Abstract:
Apparatus and methods for authenticating and granting a client device (e.g., cellular telephone) access to a network. In one embodiment, a network service provider such as a cellular telephone company may distribute user access (e.g., Universal Subscriber Identity Module or “USIM”) credentials to a service manager via a USIM vendor. The services manager may maintain a list of authorized users. A user at a client may authenticate to the services manager. Once authenticated, the services manager may provide the user with a set of USIM credentials. When the user desires to use wireless network services, the user equipment may establish a wireless link between the user equipment and the network service provider. During authentication operations, the user equipment may use the USIM credentials to authenticate to the network service provider. Following successful authentication, the network service provider may provide the user equipment with wireless services.
Abstract:
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).
Abstract:
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).
Abstract:
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).
Abstract:
A device and method selects an antenna configuration. The method performed at a user equipment includes determining at least one communication functionality that is being used, each communication functionality configured to utilize at least one antenna in a multi-antenna arrangement of the user equipment. The method includes receiving a first indication of whether a cellular communication functionality is being used, the cellular communication functionality configured to utilize at least one antenna in the multi-antenna arrangement. The method includes receiving a second indication of whether a coexistence condition is present. The method includes determining an antenna configuration for the multi-antenna arrangement to be used by the determined communication functionality based upon the determined communication functionality, the first indication, and the second indication. The method includes configuring the multi-antenna arrangement for the determined communication functionality based upon the antenna configuration.
Abstract:
This disclosure relates to systems, methods, and apparatus for limiting or throttling an activity of an accessory device communicatively coupled to a computing device. The activity of the accessory device is limited or throttled in order to reduce electromagnetic interference and improve signal quality of a wireless communication in which the computing device is participating. In some embodiments, a decision to throttle can be based on battery charge level of the computing device. For example, in some embodiments, the accessory device is an accessory battery charger configured to provide power to the computing device when a power outlet is not immediately available. If the signal quality of a phone call from the computing device is diminished or the user is in an area of low signal coverage, the accessory battery charger can be limited or throttled in order to prevent interference between the accessory battery charger and computing device.
Abstract:
This application relates to systems, methods, and apparatus for testing operability of a mobile device with a reader device. In some embodiments, a testing system is set forth for automatically placing the mobile device proximate to the reader device in order to initiate a wireless transaction between the mobile device and the reader device. Depending on whether the mobile device is determined to be operable with the reader device, the testing system can automatically place the mobile device proximate to another reader device for testing. In this way, reductions in testing time can be manifested as a result of automating the testing process.
Abstract:
In order to improve communication with another electronic device, during an advertising mode an electronic device (such as a smartphone) may transmit a packet with advertising information using a default transmit power level. Then, based on feedback about a performance metric associated with the communication from the other electronic device, the electronic device may selectively increase the transmit power level for a subsequent packet. Because this selective increase in the transmit power level may increase the overall power consumption, the change in the transmit power level also may depend on one or more factors, such as a battery power level of the electronic device. However, the selective increase in the transmit power level may, in some instances, decrease the overall power consumption by reducing or eliminating retries.
Abstract:
An electronic device with a display and a fingerprint sensor may authenticate a user for a respective function. While access to one or more resources of the device is restricted, the device displays an irregular arrangement of shapes on the touch-sensitive display. The device receives input based on the displayed irregular arrangement of the shapes. In accordance with a determination that the input meets input pattern criteria, the device provides access to the one or more restricted resources. In accordance with a determination that the input does not meet the input pattern criteria, the devices forgoes providing access to the one or more restricted resources of the device.