Patent application number | Description | Published |
20130303232 | METHODS AND APPARATUS FOR LOCATION-BASED PARAMETRIC CONTROL - Methods and apparatus for location-based control of parameters such as radio frequency (RF) transmission characteristics of a wireless device. In one embodiment, a determination of a maximum allowable level for a given characteristic associated with the location of the wireless device is made, and the transmission characteristic of the wireless device is adjusted based at least in part on this maximum allowable level. The location may correspond to a regulatory domain with specific requirements for wireless transmitters. A database is referenced to retrieve these requirements. The maximum allowable levels are derived from the requirements. Thus, exemplary wireless devices are capable of universal regulatory compliance. | 11-14-2013 |
20140003408 | METHODS AND APPARATUS FOR NETWORK SELECTION IN OVERLAPPING NETWORK ENVIRONMENTS | 01-02-2014 |
20140362835 | System and Method for Cloud Synchronizing Known Networks - A system and method synchronizes network data for a device registered to a user. The network data includes a list of a plurality of known wireless networks and authentication data associated with each of the known wireless networks. The method includes establishing a connection to a server of a synchronization network. The method includes transmitting identification data to the server. The identification data indicates the network data corresponding to the user to which the device is registered. The method includes receiving the list of known wireless networks from the server via the synchronization network. The method includes receiving a secure file including the authentication data from the server via the synchronization network. | 12-11-2014 |
20140365669 | Device and Method for Associating with WiFi Networks - A method automatically connects a device to a WiFi network. The method includes determining WiFi networks that are available for a connection thereto. The method includes categorizing each of the WiFi networks as a private WiFi network or a public WiFi network in which the private WiFi network utilizes a first association process while the public WiFi network utilizes a second association process. The method includes executing a first automatic connection process using the first association process until a successful connection is established to one of the private WiFi networks based upon a first prioritized list. The method includes executing a second automatic connection process until a successful connection is established to one of the public WiFi networks based upon a second prioritized list when the first automatic connection process to the private wireless networks is unsuccessful. | 12-11-2014 |
20150092652 | Wireless Multicast Communication - This document describes multicast communication between wireless devices. A scheduling frame may be wirelessly transmitted by a wireless device. The scheduling frame may include a multicast address indicating a group of intended receiving devices for a payload frame. The scheduling frame may further include scheduling information indicating an order for the group of intended receiving devices to transmit acknowledgement information for the payload frame. A payload frame may also be wirelessly transmitted by the wireless device. The payload frame may include payload information intended for the group of intended receiving devices. Additionally, acknowledgement frames may be wirelessly received by the wireless device from at least a subset of the group of intended receiving devices. The acknowledgement frames may be received according to the order indicated in the scheduling information. | 04-02-2015 |
20150350875 | Device and Method for Basic Service Set Transition Management - A method, station and computer readable storage medium used to perform a roaming procedure. The method performed by the station including determining whether a roam is to be performed, the station being associated with a first access point (AP), receiving network related information for at least one second AP, determining a score value for each of the at least one second AP based upon the network related information, the score value being either a quantitative score calculated as a function of a respective received signal strength indicator (RSSI) value and a respective load value or a qualitative score calculated as a function of a preference value and the RSSI value, selecting one of the at least one second AP based upon the score values and roaming from the first AP to the selected one of the at least one second AP. | 12-03-2015 |
20150350911 | System and Method for Temporarily Joining a WiFi Network - A system, method and station used to establish a guest connection to a WiFi network. A first station establishes a first connection to a second station using a first communication mechanism, receives a data block from the second station, the data block including network information based upon a Basic Service Set (BSS) identification (BSSID) corresponding to a access point of a WiFi network to which the second station has connected, authentication information for connecting to the WiFi network and a time field indicating an amount of time the first station is allowed to access the WiFi network using the data block, establishes a second connection to the WiFi network using a second communication mechanism based upon the network information and authentication information of the data block and disconnects the second connection when the amount of time expires. | 12-03-2015 |
20150350933 | Wireless Link Quality Monitoring - Wi-Fi link health monitoring by a wireless device. Signal strength (e.g., RSSI) of a Wi-Fi link may be monitored. If the signal strength is low, further link quality metrics may be monitored. If it is determined that health of the Wi-Fi link is poor based on monitoring signal strength and other link quality metrics, roaming to a different Wi-Fi network may be performed, the Wi-Fi link may be disconnected, and/or an application processor of the wireless device may be woken. | 12-03-2015 |
20150350957 | Device and Method for Reliable WiFi Data Connectivity - A station and non-transitory computer readable storage medium for determining a first physical layer rate to perform data transmissions between the station and an access point of a WiFi network, the first physical layer rate being based on a primary rate and a plurality of fallback rates associated with the access point, the primary rate having a higher transmission speed than the plurality of fallback rates, determining a trigger based upon at least one current condition of the station and at least one corresponding prior condition existing at a time when the first physical layer rate is determined, selecting one of the plurality of fallback rates when the trigger is determined, performing data transmissions between the station and the access point using the one of the plurality of fallback rates and determining a second physical layer rate based on the one of the plurality of fallback rates. | 12-03-2015 |
20150350993 | Device and Method for Opportunistic Roaming - A method, station and computer readable storage medium used to perform opportunistic roaming procedures. A station joined to a basic service set (BSS) of an access point (AP) performs a method including determining a roam profile for the station, the roam profile indicating at least one of available operating bands or available APs for the station, determining a first value associated with a network parameter of the joined AP, determining at least one roam candidate AP having a second value associated with the network parameter corresponding to the roam candidate AP, wherein the first and second values are a received signal strength indicator, determining whether a predetermined criteria value is satisfied based upon the first and second values, wherein the predetermined criteria value is a minimum difference between the first value and second value and roaming to the roam candidate AP when the predetermined criteria value is satisfied. | 12-03-2015 |
