Methods and apparatus for selecting a base station transceiver system for communication with a Third Generation (3G) (or better) mobile station are described. In one illustrative example, one or more base station transceiver systems are identified for communication with the mobile station through a scanning process. A first base station transceiver system is identified as providing a Third Generation (3G) communication service or better, whereas a second base station transceiver system is identified as failing to provide the 3G or better communication service (e.g. it may provide a Second Generation (2G) communication service). The first system is selected for communication over the second system based at least in part on identifying that the second system fails to provide the 3G or better communication service. For example, the first system may be chosen over the second system if the first system has a signal quality that is better than a minimum threshold, even if its signal quality is worse than that of the second system. Advantageously, even if an available 2G system has a better signal quality, preference for an adequate 3G or better system is given to ensure that a preferred data service is made available to the mobile station.
A method of communicating in a secure communication system, comprises the steps of assembling as message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient.
Methods and apparatus for selecting a wireless communication network based on quality of service criteria associated with an application are disclosed. In one illustrative example, one of several different software applications of a mobile communication device is executed. The software application may be, for example, an e-mail application, an internet data application, a voice-over-IP application, a video player application, an audio player application, or a video game application. Each software application is associated with different quality of service (QoS) criteria for data communications through a wireless network. The quality of service criteria may include, for example, a bandwidth criterion, a delay criterion, a delay variation criterion, and a data loss criterion. A scanning operation is performed to identify a plurality of a wireless networks available in a coverage area of the mobile device. One of the identified wireless networks is selected for communication based on a match between its available quality of service and the quality of service criterion associated with the executed software application. Advantageously, the most suitable network may be chosen and utilized for each software application.
A battery management system for managing a plurality of subsystem circuits and functions of a mobile communication device powered by a battery is disclosed. The battery management system includes a battery monitoring circuit, a user interface, and a battery management module. The battery monitoring circuit is operable to monitor a present battery capacity and generate a battery capacity signal based on the present battery capacity. The user interface is operable to receive a user-input allocation of battery capacity among the subsystem circuits and functions. The battery management module is operable to receive the user-input allocation and the battery capacity signal, and to selectively disable each subsystem circuit or function when each subsystem circuit or function has depleted its allocation of battery capacity.
The current state of art for over-the-air (OTA) provisioning typically consists of a rigid set of operations that are suited to deliver a fixed content type. The runtime environment on the terminal is designed to handle a limited set of predefined content types and incapable of any content-adaptive or customized provisioning by the content provider or publisher. Systems and methods are provided for customized provisioning of an application program on a runtime environment of a terminal. The application includes application content having at least one specified content type. A method comprises: obtaining the application content by the runtime environment; and obtaining by the runtime environment a set of provisioning instructions related to the application content. The provisioning instructions are coupled to the application for specifying a provisioning API set for provisioning the application content. This method also executes the provisioning instructions for employing the API set to provision the application according to the specified content type.
6.
APPARATUS, AND ASSOCIATED METHOD, FOR FACILITATING SYNCHRONIZATION OF DATABASES CONNECTED BY WAY OF A RADIO AIR INTERFACE
Apparatus, and an associated method, for facilitating synchronization of databases connected by way of a radio air interface. Changes to a data record embodied at the network part are detected by a detector. A mapping is performed by a mapper, and a synchronization request is generated by a synchronization request generator. The synchronization request is filtered by a filter, and converted into form to permit its efficient communication upon the radio air interface to a mobile node pursuant to a synchronization session.
The presence of new unread electronic messages received, that is, messages received since unread messages were last reviewed, is provided by indicia presented to the user. These indicia can take various forms, such as by bolding, flashing, changing the size or color of a count of unread messages, and/or the unread message icon. Alternatively, a separate indication, such as a second count representing the number of new unread electronic messages received, or some other symbol, such as an explanation point, can be displayed.
An improved system and method for managing data on a handheld electronic device includes a server that periodically pushes data to a particular handheld electronic device, with the data being stored on the handheld electronic device by way of a routine running in the background whereby such reception and storage is generally transparent to a user. The data can be any type of data and may be data that is desired by the user or that fits a profile or preference of the user. The profile can, for instance, be predetermined and/or can be customized by the user and/or can reflect a preference of the user. The data pushed to the handheld electronic device can also be related in some fashion to a geographic disposition of the handheld electronic device. Such pushing of data and storage is managed by a routine running in the background of the handheld electronic device. The routine enables current data to be maintained on the handheld electronic device for ready access by a user.
G06F 15/02 - Calculateurs numériques en généralÉquipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p. ex. calculettes
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p. ex. gestion de la mobilité
9.
METHOD, SYSTEM AND DEVICE FOR AUTHENTICATING A USER
Preferred embodiments of the invention relate to a method and device for authenticating a user of a computer and a corresponding system using the method and device. The device is a handheld electronic device having accessible thereto a first authentication code of the user. The handheld electronic device requires a second authentication code for enabling use thereof. In order to authenticate the user to the computer, the handheld electronic device is configured to transmit the first authentication code to the computer over a communication link between the computer and the handheld electronic device.
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
G06F 21/44 - Authentification de programme ou de dispositif
A system and method for remote device registration, to monitor and meter the injection of keying or other confidential information onto a device, is provided. A producer who utilizes one or more separate manufacturers, operates a remote module that communicates over forward and backward channels with a local module at the manufacturer. Encrypted distribution images are sent by producer to the manufacturer and are decrypted and used in the production of devices. As distribution images are decrypted, credits from a credit pool are depleted and can be replenished by the producer through credit instructions. As distribution images are decrypted, usage records are created and eventually concatenated, and sent as usage reports back to the producer, to enable the producer to monitor and meter production at the manufacturer.
A method and apparatus for presenting information is provided. In an embodiment, an electronic device with wireless telephony features is provided. The display of the device is divided into at least two regions. The first region is reserved for presenting status information about the device, including such information as battery life, signal strength, time and date, carrier information, and the like. The second region is reserved for use by applications, such as at least a main menu application and an incoming telephone call application. When an incoming call arrives, the main menu application presented on the second region is replaced with the incoming call information, but the status information remains unchanged. As the status of the incoming call changes from unanswered to answered, only a portion of the second region is updated, as a remaining portion of the second region remains the same and indicates that an incoming call is being processed.
The present invention relates generally to computer graphics, and more specifically to methods of, and systems for, configuring, controlling and accessing multiple hardware graphics layers that are used to compose a single video display. One aspect of the invention is broadly defined as follows: in a computer environment including a software application and an operating system running on a computer, the computer including a graphics card and a video display, the graphics card being operable to render images to the video display, the improvement comprising: the operating, system including a universal application programming interface (API) which supports hardware layers on graphics cards; the operating system being operable to: receive draw events via the universal API; determine what hardware layers are available on the graphics card, and what their parameters are; and respond to draw requests from the software application by rendering the draw requests selectively to any of the available hardware layers on the graphics card; whereby the computer environment allows software applications to exploit available hardware layers on the graphics card.
G06F 3/14 - Sortie numérique vers un dispositif de visualisation
G09G 5/00 - Dispositions ou circuits de commande de l'affichage communs à l'affichage utilisant des tubes à rayons cathodiques et à l'affichage utilisant d'autres moyens de visualisation
13.
SYSTEM AND METHOD FOR MANAGEMENT OF PLAINTEXT DATA IN A MOBILE DATA PROCESSING DEVICE
A handheld data processing device includes stored data that is intended to be kept secure from unauthorized access. The handheld data processing device includes applications that store such secure data and which make use of plaintext data corresponding to the secure data. An identifier is defined to be associated with defined plaintext data. When the handheld data processing device is placed in a locked or secure state, code executable on the device is able to search for plaintext identifiers. Code executable on the device is consequently able to display to the user whether plaintext data is stored on the device or not.
