摘要:
A system and method for providing updated rules governing the switching of enabled provisioning data supporting a wireless service contract. A mobile device may be initially programmed with a profile data table and priority list index data table to automatically enable provisioning data supporting one of the plurality of service providers stored in a VSIM internal memory unit to conduct a wireless communication when certain operational parameter values are satisfied. The profile data table and priority list index data table may be automatically updated in response to a variety of triggers.
摘要:
Methods and apparatus relating to a radio frequency identification device (RFID) with wide-area connectivity are provided. In an example, a real-time location (RTL) monitoring device is provided. The RTL monitoring device includes a first radio-frequency identification (RFID) tag and an RFID interrogator configured to interrogate the first RFID tag and a second RFID tag. A long-range wireless transceiver is coupled to the RFID interrogator, and configured to communicate RFID data. The first RFID tag, the RFID interrogator, and the long-range wireless transceiver can be collocated in an enclosure separate from the second RFID tag. The RTL monitoring device is configured to aggregate a plurality of responses from the first and second RFID tags, and to communicate the aggregated RFID data with a second device, such as a satellite, a base station, and/or an eNodeB device.
摘要:
A system and method store provisioning data supporting a plurality of service providers in a VSIM internal memory unit of a mobile device. A user may selectively enable provisioning data supporting one of the plurality of service providers stored in the VSIM internal memory unit to conduct a wireless communication. An embodiment permits backing up, retrieving and restoring personal data in the VSIM internal memory unit using a remote database. Another embodiment allows a mobile device to select an optimal service provider to conduct a wireless communication. The optimal service provider may be determined based upon mobile device location, communication usage request and/or time and date.
摘要:
A system and method for providing updated rules governing the switching of enabled provisioning data supporting a wireless service contract. A mobile device may be initially programmed with a profile data table and priority list index data table to automatically enable provisioning data supporting one of the plurality of service providers stored in a VSIM internal memory unit to conduct a wireless communication when certain operational parameter values are satisfied. The profile data table and priority list index data table may be automatically updated in response to a variety of triggers.
摘要:
A method and apparatus for consumption of content (1) is described in which a licensor is able to exercise control over consumption based on a personal identity in the form of a set of binding attributes (15). The control may be exercised for a number of consuming terminals (19) including rendering machines such as portable video and audio players.
摘要:
Methods, devices, apparatus, computer-readable media and processors are provided that protect the distribution of media content. Media content is encrypted and the associated cryptographic mechanisms are stored and accessible either remotely at a networked database or internally within a data storage device memory. Access to the cryptographic mechanisms is granted by associating the cryptographic mechanisms with a data storage device identification and, optionally, a computing device identification.
摘要:
Methods and apparatus relating to a radio frequency identification device (RFID) with wide-area connectivity are provided. In an example, a real-time location (RTL) monitoring device is provided. The RTL monitoring device includes a first radio-frequency identification (RFID) tag and an RFID interrogator configured to interrogate the first RFID tag and a second RFID tag. A long-range wireless transceiver is coupled to the RFID interrogator, and configured to communicate RFID data. The first RFID tag, the RFID interrogator, and the long-range wireless transceiver can be collocated in an enclosure separate from the second RFID tag. The RTL monitoring device is configured to aggregate a plurality of responses from the first and second RFID tags, and to communicate the aggregated RFID data with a second device, such as a satellite, a base station, and/or an eNodeB device.
摘要:
A system and method store provisioning data supporting a plurality of service providers in a VSIM internal memory unit of a mobile device. A user may specify a user profile to automatically enable provisioning data supporting one of the plurality of service providers stored in the VSIM internal memory unit to conduct a wireless communication when certain criteria values are satisfied. The automatic enabling of provisioning data may be determined based upon mobile device location, communication usage request and/or time and date.
摘要:
A system and method for providing a capability to backup cellular telephone provisioning information and personal data from a mobile handset on a server. A user initializes an account with a service provider with authentication credentials and backs up provisioning information and personal data stored within a mobile handset to server for safe keeping. The provisioning information and personal data can be accessed via the cellular telephone network so that the provisioning and personal data can be transferred among mobile handsets. This allows a user to restore personal data quickly and easily if a mobile handset replaced, lost or destroyed. The system and method further provide the capability to remotely provision new mobile handsets.
摘要:
Methods, devices, apparatus, computer-readable media and processors are provided that protect the distribution of media content. Media content is encrypted and the associated cryptographic mechanisms are stored and accessible either remotely at a networked database or internally within a data storage device memory. Access to the cryptographic mechanisms is granted by associating the cryptographic mechanisms with a data storage device identification and, optionally, a computing device identification.