H04M3/16

Managing display of private information

In one example, a method includes receiving a first indication of an incoming communication and determining that the incoming communication includes private information. The method may also include outputting, for display at a wearable computing device, a second indication of the incoming communication, wherein the indication includes non-private information. The method may also include determining, based on motion data generated by the wearable computing device, that a user of the wearable computing device is likely viewing the wearable computing device. The method may also include outputting, for display at the wearable computing device, an indication of the private information.

Method and apparatus for transreceiving privacy information
09826396 · 2017-11-21 · ·

A method and an apparatus for transmitting and receiving privacy information are disclosed. The method includes transmitting a connection (ATTACH) message including a terminal type indication, privacy type, privacy indication, and transmission period, receiving a connection complete (ATTACH ACCEPT) message; and transmitting location information. According to the embodiments of the present invention, the method and the apparatus for transmitting and receiving privacy information can provide an adequate protection for the privacy information in a terminal.

System and method for providing service using terminal scanning device, terminal scanning device applied to same, and operation method of terminal scanning device
09826383 · 2017-11-21 · ·

Disclosed are a system and a method for providing a service using a terminal scanning device. When the terminal scanning device scans for a terminal located within a particular range, executes a particular application pre-installed in a terminal found through the scanning, and provides user information of the found terminal to a service server, the found terminal receives a particular service related to the user information from the service server through a link with the particular application executed by the terminal scanning device. Therefore, necessary information can be automatically provided to the terminal when the terminal approaches a particular place such as a shop or a building without a continuous scanning operation.

Spatial physical layer security in wireless communication systems

Certain aspects of the present disclosure provide techniques for wireless communication by a first wireless device. The first wireless device may participate in a beam forming procedure with a second wireless device to evaluate a plurality of transmit (TX) and receive (RX) beam pairs. The first wireless device may select one of the TX and RX beam pairs based on the evaluation. The first wireless device may determine at least one cryptographic key based on channel parameters associated with a selected one of the TX and RX beam pairs. The first wireless device may use the at least one cryptographic key for communications with the second wireless device.

Enhanced real-time messaging

A system includes a gateway that is configured to receive a message from a source for transmission to a destination and multiple communication channels on which to transmit the message to the destination, where the communication channels include different types of communication channels. The system includes a decision engine that is operably coupled to the gateway and the communication channels. The decision engine is configured to select a first communication channel from the communication channels to route the message for transmission to the destination. The decision engine is configured to select a second communication channel from the communication channels to route the message for transmission to the destination in response to a period of time expiring without receiving an acknowledgement from the destination via the first communication channel, where the second communication channel is a different type of communication channel than the first communication channel.

Apparatus and method for accessing wireless network

A method of using subscriber identification information stored in mobile user equipment (UE) to connect to a communication service over a public wireless network in the UE, establishing a communication link between the UE and a device, generating network access information (NAI) associated with the communication service in the UE, and sending the NAI from the UE to the device via the communication link. The method further comprises connecting the communication service in the device using the NAI and terminating the connection of the communication service in the UE.

Emergency communication system

An emergency communication system that is capable of broadcasting a live message to a specific zone of a protected structure, recording the live transmission, and repeating the recorded message to the same protected zone. In certain embodiments configured to protect multiple zones, the system further permits broadcast of a second live message to another zone of the structure, recording the second live broadcast, and repeating the second recorded message in the same zone to which the message was broadcast live. The system includes hardware such as a processing element and speaker assemblies and a computer program for instructing the processing element to carry out the transmission, recording, and re-broadcasting of messages through the speaker assemblies.

Mobile communication method and mobile station to prohibit retransmission of assistance information

An objective is to prohibit retransmission of “UE assistance information”. A mobile communication method according to the present invention includes the steps of: transmitting “UE assistance information” to a radio base station (eNB) by a mobile station (UE), the “UE assistance information” prompting the radio base station (eNB) to change a parameter for the mobile station UE used in the radio base station; notifying, by the radio base station (eNB), the mobile station (UE) of a transmission-prohibited period of the “UE assistance information”; and stopping, by the mobile station (UE), retransmission of the “UE assistance information” on the basis of the transmission-prohibited period.

System and method for establishing real-time location

A communication system with a master device configured to determine location information in real-time with respect to a portable device. The master device may direct one or more monitor devices to monitor communications that occur over a primary communication link. The monitor devices may sense characteristic information about the signal from the portable device, and communicate this characteristic information to the master device via an auxiliary communication link. The communication system may determine location of the portable device, authenticate the portable device, determine whether the portable device is authorized to allow or initiate an action, and command or enable an action with respect to equipment.

Systems and methods for detecting illegitimate devices on wireless networks

The disclosed computer-implemented method for detecting illegitimate devices on wireless networks may include (1) identifying a baseline signal strength for a wireless network, (2) monitoring a signal strength of the wireless network to obtain at least one additional signal strength measurement, (3) determining that the additional signal strength measurement varies from the baseline signal strength beyond a threshold, (4) determining, in response to determining that the additional signal strength measurement varies from the baseline signal strength, that an illegitimate device is present on the wireless network, and (5) initiating, in response to determining that the illegitimate device is present on the wireless network, a security action. Various other methods, systems, and computer-readable media are also disclosed.