Patent application number | Description | Published |
20110099361 | Validation And/Or Authentication Of A Device For Communication With Network - A device may include a trusted component. The trusted component may be verified by a trusted third party and may have a certificate of verification stored therein based on the verification by the trusted third party. The trusted component may include a root of trust that may provide secure code and data storage and secure application execution. The root of trust may also be configured to verify an integrity of the trusted component via a secure boot and to prevent access to the certain information in the device if the integrity of the trusted component may not be verified. | 04-28-2011 |
20120023568 | Method and Apparatus for Trusted Federated Identity Management and Data Access Authorization - Systems, methods, and instrumentalities are disclosed that may provide for integration of trusted OpenID (TOpenID) with OpenID. The authentication may be accomplished, in part, via communications between a trusted ticket server on a UE and a network application function. The UE may retrieve platform validation data (e.g., from a trusted platform module on the UE). The UE may receive a platform verification in response to the platform validation data. The platform verification may indicate that the network application function has verified the platform validation data and the user. The platform verification may indicate that the platform validation data matches a previously generated reference value. | 01-26-2012 |
20120047551 | Machine-To-Machine Gateway Architecture - Systems, methods, and instrumentalities are disclosed that provide for a gateway outside of a network domain to provide services to a plurality of devices. For example, the gateway may act as a management entity or as a proxy for the network domain. As a management entity, the gateway may perform a security function relating to each of the plurality of devices. The gateway may perform the security function without the network domain participating or having knowledge of the particular devices. As a proxy for the network, the gateway may receive a command from the network domain to perform a security function relating to each of a plurality of devices. The network may know the identity of each of the plurality of devices. The gateway may perform the security function for each of the plurality of devices and aggregate related information before sending the information to the network domain. | 02-23-2012 |
20120254959 | IDENTITY MANAGEMENT ON A WIRELESS DEVICE - A wireless device may perform a local authentication to reduce the traffic on a network. The local authentication may be performed using a local web server and/or a local OpenID provider (OP) associated with the wireless device. The local web server and/or local OP may be implemented on a security module, such as a smartcard or a trusted execution environment for example. The local OP and/or local web server may be used to implement a provisioning phase to derive a session key, associated with a service provider, from an authentication between the wireless device and the network. The session key may be reusable for subsequent local authentications to locally authenticate a user of the wireless device to the service provider. | 10-04-2012 |
20130125226 | SSO FRAMEWORK FOR MULTIPLE SSO TECHNOLOGIES - Users desire useable security or a seamless means for accessing internet services whereby user interaction in the provisioning of credentials may be kept to a minimum or even eliminated entirely. The Single Sign-On (SSO) identity management (IdM) concept may be a means by which a user may be provided with such ease of use, while enabling user-assisted and network-assisted authentication for access to desired services. To enable seamless authentication services to users, a unified framework and a protocol layer interface for managing multiple authentication methods may be used. | 05-16-2013 |
20130198838 | METHOD AND APPARATUS FOR PROVIDING SECURITY TO DEVICES - Systems, methods, and apparatus are provided for generating verification data that may be used for validation of a wireless transmit-receive unit (WTRU). The verification data may be generated using a tree structure having protected registers, represented as root nodes, and component measurements, represented as leaf nodes. The verification data may be used to validate the WTRU. The validation may be performed using split-validation, which is a form of validation described that distributes validation tasks between two or more network entities. Subtree certification is also described, wherein a subtree of the tree structure may be certified by a third party. | 08-01-2013 |
20130212637 | MIGRATION OF CREDENTIALS AND/OR DOMAINS BETWEEN TRUSTED HARDWARE SUBSCRIPTION MODULES - Systems, methods, and instrumentalities are disclosed that allow a user to initiate migration of a credential from one domain to another domain. A request to initiate a migration of credentials from a first domain to a second domain may be initiated by a user ( | 08-15-2013 |
20130298209 | ONE ROUND TRIP AUTHENTICATION USING SNGLE SIGN-ON SYSTEMS - Systems, methods, and apparatus embodiments are described herein for enabling one-round trip (ORT) seamless user/device authentication for secure network access. For example, pre-established security associations and/or credentials may be leveraged between a user/device and a network entity (e.g., application server) on a network to perform an optimized fast authentication and/or to complete security layer authentication and secure tunnel setup in an on-demand and seamless fashion on the same or another network. | 11-07-2013 |
