Abstract:
Some embodiments relate to methods for provisioning a secondary wireless device with an eSIM for wireless communication and activating multi-SIM functionality between the secondary wireless device and a primary wireless device having a subscribed SIM. The primary wireless device may act as a proxy in obtaining the eSIM for the secondary wireless device. The primary wireless device may then provide, to the cellular network, identifiers of the SIMs of the primary and secondary wireless devices. The primary wireless device may then request initiation of multi-SIM functionality for the two SIMs, and receive an indication that the multi-SIM functionality has been initiated. As an example, the multi-SIM functionality may be implemented by mapping the SIM of the primary wireless device and the SIM of the secondary wireless device (e.g., the provisioned eSIM) to the same Mobile Directory Number (MDN).
Abstract:
Described are methods that allow credentials of a first client station to authenticate a second client station. An exemplary method includes associating a first client station with a second client station, the first client station including credential information, the associating authorizing the second client station to use the credential information, transmitting, by the second client station, an association request to a network, the network utilizing the credential information to authorize a connection, the second client station configured to perform a proxy functionality for requests received from the network to be forwarded to the first client station and responses received from the first client station to be forwarded to the network, determining, by the network, whether the credential information received from the second client station is authenticated and establishing a connection between the second client station and the network using the credential information of the first client station.
Abstract:
Methods and apparatus for preferring connections between networks. In one embodiment, a mobile device is capable of hybrid network operation (e.g. LTE and CDMA 1× operation), allowing the mobile device to be registered to a CDMA 1× network for voice calls while receiving and sending data traffic over a LTE network. However, any data sent by the LTE network may be lost if the data was transmitted during a tune-away to the CDMA 1× network to perform maintenance operations. In one variant, the mobile device can disable the idle voice connection to the CDMA 1× network based on a request from resident applications requiring real-time data streaming, which are more likely to experience data loss. Consequently, potential data loss due to a network tune-away is prevented, thereby improving data performance of the resident applications. In another embodiment, an adaptive transmit receive mode can be selectively disabled/enabled for data traffic.
Abstract:
This disclosure relates to caching SIM files at a baseband processor to reduce cellular bootup time. According to one embodiment, a wireless device may read SIM files from a SIM and store a local copy of each file in a cache of the baseband processor of the wireless device. SIM identification information for the SIM from which the cached files were read may be associated with the cache. Indicator information usable for comparing file versions may also be generated and stored in the cache for each file. Upon a subsequent SIM initialization, the wireless device may read SIM files from the cache instead of from the initialized SIM if the cached version is identical to the SIM version, which may be determined based at least in part on the SIM identification information and the indicator information for such files.
Abstract:
Methods and apparatus for intelligently selecting and operating one or more air interfaces of a mobile wireless device for e.g., call setup time reduction. In one embodiment, operation of a high speed cellular interface is selectively adjusted or disabled or switched out when not required so as to minimize call setup times by, e.g., using a different cellular interface to receive pages. In one implementation, the wireless device includes a high-speed cellular interface, a lower-speed cellular interface, and a WLAN (e.g., Wi-Fi) interface.
Abstract:
Systems, methods, processors, and circuitries are provided for activation of broadband network services via cellular network user equipment (UE). In some aspects, a UE includes a memory and a processor. The processor is coupled to the memory and configured to, when executing instructions stored in the memory, cause the UE to determine, via a cellular network, an entitlement of the UE to a service of a broadband network; generate a token for the service; create a blind token based on the token; transmit, via the cellular network to a server, the blind token for signing; receive, via the cellular network from the server, a blind signature for the blind token; unblind the blind signature to yield an unblinded signature; and store the unblinded signature and the token for subsequent access to the service.
Abstract:
This disclosure relates to techniques for a wireless device to determine whether to display an indicator of millimeter wave cellular availability. A wireless device may establish a radio resource control connection that includes connectivity with a fifth generation new radio millimeter wave cell. The wireless device may determine to display an indication of millimeter wave cell availability. The wireless device may determine location status information and motion status information for the wireless device. The wireless device may determine when to cease displaying the indication of millimeter wave cell availability after the radio resource control connection is released or the millimeter wave cell is deconfigured based at least in part on the location status information for the wireless device and the motion status information for the wireless device.
Abstract:
A device providing inter-device call continuity facilitated by a wireless audio output device may include a processor configured to initiate, over a peer-to-peer connection with a second device, a communication session between the second device and a third device. The processor may be further configured to establish, over the peer-to-peer connection with the second device, an audio link corresponding to the communication session. The processor may be further configured to determine, based at least in part on the audio link, that a connection quality of the peer-to-peer connection satisfies a connection degradation condition. The processor may be further configured to request, over a wide area network connection, for the communication session with the third device to be handed-off from the second device to the first device, and to establish, over the wide area network connection, the communication session with the third device.
Abstract:
This disclosure relates to techniques for a wireless device to determine whether to display an indicator of millimeter wave cellular availability. A wireless device may establish a radio resource control connection that includes connectivity with a fifth generation new radio millimeter wave cell. The wireless device may determine to display an indication of millimeter wave cell availability. The wireless device may determine location status information and motion status information for the wireless device. The wireless device may determine when to cease displaying the indication of millimeter wave cell availability after the radio resource control connection is released or the millimeter wave cell is deconfigured based at least in part on the location status information for the wireless device and the motion status information for the wireless device.
Abstract:
Methods and devices for a user equipment (UE) device to utilize an electronic subscriber identity module (eSIM) to provide backup cellular connectivity for essential services and security enhancements. A UE device receives user input to alter an operational state of the UE. The user input may include removing a physical subscriber identity module (SIM) card installed in the UE or attempting to power off the UE. In response to receiving the user input, an authorization process is initiated. In response to determining that the authorization process has failed, a security enhancement is implemented for the UE.