20150351012 | Device and Method for WiFi Scan Optimization - A method and wireless station used to perform WiFi scans. The wireless station determines a first cell identity of a first cell to which the wireless station is currently connected, determines a second cell identity of a second cell that is available, determines whether either of the first or second cell identities are related to a WiFi network based on relationships between cell identities and WiFi networks stored in the wireless station, performs a first type of scan for available WiFi networks when either of the first cell identity or the second cell identity is related to the WiFi network and performs a second type of scan for available WiFi networks when neither of the first cell identity or the second cell identity is related to the WiFi network, the first type of scan is performed more frequently or over more channels compared to the second type of scan. | 12-03-2015 |
20150373633 | Co-Located Network Selection Algorithm - A wireless device may automatically connect to a preferred wireless network, such as a preferred Wi-Fi network. The wireless device may order a plurality of wireless networks according to initial criteria, such as the time the wireless device last connected to each wireless network. Preference rules may then be applied to reorder the wireless networks. Each preference rule may be applied only if an associated score meets a threshold. A scan may be performed to determine which of the wireless networks are available for connection. The wireless device may automatically connect to the highest-ordered available wireless network. The scores associated with the preference rules may be modified in response to events that indicate a user preference for one or more of the wireless networks, such as manually switching from one network to another. | 12-24-2015 |
Patent application number | Description | Published |
20090011834 | LOCATION AWARE AD-HOC GAMING - A method of mobile gaming is disclosed. The method includes configuring a mobile device to communicate in a first communication protocol and a second communication protocol, determining location information for the mobile device, communicating the location information and a gaming request via the first communication protocol to a game server, receiving a gaming request response from the game server via the first communication protocol, initiating a gaming session in response to the gaming request response, wherein the gaming session is conducted via the second communication protocol. | 01-08-2009 |
20090103503 | Location Aware Background Access Point Scanning for WLAN - Respective distances between a communication device and a plurality of wireless local area network (WLAN) access points are determined. One of the plurality of WLAN access points with which the communication device is to associate is selected based on the determined distances | 04-23-2009 |
20090278705 | SYSTEMS AND METHODS FOR PROVIDING LOCATION-AWARE WI-FI ACCESS FOR A PORTABLE DEVICE - Methods and systems for providing location-aware WiFi access for a portable device include determining an initial location of the portable device and transmitting the initial location to a WiFi location provider, wherein the WiFi location provider comprises locations and WiFi parameters for a plurality of WiFi access points, wherein each WiFi access point has a corresponding wireless range. The locations and the WiFi parameters for a set of WiFi access points are then received from the WiFi location provider, wherein the set of WiFi access points are within a radius of the initial location of the portable device. At least one WiFi access point in the set of WiFi access points is scanned for that contains the portable device within its wireless range. The portable device then connects to the at least one WiFi access point, thereby forming a WiFi connection. | 11-12-2009 |
20130010665 | AD-HOC NETWORK POWER SAVE SYSTEM AND METHOD - Symmetrical and asymmetrical ad-hoc, wireless networks and a method for saving power in the same may include causing a first station to determine whether a second station has a master capability to buffer data traffic for the first station. A first station requests the second station to buffer the data traffic intended for the first station for a first predetermined period. The first station enters a first power save mode, and the second station buffers the data traffic for the first station for the first predetermined period. The first station exits the first power save mode after the first predetermined period and the second station sends the buffered data traffic to the first station. Both the first and second stations may have master capabilities, or only one of the first and second stations may have a master capability. | 01-10-2013 |
20130094390 | LOCATION AWARE BACKGROUND ACCESS POINT SCANNING FOR WLAN - Respective distances between a communication device and a plurality of wireless local area network (WLAN) access points are determined. One of the plurality of WLAN access points with which the communication device is to associate is selected based on the determined distances. | 04-18-2013 |
20140051361 | LOCATION AWARE AD-HOC GAMING - A method of mobile gaming is disclosed. The method includes configuring a mobile device to communicate in a first communication protocol and a second communication protocol, determining location information for the mobile device, communicating the location information and a gaming request via the first communication protocol to a game server, receiving a gaming request response from the game server via the first communication protocol, initiating a gaming session in response to the gaming request response, wherein the gaming session is conducted via the second communication protocol. | 02-20-2014 |
20140112197 | AD-HOC SIMPLE CONFIGURATION - A protocol governing the operation of an ad-hoc WLAN enables each device in the WLAN to be configured as a registrar and/or an enrollee. Accordingly, each device is configurable to support both the registrar as well as enrollee modes of operations. In response to a time-driven user action, the device may be configured to enter into a registrar mode or an enrollee mode. While in the registrar mode, the device enters into an aggressive beaconing phase by setting its beacon contention window to a relatively very small value. The aggressive beaconing increases the probability of the discovery of the registrar by the enrollees. Optionally the device may prompt the user to select between a registrar and an enrollee mode of operation by displaying the option on an LCD panel. | 04-24-2014 |
20140258550 | AUTOMATIC AD-HOC NETWORK CREATION AND COALESCING USING WPS - A device previously configured as a registrar and that has established an independent ad-hoc network is automatically discovered by another device also previously configured as a registrar. To form an ad-hoc wireless network between these two devices, each device periodically enters a scanning mode to scan for and intercept beacons transmitted by the other device. Upon such interception, one of the devices becomes an enrollee in accordance with a predefined condition and in response to a user selected option. Subsequently, the enrollee modifies its beacons to include an attribute, such as the MAC address, associated with the other device. After intercepting the modified beacon, the remaining registrar prompts it user to decide whether to allow the enrollee to join the registrar's network. If the user responds affirmatively, a handshake is performed between the two devices and a subsequent attempt is made by the enrollee to join the registrar's network. | 09-11-2014 |
Patent application number | Description | Published |