An improved handheld electronic device and an associated method provide a simplified mechanism for enabling and disabling a short-range wireless communications element used to create a connection to a short-range wireless network, such as a Bluetooth.TM. network. The method, implemented by the handheld electronic device, includes enabling the short-range wireless communications element, pairing the handheld electronic device with a second electronic device using the short-range wireless communications element, and providing a first icon on the handheld electronic device after pairing the handheld electronic device with the . second electronic device. Thereafter, the method includes disabling the short-range wireless communications element and providing a second icon on the handheld electronic device whenever the first icon is activated, and enabling the short-range wireless communications element and providing the first icon on the handheld electronic device whenever the second icon is activated.
G06F 15/02 - Calculateurs numériques en généralÉquipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p. ex. calculettes
H04B 7/26 - Systèmes de transmission radio, c.-à-d. utilisant un champ de rayonnement pour communication entre plusieurs postes dont au moins un est mobile
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
An improved handheld electronic device and an associated method provide an improved call log that presents information relating to logged phone calls in a collapsed manner, meaning that for each phone number having a call stored in the memory of the device, only the most recent in time call is listed on the call log. An improved handheld electronic device and an associated method also provide a call history for any phone call from the improved call log that is selected by the user. The call history includes a listing of all of the calls stored by the device that are associated with the selected call log call.
G06F 15/02 - Calculateurs numériques en généralÉquipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p. ex. calculettes
H04M 1/57 - Dispositions pour indiquer ou enregistrer le numéro de l'abonné demandeur à l'appareil de l'abonné demandé
In one embodiment, a scheme is provided for customization of a mobile communications device's data session retry mechanism in a wireless packet data service network. Upon detecting that a cause code has been returned by a node disposed in a wireless packet data service network, a structure is interrogated to determine if the cause code is mapped to a flag relating to the device's data session retry mechanism. Responsive to determining that the received cause code is mapped as a critical cause code, the data session retry mechanism of the mobile communications device is disabled so that further signaling messages towards the network are prevented.
A method of checking a new entry in a calendar application having a cache that includes a first subset of existing entries falling within a first date range. Also, an electronic device implementing the method. The method includes determining whether the date of the new entry falls within the first date range. If so, the method determines whether the new entry directly conflicts with or is adjacent to one of the existing entries in the first subset, and provides a notification if appropriate. If the date is outside the first date range, the method creates a new calendar cache including a second subset of existing entries falling within a second date range around the new entry date, determines whether the new calendar entry directly conflicts with or is adjacent to one of the existing calendar entries in the second subset, and provides a notification if appropriate.
The invention provides a microphone coupler for a microphone located within a housing of a portable communication device and a device incorporating the coupler. The coupler comprises a body section and a conduit or just a conduit. The body section is shaped to fit around the microphone and is defined by one or more walls and within the walls an interior cavity is defined. One wall has a port in through connecting to the cavity. The cavity can receive at least a portion of the microphone and provides a space between the microphone and the body section. The conduit has an internal channel, a distal end, a proximate end and openings at each end connecting to the channel. For the conduit, the proximate end is connected to the body section and the second opening mates with the port.
Outgoing phone calls can be made on a handheld electronic device that has been locked to prevent unauthorized use through an override that permits the making of outgoing phone calls while applications additional to the phone application remain locked. In some embodiments, the override can not be selected unless first enabled by a remotely generated enable override authorization signal.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
H04M 1/67 - Dispositions pour empêcher les appels non autorisés provenant d'un appareil téléphonique par des moyens électroniques
H04M 1/72484 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles où les fonctions sont activées par la réception d’une démarche de communication
A signal processing system detects reverberation. The system may suppress the reverberation and improve signal quality. The system analyzes frequency bands of an input signal to determine whether reverberation characteristics are present. When reverberation is detected, the system may attenuate the reverberant frequency band to reduce or eliminate the reverberation.
G10K 11/175 - Procédés ou dispositifs de protection contre le bruit ou les autres ondes acoustiques ou pour amortir ceux-ci, en général utilisant des effets d'interférenceMasquage du son
The operation of a vehicle electronic module is influenced by vehicle-state received on a vehicle communication bus. The electronic module analyzes vehicle-state data that includes information about the vehicle's environment. The electronic module improves or maintains electronic module performance by adjusting communication processing parameters to improve driver or passenger communication.
B60R 99/00 - Matière non prévue dans les autres groupes de la présente sous-classe
G10K 11/16 - Procédés ou dispositifs de protection contre le bruit ou les autres ondes acoustiques ou pour amortir ceux-ci, en général
G10K 11/175 - Procédés ou dispositifs de protection contre le bruit ou les autres ondes acoustiques ou pour amortir ceux-ci, en général utilisant des effets d'interférenceMasquage du son
22.
WIRELESS PERSONAL AREA NETWORK HAVING AUTHENTICATION AND ASSOCIATED METHODS
A wireless personal area network (WPAN) system includes a plurality of WPAN devices using encrypted wireless communication therebetween when in an enabled state and not wirelessly communicating when in a disabled state. At least one of the WPAN devices includes a WPAN identity reader for reading at least one identifying parameter of a user, for confirming that the user is an authorized user based upon reading the at least one identifying parameter, and for wirelessly communicating with at least one other WPAN device to switch the at least one other WPAN device from the disabled state to the enabled state based upon confirming the user is an authorized user.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
23.
MOBILE WIRELESS COMMUNICATIONS DEVICE WITH HUMAN INTERFACE DIVERSITY ANTENNA AND RELATED METHODS
A mobile wireless communications device may include a portable handheld housing, and a wireless transceiver carried by the housing. A pair of an antennas are positioned in side-by-side relation preferably in the upper portion of the portable handheld housing. A human interface diversity controller is connected to the wireless transceiver to preferentially operate with the plurality of antennas based upon a relative position of the portable handheld housing with respect to a hand of a human user. The device can select or weight the antennas based upon the position of the device when being held by a user.
A manual input navigation device and a sensor are utilized to manipulate graphical elements in a mobile device graphical user interface. The manual input navigation device generates an input navigation signal for altering a relative position of the graphical element in the graphical user interface, and the sensor measures a current tilt angle of the mobile device. Upon the generation of the input navigation signal, the current tilt angle is stored as a reference tilt angle. The relative position of the graphical element is altered based on the difference between the current tilt angle and the reference tilt angle.
G06F 3/03 - Dispositions pour convertir sous forme codée la position ou le déplacement d'un élément
G06F 15/02 - Calculateurs numériques en généralÉquipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p. ex. calculettes
A system and method for remote device registration, to monitor and meter the injection of keying or other confidential information onto a device, is provided. A producer who utilizes one or more separate manufacturers, operates a remote module that communicates over forward and backward channels with a local module at the manufacturer. Encrypted data transmissions are sent by producer to the manufacturer and are decrypted to obtain sensitive data used in the devices. As data transmissions are decrypted, credits from a credit pool are depleted and can be replenished by the producer through credit instructions. As distribution images are decrypted, usage records are created and eventually concatenated, and sent as usage reports back to the producer, to enable the producer to monitor and meter production at the manufacturer. In an alternative arrangement overproduction may be inhibited by introducing a separation of duties within a manufacturing process. Typically a producer will contract out the various stages of manufacturing to multiple contractors. In general, separation of duties involves purposefully separating manufacturing stages, for silicon chips or other devices, so that the end product must have been "touched", by each subcontractor, in order for the end product to be fully functional.
G06F 21/72 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les circuits de cryptographie
H04L 9/28 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant un algorithme de chiffrement particulier
26.
