Abstract:
This application sets forth techniques for managing phone number-based user accounts. According to some embodiments, a server computing device can be configured to carry out the steps of (1) receiving, from a first client computing device, a request to create a user account based on a phone number, (2) in response to authenticating that the first client computing device is associated with the phone number: creating the user account based on the phone number, creating a hidden contact address based on the phone number, and assigning the hidden contact address to the user account, and (3) in response to receiving a notification that a second client computing device is associated with the phone number: requiring the user account to be updated to be based on a different phone number, or assigning, to the user account, a visible contact address based on the phone number.
Abstract:
Embodiments described herein relate to managing access to 5G cellular baseband resources for 5G-capable wireless devices. A wireless device can monitor application workloads by analyzing communication network performance requirements for a given application in-use or launching for future use along with system-level indications of overall device usage, battery level, and mobility status to determine whether access to 5G cellular baseband resources is recommended for an application. A 5G cellular baseband resource recommendation is provided for an application indicating a level of bandwidth in current use or expected for future use as well as a confidence metric in the bandwidth level indication. The 5G cellular baseband resource recommendation is used with additional device criteria to determine whether access to one or more 5G radio frequency bands is allowed.
Abstract:
Apparatus and methods to support parallel access to services of multiple subscriber identity modules (SIMs) and/or electronic SIMs (eSIMs) by a wireless device are disclosed. The wireless device is a single-radio wireless device that includes wireless circuitry that supports an active voice or video connection via a single radio access network of a cellular wireless network at a time. To send or receive data for a second SIM/eSIM, when an active voice or video connection for a first SIM/eSIM uses the wireless circuitry, the single-radio wireless device can i) establish parallel, linked protocol data unit (PDU) sessions for different SIMs, ii) multiplex traffic for different SIMs over a common radio connection with SIM information embedded in protocol headers for routing by network equipment, and/or iii) use an additional dedicated bearer using a first, active SIM for each data network name (DNN) over which to route for a second, suspended SIM..
Abstract:
This application relates to a client-server architecture that enables file sharing between an instructor and a class. The files are stored in a storage service accessible via a network, and a separate copy of each file can be shared with each student in the class. In order to facilitate the sharing of multiple copies of the file, a share pool is created in a partition of the storage service allocated to the instructor. The share pool includes a number of stub files that are placeholders for clones of the shared file. A share handler service receives a request to share a file with a class, requests a number of stub files from the share pool, and utilizes the number of stub files to generate clones of the shared file in the partition of the storage service. Students are then granted access to the clones in the partition.
Abstract:
The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
Abstract:
An electronic device having liquid-resistant modifications that prevent liquid ingress into an opening (or openings) in an enclosure of the electronic device is disclosed. For example, the electronic device may include a coating formed from a liquid-resistant material that is applied internally to the enclosure. The electronic device may further include a frame that carries a protective transparent layer designed to cover a display assembly. In order to secure the frame with the enclosure, the electronic device may include an adhesive assembly disposed over an outer perimeter of the coating. The adhesive assembly may include several adhesive parts initially separate from one another. However, with the adhesive parts between the frame and the enclosure, the adhesive parts can be compressed by the frame and the enclosure, causing the adhesive parts to expand and engage each other. As a result, the coating and the adhesive parts provide a seal against liquid.
Abstract:
Representative embodiments set forth herein disclose techniques for implementing dynamic file system volumes that can share storage space with other file system (FS) volumes within the same partition / storage device. According to some embodiments, techniques are disclosed for establishing an FS volume within a container. According to other embodiments, techniques are disclosed for handling input / output (I/O) requests across different FS volumes. According to yet other embodiments, techniques are disclosed for efficiently establishing, within a storage device, an FS volume from an image of the FS volume.
Abstract:
A server of a wireless operator creates a roaming list based on a user's roaming plan and sends the roaming list to the user's wireless device. The roaming list includes a list of public land mobile networks (PLMNs). When the user travels away from their home wireless network to another geographic area, the wireless device scans based on the roaming list for radio signals. The roaming list contributes to user satisfaction because timely attachment to a radio network while away from home occurs efficiently since the wireless operator creates the roaming list based on both i) roaming agreements that the wireless operator is a party to with other wireless operators, ii) the user's roaming plan, iii) the radio access technology (RAT) capabilities of the wireless device and iv) the RAT capabilities of other wireless operators in particular geographic regions.
Abstract:
Systems, methods, and non-transitory computer-readable storage media for performing a role swapping operation between a pair of non-tethered wireless ear buds after detecting a triggering event. Further, state information can be coordinated between devices, including in connection with performing a role swap between buds in a pair of wireless, untethered ear buds, where one wireless ear bud is in a primary role and is responsible for a connection with a companion device, and another wireless ear bud in the pair is in a secondary role.
Abstract:
An accessory to device coupling system can include a first magnet array adapted for assembly with respect to a surface of an electronic device and a second magnet array adapted for assembly with respect to a surface of an accessory device, the accessory device configured to interact electrically with the electronic device. The first magnet array can include a first plurality of magnets arranged in a first pattern of alternating polarities, and the second magnet array can include a second plurality of magnets arranged in a second pattern of alternating polarities that corresponds to the first pattern of alternating polarities. The corresponding alternating polarity patterns can cause the second magnet array to couple to the first magnet array with a normalized attraction force only at an intended orientation and alignment, and with less than half of the normalized attraction force at any other orientation and alignment.