20100157865 | Power-Save for Wireless Networks - Embodiments of the present invention enable power-save methods for wireless networks. Embodiments of the present invention are compliant with the IEEE 802.11 protocol. Further, embodiments of the present invention are readily inter-operable with other third party implementations. | 06-24-2010 |
20110305264 | Beacon Miss Prevention in Power Save Modes Using Timing Synchronization Function - An integrated circuit comprising a transceiver module, a beacon miss module, and a control module. The transceiver module is configured to, at predetermined times, transition a wireless network device from an inactive mode to an active mode. The beacon miss module is configured to count a number of delivery traffic indication message (DTIM) beacons missed by the transceiver module during each of a first predetermined period and a second predetermined period, wherein the first predetermined period is shorter than the second predetermined period. The control module is configured to adjust the predetermined times at which the wireless network device is transitioned from the inactive mode to the active mode based on the number of the DTIM beacons missed by the transceiver module during each of i) the first predetermined period and ii) the second predetermined period. | 12-15-2011 |
20130077549 | INTEGRATED CIRCUIT AND METHOD WITH PRE-BEACON ACTIVATION TIME ADJUSTMENT - An integrated circuit including a transceiver module that receives beacons from an access point (AP), and transition a wireless network device to an active mode based on: a predetermined beacon interval; and a first predetermined period prior to one of multiple beacons. A timestamp module calculates a first correction value based on a first timestamp received from the AP. An adjustment module adjusts the first predetermined period based on the first correction value. A beacon module detects a beacon missed during an inactive mode by the transceiver module. The timestamp module transmits a probe request signal to the AP a second predetermined period after detection of the missed beacon, receives a second timestamp from the AP in response to the probe request signal, and recalculates the first correction value based on the second timestamp. The adjustment module adjusts the first predetermined period based on the recalculated first correction value. | 03-28-2013 |
20130150012 | MECHANISMS TO IMPROVE MOBILE DEVICE ROAMING IN WIRELESS NETWORKS - A mobile wireless device adapts roaming parameters used to determine searching for and switching among access points. The roaming parameters are adjusted based on a wireless network characterization for access points that includes a detected wireless network type. In an embodiment, the wireless network type is characterized by a service set identifier and a number of unique basic service set identifiers associated with the service set identifier per radio frequency band. Roaming parameters include a scan threshold, a roam threshold and a time interval between successive scans. | 06-13-2013 |
20130225161 | SEAMLESS TRANSITION FROM CELLULAR TO Wi-Fi COMMUNICATION - An electronic device receives a list of available networks and associated access credentials via a cellular-telephone network. These available networks may be other than the cellular-telephone network and may use a communication technique other than a cellular-telephone communication technique, such as an IEEE 802.11 protocol. For example, a base station in the cellular-telephone network may track the location of the electronic device, and may provide the list to the electronic device when the cellular-telephone network performance is constrained or degraded. In response to receiving the list, the electronic device may select a network from the available networks based on a communication criterion, such as: proximity to the electronic device, a signal strength, security, and/or communication quality. Information specifying this selection may be provided via the cellular-telephone network, and then instructions that transition communication with the electronic device from the cellular-telephone network to the selected network may be received. | 08-29-2013 |
20130288601 | AUTOMATIC CONFIGURATION OF ELECTRONIC DEVICES - The disclosed embodiments provide a system that facilitates the configuration of a first electronic device. During operation, the system detects a non-configured state of the first electronic device in proximity to a second electronic device. Next, the system establishes a network connection between the first and second electronic devices. Finally, the system uses the network connection to transmit configuration information from the second electronic device to the first electronic device, wherein the configuration information is used to configure the first electronic device without receiving manual input from a user through a user interface of the first electronic device. | 10-31-2013 |
20130331098 | Automatically Determining and Alerting Users to Available Wireless Networks - Automatically determining and alerting a user to available wireless networks. Initially, the method may automatically determine that one or more wireless networks are available to a wireless device at a location. The method may determine if the wireless device has been present at the first location for more than a threshold amount of time, e.g., based on periodic determination of the available wireless networks to the wireless device. Based on the wireless device being present at the first location for more than the threshold amount of time, an alert may be automatically displayed to the user on a display of the wireless device. The alert may indicate at least one wireless network of the one or more wireless networks at the first location. The wireless device may connect to wireless network indicated by the alert in response to user input. | 12-12-2013 |
20130331101 | Automatically Modifying Wireless Network Connection Policies Based on User Activity Levels - Modifying network connection policies of a wireless device based on user activity levels. One or more activity indicators of the wireless device may be monitored. One or more criteria for wireless network blacklisting may be selected based on the one or more activity indicators. The criteria may include different types of connectivity problems. A wireless network may be detected. The wireless network may be monitored for connectivity problems. The wireless network may be blacklisted if connectivity problems meeting the selected criteria for wireless network blacklisting are determined to have occurred. | 12-12-2013 |
20130331118 | PERFORMING ENHANCED BACKGROUND LOCATION SCANS TO FACILITATE LOCATION-BASED GEO-FENCING - The disclosed embodiments facilitate location awareness in mobile computing devices while also reducing power consumption. A baseband processor performs background scanning of wireless networks, tracking the status of surrounding wireless networks while a primary application processor operates in a lower-power sleep state. Upon detecting a wireless network of interest, the baseband processor notifies (and wakes up) the application processor. The baseband processor can also be configured to track a subset of the wireless networks detected from previous scans to facilitate trajectory tracing. | 12-12-2013 |
20130332598 | INTERNET PROTOCOL ADDRESS IPv4/IPv6 BASED PACKET FILTERING IN WoWLAN MODE - One embodiment of the present invention provides a system configured to apply Internet Protocol (IP) address based packet filtering prior to entering Wake on Wireless LAN (WoWLAN) mode. During operation, the system receives a request to enter WoWLAN mode. In response to this request, the system collects a set of active IP addresses, as well as a set of active ports. Next, the system filters out packets destined to IP addresses that are not members of the set of active IP addresses, and ports that are not members of the set of active ports. Finally, the system enters WoWLAN mode. | 12-12-2013 |
