Patent application number | Description | Published |
20100036933 | Dynamic Portal Creation Based on Personal Usage - Methods, media and systems are provided for generating a dynamic web portal in a wireless network, and the portal is based on personal usage. An initialized portal contains no web content. Systems include one or more network elements configured to monitor requests for resource components, to generate web portals, and to dynamically update the portals based on the requests for resource components. Data structures embodied on a computer-readable media are included for storing numerical data regarding the requests and for storing a plurality of portals. The dynamic web portal is updated to contain component resources from visited web pages, each having a respective universal resource locator (URL) or portion of code with which it is associated. Requests for resources are monitored and added to a web portal when a specified threshold is surpassed so that an updated web portal can be presented. | 02-11-2010 |
20110211531 | Method and System for Selective Application of Cellular-PBX Integration Service - A method and system for selectively applying a cellular-PBX integration service. When a radio access network (RAN) receives a call request seeking to set up a call for a cellular wireless communication device (WCD) that is operating in the coverage area of the RAN, a determination is made as to whether the WCD is currently checked-into a cellular-PBX integration service. A service control point (SCP), for instance, may make the determination. If the determination is that the WCD is currently checked-in, then the call is set up to an IP PBX server that services the WCD, and the IP PBX server may then handle the call as it would handle a call placed to any IP PBX extension. Further, differential billing can be applied, charging an enterprise billing-account for the call if the WCD is checked-in, and charging a WCD billing-account for the call if the WCD is not checked-in. | 09-01-2011 |
20130305333 | Web Server Bypass of Backend Process on Near Field Communications and Secure Element Chips - A mobile access terminal providing access to data in a secure element of the mobile access terminal is provided. The mobile access terminal comprises the secure element; a web browser; a near field communications system; an over-the-air proxy; an application programming interface layer; and a web server residing on a secure storage area of the mobile access terminal, wherein the web browser is provided with exclusive access to the web server. | 11-14-2013 |
20130345530 | End-to-End Trusted Communications Infrastructure - A method of delivery of medical data via a trusted end-to-end communication link. The method comprises obtaining a measurement of a parameter of a human being by a first sensor, obtaining a biometric from the human being by a second sensor, receiving input from the first and second sensors by a secure application executing in a trusted security zone of a processor, whereby access to the input from the first and second sensors by applications executing in a normal partition of the processor is blocked, wherein the input from the first and second sensors comprises the measurement of the parameter and the biometric, and transmitting a message based on the input from the first and second sensors via a trusted end-to-end communication link to a medical data server, wherein an application that receives the message executes in a trusted security zone of the server. | 12-26-2013 |
20140033316 | TRUSTED SECURITY ZONE ACCESS TO PERIPHERAL DEVICES - A method of trusted data communication. The method comprises executing a data communication application in a trusted security zone of a processor, wherein the processor is a component of a computer, commanding a controller of a peripheral device to execute a control application in a trusted security zone of the controller, wherein the controller is a component of the computer, commanding at least one of another peripheral device or a user interface device to not access a data bus of the computer, verifying that the controller is executing the control application in the trusted security zone of the controller, sending data from the processor to the controller over the data bus of the computer, and the controller one of transmitting the data sent by the processor on an external communication link, reading a memory storage disk, or writing to a memory storage disk. | 01-30-2014 |
20140047548 | Systems and Methods for Provisioning and Using Multiple Trusted Security Zones on an Electronic Device - A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key. | 02-13-2014 |
20140281544 | Trusted Security Zone Containers for the Protection and Confidentiality of Trusted Service Manager Data - Embodiments relate generally to systems and methods for providing access to a trusted security zone container within a trusted security zone of a mobile device. An application may receive trusted service manager validation data from a trusted service manager. The application may also receive a trusted security zone master key, wherein the trusted security zone master key provides access to a plurality of trusted security zone containers within the trusted security zone. The application may hash the trusted service manager validation data with the trusted security zone master key. The application may generate the trusted security zone sub key based on hashing to access one or more containers. One or more signal may be transmitted to provision the set of one or more trusted security zone containers with the trusted security zone sub key. The application may provide the sub key to the trusted service manager to access a container. | 09-18-2014 |
Patent application number | Description | Published |