20130312125 | METHOD AND APPARATUS FOR SECURE TRUSTED TIME TECHNIQUES - A method and apparatus to establish a trustworthy local time based on trusted computing methods are described. The concepts are scaling because they may be graded by the frequency and accuracy with which a reliable external time source is available for correction and/or reset, and how trustworthy this external source is in a commercial scenario. The techniques also take into account that the number of different paths and number of hops between the device and the trusted external time source may vary. A local clock related value which is protected by a TPM securely bound to an external clock. A system of Accuracy Statements (AS) is added to introduce time references to the audit data provided by other maybe cheaper sources than the time source providing the initial time. | 11-21-2013 |
20140129815 | VALIDATION AND/OR AUTHENTICATION OF A DEVICE FOR COMMUNICATION WITH NETWORK - A device may include a trusted component. The trusted component may be verified by a trusted third party and may have a certificate of verification stored therein based on the verification by the trusted third party. The trusted component may include a root of trust that may provide secure code and data storage and secure application execution. The root of trust may also be configured to verify an integrity of the trusted component via a secure boot and to prevent access to the certain information in the device if the integrity of the trusted component may not be verified. | 05-08-2014 |
20140179271 | SMART CARD WITH DOMAIN-TRUST EVALUATION AND DOMAIN POLICY MANAGEMENT FUNCTIONS - Methods and instrumentalities are disclosed that enable one or more domains on one or more devices to be owned or controlled by one or more different local or remote owners, while providing a level of system-wide management of those domains. Each domain may have a different owner, and each owner may specify policies for operation of its domain and for operation of its domain in relation to the platform on which the domain resides, and other domains. A system-wide domain manager may be resident on one of the domains. The system-wide domain manager may enforce the policies of the domain on which it is resident, and it may coordinate the enforcement of the other domains by their respective policies in relation to the domain in which the system-wide domain manager resides. Additionally, the system-wide domain manager may coordinate interaction among the other domains in accordance with their respective policies. A domain application may be resident on one of the domains. The domain application may be ported to the platform based on a relationship between at least one domain owner and at least one other domain owner of the one or more domains. | 06-26-2014 |
20140359278 | Secure Remote Subscription Management - A method and apparatus are disclosed for performing secure remote subscription management. Secure remote subscription management may include providing the Wireless Transmit/Receive Unit (WTRU) with a connectivity identifier, such as a Provisional Connectivity Identifier (PCID), which may be used to establish an initial network connection to an Initial Connectivity Operator (ICO) for initial secure remote registration, provisioning, and activation. A connection to the ICO may be used to remotely provision the WTRU with credentials associated with the Selected Home Operator (SHO). A credential, such as a cryptographic keyset, which may be included in the Trusted Physical Unit (TPU), may be allocated to the SHO and may be activated. The WTRU may establish a network connection to the SHO and may receive services using the remotely managed credentials. Secure remote subscription management may be repeated to associate the WTRU with another SHO. | 12-04-2014 |
20140365777 | SYSTEMS AND METHODS FOR SECURING NETWORK COMMUNICATIONS - Secure communications may be established amongst network entities for performing authentication and/or verification of the network entities. For example, a user equipment (UE) may establish a secure channel with an identity provider, capable of issuing user identities for authentication of the user/UE. The UE may also establish a secure channel with a service provider, capable of providing services to the UE via a network. The identity provider may even establish a secure channel with the service provider for performing secure communications. The establishment of each of these secure channels may enable each network entity to authenticate to the other network entities. The secure channels may also enable the UE to verify that the service provider with which it has established the secure channel is an intended service provider for accessing services. | 12-11-2014 |
20150067813 | Method and Apparatus for Trusted Federated Identity Management and Data Access Authorization - Systems, methods, and instrumentalities are disclosed that may provide for integration of trusted OpenID (TOpenID) with OpenID. The authentication may be accomplished, in part, via communications between a trusted ticket server on a UE and a network application function. The UE may retrieve platform validation data (e.g., from a trusted platform module on the UE). The UE may receive a platform verification in response to the platform validation data. The platform verification may indicate that the network application function has verified the platform validation data and the user. The platform verification may indicate that the platform validation data matches a previously generated reference value. | 03-05-2015 |
