Abstract:
Apparatus and methods for distributing electronic access client modules for use with electronic devices. In one embodiment, the access client modules are virtual subscriber identity modules (VSIMs) that can be downloaded from online services for use with cellular-equipped devices such as smartphones. The online services may include a point of sale (POS) system that sells electronic devices to users. A broker may be used to facilitate the selection of a virtual subscriber identity module. A provisioning service may also be used to provision the selected VSIM.
Abstract:
Methods and apparatus for intelligently selecting and operating one or more air interfaces of a mobile wireless device for e.g., call setup time reduction. In one embodiment, operation of a high speed cellular interface is selectively adjusted or disabled or switched out when not required so as to minimize call setup times by, e.g., using a different cellular interface to receive pages. In one implementation, the wireless device includes a high-speed cellular interface, a lower-speed cellular interface, and a WLAN (e.g., Wi-Fi) interface.
Abstract:
Methods and apparatus for large scale distribution of electronic access control clients. In one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal Integrated Circuit Card (eUICC) and client eUICC software comprise a so-called “stack” of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eSIMs).
Abstract:
The invention provides a technique for managing write operations issued to a non-volatile memory included in a wireless device. A monitor software application executes on the wireless device and is configured to determine that a number of write operations issued to the non-volatile memory is greater than or equal to a write operation threshold associated with the non-volatile memory. In response, at least one application is isolated as the application responsible for issuing excessive write operations. The isolation can be carried out locally on the wireless device, or the isolation can be carried out remotely at a server by sending information about the write operations to the server. The monitor then limits additional write operations from being issued to the non-volatile memory so as to protect the non-volatile memory from becoming corrupted or inoperable.
Abstract:
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
Abstract:
Facilitating multiple subscriber identity support in a wireless user equipment (UE) device. A UE may include or be coupled to multiple subscriber identity modules (SIMs). The UE may be configured to perform cellular communications with a first cellular network using a first subscriber identity provided by a first SIM. The UE may also be configured to perform cellular communications with a second cellular network using a second subscriber identity provided by a second SIM. The cellular communications with the first cellular network and the second cellular network may be performed concurrently using shared radio resources.
Abstract:
The disclosed system and method for a mobile device combines information derived from onboard sensors with conventional signal processing information derived from a speech or audio signal to assist in noise and echo cancellation. In some implementations, an Angle and Distance Processing (ADP) module is employed on a mobile device and configured to provide runtime angle and distance information to an adaptive beamformer for canceling noise signals, provides a means for building a table of filter coefficients for adaptive filters used in echo cancellation, provides faster and more accurate Automatic Gain Control (AGC), provides delay information for a classifier in a Voice Activity Detector (VAD), provides a means for automatic switching between a speakerphone and handset mode of the mobile device, or primary microphone and reference microphones and assists in separating echo path changes from double talk.
Abstract:
Methods and apparatus for preferring connections between networks. In one embodiment, a mobile device is capable of hybrid network operation (e.g. LTE and CDMA 1X operation), allowing the mobile device to be registered to a CDMA 1X network for voice calls while receiving and sending data traffic over a LTE network. However, any data sent by the LTE network may be lost if the data was transmitted during a tune-away to the CDMA 1X network to perform maintenance operations. In one variant, the mobile device can disable the idle voice connection to the CDMA 1X network based on a request from resident applications requiring real-time data streaming, which are more likely to experience data loss. Consequently, potential data loss due to a network tune-away is prevented, thereby improving data performance of the resident applications. In another embodiment, an adaptive transmit receive mode can be selectively disabled/enabled for data traffic.
Abstract:
Techniques for flexible electronic subscriber identity module (eSIM) deployment to a wireless device by a network server, including generation of multiple eSIMs using an identical eSIM identifier value, such as an identical integrated circuit card identifier (ICCID) value, and subsequent selection of an eSIM based on capabilities of the wireless device. Multiple eSIMs that correspond to different sets of wireless device capabilities are generated without knowledge of the wireless communication standards that a wireless device supports. The multiple eSIMs include a first eSIM that includes fifth generation (5G) wireless communication protocol information and a second eSIM that excludes 5G wireless communication protocol information. The network server selects an eSIM from the multiple eSIMs based on whether the wireless device is 5G capable. After selection and binding of a profile package that includes the eSIM, the remaining eSIMs that use the identical ICCID value are deleted, for security enforcement against cloning.
Abstract:
A system and method for selecting a network interface for a communication device having at least two radio physical interface, to improve communications by the communication device. A configuration of the communication device is determined, where a first radio physical interface is designated as a primary interface and active, and a second radio physical interface as idle. A networking subsystem of the operating system executes a state machine configured to monitor network conditions and associated performance parameters of the at least two radio physical interfaces, to automatically outrank the second radio physical interface over the first radio physical interface as the primary interface.