20130332599 | NEIGHBOR DISCOVERY OFFLOAD IN MOBILE DEVICES - One embodiment of the present invention provides a system that facilitates offloading neighbor discovery from a host prior to the host entering Wake on Wireless LAN (WoWLAN) mode. During operation, the system receives a request from a host executing on the processor to enter WoWLAN mode. Next, the system collects a set of active IP addresses on the host. The system then places the apparatus in WoWLAN mode. Next, the system receives neighbor discovery requests from IP addresses external to the host at a networking chip external to the processor. The system then responds to the neighbor discovery requests from the networking chip on behalf of the host and without waking the host from WoWLAN mode for requests destined to IP addresses that are members of the set of active IP addresses. Finally, the system also prevents, at the networking chip, the neighbor discovery requests from waking the host. | 12-12-2013 |
20140064140 | QUICKLY JOINING WI-FI NETWORKS USING NEIGHBORING ACCESS POINTS - One embodiment of the present invention provides a device for joining a known Wi-Fi network. During operation, the device performs a scanning operation during a scanning process to find a known access point of a WLAN for the device to join. Next, if the scanning operation finds an access point, the device determines whether the access point neighbors a known access point. If so, the device attempts to associate with the known access point by performing a scanning operation on the specific channel associated with the known access point. | 03-06-2014 |
20140068727 | WI-FI CREDENTIAL SHARING USING IMAGES - In order to facilitate access to a wireless network, access information (and, more generally, credentials) may be provided to an electronic device via an image. In particular, the electronic device may capture an image that includes a representation of the access information. For example, the electronic device may scan a two-dimensional representation of the access information, such as a Quick Response (QR) code. Then, the electronic device may analyze the image to extract the access information. Next, the access information may be used to access the wireless network. This communication technique allows a user of the electronic device to access the wireless network with less effort, thereby improving the user's experience. | 03-06-2014 |
20140086233 | SYNCHRONIZATION REQUESTS TO REDUCE POWER CONSUMPTION - An electronic device is described. In order to facilitate the communication of synchronization information with another electronic device in a wireless network, the electronic device provides a request for the synchronization information to the other electronic device at a time other than a predefined synchronization transmission time of the other electronic device. Then, the electronic device receives the synchronization information from the other electronic device in response to the request. In this way, the probability that the synchronization information is successfully communicated is increased, and the amount of time the electronic device is in an active mode is reduced, thereby reducing power consumption. | 03-27-2014 |
20140092889 | Method and Apparatus for Providing Location-Aware Wi-Fi Access - Methods and systems for providing location-aware WiFi access for a portable device include receiving, at a mobile communication device, locations and ranges for a set of one or more WiFi access points from a location provider system. The mobile communication device uses the locations and ranges to determine whether to power on a WiFi transceiver, and to determine for which WiFi access points to scan if the WiFi transceiver is powered on. | 04-03-2014 |
20140098729 | BUFFERED INDICATION OF INDIVIDUALLY ADDRESSED TRAFFIC WITH REDUCED POWER CONSUMPTION - Embodiments provide a technique for enabling a wireless device to operate in a power saving mode without completely cutting off the wireless device from receiving outside communications. The technique includes, at an access point (AP), generating traffic indication map (TIM) information that indicates whether downlink data directed to the wireless device is buffered at the AP. The AP precedes a beacon frame with at least one “lightweight” traffic indication map (TIM) frame that includes the TIM information, which is a subset of the information that is included in the beacon frame. The AP can be configured to transmit the TIM broadcast frame, the beacon frame, and any other frames that include the TIM information during a single transmit opportunity to reduce the number of instances where the wireless device is required to transition from an idle state to a listen state. | 04-10-2014 |
20140105086 | MOTION-BASED ADAPTIVE SCANNING - In order to facilitate reduced power consumption of an electronic device (such as a smartphone) when communicating with another electronic device (such as an access point) in a wireless network, the electronic device may change a frequency of network scans performed by an interface circuit in the electronic device based on a motion profile of the electronic device. In particular, the electronic device may determine the motion profile based on spatial information, such as: acceleration data, orientation data, Global Positioning System data and/or data from the wireless network. Then, the electronic device may change the frequency of the network scans performed by the interface circuit based on the motion profile. In this way, the frequency of the network scans can be reduced when the electronic device is stationary or moving rapidly (such as when a user of the electronic device is driving in a car). | 04-17-2014 |
20140105195 | DETECTING NEIGHBORING ACCESS POINTS IN A NETWORK - An electronic device, e.g., a mobile device, having access to a wireless network roams from one access point (AP) to another using access point detection based on location and learning. A learning scheme may modify a list of nearby access points determined based on location to identify neighboring access points where roaming is possible. The identified neighboring access points where roaming is possible may be ordered based on roaming history, such as the frequency of the roams to a particular AP. The roaming history may be maintained on a per client basis or aggregated across all clients using an AP. | 04-17-2014 |
20140105197 | LOCATION AWARE BACKGROUND ACCESS POINT SCANNING FOR WLAN - Respective distances between a communication device and a plurality of wireless local area network (WLAN) access points are determined. One of the plurality of WLAN access points with which the communication device is to associate is selected based on the determined distances. A background scanning process is initiated based on determined distances. The background scanning process includes at least selecting one of the plurality of WLAN access points with which the communication device is to associate based on the determined respective distances by evaluating the plurality of WLAN access points in an order based on the determined respective distances. If it is determined that a WLAN access point is acceptable, evaluation of the plurality of WLAN access points is stopped before all of the plurality of WLAN access points have been evaluated. | 04-17-2014 |
20140128063 | Extending Use of a Cellular Communication Capabilities in a Wireless Device to Another Device - Extending cellular telecommunication service from a first UE to another device. The first UE may register for cellular telecommunication service with a cellular network using a first cellular service account, using a cellular communication link via a cellular radio. A second device may be discovered and a communication link may be established between the first UE and the second device. The second device may be registered to use cellular telecommunication capability provided by the first UE. Communications between the second device and the cellular network may be conveyed via the communication link between the first UE and the second device and the cellular communication link. Conveying communications between the second device and the cellular network may provide use of the first cellular service account for cellular telecommunication service to the second device. | 05-08-2014 |