PROCESS SCHEDULER EMPLOYING ADAPTIVE PARTITIONING OF PROCESS THREADS
A system is set forth that comprises a processor, such as a single processor or symmetric multiprocessor, and one or more memory storage units. The system also includes software code that is stored in the memory storage units. The software code is executable by the processor and comprises code for generating a plurality of adaptive partitions that are each associated with one or more software threads. Each of the adaptive partitions has a corresponding processor budget. The code also is executable to generate at least one sending thread and at least one receiving thread. The receiving thread responds to communications from the sending thread to execute one or more tasks corresponding to the communications. A scheduling system also forms at least part part of the code that is executable by the processor. In operation, the scheduling system selectively allocates the processor to each sending and receiving thread based, at least in part, on the processor budget of the adaptive partition associated with the respective thread. In this type of sending/receiving environment, the scheduling system bills the processor budget of the adaptive partition associated with the sending thread for processor allocation used by the receiving thread to respond to communications sent by the sending thread.
A memory interface controller and method to allow a processor designed and configured to operate with NOR flash and SRAM memory devices to instead operate using NAND flash and SDRAM. The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor.
Based on user configuration, a main messaging user interface screen on a messaging device either presents a list of references to messages stored on the device based on a complete index of references to the stored messages or based on a filtered index of references to the stored messages. References to stored messages of a predetermined type are not maintained in the filtered index.
An internet protocol loopback wireless data protocol converter for a mobile device having: at least one loopback interface; at least one internet protocol server operating on one or more ports of the at least one loopback interface; a wireless optimized data communications module to connect to a wireless data infrastructure to send and receive wireless optimized data; and at least one protocol converter to convert communications in a wireless optimized data protocol to and from standard Internet protocol, the protocol converter further comprising a wireless optimized data module communicating with the at least one protocol converter, the wireless optimized data module storing wireless optimized data for the wireless data protocol, wherein an internet protocol application can communicate with the at least one server using the loopback interface and data to and from the application can be received and transmitted using the wireless optimized data communications module with conversion by the at least one protocol converter.
H04L 51/224 - Surveillance ou traitement des messages en fournissant une notification sur les messages entrants, p. ex. des poussées de notifications des messages reçus
H04L 51/58 - Adaptation des messages pour la communication sans fil
H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]
H04L 67/04 - Protocoles spécialement adaptés aux terminaux ou aux réseaux à capacités limitéesProtocoles spécialement adaptés à la portabilité du terminal
H04L 69/329 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche application [couche OSI 7]
30.
METHOD AND APPARATUS FOR VERIFIABLE GENERATION OF PUBLIC KEYS
The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of private and public keys. Verification of the signature proves that the keys are generated from a key generation process utilizing the signature. A certification authority can validate and verify a public key generated from a verifiable key generation process.
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
31.
METHOD FOR UPGRADING APPLICATION DATA ACCORDING TO A NEW APPLICATION DEFINITION
A method is disclosed for upgrading preexisting application data according to a new application definition, the method comprises parsing the preexisting application data to provide parsed preexisting application data and converting the parsed preexisting application data according to the new application definition to thereby provide application data compliant with the new application definition.
32.
METHOD AND SYSTEM FOR EXTENDING SCRIPTING LANGUAGES
A method for extending a script language in a runtime environment of a data processing system to support an application, the runtime environment having a script language interpreter, the method comprising: subclassing a predetermined object defined by the script language to create a subclassed object, the predetermined object having an original method, the subclassed object having a respective replacement method for supporting the application; dynamically registering a symbol corresponding to the subclassed object; detecting the subclassed object in the application with the script language interpreter; and, executing the replacement method with the script language interpreter.
33.
SYSTEM AND METHOD FOR GENERATING SAFE AND EFFICIENT COMPONENT RELATIONSHIPS IN WIRELESS APPLICATIONS
A method of detecting recursive instantiation loops in a wireless application. A data model digraph is constructed including a respective node for each data component in the wireless application, and a respective edge for each relationship between a pair of data components. The data model digraph is searched to identify any cycles. For each identified cycle, each data component that participates in the cycle is identified.
Reduced delays in data service offered by data-capable networks are provided. One illustrative method includes the steps of receiving and storing in memory a first timer value which is broadcasted by a wireless communication network for use in the mobile station; causing a request for data connectivity to be transmitted through the wireless network, and reattempting the request up to a plurality of times when data connectivity fails; after the one or more reattempted requests for data connectivity fail, activating a timer based on a second timer value which is less than the first timer value; and repeating the transmitting of requests for data connectivity after expiration of the timer.
One illustrative method of providing network broadcast information to a wireless device from a wireless local area network (WLAN) includes the steps of receiving, from one or more available cellular networks or a network database, cellular network broadcast information associated with the one or more available cellular networks; providing the cellular network broadcast information in a generic container message which varies in content and format according to one or more cellular standards associated with the one or more available cellular networks; and causing the generic container message to be regularly broadcasted for receipt and use by a wireless device. In an alternative approach, the steps include regularly broadcasting a network interworking indicator which is indicative of whether cellular network broadcast information is available for receipt from the WLAN; receiving a probe request from a wireless device; and causing the cellular network broadcast information to be sent to the wireless device in the generic container message in response to the probe request from the wireless device, The generic container message may alternatively or additionally include wireless network broadcast information from different types of wireless networks (e.g. Wi-MAX) which are available to the WLAN.
H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
36.
SYSTEM AND METHOD OF AUTOMATICALLY DETERMINING WHETHER OR NOT TO INCLUDE MESSAGE TEXT OF AN ORIGINAL ELECTRONIC MESSAGE IN A REPLY ELECTRONIC MESSAGE
A system and method for automatically determining whether or not original message text should be included in a reply electronic message is provided. In one broad aspect, the original message text is included in the reply electronic message as a function of the original message. In a first example, the original message text is included as a function of a domain name of an originating address. In a second example, the original message text is included as a function of maintained information used for determining if original message text should be included in reply electronic messages. In a third example, the original message text is included as a function of an indicative encoding inside the original electronic message. In a fourth example, the original message text is included as a function of maintained information used for detecting address aliases. In another broad aspect, the original electronic message is encoded with an indicative encoding as to whether or not a reply electronic message should include the original message text.
In instant communications over a wireless network, a user from a private organization sends the request for instant communications communication through a private server controlled by the private organization. The private server sets up a private account with the wireless carrier and the user communicates via the private account.
H04W 4/06 - Répartition sélective de services de diffusion, p. ex. service de diffusion/multidiffusion multimédiaServices à des groupes d’utilisateursServices d’appel sélectif unidirectionnel
H04W 4/10 - Services de messagerie instantanée vocale ou de messagerie sur appel
H04W 4/14 - Services d'envoi de messages courts, p. ex. SMS ou données peu structurées de services supplémentaires [USSD]
A system for enhancing the frequency response of speech signals is provided. An average speech spectral shape estimate is calculated over time based on the input speech signal. The average speech spectral shape estimate may be calculated in the frequency domain using a first order IIR filtering or "leaky integrators." Thus, the average speech spectral shape estimate adapts over time to changes in the acoustic characteristics of the voice path or any changes in the electrical audio path that may affect the frequency response of the system. A spectral correction factor may be determined by comparing the average speech spectral shape estimate to a desired target spectral shape. The spectral correction factor may be added (in units of dB) to the spectrum of the input speech signal in order to enhance or adjust the spectrum of the input speech signal toward the desired spectral shape, and an enhanced speech signal re-synthesized from the corrected spectrum.
G10L 15/20 - Techniques de reconnaissance de la parole spécialement adaptées de par leur robustesse contre les perturbations environnantes, p. ex. en milieu bruyant ou reconnaissance de la parole émise dans une situation de stress
G10L 21/0232 - Traitement dans le domaine fréquentiel
G10L 21/0332 - Détails du traitement à cet effet impliquant la modification des formes d’onde
39.
A METHOD AND APPARATUS FOR DYNAMIC SESSION PLACEHOLDER FOR MESSAGE COLLECTION USER INTERFACE
A method and apparatus for representing a conversation of related messages is provided. In a message collection user interface for displaying messages sent and received by a communications device, a dynamic session placeholder is used for a respective conversation of related messages. The message collection user interface is displayed including any dynamic session placeholders in the list of messages. As messages from the conversation are occasioned, the dynamic session placeholder is updated. When the message collection is displayed, it is displayed in accordance with the updated session placeholder.
