-
公开(公告)号:US20250071151A1
公开(公告)日:2025-02-27
申请号:US18946594
申请日:2024-11-13
Applicant: Headwater Research LLC
Inventor: Gregory G. Raleigh
IPC: H04L9/40 , G06F15/177 , G06Q10/0631 , G06Q10/0637 , G06Q20/10 , G06Q20/20 , G06Q20/40 , G06Q30/0207 , G06Q30/0241 , G06Q30/0283 , G06Q30/04 , G06Q30/0601 , G06Q40/00 , G06Q40/12 , H04L9/32 , H04L12/14 , H04L41/08 , H04L41/0806 , H04L41/0893 , H04L41/5003 , H04L41/5025 , H04L41/5054 , H04L47/20 , H04L47/2408 , H04L51/046 , H04L67/00 , H04L67/145 , H04L67/306 , H04L67/55 , H04L67/564 , H04L67/63 , H04M15/00 , H04W4/02 , H04W4/12 , H04W4/18 , H04W4/20 , H04W4/24 , H04W4/50 , H04W8/02 , H04W8/18 , H04W8/20 , H04W12/00 , H04W12/02 , H04W12/037 , H04W12/06 , H04W12/08 , H04W24/08 , H04W28/02 , H04W28/12 , H04W48/14 , H04W48/16 , H04W72/0453 , H04W84/04 , H04W84/12 , H04W88/06 , H04W88/08
Abstract: Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device stores a set of device credentials for activating the communications device for a service on a network; and sends an access request to the network, the access request including the set of device credentials.
-
公开(公告)号:US20250069028A1
公开(公告)日:2025-02-27
申请号:US18949373
申请日:2024-11-15
Applicant: Federal Express Corporation
Inventor: Ole-Petter Skaaksrud
IPC: G06Q10/0833 , G06Q10/087 , G06Q30/0601 , H04B17/391 , H04H20/71 , H04L1/00 , H04W4/029 , H04W8/18 , H04W8/24 , H04W28/02 , H04W40/02 , H04W52/22 , H04W52/40
Abstract: Methods and apparatus are described for enhanced node communication within a wireless node network having nodes and a server. The method begins with a first node associating with a second node, and the first node capturing relevant node information. The first node transmits the relevant node information to the server via the second node operating as an intermediary for indirect communication with the server. A third node captures relevant node information and transmits the relevant node information to the server without using the second node as an intermediary or bridge to the server. Each of the first node, the second node, and the third node may be wireless transceiver-based nodes and respectively implemented as integrated circuits.
-
公开(公告)号:US20250056204A1
公开(公告)日:2025-02-13
申请号:US18797318
申请日:2024-08-07
Applicant: Lenovo (Singapore) Pte. Ltd.
Inventor: Roozbeh Atarius
Abstract: Various aspects of the present disclosure relate to: receiving, from a first device, a message including: an indication identifying a service or an application; and an indication identifying an analytics associated with the service or the application; transmitting, to a second device, a request for a subscription to the analytics; receiving, from the second device, a response associated with the analytics; and transmitting, to the first device, the response associated with the analytics.
-
公开(公告)号:US20250048086A1
公开(公告)日:2025-02-06
申请号:US18924311
申请日:2024-10-23
Applicant: Apple Inc.
Inventor: Li LI , Jean-Marc PADOVA , Najeeb M. ABDULRAHIMAN
IPC: H04W8/26 , H04W8/18 , H04W12/03 , H04W12/0431 , H04W12/06
Abstract: This application describes a phased approach to provision eSIM profiles to a wireless device. Credentials are preloaded to an eUICC during manufacture of the eUICC and used subsequently to load eSIM profiles to the eUICC without requiring an active, real-time connection to an MNO provisioning server. Multiple bound profile packages (BPPs) can be pre-generated and encrypted by MNO provisioning servers for an eUICC and transferred to a BPP aggregator server before assembly of the eUICC in a respective wireless device. A local provisioning server in a manufacturing facility mutually authenticates and connects to the BPP aggregator server to download and store one or more of the encrypted BPPs for later installation on the eUICC. The local provisioning server subsequently mutually authenticates and connects to the eUICC to load at least one of the one or more pre-generated, encrypted BPPs to the eUICC during assembly and/or testing of the wireless device.
-
公开(公告)号:US20250048079A1
公开(公告)日:2025-02-06
申请号:US18899896
申请日:2024-09-27
Applicant: Intercom, Inc.
Inventor: Eoin Nolan , Séan Smithers , Paul Magrath
Abstract: A method includes identifying a first group of user objects that are absent from a first user path comprising a first edge and a first subsequent node. The first subsequent node including a condition block indicating whether a respective user object advances within the first user path from the first subsequent node along the first edge. The method includes locating active checkpoints within other user paths with each active checkpoint having a user object associated therewith. The method includes generating a second group of the user objects associated with the active checkpoints from the other user paths. The method includes performing, by a processing device, a negative match to identify a first user object from the first group and a second user object from the second group. The method includes preventing the first user object and the second user object from entering the first user path.
