H04W40/005

METHODS AND APPARATUS FOR DETECTING A VOICE COMMAND

According to some aspects, a method of monitoring an acoustic environment of a mobile device, at least one computer readable medium encoded with instructions that, when executed, perform such a method and/or a mobile device configured to perform such a method is provided. The method comprises receiving acoustic input from the environment of the mobile device while the mobile device is operating in the low power mode, detecting whether the acoustic input includes a voice command based on performing a plurality of processing stages on the acoustic input, wherein at least one of the plurality of processing stages is performed while the mobile device is operating in the low power mode, and using at least one contextual cue to assist in detecting whether the acoustic input includes a voice command.

ADAPTIVE ROUTE, BI-DIRECTIONAL NETWORK COMMUNICATION
20220201590 · 2022-06-23 ·

In an adaptive route wireless network and bi-directional protocol, each computing device along a route to a gateway appends the previous node's network address to downstream messages as they are transmitted along the route from an originating computing device to the gateway. The list of appended network addresses thus records the route taken by the downstream network message through the adaptive route network. A server computing device maintains a route table including the list of appended network addresses received with each downstream message. To send unsolicited upstream messages to any computing device on the wireless network, the server generates an upstream network message that includes the appended network address(es) from the portion of the route table corresponding to the destination computing device. The upstream route to the destination computing device is thus contained in the list of appended network addresses within the network message.

Key derivation for a module using an embedded universal integrated circuit card
11736283 · 2023-08-22 · ·

A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.

CONFIGURING REPEATER-ASSISTED COMMUNICATION
20230262573 · 2023-08-17 ·

Apparatuses, methods, and systems are disclosed for configuring repeater-assisted communication. One method includes transmitting, from a first network node (“NN”), an indication of repeater-assisted communication to a second NN and a third NN. The method includes transmitting configuration information to the second NN and the third NN. The configuration information includes control information that corresponds to whether the second NN and the third NN are turned on or turned off, the control information corresponding to whether the second NN and the third NN are turned on or turned off is correlated, the control information identifies timing information for the second NN and the third NN, and the timing information indicates whether the second NN and the third NN are expected to transmit a signal received at the second NN and the third NN at a prior time to the first NN and/or a fourth NN based on the configuration information.

END DEVICE COMMUNICATION

Embodiments disclosed herein relate to enabling direct wireless device-to-device communication between sleepy end devices (SEDs) of a mesh (e.g., Thread®) network. A router may forward packets between end devices of the mesh network. However, if the router is not available, SEDs may not be able to communicate with each other using a mesh protocol. Embodiments presented herein enable end devices of the mesh network to communicate directly, without a router. Some embodiments are directed to changing a role of an end device to temporarily act as a router for a particular target end device. The role change may be based on a trigger event and may be temporary until a target action is performed by the target end device. In some embodiments, the end devices continue to operate as SEDs and use coordinated sampled listening techniques to communicate via the mesh protocol.

Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI)
20220141010 · 2022-05-05 ·

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

FLOOD FILL MESH RADIO NETWORK
20220141753 · 2022-05-05 ·

Disclosed is an improved implementation of a flood fill mesh network that utilizes low power and does not require any network addressing or routing protocol for network message delivery. Network messages are only communicated to a network node's correspondents using broadcast network messages over a wireless network. Network messages propagate throughout the network based on each correspondent node rebroadcasting received messages to its correspondent nodes, and so on. Coordinated synchronization across network nodes can be achieved by each network node broadcasting synchronization frames to its correspondents within a synchronization window time period and thereafter adjusting its own start time for the next synchronization period to converge synchronization. A guard band may also be utilized to account for any clock drift and signal path delays between any two communicating network nodes.

Managing FTM frames of WLAN RTT bursts

In aspects of managing FTM frames of WLAN RTT bursts, a device can receive a WLAN RTT burst, such as initiated by a device application, device firmware, or received as a RTT ranging request. The device implements a status module that interposes the routing of the ranging request in the device, and determines a device state of the device with a device state monitor of the status module. The status module is implemented to drop the ranging request if the device is an idle device state such that the ranging request is extraneous. Alternatively, the status module is implemented to reduce a number of FTM frames in the ranging request based on the device state indicating that multiple FTM frames of the ranging request are extraneous, and then route to perform the ranging request of the WLAN RTT burst with the reduced number of FTM frames in the ranging request.

STAGGERED EXTENDED SLEEP CYCLES, COMPRISING ON AND OFF SLEEP DURATIONS, IN WIRELESS DEVICES
20210368449 · 2021-11-25 ·

Extended sleep in a wireless device. In an embodiment, synchronized parameters, used by a wireless device to define an extended-sleep cycle, are stored at a system. Based on the synchronized parameters, the system determines a transmission time at which to transmit a message over the wireless communication network such that the message will be received by the wireless device during a portion of the extended-sleep cycle during which the wireless device is monitoring paging occasions. The message is then queued until it is transmitted at the transmission time.

Disengaged-mode active coordination set management
11224081 · 2022-01-11 · ·

This document describes methods, devices, systems, and means for disengaged-mode active coordination set (ACS) management. A user equipment (110) uses an ACS for joint wireless communication between the user equipment (110) and multiple base stations (120) included in the ACS. The user equipment (110) receives a resource configuration for an ACS Disengaged-mode Reference Signal (ADRS). The user equipment (110) transitions to a disengaged mode (424) and receives the ADRS. The user equipment (110) determines that an updated ACS is required, transmits a message or a sounding signal indicating the need for the updated ACS, and in response, receives the updated ACS from a master base station (121).