Patent classifications
H04B1/3816
TRAY SUPPORT STRUCTURE AND ELECTRONIC DEVICE INCLUDING THE SAME
An electronic device includes a circuit board, a socket on the circuit board and electrically connected to the circuit board, and a tray removably insertable into the socket from outside the electronic device, the tray including a body portion, a first protrusion extended from the body portion, and a second protrusion extended from the body and spaced apart from the first protrusion. The socket includes a detection portion which is engageable with the first protrusion of the tray and detects insertion of the tray in the socket, together with the circuit board, and a supporting portion which is engageable with the second protrusion of the tray. The tray which is inserted into the socket disposes the first protrusion contacting the detection portion, and a portion of the tray corresponding to the second protrusion supported by the supporting portion.
Client device authentication using contactless legacy magnetic stripe data
A technique for generating a diversified encryption key for a contactless legacy magnetic stripe card is disclosed. The diversified key can be generated using a master key, a key diversification value and an encryption algorithm. In one example embodiment, the key diversification value can be provided by the user as a fingerprint, numeric code or photo. The user can provide the key diversification value to the card or a cellphone. The card can generate the diversified key using the user provided key diversification value. The card or the cellphone can transmit the user provided diversification value to the server and the server can regenerate the diversified key using the user provided diversification value.
Client device authentication using contactless legacy magnetic stripe data
A technique for generating a diversified encryption key for a contactless legacy magnetic stripe card is disclosed. The diversified key can be generated using a master key, a key diversification value and an encryption algorithm. In one example embodiment, the key diversification value can be provided by the user as a fingerprint, numeric code or photo. The user can provide the key diversification value to the card or a cellphone. The card can generate the diversified key using the user provided key diversification value. The card or the cellphone can transmit the user provided diversification value to the server and the server can regenerate the diversified key using the user provided diversification value.
Remote sim unlock (RSU) implementation using blockchain
A permissioned blockchain can be a decentralized data store that maintains information indicating whether user equipment (UE) is SIM locked and/or should be disabled. A UE can access the blockchain during boot up to determine if it should be disabled and not booted into a normal operating environment, and/or whether it is SIM locked to a particular carrier. Authorized entities, such as carriers and UE manufacturers, can update the blockchain to indicate that certain UEs should be disabled, are SIM locked, are not SIM locked, and/or whether it is permissible to remove SIM locks from those UEs.
Remote sim unlock (RSU) implementation using blockchain
A permissioned blockchain can be a decentralized data store that maintains information indicating whether user equipment (UE) is SIM locked and/or should be disabled. A UE can access the blockchain during boot up to determine if it should be disabled and not booted into a normal operating environment, and/or whether it is SIM locked to a particular carrier. Authorized entities, such as carriers and UE manufacturers, can update the blockchain to indicate that certain UEs should be disabled, are SIM locked, are not SIM locked, and/or whether it is permissible to remove SIM locks from those UEs.
SIM Card Detection Failure Recovery Method for Electronic Device and Electronic Device
A subscriber identification module (SIM) card detection failure recovery method for an electronic device includes that the electronic device identifies a card recovery scenario, where card recovery includes whether to power on a SIM card. A configurable timer is started based on the card recovery scenario. The electronic device periodically obtains, based on a time set by the timer, power-on information for powering on the SIM card. The electronic device determines a power-on condition of the SIM card based on the power-on information. If the power-on condition is met, the electronic device powers on the SIM card.
SIM Card Detection Failure Recovery Method for Electronic Device and Electronic Device
A subscriber identification module (SIM) card detection failure recovery method for an electronic device includes that the electronic device identifies a card recovery scenario, where card recovery includes whether to power on a SIM card. A configurable timer is started based on the card recovery scenario. The electronic device periodically obtains, based on a time set by the timer, power-on information for powering on the SIM card. The electronic device determines a power-on condition of the SIM card based on the power-on information. If the power-on condition is met, the electronic device powers on the SIM card.
METHOD AND APPARATUS FOR ACCESSING CELLULAR NETWORK FOR SIM PROFILE
The present disclosure relates to a communication technique that combines a 5G communication system for supporting a data rate that is higher than that of a beyond 4G system with IoT technology, and a system thereof. The present disclosure may be applied to intelligent services on the basis of 5G communication technology and IoT related technology, such as smart home, smart building, smart city, smart car or connected car, health care, digital education, retail, security and safety related services. Disclosed is a method for causing a cellular network itself to receive provisioning of a SIM profile to make it possible to use a normal cellular network service.
Systems and methods for providing LTE-based backhaul
Systems and methods are disclosed for enabling a mesh network node to switch from a base station role to a user equipment role relative to a second mesh network node, and vice versa. By switching roles in this manner, the mesh network node may be able to benefit from increased uplink or downlink speed in the new role. This role reversal technique is particularly useful when using wireless protocols such as LTE that are asymmetric and allow differing throughput on uplink and downlink connections. Methods for determining whether to perform role reversal are disclosed, and methods for using role reversal in mesh networks comprising greater than two nodes are also disclosed.
Systems and methods for providing LTE-based backhaul
Systems and methods are disclosed for enabling a mesh network node to switch from a base station role to a user equipment role relative to a second mesh network node, and vice versa. By switching roles in this manner, the mesh network node may be able to benefit from increased uplink or downlink speed in the new role. This role reversal technique is particularly useful when using wireless protocols such as LTE that are asymmetric and allow differing throughput on uplink and downlink connections. Methods for determining whether to perform role reversal are disclosed, and methods for using role reversal in mesh networks comprising greater than two nodes are also disclosed.