20150099510 | DEVICE VALIDATION, DISTRESS INDICATION, AND REMEDIATION - A wireless communications device may be configured to perform integrity checking and interrogation with a network entity to isolate a portion of a failed component on the wireless network device for remediation. Once an integrity failure is determined on a component of the device, the device may identify a functionality associated with the component and indicate the failed functionality to the network entity. Both the wireless network device and the network entity may identify the failed functionality and/or failed component using a component-to-functionality map. After receiving an indication of an integrity failure at the device, the network entity may determine that one or more additional iterations of integrity checking may be performed at the device to narrow the scope of the integrity failure on the failed component. Once the integrity failure is isolated, the network entity may remediate a portion of the failed component on the wireless communications device. | 04-09-2015 |
20150215281 | Method and Apparatus for Providing Security to Devices - Systems, methods, and apparatus are provided for generating verification data that may be used for validation of a wireless transmit-receive unit (WTRU). The verification data may be generated using a tree structure having protected registers, represented as root nodes, and component measurements, represented as leaf nodes. The verification data may be used to validate the WTRU. The validation may be performed using split-validation, which is a form of validation described that distributes validation tasks between two or more network entities. Subtree certification is also described, wherein a subtree of the tree structure may be certified by a third party. | 07-30-2015 |
20150237502 | Platform Validation and Management of Wireless Devices - Methods, components and apparatus for implementing platform validation and management (PVM) are disclosed. PVM provides the functionality and operations of a platform validation entity with remote management of devices by device management components and systems such as a home node-B management system or component. Example PVM operations bring devices into a secure target state before allowing connectivity and access to a core network. | 08-20-2015 |
20150319156 | INDEPENDENT IDENTITY MANAGEMENT SYSTEMS - Systems, methods and apparatus embodiments are described herein for authenticating a user and/or a user equipment (UE). For example, a user and/or UE may request access to a service controlled by a service provider (SP). The user may be authenticated by an identity provider (IdP), producing a result. A user assertion may be provided to the SP, and the user assertion may comprise the user authentication result. The UE may be authenticated with another IdP, producing an associated result. A device assertion may be provided to the SP and may comprise the device authentication result. A master IdP may bind the assertions together and a consolidated assertion may be provided to the SP so that the user/UE can receive access to a service that is provided by the SP. | 11-05-2015 |
20150326561 | Authentication and Secure Channel Setup for Communication Handoff Scenarios - Persistent communication layer credentials generated on a persistent communication layer at one network may be leveraged to perform authentication on another. For example, the persistent communication layer credentials may include application-layer credentials derived on an application layer. The application-layer credentials may be used to establish authentication credentials for authenticating a mobile device for access to services at a network server. The authentication credentials may be derived from the application-layer credentials of another network to enable a seamless handoff from one network to another. The authentication credentials may be derived from the application-layer credentials using reverse bootstrapping or other key derivation functions. The mobile device and/or network entity to which the mobile device is being authenticated may enable communication of authentication information between the communication layers to enable authentication of a device using multiple communication layers. | 11-12-2015 |
Patent application number | Description | Published |
20110035592 | AUTHENTICATION METHOD SELECTION USING A HOME ENHANCED NODE B PROFILE - An authentication method selection using a home enhanced Node B (H(e)NB) profile is disclosed. A method for selecting an H(e)NB authentication method includes authenticating at least one of the device or the hosting party module by a security gateway (SeGW). The SeGW receives a request from the H(e)NB to start the authentication process. Based on information received from the H(e)NB and an authentication information server, the SeGW determines how to authenticate the H(e)NB. The possible authentication methods include device authentication only, device authentication and hosting party module authentication, requesting the H(e)NB to perform authentication using Extensible Authentication Protocol-Authentication and Key Agreement, or authentication of both the H(e)NB and one or more WTRUs connected to or attempting to connect to the H(e)NB. | 02-10-2011 |