20140211676 | DYNAMIC ADAPTATION OF A TRAFFIC INACTIVITY TIMER - A method for dynamically adapting a traffic inactivity timer is disclosed. The method can include a wireless communication device determining a data traffic level on a wireless network interface and determining whether the data traffic level exceeds a threshold data traffic level. The method can further include the wireless communication device using a first inactivity timeout period for the traffic inactivity timer in an instance in which it is determined that data traffic level does not exceed the threshold data traffic level. The method can additionally include the wireless communication device using a second inactivity timeout period for the traffic inactivity timer in an instance in which it is determined that the data traffic level exceeds the threshold data traffic level. The second inactivity timeout period can define a longer time period than the first inactivity timeout period. | 07-31-2014 |
20140233406 | DETERMINING PARAMETERS OF AN ACCESS POINT - A method and system are described for determining parameters of an access point (AP). In the described embodiments, during a first time period, a portable electronic device (PED) scans for APs on a wireless local area network (WLAN) channel. Then, when an AP is detected on the WLAN channel, the PED determines if the AP includes a general advertisement service (GAS) protocol to make available information related to services provided by the AP. If the AP includes the GAS protocol, then the PED transmits a GAS request frame to the AP. If a response to the GAS request frame is not received from the AP within the first time period, then the PED extends the dwell time to wait for the response for a second time period, wherein a duration of the second time period is determined based on a total allowable time to scan for APs. | 08-21-2014 |
20140254443 | ELECTRONIC DEVICE WITH LOW-POWER ROAMING - A low-power roaming mechanism is described. This low-power roaming mechanism is used by a portable electronic device when the portable electronic device enters a stand-by mode (sleep mode). During this stand-by mode, the portable electronic device allows a wireless interface to look for surrounding wireless networks with a configurable quota. This quota is allotted for roaming based on the usage or communication pattern of the portable electronic device. Once the allotted quota is completely used, the portable electronic device is blocked from performing roaming operations to prevent the portable electronic device from draining the battery. | 09-11-2014 |
20140267135 | APPLICATION-BASED TOUCH SENSITIVITY - A sensing threshold of a touch sensing surface may be specified based on a user interface context. For example, inadvertent touches may be more likely in a map application that is often used in a car where a user experiences constant jostling. Accordingly, a high sensing threshold can be associated with the map application, and other applications can be associated with a lower sensing threshold. | 09-18-2014 |
20140269404 | DETERMINING THE RELIABILITY OF COMMUNICATIONS BETWEEN A PORTABLE ELECTRONIC DEVICE AND AN ACCESS POINT - A method and system are described for determining the reliability of the communications between a portable electronic device and an access point (AP) before associating with the AP. In the described embodiments, a first probe request frame is transmitted to the AP at a first data rate, and a first probe response frame is received from the AP, wherein the first probe response frame is responsive to the first probe request frame. Then, a second probe request frame is transmitted to the AP at a second data rate, wherein the first data rate is lower than the second data rate. Then, the portable electronic device determines if a second probe response frame is received from the AP, wherein the second probe response frame is responsive to the second probe request frame. The portable electronic device then determines the reliability of the communications between the portable electronic device and the AP. | 09-18-2014 |
20150181637 | Extending Use of a Cellular Communication Capabilities in a Wireless Device to Another Device - Extending cellular telecommunication service from a first UE to another device. The first UE may register for cellular telecommunication service with a cellular network using a first cellular service account, using a cellular communication link via a cellular radio. A second device may be discovered and a communication link may be established between the first UE and the second device. The second device may be registered to use cellular telecommunication capability provided by the first UE. Communications between the second device and the cellular network may be conveyed via the communication link between the first UE and the second device and the cellular communication link. Conveying communications between the second device and the cellular network may provide use of the first cellular service account for cellular telecommunication service to the second device. | 06-25-2015 |
20150223070 | CUSTOMER IDENTIFICATION FOR SEAMLESS WIRELESS-NETWORK ACCESS - An electronic device connects to a network associated with a service provider via a router at a home location. During a time interval, the electronic device provides information specifying a network address of the router to an authentication computer when the electronic device is connected to a network. The authentication computer uses the received information to determine a connection pattern of the electronic device. Moreover, the authentication computer identifies that the electronic device is at the home location based on the connection pattern. Then, the authentication computer provides, to an accounting computer associated with the service provider, a request to allow the electronic device to access a wireless network associated with the service provider at a remote location (which is other than the home location). Furthermore, the authentication computer communicates network information to the electronic device, which allows the electronic device to access the wireless network without providing authentication information. | 08-06-2015 |
20160037439 | METHOD AND APPARATUS FOR AUTOMATICALLY DETECTING AND CONNECTING TO WI-FI NETWORKS - An apparatus and methods are provided for automatically detecting and connecting to a Wi-Fi network. In these methods, a wireless device listens for beacons that are sent using a low-power wireless protocol. Once the wireless device detects a first beacon at a first location, the wireless device extracts a first beacon region identifier from the beacon and correlates the first beacon region identifier with a first Wi-Fi network that is located at the first location. Next, the wireless device retrieves a first set of credentials for connecting to the first Wi-Fi network. Once the first set of credentials is retrieved, the wireless device uses the first set of credentials to connect to the first Wi-Fi network. | 02-04-2016 |
Patent application number | Description | Published |
20090039564 | PROCESS AND APPARATUS FOR FORMING UNIFORM NANOFIBER SUBSTRATES - The present invention is directed to a method and apparatus for making nanofiber webs, wherein a source of process air is utilized to affect the spray pattern and quality of fibrillated material expressed from a die assembly including a multi-fluid opening. Appropriately, the aforementioned process air is defined herein as an alternate or ancillary air source apart from primary process air, which primary air is simultaneously supplied with the molten polymeric material to the fiber forming multi-fluid opening. The ancillary air source of the invention is further distinct from secondary air, which is also known in the art as quenching air. The ancillary air can be described as a continuous fluid curtain of shielding or shaping air. | 02-12-2009 |
