Patent classifications
H04B1/3816
SYSTEM AND METHOD FOR PREVENTING SECURITY BREACHES IN AN INTERNET OF THINGS (IOT) SYSTEM
A system and method are described for preventing security breaches in an IoT system. For example, one embodiment of a system comprises: an Internet of Things (IoT) device comprising a wireless communication module to establish communication with a plurality of IoT hubs over local wireless communication channels; advertising control logic to transmit first advertising beacons to the plurality of IoT hubs of a user indicating that the IoT device is connectable; the advertising control logic to begin transmitting a second advertising beacon to IoT hubs indicating that the IoT device is not connectable if the IoT device establishes a connection with a first IoT hub, the IoT hubs other than the first IoT hub to report the not connectable status of the IoT device to an IoT service; and a connection security module of the IoT service to determine whether the IoT device is connected to any known IoT hub upon receiving the not connectable status from one or more of the IoT hubs; wherein if the connection security module cannot identify a known IoT hub to which the IoT device is connected, then an alert condition is generated.
Chip card assembling structure and method thereof
Disclosed are a chip card assembling structure and a method thereof, including at least one base plate, at least one fixing element having a side forming a fixing trough corresponding to the base plate, at least one adhesive film disposed on one side of the fixing element to cover the fixing trough, and at least one thin-film chip received in the fixing trough and bonded to the adhesive film. To use the present invention, the adhesive film, together with the thin-film chip, is lifted and the base plate is placed into the fixing trough, following setting the adhesive film and the thin-film chip back to have the thin-film chip coupled to the base plate. Then, the adhesive film is lifted to remove the coupled thin-film chip and base plate, so that the relative position between the thin-film chip and the base plate is precise and correct.
Earphone charging device
The present disclosure discloses an earphone charging device including a lower box portion having a main control circuit, an upper cap portion covering the lower box portion, and a display screen positioning around the lower box portion. The display screen includes a first portion firmly secured to the lower box portion and at least one second portion floatably connected to the lower box portion. The present disclosure can not only provide a high-leveled visual feeling of the large screen, but also realize a rapid storage of the display screen.
Earphone charging device
The present disclosure discloses an earphone charging device including a lower box portion having a main control circuit, an upper cap portion covering the lower box portion, and a display screen positioning around the lower box portion. The display screen includes a first portion firmly secured to the lower box portion and at least one second portion floatably connected to the lower box portion. The present disclosure can not only provide a high-leveled visual feeling of the large screen, but also realize a rapid storage of the display screen.
Update of a trusted name list
Methods, devices, and servers for as-needed update of a trusted list are provided herein. An electronic subscriber identity module (eSIM) server receives a request for an eSIM of a particular type from a wireless device. The eSIM server evaluates the particular type and requests an eSIM of the particular type from a second eSIM server, which is not initially trusted by a secure element (SE) of the wireless device. The eSIM server sends a policy update to the wireless device. The wireless device passes the policy update to the SE, for example, a universal integrated circuit card (UICC). The UICC updates the trusted list with an identity of the second eSIM server. When the wireless device downloads a bound profile package (BPP) containing an eSIM from the second eSIM server, the UICC validates the BPP based on the updated trusted list. The eSIM is then installed on the UICC.
Update of a trusted name list
Methods, devices, and servers for as-needed update of a trusted list are provided herein. An electronic subscriber identity module (eSIM) server receives a request for an eSIM of a particular type from a wireless device. The eSIM server evaluates the particular type and requests an eSIM of the particular type from a second eSIM server, which is not initially trusted by a secure element (SE) of the wireless device. The eSIM server sends a policy update to the wireless device. The wireless device passes the policy update to the SE, for example, a universal integrated circuit card (UICC). The UICC updates the trusted list with an identity of the second eSIM server. When the wireless device downloads a bound profile package (BPP) containing an eSIM from the second eSIM server, the UICC validates the BPP based on the updated trusted list. The eSIM is then installed on the UICC.
NETWORK ACCESS METHOD AND MOBILE COMMUNICATIONS TERMINAL
A network access method includes: obtaining a shared network information stored in an operator's server after a subscriber identity module (SIM) card is inserted into a mobile communications terminal and electrified where the shared network information is a network identity of a VPLMN delivered by other terminal, searching for the network identity of the VPLMN with the mobile communications terminal based on the shared network information, adding the network identity of the VPLMN to the EPLMN list where the EPLMN list comprises a network identity of a HPLMN and the network identity of the VPLMN, and accessing a network based on the EPLMN list.
NETWORK ACCESS METHOD AND MOBILE COMMUNICATIONS TERMINAL
A network access method includes: obtaining a shared network information stored in an operator's server after a subscriber identity module (SIM) card is inserted into a mobile communications terminal and electrified where the shared network information is a network identity of a VPLMN delivered by other terminal, searching for the network identity of the VPLMN with the mobile communications terminal based on the shared network information, adding the network identity of the VPLMN to the EPLMN list where the EPLMN list comprises a network identity of a HPLMN and the network identity of the VPLMN, and accessing a network based on the EPLMN list.
SYSTEM COMPRISING A PORTABLE SWITCHING DEVICE FOR USE WITH A PORTABLE ELECTRONIC DEVICE
A lens and/or a view screen of an electronic device having at least one case can be cleaned by wiping the view screen with a cleaning component wherein the cleaning component is configured to selectively couple to the at least one case or some other substrate using a magnetic attractive force. The cleaning devices may have secondary applications such as securing fly fishing lures, activating or deactivating a device having a magnetic switch, or preventing sunglasses from sinking. They may also be manufactured without a cleaning component for use with the secondary applications.
Device based network notification of device supported machine-type communication features
The disclosed subject matter provides a proactive device initiated mechanism for notifying a network device regarding device supported machine-type communication (MTC) features. In one embodiment, a method is provided that includes identifying, by a device comprising a processor, machine-type communication related parameters of the device using a subscriber identity module application stored on a subscriber identity module card of the device. The method can further include generating, by the device using the subscriber identity module application, parameter information that identifies the machine-type communication related parameters of the device based on the identifying, and sending, by the device, the parameter information to a network server device of a wireless communication network based on the generating.