Abstract:
The disclosure is related to locking an orientation of a display screen of a mobile display device. In an aspect, the mobile display device stores a first local orientation lock associated with a first application, wherein the first local orientation lock specifies a first orientation of the display screen to which the orientation of the display screen is to be set when the first application is displayed on the display screen, receives an instruction to display the first application, determines whether a global orientation lock for the display screen is set, wherein the global orientation lock specifies a global orientation of the display screen to which the orientation of the display screen is to be set, and sets, based on the global orientation lock being set, the orientation of the display screen to the global orientation and displaying the first application on the display screen in accordance with the global orientation.
Abstract:
A method includes: decoding frequency correction channel (FCCH) data and synchronization channel (SCH) data transmitted by a first base transceiver station (BTS) to obtain a first set of synchronization information; determining whether broadcast control channel (BCCH) data transmitted by the first BTS was successfully decoded using the first set of synchronization information; and in response to a determination that the BCCH data transmitted by the first BTS was not successfully decoded using the first set of synchronization information: determining a cause of a BCCH decoding failure; and in response to a determination that the cause of the BCCH decoding failure is stale synchronization information in the first set of synchronization information, repeating a decoding of the FCCH data and the SCH data transmitted by the first BTS to obtain a second set of synchronization information.
Abstract:
Auto-recovery from RF signal acquisition failure may be provided in a portable computing device. A field-calculated frequency-temperature (“FT”) curve is used to apply temperature compensation to a crystal oscillator associated with RF transceiver circuity of the device. In response to acquisition failure, it may be determined whether a deviation between the field-calculated FT curve and a factory-set FT curve exceeds threshold criteria. In response to acquisition success, the field-calculated FT curve may be refined based on frequency error information. However, in response to acquisition failure and a determination that the deviation exceeds the threshold criteria, information defining the field-calculated FT curve may be replaced with information defining the factory-set FT curve.
Abstract:
Various features related to selectively forwarding alerts/notifications for communications received at a first device to a paired device based on a user's privacy settings, are described. In an aspect of the disclosure, a method and an apparatus are provided. The apparatus maybe a first device, e.g., a UE, including at least one processor. In some configurations, the at least one processor is configured to receive a communication, and determine whether the communication is from a contact associated with a restricted group. The at least one processor maybe further configured to perform, based on the determining, one of: blocking an alert corresponding to the communication from being forwarded to a second device, or forwarding the alert corresponding to the communication to the second device. The second device maybe one of a wearable device, a car infotainment unit, a home entertainment unit, or a business conferencing unit, paired with the first device.
Abstract:
In currently available mobile devices (e.g., a user equipment (UE)), no authentication occurs at the mobile device to answer an incoming call at the mobile device. In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus for secure call answering are provided. The apparatus is a first UE. The apparatus receives an incoming call originated from a second UE. The apparatus determines whether the incoming call originated from the second UE is a secure incoming call. The apparatus also receives a secure authentication input upon determining that the incoming call is a secure incoming call. Further, the apparatus determines whether the secure authentication input matches with authentication information upon receiving the secure authentication input. Additionally, the apparatus answers the received secure incoming call originated from the second UE when the received secure authentication input matches the authentication information.
Abstract:
A method for performing emergency calls includes: camping a first subscription of a mobile communication device on a first cell on a first communication network; camping a second subscription of the mobile communication device on a second cell on a second communication network; determining by the mobile communication device whether one of the first and second subscriptions supports emergency calls; and initiating an emergency call on the determined subscription.
Abstract:
A method for call re-establishment by a wireless communication device is described. The method includes obtaining system information from one or more neighbor cells in a wireless communication system. The method also includes determining whether the one or more neighbor cells support call re-establishment based on the system information. The method further includes attempting call re-establishment only on neighbor cells that support call re-establishment.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a wireless communication device may identify, based at least in part on a scaling factor, one or more phase weights associated with a transmit beam of the wireless communication device. The scaling factor is associated with a frequency in a frequency band associated with the wireless communication device. The wireless communication device may generate, based at least in part on the one or more phase weights, the transmit beam. The wireless communication device may transmit a wireless communication using the transmit beam. Numerous other aspects are described.
Abstract:
Methods, systems, and devices for wireless communications are described. A first wireless device may communicate with a second wireless device using a first set of beams including a first beam and a second beam, where the first and second beams are generated via first and second sets of antenna elements, respectively. The first wireless device may compare a first power associated with the first beam and a second power associated with the second beam, and may determine that at least one antenna element from the first set of antenna elements, the second set of antenna elements, or both, is defective based on the comparison. The first wireless device may switch from the first set of beams to a second set of beams based on the at least one antenna element being defective, and communicate with the second wireless device using the second set of beams.
Abstract:
Methods, systems, and devices for wireless communications are described. A first wireless device may communicate with a second wireless device using a first set of beams including a first beam and a second beam, where the first and second beams are generated via first and second sets of antenna elements, respectively. The first wireless device may compare a first power associated with the first beam and a second power associated with the second beam, and may determine that at least one antenna element from the first set of antenna elements, the second set of antenna elements, or both, is defective based on the comparison. The first wireless device may switch from the first set of beams to a second set of beams based on the at least one antenna element being defective, and communicate with the second wireless device using the second set of beams.