20110265153 | Protection Against Unsolicited Communication - Methods and apparatus are disclosed to provide protection against Unsolicited Communication (UC) in a network, such as, without limitation, an Internet Protocol (IP) Multimedia Subsystem (IMS). A communication may originate from a sending device and may be intended for delivery to a receiving device. A network may determine authentication information associated with the sending device. The network may send the authentication information to a receiving entity to evaluate if the communication is unsolicited using the authentication information. If the communication is determined to be acceptable, a connection associated with the communication may be allowed. | 10-27-2011 |
20130080769 | SYSTEMS AND METHODS FOR SECURING NETWORK COMMUNICATIONS - Secure communications may be established amongst network entities for performing authentication and/or verification of the network entities. For example, a user equipment (UE) may establish a secure channel with an identity provider, capable of issuing user identities for authentication of the user/UE. The UE may also establish a secure channel with a service provider, capable of providing services to the UE via a network. The identity provider may even establish a secure channel with the service provider for performing secure communications. The establishment of each of these secure channels may enable each network entity to authenticate to the other network entities. The secure channels may also enable the UE to verify that the service provider with which it has established the secure channel is an intended service provider for accessing services. | 03-28-2013 |
20130174241 | AUTOMATED NEGOTIATION AND SELECTION OF AUTHENTICATION PROTOCOLS - Wireless telecommunications networks may implement various forms of authentication. There are a variety of different user and device authentication protocols that follow a similar network architecture, involving various network entities such as a user equipment (UE), a service provider (SP), and an authentication endpoint (AEP). To select an acceptable authentication protocol or credential for authenticating a user or UE, authentication protocol negotiations may take place between various network entities. For example, negotiations may take place in networks implementing a single-sign on (SSO) architecture and/or networks implementing a Generic Bootstrapping Architecture (GBA). | 07-04-2013 |
20140123292 | TRANSIT CONTROL FOR DATA - A method for an apparatus which operates in a data cloud includes requesting trust information from a service cloud, receiving the trust information from the service cloud, performing a trust assessment of the service cloud based on the trust information, and controlling transmission of data to the service cloud according to a result of the trust assessment. | 05-01-2014 |
Patent application number | Description | Published |
20080249492 | Fiber material web - A fiber material web of pulp fibers is made by pulp fibers being calendered and spot-connected or linearly connected without a binder in pressurized areas by fusion of the fiber bodies with generation of an embossed patter. The pulp fibers are chemically treated pulp fibers. The fiber material web is suitable for use in sanitary articles and as a filter material. | 10-09-2008 |
20090324893 | Absorbent Fiber Web - An absorbent fiber web has a base layer of cellulose fibers and an external layer that is connected at least across areas thereof with the base layer. The external layer is a nonwoven of nano fibers. The base layer and the nonwoven are connected to one another across areas thereof without a binder. | 12-31-2009 |
20100159207 | Cellulose Cloth - A cellulose cloth has a fiber layer of cellulose fibers that absorb liquids as well as a second layer bonded thereto, wherein the second layer has a different color or a different color pattern than the fiber layer, and wherein the fibers of the fiber layer are bonded to one another by partial press-bonding with compression of the cellulose fibers in the press-bonded areas. | 06-24-2010 |
20100255048 | Web Material - A web material encompasses a bonded fibrous material web of cellulose material that is made of a layer of cellulose fibers that are press-bonded in sections of the fibrous material web. One or several antimicrobial substances are contained in the fibrous material web. The antimicrobial substances are selected from finely dispersed silver and silver salts, antimicrobial metal oxides, solid inorganic acids, solid organic acids, and biocides. | 10-07-2010 |
20110130738 | Absorptive Pad for Use on Wounds - An absorptive pad for placement on wounds in the form of a layered body of a multi-layer configuration has a first layer facing the skin, a second layer facing away from the skin, and an absorptive core arranged between the first layer and the second layer. The first layer has a wound area to be placed onto a wound, wherein the wound area of the first layer is made of a material that is permeable to liquids. The first layer outside of the wound area is provided at least partially with an adhesive. | 06-02-2011 |