20100120314 | APPARATUS FOR PRODUCING SUB-MICRON FIBERS, AND NONWOVENS AND ARTICLES CONTAINING SAME - An apparatus for producing sub-micron fibers, and more specifically an apparatus for effecting formation of sub-micron fibers by fibrillation of polymer films, and nonwoven materials and articles incorporating them. | 05-13-2010 |
20110147301 | NONWOVENS AND ARTICLES CONTAINING SUBMICRON FIBERS - Nonwoven web products containing sub-micron fibers, and more specifically nonwoven web products having sub-micron fibers formed by fibrillation of polymer films, and nonwoven materials and articles incorporating them, and methods of producing these products. | 06-23-2011 |
20110196325 | Absorbent Article with Containment Barrier - The present disclosure, in part, relates generally to an absorbent article to be worn about the lower torso. The absorbent article comprises a chassis comprising a topsheet, a backsheet, an absorbent core disposed between the topsheet and the backsheet, and a pair of longitudinal barrier cuffs attached to the chassis. Each of the longitudinal barrier cuffs is comprised of a web of material. The web of material has a low surface tension fluid strikethrough time of at least about 19 seconds, and an air permeability of at least about 20 m | 08-11-2011 |
20110196327 | Web Material(s) for Absorbent Articles - The present disclosure, in part, relates generally to an absorbent article to be worn about the lower torso. The absorbent article comprises a chassis comprising a topsheet, a backsheet, an absorbent core disposed between the topsheet and the backsheet, and a pair of longitudinal barrier cuffs attached to the chassis. Each of the longitudinal barrier cuffs is formed of a web of material. The web of material comprises a first nonwoven component layer comprising fibers having an average diameter in the range of about 8 microns to about 30 microns, a second nonwoven component layer comprising fibers having an average diameter of less than about 1 micron, and a third nonwoven component layer comprising fibers having an average diameter in the range of about 8 microns to about 30 microns. The second nonwoven component layer is disposed intermediate the first nonwoven component layer and the third nonwoven component layer. | 08-11-2011 |
20110196332 | Absorbent Article with Bonded Web Material - An absorbent article to be worn the lower torso is provided. The absorbent article comprises a chassis comprising a topsheet, a backsheet, an absorbent core, and a pair of longitudinal barrier cuffs attached to the chassis. Each of the longitudinal barrier cuffs comprises a web of material. The web of material comprises a first nonwoven component layer, and a second nonwoven component layer. Each of the longitudinal barrier cuffs comprises a longitudinal zone of attachment where each of the longitudinal barrier cuff attaches to the chassis, a longitudinal free edge, and a plurality of mechanical bonds disposed between the longitudinal zone of attachment and the free edge. The plurality of mechanical bonds attach one of a first portion of the web of material to a second portion of the web of material, and the web of material to a portion of the absorbent article. | 08-11-2011 |
20110275269 | Fibers, Nonwovens and Articles Containing Nanofibers Produced from Broad Molecular Weight Distribution Polymers - The present invention is directed to articles comprising nanofibers. The nanofibers, having a diameter of less than 1 micron, may comprise a significant number of the fibers in one layer of the web contained by the article. Preferably, the nanofibers are produced in a melt film fibrillation process. The articles include diapers, training pants, adult incontinence pads, catamenials products such as feminine care pads and pantiliners, tampons, personal cleansing articles, personal care articles, and personal care wipes including baby wipes, facial wipes, and feminine wipes. | 11-10-2011 |
20120021026 | Dissolvable Fibrous Web Structure Article Comprising Active Agents - The personal care compositions of the present invention are in the form of an Article comprising a dissolvable fibrous web structure. The fibers of the dissolvable fibrous web structure comprise a surfactant; a water soluble polymeric structurant; and a plasticizer. Additionally the ratio of the water soluble water soluble polymeric structurant to the active agent in the fiber is 3.5 or less. | 01-26-2012 |
20120150135 | Absorbent Article With Containment Barrier - An absorbent article comprising a chassis comprising a topsheet, a backsheet, an absorbent core disposed between the topsheet and the backsheet, and a pair of longitudinal barrier cuffs attached to the chassis. Each longitudinal cuff is formed of a web of material having first and second opposing surfaces and comprising a nonwoven component layer comprising fibers having a number-average diameter of less than about 1 micron, a mass-average diameter of less than about 1.5 microns, and a ratio of the mass-average diameter to the number-average diameter less than about 2. The absorbent article further comprises a hydrophobic coating disposed on at least one surface of the web of material. | 06-14-2012 |
20120172831 | Methods of Delivering a Health Care Active by Administering Personal Health Care Articles Comprising a Filament - A method of delivering a health care active having the steps of administering to a mammal in need of a health benefit or a treatment for a health condition a personal health care article and consuming the article. The article contains one or more filaments that contain a backbone material, a health care active and optionally aesthetic agents, extensional aids, plasticizers, and crosslinking agents. | 07-05-2012 |
20120273986 | PROCESS FOR PRODUCING NONWOVENS AND ARTICLES CONTAINING SUBMICRON FIBERS - Processes for producing nonwoven web products containing sub-micron fibers are provided, and more specifically processes for producing nonwoven web products having sub-micron fibers formed by fibrillation of polymer films are provided. | 11-01-2012 |
20130004757 | ARTICLES CONTAINING NANOFIBERS PRODUCED FROM LOW MELT FLOW RATE POLYMERS - The present invention is directed to hygiene articles comprising nanofibers. The nanofibers are made from a melt film fibrillation process with a polymer composition having a melt flow rate of less than about 400 decigram per minute. The nanofibers, having a diameter of less than 1 micron, must comprise a significant number of the fibers in one layer of the web contained by the hygiene article. The hygiene articles include diapers, training pants, adult incontinence pads, catamenials products such as feminine care pads and pantiliners, tampons, personal cleansing articles, personal care articles, and personal care wipes including baby wipes, facial wipes, and feminine wipes. | 01-03-2013 |
20130023836 | Hygiene Articles Containing Nanofibers - A method of making a nonwoven web comprising nanofibers that are made by a melt film fibrillation process is disclosed. The nanofibers have a diameter of less than 1 micron, and comprise a significant number of the fibers in one layer of the web. The process generally includes the steps of providing a polymeric melt, utilizing a central fluid stream to form an elongated hollow polymeric film tube, and using this and/or other fluid streams to form multiple nanofibers from the hollow tube. | 01-24-2013 |