A system and methods are provided for extending the frequency bandwidth of a harmonic signal. Harmonic content of a band-limited signal is extended to frequencies outside the signal's passband by performing a non-linear transformation on the complex spectrum of the band-limited signal in the frequency domain. The non-linear transformation may be accomplishes by a linear convolution of the complex spectrum with itself. A system for extending the frequency bandwidth of a harmonic signal includes a signal processor with a forward transform module for transforming a time domain signal into the frequency domain, a non-linear transform module for performing the non-linear transformation on the complex spectrum of the harmonic signal, and a reverse transform module for transforming the extended spectrum of the harmonic signal back into the time domain.
H04B 1/66 - Détails des systèmes de transmission, non couverts par l'un des groupes Détails des systèmes de transmission non caractérisés par le milieu utilisé pour la transmission pour réduire la largeur de bande des signauxDétails des systèmes de transmission, non couverts par l'un des groupes Détails des systèmes de transmission non caractérisés par le milieu utilisé pour la transmission pour améliorer l'efficacité de la transmission
41.
METHODS AND APPARATUS FOR REDUCING A SAMPLING RATE DURING A SAMPLING PHASE DETERMINATION PROCESS
A received signal is sampled at a sampling period of T + m*(T/n) during a sampling phase determination process. T is a symbol or chip period of the received signal, n is a number of phases of the sampled signal, T/n is a phase resolution period, and m is a fixed non-zero integer value where - n < m < n (e.g. m =1 or -1). By sampling the received signal at the sampling period of T + m*(T/n), a sample set for each one of n phases of the sampled signal is produced. For each sample set, a correlation process is performed between the sample set and a predetermined correlation signal to produce a correlation result. Once an optimal correlation result is identified from the correlation process, the received signal is sampled at a sampling period of T at a phase associated with the optimal correlation result. Advantageously, oversampling at a sampling rate of n/T is not required during the sampling phase determination process, which reduces cost and power consumption.
H04B 1/707 - Techniques d'étalement de spectre utilisant une modulation par séquence directe
H04L 7/02 - Commande de vitesse ou de phase au moyen des signaux de code reçus, les signaux ne contenant aucune information de synchronisation particulière
H04L 7/10 - Dispositions pour synchronisation initiale
A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The entity charged with authentication maintains a list of previously used bit patterns, extracted from a portion of the authentication message connected to the random component. If the bit pattern has been seen before, the message is rejected; if the bit pattern has not been seen before, the bit pattern is added to the stored list and the message is accepted.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
43.
SYSTEM AND METHOD OF AUTOMATICALLY TURNING WIRELESS RADIO ON/OFF
A system and method of automatically turning a PAN (personal area network) radio, such as a Bluetooth radio, on and off in a wireless device is described. The wireless device is coupled to an audio peripheral through a wireless PAN connection. In one embodiment, if the wireless PAN connection becomes non-operational, then the PAN radio in the wireless device is automatically turned off in order to conserve power. In another embodiment, if a call is completed, then the personal is network radio is automatically turned off. The PAN radio is turned back on automatically whenever its operation is required such as when receiving or placing a call. In another embodiment, if any wireless connection becomes non-operational or any communication terminates on any connection, then a radio in the wireless device is automatically turned off in order to conserve power. The radio is turned back on automatically whenever its operation is required such as when receiving or sending data.
A method and system for transferring application states between a first electronic device and a second electronic device is provided. The first electronic device is coupled to communicate with the second electronic device. The method comprises the steps of: transmitting at least one application state element to the second electronic device and executing a second application on the second electronic device according to the application state elements.
A mobile communications device for connecting to a conference call hosted by an audio conference service. After receiving a meeting invitation and storing information relating thereto, the mobile communications device dials a first sequence contained in a first link to connect to the audio conference service and, subsequent to dialing the first sequence, dials a second sequence contained in a second link associated with the first link to connect to the conference call.
A system and a method for a wireless communication system for adaptively delivering data to a wireless mobile communication device based upon an availability status of the mobile device in the wireless communication system are disclosed. The wireless communication system includes a host service having data for the mobile device; a wireless router system coupled to the host service for determining the availability status of the mobile device in the wireless communication system; and a wireless network coupling the wireless muter system and the mobile device. The host service transmits the data for the mobile device if the availability status of the mobile device is available, and queues the data in the host service if the availability status of the mobile device is unavailable until the availability status of the mobile device becomes available.
Method and apparatus for data access for a mobile terminal comprising a module for determining whether first and second modes of wireless network coverage is available, a module for selecting the first mode if available, a module for attempting access via the second mode on failure to establish access via the first mode and a module for monitoring availability of the first mode. Even when a connection is established via the second mode, availability of the first mode is monitored and access attempted, when second mode connection is idle.
A system and method for providing code signing services to software application developers or to other individuals or entities that wish to have applications digitally signed. Signing of the applications may be required in order to enable the applications to access sensitive APIs and associated resources of a computing device when the applications are executed on the computing device. In one embodiment, a method of providing code signing services will comprise at least some steps relating to registering the entities that seek access to sensitive APIs as controlled by the code signing authority, and managing the accounts of the registered entities.
H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
49.
METHODS AND SYSTEMS FOR CUSTOMIZED MULTI-APPLICATION CHANNEL CONTROL
Methods and devices are provided to aid in the control of a channel used in communicating data packets between a first communication device and a communication device with which the first communication device is communicating. For an open session occurring on the channel, the channel can be in an active state or a dormant state. Controlling when the channel is brought down to the dormant state can help improve operating conditions such as battery life of a communication device. Time-out parameters associated with the communication device, each open session and packets being sent and received on the channel are used in determining when the channel is brought up to the active state or brought down to the dormant state.
A voice enhancement system is provided for improving the perceptual quality of a processed voice signal. The system improves the perceptual quality of a received voice signal by removing unwanted noise from a voice signal recorded by a microphone or from some other source. Specifically, the system removes sounds that occur within the environment of the signal source but which are unrelated to speech. The system is especially well adapted for removing transient road noises from speech signals recorded in moving vehicles. Transient road noises include common temporal and spectral characteristics that can be modeled. A transient road noise detector employs such models to detect the presence of transient road noises in a voice signal. If transient road noises are found to be present, a transient road noise attenuator is provided to remove them from the signal.
Systems and methods for handling restoration operations for a mobile device. A mobile device receives a kill pill command, wherein the command causes some or all data on the mobile device to be wiped. An indicator is stored to indicate that the kill pill command was sent to the mobile device. The indicator is used to determine whether a program should be wiped from the mobile device.
H04L 67/125 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p. ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance en impliquant la commande des applications des terminaux par un réseau
52.
SYSTEM AND METHOD OF OWNER APPLICATION CONTROL OF ELECTRONIC DEVICES
Systems and methods of owner application control of an electronic device are provided. Owner application control information is stored on the electronic device and/or one or more remote servers. Owner application control information is consulted to determine if one or more required applications are available for execution on the electronic device. If not, one or more required applications not available are downloaded and installed. This could be in a manner transparent to the user of the electronic device. If one or more required applications are not available on the electronic device, the device can be functionally disabled in whole, or in part, until one or more required applications are available.
A method and apparatus of optimizing transitioning between EVDO and CDMA 1X systems in a hybrid access terminal, the method having the steps of: preventing a reconnect data call from being sent from the hybrid access terminal. The preventing step including checking whether a transition between an EVDO and a CDMA 1X system is successful; and if not blocking the data call, and/or checking whether an EVDO received signal strength indication is greater than or equal to a receiver sensitivity on the hybrid access terminal; and if yes, allowing the hybrid access terminal to connect to the EVDO system, and/or delaying a connection timer for connecting to the EVDO system and/or applying fast dormancy to the hybrid access terminal in an EVDO state.