20120004615 | Bandage - A bandage for covering a body opening from which a conduit, not belonging to the body, projects, has a first support with a first slit beginning at an edge of the support and extending toward a center of the first support, wherein the first slit defines a first support half and a second support half on opposed sides of the first slit. A first flat absorbent core is disposed on the first support half; a second flat absorbent core is disposed on the second support half. The first and second absorbent cores are positioned in parallel orientation relative to the first slit, respectively. The first slit has an end remote from the edge of the first support; the end of the first slit is provided with a widened portion. | 01-05-2012 |
20120006741 | Filter Material Web - A fiber material web of pulp fibers is made by pulp fibers being calendered and spot-connected or linearly connected without a binder in pressurized areas by fusion of the fiber bodies with generation of an embossed patter. The pulp fibers are chemically treated pulp fibers. The fiber material web is suitable for use in sanitary articles and as a filter material. | 01-12-2012 |
20120010584 | Absorption Body for Use on Wounds - An absorption body for use on wounds is constructed of a multilayer configuration with a first layer that is facing the wound, a second layer that is facing away from the wound, and an absorbent core that is arranged between the first and second layers. The first layer in the area of the wound has a material that is permeable for liquids and the second layer has a breathable material. The absorption body is suitable as a wound pad. | 01-12-2012 |
20120167771 | Filter Material for Cleaning Air and Gases - The invention relates to a filter material for cleaning air and gases, comprising a fiber layer ( | 07-05-2012 |
20130180120 | Moisture Regulating Element for Use In Packaging - A moisture-regulating element for use in packaging is claimed, which comprises a layer of pulp fibres and optionally further layers, characterized in that the element contains means which are able to regulate the moisture content. | 07-18-2013 |
20140358105 | PEG-SHAPED OR CYLINDRICAL HYGIENE ELEMENT - A peg-shaped or cylindrical hygiene article for insertion into a body cavity or opening is claimed, which article comprises a fibrous layer ( | 12-04-2014 |
Patent application number | Description | Published |
20110188987 | REGULATABLE COOLANT PUMP AND METHOD FOR ITS REGULATION - A regulatable coolant pump and a method for regulation of this regulatable coolant pump for internal combustion engines, which is driven by way of a pulley actives a valve slide using an electromagnetically activated piston pump equipped with a return spring in the form of a pressure spring. The pump implements a “pump feed” using many small “partial lifts.” A “leakage volume stream” that flows opposite to the “pumped volume stream” is superimposed on the “pumped volume stream” via the arrangement of circular apertures both in the inlet valve membrane of the working piston and in the outlet valve membrane so that the valve slide can be moved in defined manner and in a very robust and reliable manner, with low drive power via the defined superimposition of these two volume streams. | 08-04-2011 |
20110293458 | VANE CELL PUMP - The invention relates to vane cell pumps having a rotor mounted in a pump housing and driven by a shaft, multiple vane plates mounted in the outer circumference of this rotor, and an outer ring that surrounds the rotor and the vane plates, whereby this ring is disposed either directly in the pump housing, or in a setting ring that can be moved in the pump housing, along predetermined paths. The purpose is to develop a new type of vane cell pump having a new type of pump chamber geometry, which guarantees optimal, complete filling, in terms of flow technology, of the pump chambers, particularly at speeds of rotation in the range from 4500 rpm to beyond 6000 rpm, and furthermore is easy to manufacture, in terms of production technology. The vane cell pump according to the invention, having transverse grooves disposed in the cylinder mantle surface of the rotor, between the bearing grooves of the vane plates, running over the entire rotor width, disposed parallel to the bearing grooves of the vane plates, spaced apart from the bearing grooves by a bearing crosspiece, is characterized in that these transverse grooves have a non-symmetrical cross-section progression, which has a low point in each cell chamber, which point is always disposed behind the cell chamber center axis, seen in the direction of rotation. | 12-01-2011 |
20120107121 | SWITCHABLE COOLANT PUMP - The invention relates to a switchable coolant pump for combustion engines which is driven by a pulley, wherein the impeller can be driven switchably by the pulley by way of a friction pairing. It is the aim of the invention to develop a switchable coolant pump for combustion engines of the above type, which is simple to manufacture in terms of the manufacturing engineering thereof, driven by a pulley, and which is suited particularly for smaller coolant pumps (which is to say, coolant pumps in which the distance between the pulley and the impeller is smaller than 15 mm and the pulley diameter of which is smaller than 50 mm). The switchable coolant pump according to the invention, comprising a connecting flange ( | 05-03-2012 |