20130147080 | Articles Containing Nanofibers Produced from Low Melt Flow Rate Polymers - The present invention is directed to hygiene articles comprising nanofibers. The nanofibers are made from a melt film fibrillation process with a polymer composition having a melt flow rate of less than about 400 decigram per minute. The nanofibers, having a diameter of less than 1 micron, must comprise a significant number of the fibers in one layer of the web contained by the hygiene article. The hygiene articles include diapers, training pants, adult incontinence pads, catamenials products such as feminine care pads and pantiliners, tampons, personal cleansing articles, personal care articles, and personal care wipes including baby wipes, facial wipes, and feminine wipes. | 06-13-2013 |
20130253017 | Methods of Delivering a Health Care Active by Administering Personal Health Care Articles Comprising a Filmament - A method of delivering a health care active having the steps of administering to a mammal in need of a health benefit or a treatment for a health condition a personal health care article and consuming the article. The article contains one or more filaments that contain a backbone material, a health care active and optionally aesthetic agents, extensional aids, plasticizers, and crosslinking agents. | 09-26-2013 |
20140052087 | Web Material(s) For Absorbent Articles - The present disclosure, in part, relates generally to an absorbent article to be worn about the lower torso. The absorbent article comprises a chassis comprising a topsheet, a backsheet, an absorbent core disposed between the topsheet and the backsheet, and a pair of longitudinal barrier cuffs attached to the chassis. Each of the longitudinal barrier cuffs is formed of a web of material. The web of material comprises a first nonwoven component layer comprising fibers having an average diameter in the range of about 8 microns to about 30 microns, a second nonwoven component layer comprising fibers having an average diameter of less than about 1 micron, and a third nonwoven component layer comprising fibers having an average diameter in the range of about 8 microns to about 30 microns. The second nonwoven component layer is disposed intermediate the first nonwoven component layer and the third nonwoven component layer. | 02-20-2014 |
20140249498 | ABSORBENT ARTICLE WITH BONDED WEB MATERIAL - An absorbent article to be worn the lower torso is provided. The absorbent article comprises a chassis comprising a topsheet, a backsheet, an absorbent core, and a pair of longitudinal barrier cuffs attached to the chassis. Each of the longitudinal barrier cuffs comprises a web of material. The web of material comprises a first nonwoven component layer, and a second nonwoven component layer. Each of the longitudinal barrier cuffs comprises a longitudinal zone of attachment where each of the longitudinal barrier cuff attaches to the chassis, a longitudinal free edge, and a plurality of mechanical bonds disposed between the longitudinal zone of attachment and the free edge. The plurality of mechanical bonds attach one of a first portion of the web of material to a second portion of the web of material, and the web of material to a portion of the absorbent article. | 09-04-2014 |
20140329428 | DISSOLVABLE FIBROUS WEB STRUCTURE ARTICLE COMPRISING ACTIVE AGENTS - The personal care compositions of the present invention are in the form of an Article comprising a dissolvable fibrous web structure. The fibers of the dissolvable fibrous web structure comprise a surfactant; a water soluble polymeric structurant; and a plasticizer. Additionally the ratio of the water soluble water soluble polymeric structurant to the active agent in the fiber is 3.5 or less. | 11-06-2014 |
20150038930 | ABSORBENT ARTICLE WITH CONTAINMENT BARRIER - An absorbent article to be worn about the lower torso, the absorbent article comprising a chassis comprising a topsheet, a backsheet, an absorbent core disposed between the topsheet and the backsheet, and a pair of longitudinal barrier cuffs attached to the chassis. Each longitudinal cuff is formed of a web of material, the web of material having first and second opposing surfaces. The web of material comprises a nonwoven component layer comprising fibers having a number-average diameter of less than about 1 micron, a mass-average diameter of less than about 1.5 microns, and a ratio of the mass-average diameter to the number-average diameter less than about 2. The absorbent article further comprises a hydrophobic coating disposed on at least one surface of the web of material such that a coated web of material is formed, the hydrophobic surface coating comprising a solventless, multicomponent silicone composition including at least two silicone polymers and being substantially free of aminosilicones. | 02-05-2015 |
20150342800 | Hygiene Articles Containing Nanofibers - A hygiene article including a nonwoven web having nanofibers. The hygiene articles include diapers, training pants, adult incontinence pads, catamenials products, tampons, personal cleansing articles, and personal care articles. The nanofiber webs can be used as a barrier, wipe, or absorbent material. Particularly, the nanofiber web is used in a diaper as a barrier-on-core, outercover, and/or leg cuff. It may also be used as a wipe. | 12-03-2015 |
Patent application number | Description | Published |
20140040632 | LOW-OVERHEAD CRYPTOGRAPHIC METHOD AND APPARATUS FOR PROVIDING MEMORY CONFIDENTIALITY, INTEGRITY AND REPLAY PROTECTION - A method and system to provide a low-overhead cryptographic scheme that affords memory confidentiality, integrity and replay-protection by removing the critical read-after-write dependency between the various levels of the cryptographic tree. In one embodiment of the invention, the cryptographic processing of a child node can be pipelined with that of the parent nodes. This parallelization provided by the invention results in an efficient utilization of the cryptographic pipeline, enabling significantly lower performance overheads. | 02-06-2014 |
20140096068 | DEVICE AND METHOD FOR SECURE USER INTERFACE GESTURE PROCESSING USING PROCESSOR GRAPHICS - A device and method for securely rendering content on a gesture-enabled computing device includes initializing a secure execution environment on a processor graphics of the computing device. The computing device transfers view rendering code and associated state data to the secure execution environment. An initial view of the content is rendered by executing the view rendering code in the secure execution environment. A gesture is recognized, and an updated view of the content is rendered in the secure execution environment in response to the gesture. The gesture may include a touch gesture recognized on a touch screen, or a physical gesture of the user recognized by a camera. After the updated view of the content is rendered, the main processor of the computing device may receive updated view data from the secure execution environment. | 04-03-2014 |
20140101461 | PARALLELIZED COUNTER TREE WALK FOR LOW OVERHEAD MEMORY REPLAY PROTECTION - A processor includes a memory encryption engine that provides replay and confidentiality protections to a memory region. The memory encryption engine performs low-overhead parallelized tree walks along a counter tree structure. The memory encryption engine upon receiving an incoming read request for the protected memory region, performs a dependency check operation to identify dependency between the incoming read request and an in-process request and to remove the dependency when the in-process request is a read request that is not currently suspended. | 04-10-2014 |
20140157404 | VIRTUALIZING A HARDWARE MONOTONIC COUNTER - Embodiments of an invention for virtualizing a hardware monotonic counter are disclosed. In one embodiment, an apparatus includes a hardware monotonic counter, virtualization logic, a first non-volatile storage location, and a second non-volatile storage location. The virtualization logic is to create a virtual monotonic counter from the hardware monotonic counter. The first non-volatile storage location is to store an indicator that the count of the hardware monotonic counter has changed. The second non-volatile storage location is to store an indicator that the count of the virtual monotonic counter has changed. | 06-05-2014 |
