H04W52/0264

Systems and methods for power consumption management

A power source is configured to supply power to one or more components of an electronic device. A processing device that is in communication with the power source can be configured to determine an estimated power requirement of the mobile electronic device during a time period, to determine a charge state of the power source, and to produce an indication of the remaining use time of the electronic device based on the estimated power requirement and the charge state of the power source.

Wake Lock Aware System Wide Job Scheduling for Energy Efficiency on Mobile Devices

Embodiments include computing devices, apparatus, and methods implemented by the apparatus for implementing wake lock aware scheduling. The apparatus may receive a wake lock request by a wake lock profiler and acquire wake lock information of a wake lock event associated with the wake lock request. The wake lock information may include a wake lock time parameter. The apparatus may send a hint having the wake lock time parameter. The apparatus may receive the hint, determine whether ready jobs can execute during the wake lock event, and send a request for permission to schedule the ready jobs for execution during the wake lock event in response to determining that the ready jobs can execute during the wake lock event.

ELECTRONIC DEVICE INCLUDING EUICC AND METHOD FOR OPERATING THE SAME
20170366962 · 2017-12-21 ·

An electronic device is provided. The electronic device includes at least one processor and an embedded universal integrated circuit card (eUICC) configured to be electrically connected with the at least one processor. The at least one processor is configured to implement a management module configured to manage a profile stored in the eUICC. The management module is configured to, when there is an enabled profile in the eUICC, perform a communication function based on the enabled profile and, when there is no the enabled profile in the eUICC, disable at least one of a periodic eUICC verification function and a network search function.

EUICC ACCESS WITHOUT BASEBAND WIRELESS SUPPORT

Embodiments described herein relate to managing access to an embedded universal integrated circuit card (eUICC) to obtain subscriber identity module (SIM) information without requiring cellular baseband wireless processing support. A baseband component of a wireless device that connects to the eUICC via a first interface can be in a reduced power state, and under certain conditions a processor external to the eUICC can access the eUICC via a second interface without booting up the baseband component to a normal (full) power state. When access to the eUICC via the first interface through the baseband component is required, the baseband component can be booted to a normal (full) power state to communicate with the eUICC. Additionally, a wireless device in which the baseband component is in a reduced power state or is absent can access one or more services of a mobile network operator (MNO) via a non-cellular wireless interface.

Efficient context monitoring

Disclosed are systems, methods, and non-transitory computer-readable storage media for efficiently monitoring the operating context of a computing device. In some implementations, the context daemon and/or the context client can be terminated to conserve system resources. For example, if the context daemon and/or the context client are idle, they can be shutdown to conserve battery power or free other system resources (e.g., memory). When an event occurs (e.g., a change in current context) that requires the context daemon and/or the context client to be running, the context daemon and/or the context client can be restarted to handle the event. Thus, system resources can be conserved while still providing relevant context information collection and callback notification features.

AUTOMATICALLY CHANGING MESSAGE TRANSMISSION MODES IN A TRACKING DEVICE
20230189156 · 2023-06-15 ·

A tracking device is configured to monitor a parameter, such as battery state or cellular network signal strength, and cause a component of the tracking device to enter a sleep state when a monitored parameter value satisfies a sleep state criterion. Before entering a sleep state, which may comprise a long-range wireless transceiver being turned off, one or more final messages may be emitted that indicate the location of the tracking device before, or at, entering of the sleep state. While in a sleep state, the tracking device may emit a low power beacon, which may be emitted in different formats at different transmission of the beacon. The different beacons may be emitted according to a configured pattern.

Automatic configuration of power settings

Embodiments relate to a computer system and computer program product for allocating resources and settings in order to optimize application satisfaction in view of hardware resources and adjustable software configurations. As applications are executed on a computing device, usage data is tracked, adjustable settings are identified, and power consumption of each application under different settings is measured. The usage data is then compiled, an optimal configuration setting is assessed for each application, and the setting is conveyed and applied to one or more applications.

DEVICE AND METHOD FOR CONTROLLING STANDBY POWER OF MOBILE TERMINAL
20170347320 · 2017-11-30 ·

Disclosed are: a communication technique combining, with IoT technology, a 5G communication system for supporting a data transmission rate higher than that of a 4G system, and subsequent systems; and a system therefor. The disclosed communication technique and system therefor can be applied to intelligent services (for example, services related to a smart home, a smart building, a smart city, a smart car or a connected car, health care, digital education, retail business, security, safety and the like) on the basis of 5G communication technology and IoT-related technology. A method for controlling standby power of a mobile terminal, of the present invention, comprises: detecting applications and services related to a background operation; classifying the detected applications and services according to characteristics; predicting use patterns for the applications and the services classified by the characteristics, in consideration of a user response to the applications and the services classified according to the characteristics; and controlling the applications and the services classified by the characteristics, on the basis of the applications and the services classified by the characteristics and the predicted use patterns.

PORTABLE ELECTRONIC DEVICES WITH AN EMERGENCY MODE FOR LOCATING SURVIVORS IN DISASTERS

An emergency mode is provided in a portable electronic device for locating a survivor in a disaster. The device includes a wireless antenna to transmit and receive wireless signals; a memory to store one or more identifiers; a user interface to receive a command that enables the emergency mode. The device also includes one or more processors, which, in response to the command, detect via the wireless receiver a predetermined identifier that matches a stored identifier identifying a sender of the predetermined identifier as a trusted node. When the predetermined identifier and a timing measurement frame are received from the trusted node, the device sends a response to the trusted node to indicate its presence.

Emergency Monitoring Application Mobility Management

Emergency monitoring application mobility management is provided. A portion of battery power on a mobile device is reserved for an emergency monitoring application between defined boundaries of a certain area based on analysis of a profile identifying battery consumption of each respective application running on the mobile device. A dedicated logical communication channel is established with the mobile device that the emergency monitoring application connects to in a detected emergency situation between the defined boundaries of the certain area. The dedicated logical communication channel is utilized to shut down a number of applications running on the mobile device during the detected emergency situation so that the reserved portion of battery power is retained to run the emergency monitoring application on the mobile device between the defined boundaries of the certain area during the detected emergency situation.