20130081720 | LUBRICANT VALVE FOR OIL PUMPS OF INTERNAL COMBUSTION ENGINES - The invention relates to a lubricant valve for oil pumps of internal combustion engines, in order to supply the bearings and sliding surfaces of the engines with lubricant in an optimum manner in order to reduce the wear. The invention is based on the problem of developing a lubricant valve for oil pumps of internal combustion engines, which lubricant valve combines, in particular, the functions of a cold-start valve and those of a control valve within itself with a minimum amount of installation space and is constructed in such a way that it is insensitive with respect to the wear debris and/or foundry sand which is entrained by the lubricant, in the process makes high throughflow quantities possible, in addition is of inexpensive construction in terms of production and assembly technology and can be produced inexpensively, and, moreover, always operates robustly, reliably and insusceptible to disruptions, even under extreme use conditions. The lubricant valve according to the invention for oil pumps of internal combustion engines is distinguished, in particular, by a double piston in a piston guide of a valve seat of the pump housing, the double piston consisting of a cold-start piston which is arranged in a control piston and is arranged in a cold-start piston guide which is arranged in the control piston, wherein, lying opposite the cold-start piston guide, a piston rod is arranged on the piston head of the control piston, on which piston rod, spaced apart from the piston head of the control piston, a working piston is arranged which the piston rod protrudes beyond in the form of a spacer rod, wherein, adjacent to the working piston, inflow holes are arranged in the piston head of the control piston and, adjacent to the piston head, outflow holes are arranged in the cylinder wall of the cold-start piston guide of the control piston. | 04-04-2013 |
20130272848 | COOLANT PUMP - An axial-flow coolant pump mechanically driven by a pulley, a gear wheel, a plug-in shaft, or the like, for internal combustion engines uses a semi-axial impeller, a Francis impeller or diagonal impeller with three-dimensionally, spatially curved blades as the rotor, and the stator disposed in the pump housing possesses an inner guide cone that narrows in the flow direction, and an outer conical guide cap disposed to be spaced apart from the cone, and the two, spaced apart symmetrically, are connected by way of three-dimensionally, spatially curved stator vanes, wherein the rotor is spaced apart from the stator by a ring gap, in such a manner that the rotor has a minimal distance, not only, on the face side, from the adjacent outer edge of the guide cone, but also, on the face side, from the adjacent outer edge of the guide cap. | 10-17-2013 |
20130306892 | DEVICE FOR ACTUATING A CONTROL VALVE - An apparatus for activation of a control valve is configurable as a slide, ball valve, rotary slide, poppet valve, or the like, and controls or regulates pressure-impacted media, for example, regulating the coolant volume stream of an internal combustion engine. A push piston linearly displaceable in a piston guide rigidly disposed on the flow housing, with an activation joint, is fastened onto the flow housing. A connecting rod is disposed in the activation joint. A push joint is disposed at the push piston end that lies opposite the activation joint, in which push joint the activation element of a control valve is displaceably and/or rotatably disposed. A reset spring is disposed adjacent to the push joint and acts on the push piston, in the direction of its longitudinal axis, so that the push piston always lies against the connecting rod without play, with the activation joint. | 11-21-2013 |
20130336822 | DEVICE AND METHOD FOR THE DEFINED LONGITUDINAL SHIFTING OF AN ADJUSTING DEVICE, WHICH ROTATES ALONG IN A DRIVE SHAFT - The invention relates to a device and method for the defined longitudinal shifting of an adjusting device which rotates along in a drive shaft, along the center axis of the drive shaft. The solution according to the invention is characterized in that a working chamber ( | 12-19-2013 |
Patent application number | Description | Published |
20130035206 | METHOD FOR OPERATING A VEHICLE DRIVE TRAIN HAVING AN INTERNAL COMBUSTION ENGINE - A method of operating a vehicle drive-train comprising an internal combustion engine and a transmission system functionally connected to the internal combustion engine. The transmission has an interlocking shifting element, one shifting element half of which is functionally connected to the transmission input shaft while the other shifting element half is functionally connected to a transmission output shaft. Upon receipt of a command to change the transmission from a neutral position, in which a force flow through the transmission is interrupted, to an operating condition, in which the force flow through the transmission is produced, the interlocking shifting element is changed to an engaged operating condition. A speed difference between the shifting element halves is brought by varying the speed of the internal combustion engine into a speed difference window within which the interlocking shifting element can be changed to its engaged operating condition. | 02-07-2013 |