-
公开(公告)号:US20250048077A1
公开(公告)日:2025-02-06
申请号:US18746417
申请日:2024-06-18
Applicant: APPLE INC.
Inventor: Abhigyan Joshi , Manjunath Prasad , Krishna Basawaraj Patil , Nithish Kulur Prabhakara , Li Li , Ajay Singh , Xiangpeng Jing , Dinesh Kumar Arora , Gaurav Pathak , Rajeev Verma , Pinki Gyanchandani
IPC: H04W8/18
Abstract: Systems and methods for providing non-active subscriber identity module (SIM) services leveraging multiple SIMs configured at multiple UEs are disclosed herein. A primary user equipment (UE), activating a first SIM of a dual SIM dual standby (DSDS) configuration used by the primary UE to perform active-mode network communications on the first SIM and sends, to a secondary UE, an indication to activate a second SIM of the DSDS configuration in response to the activating the first SIM of the DSDS configuration used by the primary UE. The secondary UE receives the indication to activate the second SIM of the first DSDS configuration used by the primary UE and activates the second SIM for use by the secondary UE in response to receiving the indication. Accordingly, the secondary UE may handle any network communications on the second SIM during the network communications on the first SIM at the primary UE.
-
公开(公告)号:US20250047773A1
公开(公告)日:2025-02-06
申请号:US18920467
申请日:2024-10-18
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Kwangtaek WOO , Mingyu KIM , Seonghun KIM , Jaeho CHOI , Jinwan AN
IPC: H04M1/72454 , H04W8/18
Abstract: An electronic device according to an embodiment comprises: a display module including a plurality of areas; a memory that stores computer-executable instructions; and a processor that executes the instructions by accessing the memory, wherein the instructions may be configured to: if detecting an execution input for a target application, acquire target subscriber identification module information connected to the target application, from among a plurality of pieces of subscriber identification module information read by the electronic device; and in a target area corresponding to the acquired target subscriber identification module information, from among the plurality of areas of the display module, display a screen of the target application executed by using the acquired target subscriber identification module information.
-
公开(公告)号:US12219540B2
公开(公告)日:2025-02-04
申请号:US17661173
申请日:2022-04-28
Applicant: QUALCOMM Incorporated
Inventor: Akash Kumar
IPC: H04W72/0453 , H04W8/18
Abstract: A method of wireless communication performed by a user equipment (UE) includes: operating in a dual SIM dual active (DSDA) mode with respect to a first subscriber identity module (SIM) and a second SIM; controlling transmit operations of the first SIM and the second SIM according to a time division multiplexed (TDM) priority pattern; performing demodulation reference signal (DMRS) bundling on the first SIM, the first SIM having a higher priority state according to the TDM priority pattern; and deferring a priority switch to give the higher priority state to the second SIM until after the first SIM has completed a repetition of DMRS bundling.
-
公开(公告)号:US12219087B2
公开(公告)日:2025-02-04
申请号:US17406617
申请日:2021-08-19
Applicant: Verizon Patent and Licensing Inc.
Inventor: Shanthala Kuravangi-Thammaiah , Madhan Muralimanohar , Violeta Cakulev , Jerry Steben , Harinder S. Lakhian , Muthukumar Retnasamy , Hans Raj Nahata
Abstract: Systems and methods described herein enable distribution of a Charging Function group identifier (“CHF-Group-ID”) and other CHF selection data to CHF consumers during Protocol Data Unit (PDU) session establishment in a 5G network. A Unified Data Repository (UDR) is provisioned with CHF-Group-ID details for each subscriber of the network. In one aspect, during PDU session establishment, CHF consumers obtain CHF-Group-ID information as part of a subscriber profile that is provided to all CHF consumers. No additional step or hop is needed for the CHF consumers to obtain the CHF-Group-ID. Thus, regionally segmented CHFs can be implemented without replication of data between CHFs in different regional segments and without additional signaling between network functions.
-
公开(公告)号:US20250039672A1
公开(公告)日:2025-01-30
申请号:US18820181
申请日:2024-08-29
Applicant: Jin Sung Lee
Inventor: Jin Sung Lee
IPC: H04W12/122 , H04W8/18 , H04W12/128
Abstract: A personal information protection method includes a first step comprising rooting a victim's device where digital hacking has occurred to obtain administrator privileges, and installing a dedicated application software on the victim's device; a second step comprising analyzing the packet information of the malware installed on the victim's device to extract information about the attacking server; a third step comprising analyzing the actual data stored on the victim's device to continuously generate fake data (such as contacts, names, email addresses, and various images) in the same or similar format as the actual data and storing the fake data on the victim's device; a fourth step comprising ensuring that the fake data is continuously transmitted from the victim's device to the attacking server, thereby preventing the attacking server from identifying the victim's personal information.
-
-
-
-
-
-
-
-
-