20140157410 | Secure Environment for Graphics Processing Units - In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the workloads from malware running on the graphics processing unit but also protects those workloads from malware running on the central processing unit. In addition, the trust framework may facilitate proof of secure execution by measuring the code and data structures used to execute the workload. If a part of the trusted computing base of this framework or protected execution environment is compromised, that part can be patched remotely and the patching can be proven remotely throughout attestation in some embodiments. | 06-05-2014 |
20140173756 | PLATFORM-HARDENED DIGITAL RIGHTS MANAGEMENT KEY PROVISIONING - Embodiments of an invention for platform-hardened digital rights management key provisioning are disclosed. In one embodiment, a processor includes an execution unit to execute one or more instructions to create a secure enclave in which to run an application to receive digital rights management information from a provisioning server in response to authentication of the application by a verification server. | 06-19-2014 |
20140208109 | METHOD AND SYSTEM FOR PROTECTING MEMORY INFORMATION IN A PLATFORM - A method and system to provide an effective, scalable and yet low-cost solution for Confidentiality, Integrity and Replay protection for sensitive information stored in a memory and prevent an attacker from observing and/or modifying the state of the system. In one embodiment of the invention, the system has strong hardware protection for its memory contents via XTS-tweak mode of encryption where the tweak is derived based on “Global and Local Counters”. This scheme offers to enable die-area efficient Replay protection for any sized memory by allowing multiple counter levels and facilitates using small counter-sizes to derive the “tweak” used in the XTS encryption without sacrificing cryptographic strength. | 07-24-2014 |
20140267332 | Secure Rendering of Display Surfaces - A protected graphics module can send its output to a display engine securely. Secure communications with the display can provide a level of confidentiality of content generated by protected graphics modules against software and hardware attacks. | 09-18-2014 |
20140337983 | Entry/Exit Architecture for Protected Device Modules - The entry/exit architecture may be a critical component of a protection framework using a secure enclaves-like trust framework for coprocessors. The entry/exit architecture describes steps that may be used to switch securely into a trusted execution environment (entry architecture) and out of the trusted execution environment (exit architecture), at the same time preventing any secure information from leaking to an untrusted environment. | 11-13-2014 |
20150086012 | SECURE VIDEO OUPUT PATH - Systems and methods for secure delivery of output surface bitmaps to a display engine. An example processing system comprises: an architecturally protected memory; and a processing core communicatively coupled to the architecturally protected memory, the processing core comprising a processing logic configured to implement an architecturally-protected execution environment by performing at least one of: executing instructions residing in the architecturally protected memory and preventing an unauthorized access to the architecturally protected memory; wherein the processing logic is further configured to provide a secure video output path by generating an output surface bitmap encrypted with a first encryption key and storing an encrypted first encryption key in an external memory, wherein the encrypted first encryption key is produced by encrypting the first encryption key with a second encryption key. | 03-26-2015 |
20150089173 | SECURE MEMORY REPARTITIONING - Secure memory repartitioning technologies are described. A processor includes a processor core and a memory controller coupled between the processor core and main memory. The main memory includes a memory range including a section of convertible pages are convertible to secure pages or non-secure pages. The processor core, in response to a page conversion instruction, is to determine from the instruction a convertible page in the memory range to be converted and convert the convertible page to be at least one of a secure page or a non-secure page. The memory range may also include a hardware reserved section are convertible in response to a section conversion instruction. | 03-26-2015 |
20150178481 | PLATFORM-HARDENED DIGITAL RIGHTS MANAGEMENT KEY PROVISIONING - Embodiments of an invention for platform-hardened digital rights management key provisioning are disclosed. In one embodiment, a processor includes an execution unit to execute one or more instructions to create a secure enclave in which to run an application to receive digital rights management information from a provisioning server in response to authentication of the application by a verification server. | 06-25-2015 |
20150180657 | TECHNIQUES FOR ENFORCING A DEPTH ORDER POLICY FOR GRAPHICS IN A DISPLAY SCENE - Various embodiments are generally directed an apparatus and method for processing an encrypted graphic with a decryption key associated with a depth order policy including a depth position of a display scene, generating a graphic from the encrypted graphic when the encrypted graphic is successfully decrypted using the decryption key and assigning the graphic to a plane at the depth position of the display scene when the encrypted graphic is successfully decrypted. | 06-25-2015 |
20150186295 | Bridging Circuitry Between A Memory Controller And Request Agents In A System Having Multiple System Memory Protection Schemes - A processor is described that includes one or more processing cores. The processor includes a memory controller to interface with a system memory having a protected region and a non protected region. The processor includes a protection engine to protect against active and passive attacks. The processor includes an encryption/decryption engine to protect against passive attacks. The protection engine includes bridge circuitry coupled between the memory controller and the one or more processing cores. The bridge circuitry is also coupled to the protection engine and the encryption/decryption engine. The bridge circuitry is to route first requests directed to the protected region to the protection engine and to route second requests directed to the non protected region to the encryption/decryption engine. | 07-02-2015 |
20150278512 | VIRTUALIZATION BASED INTRA-BLOCK WORKLOAD ISOLATION - Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system may include a virtual machine manager (VMM) module to create a secure virtualization environment or sandbox. The system may also include a processor block to load data into a first region of the sandbox and to generate a workload package based on the data. The workload package is stored in a second region of the sandbox. The system may further include an operational block to fetch and execute instructions from the workload package. | 10-01-2015 |
20150278514 | Entry/Exit Architecture for Protected Device Modules - The entry/exit architecture may be a critical component of a protection framework using a secure enclaves-like trust framework for coprocessors. The entry/exit architecture describes steps that may be used to switch securely into a trusted execution environment (entry architecture) and out of the trusted execution environment (exit architecture), at the same time preventing any secure information from leaking to an untrusted environment. | 10-01-2015 |