H04M1/66

Enhanced real-time messaging

A system includes a gateway that is configured to receive a message from a source for transmission to a destination and multiple communication channels on which to transmit the message to the destination, where the communication channels include different types of communication channels. The system includes a decision engine that is operably coupled to the gateway and the communication channels. The decision engine is configured to select a first communication channel from the communication channels to route the message for transmission to the destination. The decision engine is configured to select a second communication channel from the communication channels to route the message for transmission to the destination in response to a period of time expiring without receiving an acknowledgement from the destination via the first communication channel, where the second communication channel is a different type of communication channel than the first communication channel.

Electronic device and voiceprint authentication method
09807611 · 2017-10-31 · ·

An electronic device uses a voiceprint for user authentication, and includes a storage unit, a voice input unit, and at least one processor. The storage unit registers a first voiceprint based on first voice corresponding to a first character string and a second voiceprint based on second voice corresponding to a second character string longer than the first character string. The at least one processor generates a third voiceprint from third voice input to the voice input unit after registration of the voiceprint in the storage unit, and makes a first comparison between the first voiceprint and the third voiceprint as first user authentication. The at least one processor generates a fourth voiceprint from fourth voice input to the voice input unit after the third voice, and makes a second comparison between the second voiceprint and the fourth voiceprint, when the first user authentication has failed.

Non-access stratum architecture and protocol enhancements for long term evolution mobile units

A method and apparatus performs processing of the non-access stratus (NAS) layer (layer 3) in long term evolution (LTE) wireless transmit/receive units (WTRUs), which allows the NAS protocol layer to route layer 3 messages to the correct NAS entity, and to encode new NAS message types and information elements. A new architecture is presented that enables NAS security. When a NAS message is generated, a determination is made as to whether or not to cipher, de-cipher and/or integrity check the NAS message based on at least one of a protocol discriminator (PD) of the NAS message, an indicator field in a header of the NAS message, the type of the NAS message, a NAS security state variable, and an indication by an upper layer protocol. The NAS security state variable indicates whether NAS security is currently active or not and may comprise one bit.

Method and apparatus for setting profile
09800993 · 2017-10-24 · ·

A method and apparatus for setting profiles are provided. The profile setting method includes receiving, from a first terminal, a profile transfer request message that requests transfer of a first profile or portion thereof from a first secure element to a second secure element; configuring a second profile using the first profile or portion thereof; and sending, to a second terminal, the configured second profile.

Apparatus and method for accessing wireless network

A method of using subscriber identification information stored in mobile user equipment (UE) to connect to a communication service over a public wireless network in the UE, establishing a communication link between the UE and a device, generating network access information (NAI) associated with the communication service in the UE, and sending the NAI from the UE to the device via the communication link. The method further comprises connecting the communication service in the device using the NAI and terminating the connection of the communication service in the UE.

Client-initiated tethering for electronic devices

The described embodiments include a tethering device that provides a tethering service to client devices. Generally, the tethering service enables a client device to share the tethering device's access to a network. For example, a client device may share the tethering device's access to a cellular network, through which the client device can access the Internet. In the described embodiments, a client device and the tethering device are configured so that the client device causes the tethering device to activate the tethering service without a user performing one or more operations for manually activating the tethering service on the tethering device.

Device and method of handling security authentication
09801067 · 2017-10-24 · ·

A method for handling a security authentication between a communication device, a source base station (BS), a target BS and a wireless local area network (WLAN) termination (WT) comprises the source BS performing a handover with the target BS and the WT; the source BS transmitting a RRCConnectionReconfiguration to the communication device, after performing the handover; the communication device performing a random access procedure with the target BS, after receiving the RRCConnectionReconfiguration; and the target BS transmitting a confirm message to the WT after performing the random access procedure, wherein the confirm message indicates that the RRCConnectionReconfiguration is received by the communication device.

FACILITATING A SECURE SESSION BETWEEN PAIRED DEVICES

A wearable device can establish a verified session with a host device. For example, if a user wearing the wearable device unlocks the host device (e.g., by entering a credential), the devices can create a verified session, which can persist across lock and unlock events at the host device. For the duration of the verified session, a host device can request session confirmation from the wearable device at any time to confirm that the verified session is still in progress. While the session is in progress, the host can make features available such as bypassing re-entry of a credential during unlock operations.

MOBILE ELECTRONIC DEVICE, SECURITY CONTROL METHOD, AND SECURITY CONTROL CODE
20170302773 · 2017-10-19 ·

A mobile electronic device includes a first input unit configured to receive input of information for cancelling a security lock state in which security lock is effective, a second input unit configured to receive input of biological information for cancelling the security lock state, and a controller configured to set a sleeping-time operation control mode corresponding to a sleeping time of a user according to an operation of the user.

MOBILE ELECTRONIC DEVICE, SECURITY CONTROL METHOD, AND SECURITY CONTROL CODE
20170302773 · 2017-10-19 ·

A mobile electronic device includes a first input unit configured to receive input of information for cancelling a security lock state in which security lock is effective, a second input unit configured to receive input of biological information for cancelling the security lock state, and a controller configured to set a sleeping-time operation control mode corresponding to a sleeping time of a user according to an operation of the user.