A method and apparatus of optimizing transitioning between EVDO and CDMA 1X systems in a hybrid access terminal, the method having the steps of: detecting an EVDO received signal at the hybrid access terminal; and delaying a connection timer at the hybrid access terminal for connecting to the EVDO system. The apparatus being a hybrid access terminal adapted for optimizing transitioning between EVDO and CDMA 1X systems, the hybrid access terminal having a radio subsystem adapted to communicate with a network; a radio processor having a digital signal processor and adapted to interact with the radio subsystem; memory; a user interface; a processor adapted to run user applications and interact with the memory, the radio and the user interface and adapted to run applications, the hybrid access terminal characterized by having means for: detecting an EVDO received signal at the hybrid access terminal; and delaying a connection timer at the hybrid access terminal for connecting to the EVDO system.
The present invention provides a system and method of modifying policy settings in a network having a plurality of subscriber devices. An embodiment includes a plurality of base stations, each capable of wirelessly transmitting across a geographic region and a server. A cell-phone, capable of roaming between regions, is operable to establish a wireless link with the base stations and through the base stations, with the server. The network contains a communication policy determining from which other communication devices a subscriber device can receive voice calls. The communication policy is updated, by the server, based on requests from the subscriber devices. Once a request is received from a subscriber device, the determination whether to update the communication policy can be based on a record of rejections respective to the caller requested to be blocked. Alternatively, the communication policy can be updated according to a trust policy maintained on the server respective to the subscriber device making the request; the trust policy represents the procedure to follow when a request is received from that subscriber device.
H04W 4/16 - Services supplémentaires liés aux communications, p. ex. transfert ou mise en attente d'appels
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04W 48/02 - Restriction d'accès effectuée dans des conditions spécifiques
56.
METHOD AND SYSTEM FOR UPDATING AN ELECTRONIC MAIL ADDRESS BOOK
A method for updating an electronic mail ("email") address book comprising: determining whether an email message presented to a user on a display screen of a data processing system contains address information; and if the email message contains address information: identifying the address information in the email message; determining whether the address information is contained in one or more contact records in the email address book; and if the address information is not contained in one or more contact records, presenting first means to the user on the display screen for generating a command to add a new contact record to the address book for the address information.
A secure correlation identifier (SCID) for authentically correlating notifications received from event sources with subscriptions, a SCID authentication system and method of filtering unsolicited messages are provided. The SCID comprises a correlation identifier for making the SCID unique, a sequence of bits concatenated with the correlation identifier and a secure tag concatenated with the concatenation of the correlation identifier and the sequence of bits. The system comprises a SCID generator for generating a SCID to be used in a message and a SCID authenticator for authenticating the SCID. The method comprises the steps of receiving a notification message having a SCID, verifying that that SCID is authentic, accepting the message if the SCID is authentic and rejecting the message if the SCID is not authentic.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 51/212 - Surveillance ou traitement des messages utilisant un filtrage ou un blocage sélectif
58.
HANDLING AN AUDIO CONFERENCE RELATED TO A TEXT-BASED MESSAGE
A client for a text-based messaging application for a dual-mode mobile communication device may initiate an audio conference based on a text-based message. Contents of fields of the text-based message may be extracted and utilized to construct an audio conference request message that is subsequently transmitted to an audio conference gateway. Where the text-based messaging application is an instant messaging (IM) client application, it may be configured to recognize a voice connection as being related to an ongoing Data Mode IM conversation. As a consequence of the recognition, the IM client application may maintain the user interface for facilitating participation in the Voice Mode IM conversation. Updates related to the status of the Voice Mode IM conversation may be received at the dual-mode mobile communication device over the voice connection and reflected in changes to the user interface.
Embodiments of a system, method, and user interface for controlling the display of images to users of mobile devices are disclosed. In one embodiment, a set of options to manipulate, navigate, and/or view images, common among multiple applications executable on a mobile device, is provided to users. Images may also be saved on a memory store on the mobile device.
G06F 3/14 - Sortie numérique vers un dispositif de visualisation
G09G 5/36 - Dispositions ou circuits de commande de l'affichage communs à l'affichage utilisant des tubes à rayons cathodiques et à l'affichage utilisant d'autres moyens de visualisation caractérisés par l'affichage de dessins graphiques individuels en utilisant une mémoire à mappage binaire
A user interface and method for composing a message to be sent over a wireless network environment using a handheld device is disclosed. According to the method, upon receipt of a user request to compose a message, a screen is displayed with a recipient field for a recipient address, an associated label to indicate that the recipient field is for a recipient address, and a message body field for holding message content. The method further includes, upon each keystroke entry of text to the recipient field, looking up entries from an address book which match the text, and displaying a selection menu representing addresses from at least a portion of the entries.
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
G06F 15/02 - Calculateurs numériques en généralÉquipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p. ex. calculettes
A method and system for responding to an electronic mail ("email") message presented to a user on a display screen of a data processing system are provided. In one embodiment, the method comprises: receiving a command from the user to generate a reply to the email message using content from one or more template replies, the reply having a subject line and a body; presenting a choice of the one or more template replies to the user; receiving a command to select a template reply from the choice, the template reply having a subject line and a body; and generating the reply by inserting content from the body of the template reply into the body of the reply.
Embodiments described herein address mobile devices with non--secure operating systems that do not provide a sufficient security framework. More particularly, the embodiments described herein provide a set of applications to the device for providing security features to the non-secure operating system.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
63.
SCANNING AND DECODING METHODS AND APPARATUS FOR MOBILE COMMUNICATION DEVICES
In one illustrative scanning and decoding method, a signal strength level of an RF signal on an RF channel is measured for a plurality of RF channels of an RF band. The act of measuring a signal strength level is repeated at least one time to obtain at least one other signal strength level of the RF signal. Subsequently, an averaging function is completed with use of the signal strength level and the at least one other signal strength level for identifying an averaged signal strength level of the RF signal. At least one optimal RF signal is then identified based on the averaged signal strength levels of the RF signals on the RF channels. In between the repeated acts of measuring signal strength levels of the RF signals, and prior to identifying the averaged signal strength levels, control information is decoded on at least one of the RF channels and stored in memory. A wireless communication network is selected for communication with use of the control information stored in the memory which corresponds to one of the at least one optimal RF signal. In this manner, the mobile station expeditiously obtains the control information for network selection or other purposes prior to completing the averaging of the signal strength levels.
A speech enhancement system that improves the intelligibility and the perceived quality of processed speech includes a frequency transformer and a spectral compressor. The frequency transformer converts speech signals from the time domain to the frequency domain. The spectral compressor compresses a pre-selected portion of the high frequency band and maps the compressed high frequency band to a lower band limited frequency range.
G10L 21/0364 - Amélioration de l'intelligibilité de la parole, p. ex. réduction de bruit ou annulation d'écho en changeant l’amplitude pour améliorer l'intelligibilité
A password protocol uses a multiple word password and provides prompts to a user allowing the user to select the next word in the password from a set of words. The selection of a word causes a client to perform a cryptographic operation and generate a new selection of words. After the password is completely entered, a key is generated from the words selected.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A system extends the bandwidth of a narrowband speech signal into a wideband spectrum. The system includes a high-band generator that generates a high frequency spectrum based on a narrowband spectrum. A background noise generator generates a high frequency background noise spectrum based on a background noise within the narrowband spectrum. A summing circuit linked to the high-band generator and the background noise generator combines the high frequency spectrum and narrowband spectrum and the high frequency background noise spectrum.
G10L 21/038 - Amélioration de l'intelligibilité de la parole, p. ex. réduction de bruit ou annulation d'écho utilisant des techniques d’étalement de bande
67.