20130151094 | LINE PRESSURE CONTROL METHOD FOR A TRANSMISSION HAVING A DOG CLUTCH - A method of controlling the system pressure in an automatic transmission having interlocking shifting elements in which, during shifts and gear engagement and gear disengagement processes involving interlocking shifting elements, as a function of the engagement and disengagement times of the interlocking shifting elements involved and the shift conditions of the frictional shifting elements involved, the system pressure is increased to an elevated pressure that enables rapid engagement or disengagement of the interlocking shifting elements, in such manner that the system pressure is increased in at least two phases whose timing depends on the shift conditions of at least one of the shifting elements involved. | 06-13-2013 |
20140290404 | PROCEDURE FOR ENGAGING A FORM-LOCKING SHIFT ELEMENT TO REALIZE A GEAR IN AN AUTOMATIC TRANSMISSION, WHEREAT AT LEAST ONE FURTHER FRICTION SHIFT ELEMENT IS TO BE ENGAGED TO REALIZE THE GEAR TO BE ACTIVATED - A method of engaging a form-interlocking shifting element to obtain a gear in an automatic transmission in which at least one further, frictional shifting element is involved in obtaining the gear to be engaged and a shifting element, not involved in obtaining the gear to be engaged but which serves as a synchronizing shifting element, is actuated in order to synchronize the interlocking shifting element to be engaged. The further, frictional shifting element, involved in engaging the gear, is engaged and then disengaged, to a defined extent, to bring the frictional shifting element to a slipping condition, in order to ensure the engagement of the interlocking shifting element. | 10-02-2014 |
20150057900 | Method for Cutting Off a Gearshift in which at Least One Form-Fitting Shifting Element is Participating, in an Automatic Transmission of a Motor Vehicle - Within the framework of a method for terminating a gearshift for an automatic transmission for a motor vehicle, at which at least one positive-locking shifting element is involved, after the initiation of the gearshift, there is an evaluation of the continuous signals of at least one control unit of the vehicle, which affect the engine torque and thus the turbine speed gradient, whereas, based on the evaluation of the signals, an upcoming change to the turbine speed gradient that exceeds a first predetermined threshold value or falls short of a second predetermined threshold value is detected, and, upon the detection an upcoming change to the turbine speed gradient that exceeds the first predetermined threshold value or falls short of the second predetermined threshold value, the gearshift is terminated. | 02-26-2015 |
Patent application number | Description | Published |
20150031386 | Methods and Apparatus for Configuration of Femtocells in a Wireless Network - Methods and apparatus that enable and optimize the simultaneous operation of several wireless femtocells having overlapping coverage areas. In one embodiment of the invention, a resource allocation (e.g., time-frequency grid for an OFDM or TDMA based wireless network) governs the simultaneous operation of several femtocells with overlapping coverage areas by specifying uses for resources. A resource allocation unit (RAU) entity is disclosed for managing and modifying resource allocations for femtocells. The community of femtocells can flexibly share resources according to the time-frequency grid, thereby maximizing spectral efficiency without requiring substantial network overhead. | 01-29-2015 |
20150305055 | Methods and Apparatus For Partial Interference Reduction Within Wireless Networks - Methods and apparatus that enable one or more wireless networks to minimize inter-cellular interference (ICI) at a receiver. In one embodiment, the network comprises an OFDM-based cellular network, and the method comprises utilizing a priori knowledge of non-data portions of signals from multiple base stations in order to schedule transmissions. In one variant, these non-data portions comprise pilot tones; the pilot tones can be scheduled onto various time-frequency resources of the network so as to minimize ICI. The mobility context of the receiver can also be used as a basis for dynamically adjusting the pilot tone density. In another variant, precoding (e.g., Tomlinson-Harashima precoding) can be applied to “shape” the non-data portions of the transmitted signals so as to mitigate ICI. In yet other variants, frame preambles and learning sequences are used as the basis for invoking selective transmission time shifts across the potentially interfering base stations so as to minimize ICI. | 10-22-2015 |
20160007164 | Methods and Apparatus for Resolving Wireless Signal Components - Methods and apparatus enabling a wireless network to generate data that can be used by a receiver (e.g., UE) to resolve the contributions of individual transmitters, such as to determine its location without resort to external devices such as GPS satellites. In one embodiment, the wireless network comprises a single frequency network (SFN), and a unique base station identifier is embedded within the data, and encoded in a manner which allows the UE to calculate path characteristics (such as path latency, and Direction of Arrival) to triangulate its position. In one variant, the data encoding comprises weighting frames of data from different base stations using an orthogonal matrix. Advantageously, the encoding and embedded identifier are also transparent to legacy UE, thereby allowing for implementation with no infrastructure or UE modifications other than software. Network and user apparatus implementing these methodologies, and methods of doing business, are also disclosed. | 01-07-2016 |