Abstract:
Embodiments describe manufacturing, programming, testing, and servicing of wireless computing devices utilizing the embedded wireless technology in the device. According to an aspect is a method for efficient batch processing of a plurality of devices. The method includes sending data to a plurality of wireless devices though a wireless communication. The data included in the wireless communication is received at the plurality of wireless devices and the plurality of wireless devices are programmed or tested with the data included in the wireless communication. The plurality of wireless devices can be programmed and/or tested in batch and/or in parallel.
Abstract:
Methods, apparatus, systems and computer program products are provided for an improved media content rating system. The rating system herein disclosed is highly-granular in nature, in that, the rating system allows for ratings to be based on the number of times that portions, segments, clips of the media file are played or otherwise executed, as opposed to basing the media content rating solely on the number of times that the media file is played. In this regard, the aspects herein described may further provide for ratings of the portions, segments, clips of the media content as opposed to limiting the rating to a rating for the overall media content file.
Abstract:
Apparatus, methods, and programs for protecting data on a wireless device may include a wireless device having a computer platform with a processing engine operable, based upon configurable parameters, to log data access attempt on the wireless device and transmit the log to a remote device. Furthermore, the wireless device may be configured to execute locally and remotely generated control commands on the wireless device, the commands operable to modify an operation of the wireless device. The embodiment may also include an apparatus operable to receive the transmitted log, analyze the received log and transmit a control command to the wireless device. The apparatus may further generate a data access report and make the report available to an authorized user.
Abstract:
Apparatus, methods, processors and machine readable media for verifying the integrity of firmware on a wireless device. Aspects include generating a verification scheme for testing the integrity of firmware on a wireless device and transmitting the verification scheme to the wireless device. The wireless device applies the verification scheme to the firmware and obtains a verification test result, which is forwarded for analysis. An analyzer compares the generated verification test result with a predetermined test result to obtain an integrity determination that indicates the integrity of the firmware. In some aspects, control commands to change an operational characteristic of the wireless device may be generated based on the integrity determination.
Abstract:
Techniques for managing peak-to-average power ratio (PAPR) for multi-carrier modulation in wireless communication systems. Different terminals in a multiple-access system may have different required transmit powers. The number of carriers to allocate to each terminal is made dependent on its required transmit power. Terminals with higher required transmit powers may be allocated fewer carriers (associated with smaller PAPR) to allow the power amplifier to operate at higher power levels. Terminals with lower required transmit powers may be allocated more carriers (associated with higher PAPR) since the power amplifier is operated at lower power levels. The specific carriers to assign to the terminals may also be determined by their transmit power levels to reduce out-of-band emissions. Terminals with higher required transmit powers may be assigned with carriers near the middle of the operating band, and terminals with lower required transmit powers may be assigned with carriers near the band edges.
Abstract:
By constructing a universal test circuit on a tester chip, and stacking the tester chip in an IC package together with operational circuit chips to be tested, the problems inherent with external IC testing are reduced. The tester chip can be standardized across a number of different chip combinations and, if desired, pre-programmed during manufacturing for a particular package. The tester chip interfaces to other chips in the stack advantageously are standardized.
Abstract:
Detection and management methods and apparatus for wireless devices may include an executable instruction authorization module operable to scan executable instructions on a wireless device, generate a log indicative of a virus or otherwise unauthorized executable instructions based on a received authorization configuration, and forward the log to a user manager. The user manager may be operable to analyze the log and generate an authorization report which may be viewable by an operator to determine the disposition of unauthorized executable instructions. At least one of the executable instruction authorization module, the user manager, and the operator may be operable to generate a control command operable to delete, or otherwise disable, unauthorized executable instructions on the wireless device, or to restore the executable instructions on the wireless device.
Abstract:
A method for localizing a mobile station, which in one embodiment is characterized by: logging one or more wireless channels which belong to one or more network providers other than the mobile station's home network provider and which substantially currently provide communication with one or more discernable base stations; and establishing a geographic position of the mobile station by use of the one or more wireless channels which belong to the one or more network providers other than the mobile station's home network provider. In one or more various embodiments, related systems include but are not limited to circuitry and/or programming for effecting the foregoing?referenced method embodiment; the circuitry and/or programming can be virtually any combination of hardware, software, and/or firmware configured to effect the foregoing? referenced method embodiment depending upon the design choices of the system designer.