METHOD AND APPARATUS FOR GENERATING A NEW EVENT DIRECTLY FROM A DOCUMENT
ABSTRACT The application relates to the field of communications and more particularly to an apparatus and method of generating a new event from a document. In accordance with one aspect of the present application, recognized date/time references contained in a document allow a new event to be created. Such date/time references are automatically recognized and highlighted in the document. Selecting the highlighted information generates a menu selection, offering a user the ability to create a new event into which the date/time information will be inserted, along with other information extracted from the document. Specific date/time information in a document is simply correlated to a known date/time format in a lookup table, while relative terms like "tomorrow", "today" or days of the week (ie. Monday, Tuesday, Wednesday, etc.) are recognized by a date/time detector module and translated into a specific date/time. Using an embodiment of the present application, a new event can be readily generated.
An enhancement system improves the perceptual quality of a processed speech. The system includes a delay unit that delays a signal received through a discrete input. A spectral modifier linked to the delay unit is programmed to substantially flatten the spectral character of a background noise. An adaptive filter linked to the spectral modifier adapts filter characteristics to match a response of a non-delayed signal. A programmable filter is linked to the delay unit. The programmable filter has a transfer function functionally related to a transfer function of the adaptive filter.
The present disclosure relates generally to the authentication of contactless payments attempted by a device having embedded contactless payment functionality. In particular, the disclosure is directed to systems and methods that utilize authentication schemes that already exist on a device in which the contactless payment functionality is embedded. One example of such authentication schemes is the use of password protection to lock or unlock the device in which the contactless payment functionality is embedded. Using the password protection functionality may provide varying levels of authentication protection based on the desires of the user. A number of exemplary uses of such a method and apparatus are disclosed herein.
Panning the display of content on a computing device, particularly a handheld device, can be awkward using incorporated track wheels or track balls especially when walking and operating the device. A graphical user interface that provides panning operations through key-based inputs and that teaches a user how to pan using the keys provides a solution.
G06F 3/0485 - Défilement ou défilement panoramique
G06F 3/04892 - Dispositions pour commander la position du curseur fondée sur des codes indiquant les pas de déplacement du curseur d’une position à une autre, p. ex. en utilisant des touches de commande du curseur associées à des directions différentes ou en utilisant le tabulateur
G06F 15/02 - Calculateurs numériques en généralÉquipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p. ex. calculettes
A portable wireless user communication device is wirelessly coupled to a second device over a monitored link. If the link is lost or endangered, then a user alarm is activated at the portable wireless user device and/or at the second device to which it is linked (which may also be a portable electronic device). The type of monitoring and/or the type of alarming may be user selectable.
One or more processors of a mobile device are operative to maintain a voice or data call over a traffic channel with use of the wireless transceiver; cause handover information of the handover procedure to be transmitted over a first control channel (e.g. SACCH) with use of the wireless transceiver during the voice or data call; and cause the same handover information of the handover procedure to be transmitted over a second control channel (e.g. FACCH) during the voice or data call. Further, the one or more processors may be operative to cause a message for the handover procedure to be transmitted in a layer-2 (L2) frame with use of the wireless transceiver during the voice or data call; and cause updated system information (e.g. an updated BA list) to be transmitted in the L2 frame with use of the wireless transceiver during the voice or data call.
Displaying a map on a wireless communications device includes downloading map data from which the map is to be rendered, rendering portions of the map for which the map data has been fully downloaded, and then graphically overlaying on a portion of the map for which the map data has not yet been fully downloaded a graphical indication, such as hatching, crosshatching or shading, to indicate that further map data is being downloaded. This hatching, crosshatching, shading, or writing informs the user that further map data is being downloaded and that not all of the map features have been rendered yet.
G06F 3/14 - Sortie numérique vers un dispositif de visualisation
G06F 15/02 - Calculateurs numériques en généralÉquipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p. ex. calculettes
G09B 29/10 - Spots pour la lecture des cartes ou indicateurs de position par coordonnéesAides pour la lecture des cartes
G09G 5/377 - Détails concernant le traitement de dessins graphiques pour mélanger ou superposer plusieurs dessins graphiques
Displaying a map on a wireless communications device includes steps of obtaining map data for rendering the map to be displayed on the wireless communications device, determining a rotation that, when applied to the map, will orient a selected path in a selected direction, such as a current direction of travel, generating a corrected rotation by applying a spherical correction factor, e.g. based on a current location, and rendering the map on a display of the wireless communications device by applying the corrected rotation. The spherical correction factor corrects for map distortions that occur at high latitudes for paths that are neither purely north-south or east-west. When such a path is rotated to face upward to show direction of travel, the path needs to be straightened by applying the spherical correction factor.
G01C 21/32 - Structuration ou formatage de données cartographiques
G01C 21/34 - Recherche d'itinéraireGuidage en matière d'itinéraire
G06F 15/02 - Calculateurs numériques en généralÉquipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p. ex. calculettes
G09B 29/10 - Spots pour la lecture des cartes ou indicateurs de position par coordonnéesAides pour la lecture des cartes
G09G 5/37 - Détails concernant le traitement de dessins graphiques
A rule-based end-pointer isolates spoken utterances contained within an audio stream from background noise and non-speech transients. The rule-based end- pointer includes a plurality of rules to determine the beginning and/or end of a spoken utterance based on various speech characteristics. The rules may analyze an audio stream or a portion of an audio stream based upon an event, a combination of events, the duration of an event, or a duration relative to an event. The rules may be manually or dynamically customized depending upon factors that may include characteristics of the audio stream itself, an expected response contained within the audio stream, or environmental conditions.
G10L 15/20 - Techniques de reconnaissance de la parole spécialement adaptées de par leur robustesse contre les perturbations environnantes, p. ex. en milieu bruyant ou reconnaissance de la parole émise dans une situation de stress
76.
COMBINATION MODES FOR NETWORK CONNECTION MANAGEMENT
A network connection establishment protocol is made more secure by directly associating a non-discoverable mode with a non-pairable mode in a combined non-discoverable/non-pairable mode. Advantageously, rather that allowing incoming pairing requests even when a device is non-discoverable, the device in the closed mode rejects all pairing requests. Responsive to specific initiation, the device may enter a combined discoverable/pairable mode. The device may be preconfigured to revert from the combined discoverable/pairable mode to the combined non-discoverable/non-pairable mode after a given duration of time or after a predetermined number of pairings.
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p. ex. protection des informations personnellement identifiables [PII]
H04W 76/14 - Établissement de la connexion en mode direct
Apparatus, and an associated method, for facilitating synchronization of a mobile station with a radio network in a GSM/EDGE-compatible, cellular communication system. The FCCH is monitored to obtain positional and frequency offset information. Once obtained, the information is used to obtain SCH burst information broadcast upon an SCH. Monitoring of the FCCH continues while the SCH burst information is detected and decoded. If additional FCCH control information is detected that has an associated quality metric value that is better than the quality metric value associated with earlier FCCH, control information, the newly-received information is used to detect the SCH burst information, absent successful decoding of the SCH burst information.
A handheld electronic device with a reduced QWERTY keyboard and disambiguation software. The device outputs a default output and a number of variants. The output is based largely upon the likelihood that a user intended a particular output, but various features of the device provide additional variants provided by various logic structures resident on the device. The device enables editing during text entry and provides a learning function that allows the disambiguation function to adapt to provide a customized experience for the user. The disambiguation function can be selectively disabled and an alternate keystroke interpretation system provided. If a field into which text is being entered is determined to be a special input field, a disambiguated result can be sought first from a predetermined data source prior to seeking results from other data sources on the device.
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06F 15/02 - Calculateurs numériques en généralÉquipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p. ex. calculettes
G06F 40/274 - Conversion de symboles en motsAnticipation des mots à partir des lettres déjà entrées
79.