20100296482 | SELECTION OF A COMMUNICATION DEVICE FOR A USER BY A BASE STATION IN RESPONSE TO RECEIVING A COMMUNICATION SESSION HAND-OFF - A first base station wirelessly transmits media to a first communication device for a communication session. The first base station hands off the communication session to a second base station. The second base station wirelessly transmits the media to the first communication device for the communication session. In response to the hand-off, the second base station selects a second communication device based on the type of media and transmits a prompt to the first communication device to transfer the communication session to the second communication device. In response to a user instruction, the second base station transmits the media to the second communication device for the communication session. | 11-25-2010 |
20100311401 | COMMUNICATION SESSION TRANSFER FROM ONE COMMUNICATION DEVICE TO ANOTHER BASED ON LOCATION CORRELATED TO TIME - A communication network receives communications for a wireless communication device and transfers the communications for delivery to the wireless communication device. The wireless communication device determines data that correlates its location to time. Either the wireless communication device or the communication network process the data to detect a transfer condition that comprises the wireless communication device being located within a predetermined area for a predetermined period of time. If the transfer condition applies, then the communication network transfers communications for the wireless device for delivery to another communication device. When the transfer condition no longer applies, the communication network again transfers communications for the wireless communication device for delivery to the wireless communication device. | 12-09-2010 |
20110113143 | VOICE SESSION AND DATA SESSION COORDINATION IN A COMMUNICATION DEVICE - A communication device has a data application and a voice application. The device establishes a data session between the data application and a data system. During the data session, the device receives a voice session request from a voice communication system, and in response, alerts the user of the request. The device receives a user acceptance of the voice session request, and in response, transfers a voice session acceptance indication from the voice application to the data application and tracks elapsed time since the user acceptance. The communication device transfers a voice session acceptance from the voice application to the voice communication system if the voice application receives a data application ready indication from the data application or if the elapsed time since the user acceptance reaches a set time period, whichever occurs first. | 05-12-2011 |
20110289410 | ISOLATION AND MODIFICATION OF AUDIO STREAMS OF A MIXED SIGNAL IN A WIRELESS COMMUNICATION DEVICE - A wireless communication device comprises a wireless communication interface, a processing system, and a user interface. The wireless communication interface is configured to wirelessly receive a mixed media signal comprising a plurality of audio streams originating from different source devices. The processing system is configured to isolate the audio streams and generate graphical representations of each one of the audio streams. The user interface is configured to display the graphical representations of each one of the audio streams and receive audio stream modification instructions from a user. The processing system is configured to process the audio stream modification instructions to generate at least one modified audio stream based on the audio stream modification instructions. The user interface is configured to display a graphical representation of the modified audio stream and audibly output a modified mixed media signal comprising the modified audio stream. | 11-24-2011 |
20130003610 | WIRELESS COMMUNICATIONS DURING A WIRELESS COMMUNICATIONS DEVICE REBOOT - A wireless communication device has first processing circuitry and second processing circuitry that are separate from one another. The wireless communication device transfers first wireless communications to a wireless network using the first processing circuitry. The wireless communication device identifies a reboot condition for the first processing circuitry and responsively provides a geographic location of the wireless communication device to the second processing circuitry and displays a user interface for communications using the second processing circuitry. The wireless communication device reboots the first processing circuitry while the user interface for communications is displayed. The wireless communication device transfers second wireless communications to the wireless network using the second processing circuitry while rebooting the first processing circuitry. The second wireless communications may comprise emergency communications including the geographic location of the wireless communication device. | 01-03-2013 |
20140106745 | DYNAMIC WIRELESS TRANSCEIVER SELECTION IN A WIRELESS COMMUNICATION DEVICE - A wireless communication device has multiple wireless transceivers to access multiple wireless networks. A first wireless transceiver exchanges wireless media communications with a first wireless network. The wireless communication device processes network data to select a second wireless network, and responsive to the selection, identifies an associated instruction in the network data to disable the first wireless transceiver responsive to selecting the second wireless network. A second wireless transceiver exchanges additional wireless media communications with the second wireless network responsive to the selection. The wireless communication device disables the first wireless transceiver responsive to the instruction. | 04-17-2014 |