first wireless network, the mobile wireless device tunes a single receiver contained therein from the first wireless network to a second wireless network. Subsequently in response to a second connection request received from the second wireless network, the mobile wireless device connects to the second wireless network.
Abstract:
An automated environment can monitor its resource consumption at the environment level and detect anomalies. Resource consumption can be monitored using a sparse set of sensors that provide information about the total resource consumption of the automated environment. The sensor data can be analyzed together with information about a behavioral routine of users in the automated environment to define a baseline resource consumption pattern. Once a baseline resource consumption pattern is established, anomalies in resource consumption can be detected and reported to users.
Abstract:
Methods and apparatus for activating a mobile device for use with a service provider. In one embodiment, a powered-off mobile device having an inserted Subscriber Identity Module (SIM) may be programmed with configuration data while “in box” (e.g., at a point of sale (POS), in a warehouse, etc.) using a near field communication (NFC) data interface. In another exemplary embodiment, information that is stored to a NFC accessible memory can be accessed when the device is non-functional e.g., to retrieve backup data.
Abstract:
A method for delaying network reselection by a wireless communication device following a call failure is provided. The method can include determining an initiation of a voice call while connected to a first network. The method can further include participating in a circuit switched fallback (CSFB) procedure to transition from the first network to a second network in response to initiation of the voice call. The method can additionally include determining an occurrence of a call failure of the voice call. The method can also include, responsive to the call failure, barring reselection to the first network for a threshold barring period.