TESTING SYSTEMS AND METHODS FOR A RESOURCE CONSTRAINED DEVICE
Systems and methods for providing symbolic information about fields, methods, and/or classes for a target device. A system and method may be used where the runtime processing is split between a host system and a target system. At the target device a test program uses a symbol not defined on the target device. A query is sent from the target device to a symbolic information source. The symbolic information source then provides the target device with information about the undefined symbol. The target device uses the information from the symbolic information source to complete the test program.
A category may be associated, in a personal information manager (PIM) application, with a data item by associating a category pattern with the data item. Where the PIM application already associates keyword patterns with data items for enabling keyword searching, the category pattern may have a format of an ordered plurality of elements that satisfies at least one rule for the format of the keyword patterns. Optionally, the first element of the ordered plurality of elements may be an element predetermined to be specific to pluralities of elements associated with categories. Advantageously, this approach to the association of a category with a data item allows for the association of more than one category with a single data item. Such an allowance provides for more accurate synchronization with a PIM application on a desktop that also allows the association of more than one category with a data item. Given the allowance of the association of multiple categories with a single data item, the user may filter a list of data items by one or more categories.
G06F 15/02 - Calculateurs numériques en généralÉquipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p. ex. calculettes
81.
METHOD AND APPARATUS TO SIMULTANEOUSLY NOTIFY EMERGENCY CONTACTS DURING AN EMERGENCY VOICE CALL BASED ON NETWORK CAPABILITY
A method and apparatus for automatically sending a data message from a mobile device to at least one recipient during or soon after an emergency voice call, the method having the steps of: checking whether a network the mobile device is connected to supports simultaneous voice and data, and if yes, creating and sending the data message; and if no, determining whether the data message can be sent over the network during the emergency voice call, and if yes, creating and sending the data message; and if no, waiting until either the mobile device connects to a new network, wherein the method proceeds back to said checking step, or until the voice call has ended and then creating and sending the data message.
A cross-technology coverage mapping system and method for modulating scanning behavior of a wireless user equipment (UE) device (600) in a radio network environment (100). In one exemplary embodiment, the wireless UE device (600) is operable to determine its geographic area location. A logic module (648) of the wireless UE device (600) is adapted for interrogating a database (200, 300A, 300B, 412) to determine which radio access technologies (RATs) have coverage in the geographic area location. Responsive to the interrogation, scanning by the wireless UE device (600) is restricted to only those RATs that have coverage in the particular geographic area.
Apparatus, and an associated method, for a communication device operable pursuant to a push content communication scheme. An instruction detector detects a message containing a instruction by which to operate upon push content. The message is, for instance, generated by a mobile station at which an application associated with the content is resident. Once detected by the instruction detector, a content operator operates upon the content in a manner corresponding to the instruction contained in the detected message. Once operated upon, the content is stored at a storage element, available when an application of which the content is associated, becomes active.
A system and method are set forth for distributing map content from a server to a communication device by transmitting a request from the communication device to the map server for a maplet index of map data covering a specified area and identified by coordinates for defining the map data, receiving the request at the map server and in response transmitting the maplet index to the communication device, wherein the maplet index defines content available the maplet without including all of the data points therein.
There is disclosed a system and method for operating an image database shared by a plurality of users. In an embodiment, each image captured by a user and stored in a shared image database is associating with the geographic coordinates of the location at which the image was captured. A search engine for the image database is configured to accept geographic coordinates as a search criterion for locating at least one captured image stored in the shared image database. The search engine may be configured to accept as a search criterion user specified numeric geographic coordinates, or geographic coordinates generated by user navigation and selection of a desired point on a map. The search engine may also be configured to accept a range of geographic coordinates to locate a plurality of user-captured images within a certain range of a geographic location.
86.
MAP VERSION CONTROL METHODS AND APPARATUS FOR UPDATING THE USE OF NETWORK-MAINTAINED MAP DATA SETS FOR MOBILE COMMUNICATION DEVICES
A map version control method of providing updates of network-maintained map data sets in mobile communication devices includes the steps of receiving a version of map data from a network database through a wireless communication network; causing the map to be visually displayed in a display in accordance with the version of the map data; maintaining storage of the version of the map data in a cache; receiving, through the wireless communication network, an indication indicating that an alternative or updated version of the map data corresponding to the map is available in the network database; identifying, at the mobile communication device, one of an acceptance and a declination of the alternative version of the map data; if the acceptance is identified: causing one or more requests for the alternative version of the map data to be sent through the wireless communication network, receiving the alternative version of the map data through the wireless communication network in response to the one or more requests, and causing the map to be visually displayed in the display in accordance with the alternative version of the map data; and if the declination is identified: refraining from causing one or more requests for the alternative version of the map data to be sent through the wireless communication network and continuing to cause the map to be visually displayed in the display in accordance with the version of the map data. The map corresponding to the alternative version of the map data may include one or more map objects that are unavailable in the map of the other version or an appearance that is different from the appearance of the map of the other version.
Methods and apparatus for use in providing map-related file data associated with point of interests for visually-displayed maps in mobile communication devices are disclosed. One illustrative method includes causing a viewable map region of a map to be displayed in a mobile communication device display, the viewable map region having one or more selectable map elements; monitoring to detect end user selection of one of the selectable map elements through a user interface; causing information corresponding to the selectable map element to be visually displayed in response to detecting the end user selection, the information including a file identifier corresponding to a file associated with the selectable map element; monitoring to detect an end user selection of the file identifier or a file function identifier; and causing file contents information of the file to be requested and received through the wireless communication network from a file server.
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
G06F 16/80 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet de données semi-structurées, p. ex. données structurées par un langage de balisage tels SGML, XML ou HTML
G09B 29/10 - Spots pour la lecture des cartes ou indicateurs de position par coordonnéesAides pour la lecture des cartes
H04M 1/72454 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens permettant d’adapter la fonctionnalité du dispositif dans des circonstances spécifiques en tenant compte des contraintes imposées par le contexte ou par l’environnement
H04W 4/021 - Services concernant des domaines particuliers, p. ex. services de points d’intérêt, services sur place ou géorepères
H04W 4/18 - Conversion de format ou de contenu d'informations, p. ex. adaptation, par le réseau, des informations reçues ou transmises pour une distribution sans fil aux utilisateurs ou aux terminaux
88.
METHODS AND APPARATUS FOR ASSOCIATING MAPPING FUNCTIONALITY AND INFORMATION IN CONTACT LISTS OF MOBILE COMMUNICATION DEVICES
In one illustrative example, a method of providing mapping functionality in a contact list of a mobile communication device comprises the acts of providing a contact list organizer function in the mobile device for use in organizing a plurality of contacts of a contact book or list; identifying, through a user interface of the mobile device, a user input request to map a location of a selected one of the contacts of the contact list; and in response to the user input request, performing the following further acts of identifying an address of the location in one or more address fields of the selected contact; sending, to an address geocoding server via wireless network, a request for location coordinates with the address as an input; receiving, via the wireless network, latitude and longitude coordinates of the location in response to the request for the location coordinates; and causing a map corresponding to the location of the selected contact to be visually rendered in a display of the mobile device based on map rendering data for the location corresponding to the latitude and longitude coordinates received via the wireless network in response to a request for map data of the location.
In one illustrative example, a method for use in mapping a location in a computer device includes the steps of receiving an electronic file or message which includes a hypertext link mapping indicator associated with a uniform resource locator (URL) string having a server address and latitude and longitude coordinates; receiving, through a user interface of the computer device, an end user selection of the hypertext link mapping indicator in the electronic file or message; and in response to the end user selection of the hypertext link mapping indicator: if a predetermined type of mapping application is provided in the computer device, invoking a mapping function of the mapping application to produce a map of a location corresponding to the latitude and longitude coordinates for visual display in a display of the computer device (e.g. based on received maplet data); and if the predetermined type of mapping application type is not provided in the computer device, requesting and receiving map data from a map coordinating server identified by the server address of the URL string to produce a map of the location for visual display in the display (e.g. based on a bitmap image). Advantageously, processing of the received hypertext link mapping indicator is handled differently depending on the type of device or whether a predetermined mapping application is installed in the device, so that optimal mapping functionality is provided for different device environments.
