H04W52/0277

MANAGEMENT OF A CONNECTIVITY OF A MOBILE DEVICE
20170339635 · 2017-11-23 ·

A method for controlling connectivity of a mobile device being connected to a first network through a first radio communication interface. The method includes triggering the mobile device to adopt a power saving mode with respect to the first network; and in response to the triggering of the adoption of the power saving mode, generating a signal for activating a second radio communication interface in order to establish a connection to a second network. A mobile device that performs the method and a computer program product with program code, that when executed on at least one processor of a computing apparatus, causes the computing apparatus to perform the method.

RESOURCE PATTERN INDICATION FROM DISTRIBUTED UNIT

Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first node of a wireless network may transmit, by a first distributed unit (DU) of the first node to a central unit (CU), a second DU of another node in the wireless network, a user equipment in the wireless network, or a child node of the first node, an indication of a suggested resource pattern for the DU. The first node may transmit or receive a communication in the wireless network based at least in part on a resource pattern that is received in connection with transmitting the indication. Numerous other aspects are described.

POST-EVENT MODIFICATION OF LOCAL CLOCK VALUES IN WATER DISTRIBUTION SYSTEM
20220369233 · 2022-11-17 ·

A hydrant apparatus may be employed to monitor a water distribution system, and may include a sensor, a processor, and a local clock source. The apparatus may wake from a low power mode to a sensing mode, receive the sensor data, associate the sensor data with a first local clock time, and return the apparatus to the low power mode from the sensing mode. The apparatus may subsequently wake to an operational mode, determine a second local clock time subsequent to the first local clock time, associate an external clock time with the second local clock time, determine an offset for the received sensor data based on the first local clock time and the association between the second local clock time and the external clock time, and transmit the sensor data and the offset to an external monitoring system.

NFC METHOD AND DEVICE FOR COMMUNICATION WITH IMPROVED POWER HARVESTING
20170331522 · 2017-11-16 ·

Method and devices for enabling Power Save Mode (PSM) in near field communication (NFC) between a first active NFC device and a second NFC device, when the first active NFC device and the second NFC device are in NFC connected mode.

Emergency Monitoring Application Mobility Management

Emergency monitoring application mobility management is provided. A portion of battery power on a mobile device is reserved for an emergency monitoring application between defined boundaries of a certain area based on analysis of a profile identifying battery consumption of each respective application running on the mobile device. A dedicated logical communication channel is established with the mobile device that the emergency monitoring application connects to in a detected emergency situation between the defined boundaries of the certain area. The dedicated logical communication channel is utilized to shut down a number of applications running on the mobile device during the detected emergency situation so that the reserved portion of battery power is retained to run the emergency monitoring application on the mobile device between the defined boundaries of the certain area during the detected emergency situation.

ELECTRONIC DEVICE FOR COMPOSING GRAPHIC DATA AND METHOD THEREOF
20170316541 · 2017-11-02 ·

An electronic device includes a first graphic composer that composes first graphic data associated with a layer of a first composition type, a second graphic composer that composes second graphic data associated with a layer of a second composition type different from the first composition type. The electronic device also includes a processor that sets a composition type of each of a plurality of layers associated with at least one application to the first or second composition type, composes first graphic data corresponding to a layer set to the first composition type using the first graphic composer, compose the composed graphic data in the frame buffer and second graphic data corresponding to a layer set to the second composition type using the second graphic composer, and display the composed graphic data through a display connected with the electronic device.

DISABLING AN APPLICATION BASED ON POWER LEVEL

One embodiment provides a method, including: identifying, using a processor, a power level of an information handling device; determining, using a processor, that the power level is below a predetermined threshold; and disabling, based upon the power level being below the predetermined threshold, access to at least one application of the information handling device. Other aspects are described and claimed.

Communication apparatus controlling close proximity wireless communication unit, control method thereof and storage medium
09807545 · 2017-10-31 · ·

A communication apparatus comprises a close proximity wireless communication unit which is able to perform close proximity wireless communication with an external apparatus; a power control unit which starts control of power supply of the communication apparatus when the close proximity wireless communication unit receives electromagnetic waves from the external apparatus; and a control unit which executes shutdown processing for reducing power to each block controlled by the power control unit, wherein when the shutdown processing is executed, the control unit disables the close proximity wireless communication unit before start of the shutdown processing.

Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
11258595 · 2022-02-22 · ·

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

Running location provider processes
09794754 · 2017-10-17 · ·

Examples describe methods, computing devices, and systems for using location provider (LP) processes to accurately identify a proximate location of a computing device, while reducing the power consumption of the computing device. An example method may include executing, on a computing device, both a first LP process and a second LP process simultaneously for at least part of a time period to determine outputs indicative of locations of the computing device for the time period. Further, the method may include determining a motion model of the computing device that indicates expected locations of the computing device. Yet further, the method may include making a comparison of the outputs to the motion model for the time period. In addition, the method may include disabling one of the LP processes based on the comparison.