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06F 17/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G09B 29/00 - CartesPlansGraphiquesTracés, p. ex. tracés de routes
H04L 12/16 - Dispositions pour la fourniture de services particuliers aux abonnés
H04W 4/30 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques
A method and apparatus for managing IM conversations is provided. In response to idle time and, preferably, read message status, particular current conversations are removed from a list of current conversations. The removed conversations may be moved to an archive which may be automatically maintained in response to size constraints. An archive interface is facilitated to review conversations, save all or portions thereof, delete, etc. The archived conversations are preferably associated with the contact for the conversation to show a history of conversations.
A processing system is set forth that includes a processor, read only memory storing an operating system image file accessible by the processor, and random access memory that is also accessible by the processor. The processing system also includes a boot program that is executable by the processor to initialize the processing system in response, for example, to a power-on event, reset event, or a wake-up event. A power-on event occurs when power is initially provided to the processing system while a wake-up event occurs when the processing system is to exit a low-power mode of operation. A reset event occurs when, for example, a fault is detected that causes the system to restart. The boot program selectively performs a full boot copy of the operating system image file from the read only memory to the random access memory or a fast boot copy of only predetermined portions of the operating system image file from the read only memory to the random access memory. For example, the boot program may execute the full boot copy operation in response to the power-on event and the fast boot copy operation in response to the wake-up event and/or reset event. Further, the boot program may limit execution of the fast boot copy operation to those instances in which the random access memory passes an integrity check of the contents of one or more areas containing selected portions of the operating system copied from the read only memory during a prior full boot copy operation.
An improved handheld electronic device has a case with an elongated cavity formed therein. An audio transducer is in fluid communication with the cavity, and a number of sound openings are formed in the case and are in fluid communication with the cavity and with the; atmosphere surrounding the handheld electronic device. The sound openings are generally spaced from a central region of the audio transducer to space the sound openings generally farther from an edge of the case than the audio transducer. The cavity is configured to form a Helmholtz resonator that enables the communication of sound through the cavity between the audio transducer and the sound openings. The spacing of the sound openings from an edge of a case helps a user to form a seal between the case and the user's ear to enable sound from the sound openings to enter the ear and to be perceived by the user. In one embodiment, the sound openings face into a channel formed in the case, which enables the sound openings to be largely hidden from view and enable the sound openings to be spaced an even greater distance from the audio transducer.
Data burst communication techniques for mobile communication devices operating in packet data sessions are disclosed. A mobile communication device is adapted to receive and decode packet data of a plurality of packet data bursts of a data block over a packet data channel during a packet data session. The mobile communication device is further adapted to receive and decode broadcast control data of a plurality of broadcast data bursts of the same or adjacent data block over a broadcast control channel contemporaneously with the packet data, where each broadcast data burst is interleaved with packet data bursts of the packet data session. When a time conflict between at least one of the packet data bursts and at least one of the broadcast data bursts exists, the mobile communication device is adapted to prioritize the receiving and decoding of the at least one packet data burst over the at least one broadcast data burst. However, if the at least one broadcast data burst is received from a "high priority" or "imminent" handoff candidate neighbor cell, the mobile communication device is adapted to prioritize the receiving and decoding of the at least one broadcast data burst over the at least one packet data burst without completely suspending packet transfer operations. Advantageously, an efficient and less disruptive communication technique is provided during packet data sessions.
A system and method for processing messages with encryptable message parts. When constructing an encoded message, an encryption key of a plurality of identified encryption keys is used to encrypt message data of a message part. A key identifier is associated with the message part and identifies the encryption key used for the encryption of the message data of the message part. In at least one exemplary embodiment, encryption keys that are used to encrypt message data of message parts are provided in a separate message part, arranged by key identifier. In particular, the encryption keys, arranged by key identifier, may be provided in exactly one message part separate from the message parts containing message data. This allows for a compact message encoding.
A method of updating information included in a handheld device user's contact entry included in a global address list wherein the device stores information of a first type, such as a mobile phone, SMS or MMS number or a PIN. The method includes determining whether the information of a first type has been modified from a first stored piece of information to a second stored piece of information, and generating a message including the second stored piece of information and sending the message to a computer system of the organization if it is determined that the information of a first type has been modified. The computer system stores the second stored piece of information in response to receipt of the message by the computer system for subsequent access by a requesting party. Also provided is an improved handheld electronic device having one or more routines adapted to implement the method.
G06F 15/02 - Calculateurs numériques en généralÉquipement de traitement de données en général commandés manuellement avec entrée par clavier et à calcul commandé par programme incorporé, p. ex. calculettes
H04W 8/26 - Adressage ou numérotation de réseau pour support de mobilité
96.
SYSTEM AND METHOD FOR PROCESSING CERTIFICATES LOCATED IN A CERTIFICATE SEARCH
A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a computing device (e.g. a mobile device) to determine status data that can be used to indicate the status of those certificates to a user of the computing device, without having to download those certificates to the computing device in their entirety. The data server is further adapted to transmit the status data to the computing device. In one embodiment, at least one status property of the certificates is verified at the data server in determining the status data. In another embodiment, additional certificate data is determined and transmitted to the computing device, which can be used by the computing device to verify, at the computing device, at least one other status property of the certificates.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Methods for choosing groups for a static Diffie-Hellman key agreement protocol to inhibit active attacks by an adversary are provided. In mod p groups, an even h is chosen of value approximately (9/16)(log2n)2, values r and n are determined using sieving and primality testing on r and n, and a value t is found to compute p = tn + 1 wherein p is prime. In elliptic curve groups defined over a binary field, a random curve is chosen, the number of points on the curve is counted and this number is checked for value of 2n wherein n is prime and n- 1 meets preferred criteria. In elliptic curve groups defined over a prime field of order q, a value n = hr + 1 is computed, wherein n is prime and n-1 meets preferred criteria, and a complex multiplication method is applied on n to produce a value q and an elliptic curve E defined over q and having an order n.
H04L 9/28 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant un algorithme de chiffrement particulier
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
98.
SYSTEM AND METHOD FOR REMOTE RESET OF PASSWORD AND ENCRYPTION KEY
A method for securing data and resetting a password using a content protection key is provided, in which the content protection key itself is protected by a password. A content protection key is also protected at a data storage device with a key encryption key generated in collaboration with an additional device such as a server. The server stores a private key required to regenerate the key encryption key, but this private key is not provided from the server to the data storage device; rather, a public key derived from the private key is provided by the server. The data storage device combines the received public key and a further private key to derive the key encryption key; the further private key itself is not stored by the data storage device, but rather its matching public key is stored. The content protection key is then encrypted using a password and the derived key encryption key. If the password is lost, data from the server and from the data storage device may be combined to recreate the key encryption key.
G06F 21/45 - Structures ou outils d’administration de l’authentification
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
99.
METHOD AND SYSTEM FOR SIGNALING RELEASE CAUSE INDICATION IN A UMTS NETWORK
A method and system for processing signaling release indication cause between user equipment and a wireless network, the method comprising the steps of: monitoring, at the user equipment, whether a signaling connection release indication should be sent to the wireless network; appending, at the user equipment, a cause for the signaling connection release indication to the signaling connection release indication; sending the appended signaling connection release indication to the wireless network; receiving the signaling connection release indication at the wireless network; and filtering said cause to determine whether to raise an alarm.
An enhanced email system incorporating mobile wireless communication devices includes program logic for efficiently managing (i.e., at least partially synchronizing) "messages sent" files in the mobile device and in a related message server. The exemplary program logic also more efficiently handles resending of previously sent email messages from the mobile wireless communication device (especially in the context of synchronized messages sent files) by sending to the message server only abbreviated unique message ID in the first instance. In this way, wireless bandwidth is conserved as is the device battery.