scispace - formally typeset
Search or ask a question

Showing papers by "Motorola published in 2019"


Patent
27 Jun 2019
TL;DR: In this paper, the authors describe a beam recovery procedure for beam failure recovery in a single-input single-out (SISO) system with a processor 305 and a transceiver 325.
Abstract: Apparatuses, methods, and systems are disclosed for efficiently transmitting a scheduling request. One apparatus 300 includes a processor 305 and a transceiver 325 that that communicates 705 with abase unit 110 using a first set of beams. The processor 305 that detects 710 beam failure for each of beam in the first set of beams and initiates 715 both a beam revival procedure and a beam recovery procedure in parallel. The processor 305 terminates 720 the beam recovery procedure in response to successful beam revival and prior to receiving a beam failure recovery request ("BFRR") response from the base unit 110. Additionally, the processor 305 re-starts 725 communication with the base unit 110 using the first set of beams in response to successful beam revival.

20 citations


Journal ArticleDOI
TL;DR: The proposed automatic strategy for generating test cases from use cases written in a Controlled Natural Language (CNL) is integrated into a tool that provides a GUI for authoring use cases and test purposes described in the proposed CNL, so the formal CSP notation is completely hidden from the test designer.

12 citations


Journal ArticleDOI
TL;DR: The proposed method for automatic ColorChecker detection is fast, robust to overlaps and invariant to affine projections and performs well in case of multiple ColorCheckers detection.

11 citations


Patent
19 Feb 2019
TL;DR: In this paper, a method for language-based muting during multiuser communications is described, where a language of speech being spoken by a user of a plurality of users communicating over a network is compared to one or more languages that each of the users has in common.
Abstract: Apparatuses, methods, program products, and systems are disclosed for language-based muting during multiuser communications. A method includes determining, by use of a processor, a language of speech being spoken by a user of a plurality of users communicating over a network, comparing the determined language to one or more languages that each of the plurality of users has in common, and muting the speech in response to the determined language not matching a language of the one or more languages that each of the plurality of users has in common.

8 citations


Patent
17 Dec 2019
TL;DR: In this article, a transceiver that communicates with a remote unit and a processor determines to handover the remote unit to a target base unit, and transmits the forwarded data to the target unit.
Abstract: Apparatuses, methods, and systems are disclosed for indicating data status to a target base unit. One apparatus includes a transceiver that communicates with a remote unit and a processor. The processor determines to handover the remote unit to a target base unit. The processor forwards data for the remote unit to the target base unit and transmits the forwarded data to the remote unit. The processor also sends a status message to the target base unit, the status message indicating that forwarded data was successfully transmitted to the remote unit.

8 citations


Patent
Salkintzis Apostolis1
24 May 2019
TL;DR: In this article, the attachment authentication protocol for attaching a remote unit to a mobile core network via a non-3GPP access network has been described, which includes a processor that receives an attachment authentication request from the core network and transforms attachment authentication requests into authentication request of the first authentication procedure.
Abstract: Apparatuses, methods, and systems are disclosed for attaching a remote unit to a mobile core network via a non-3GPP access network. One apparatus includes a processor that initiates a first authentication procedure with a remote unit over the access network and sends an attach request to the core network on behalf of the remote unit. The processor receives an attachment authentication request from the core network and transforms the attachment authentication request into authentication request of the first authentication procedure. The processor further uses an authentication response of the first authentication procedure to complete attachment to the core network. In certain embodiments, the apparatus also includes first and second network interfaces that communicate with the remote unit over the access network and with the core network, respectively.

7 citations


Patent
29 Oct 2019
TL;DR: In this paper, a transceiver communicates with a base station in a mobile communication network and determines a first spacing value for frequency locations within a frequency range and a second spatial value for frequencies within the frequency range.
Abstract: Apparatuses, methods, and systems are disclosed for determining a location of a frequency-domain resource block using frequency spacing values. One apparatus includes a transceiver that communicates with a base station in a mobile communication network a processor that determines a first spacing value for frequency locations within a frequency range and determines a second spacing value for frequency locations within the frequency range. The processor receives (via the transceiver) information of a first scalar and a second scalar and determines a location of a set of frequency-domain resource blocks using a location of a reference resource block. Here, the location of the reference resource block is based on the sum of a product of the first scalar and the first spacing value and a product of the second scalar and the second spacing value. The apparatus receives data from the base station on the set of frequency-domain resource blocks.

7 citations


Patent
02 May 2019
TL;DR: In this paper, an electronic device includes at least one biometric sensor, one additional sensor, and a user interface One or more processors are operable with a memory, carried by the electronic device and storing private data as encrypted private data.
Abstract: An electronic device includes at least one biometric sensor, at least one additional sensor, and a user interface One or more processors are operable with a memory, carried by the electronic device and storing private data as encrypted private data When a request to expose the private data is received, the one or more processors identify a requestor as a predetermined user by obtaining at least one biometric authentication factor and at least one second authentication factor The one or more processors confirm the at least one biometric authentication factor and the at least one second authentication factor each match a predefined criterion Where they do, the one or more processors expose the private data locally on the electronic device

6 citations


Patent
Wang Yunming1, Song Miao1
07 Mar 2019
TL;DR: In this paper, a mapping module is implemented to generate a visual mapping that displays a route from the mobile device to the tagged object based on the map data, and a 3D visual representation of the tagged objects is displayed based on a received 3D object model.
Abstract: In aspects of visual mapping of geo-located tagged objects, a mobile device includes a mapping module that receives map data of a geo-fenced area from a controller device of the geo-fenced area. The mobile device can scan for wireless-enabled devices within a geo-fenced area, and receive a designation input of a tagged object that corresponds to one of the wireless-enabled devices. The mapping module is implemented to generate a visual mapping that displays a route from the mobile device to the tagged object based on the map data. The mapping module can receive object metadata about the tagged object as the mobile device approaches the tagged object along the route of the visual mapping, and a 3D visual representation of the tagged object is displayed based on a received 3D object model of the tagged object.

6 citations


Patent
30 Jul 2019
TL;DR: In this paper, the gap period configuration message includes information that configures one or more gap periods within a transmission period, and a control indication message in the one-or-more gap periods.
Abstract: Apparatuses, methods, and systems are disclosed for gap period (524, 528, 532, 536) configuration. One apparatus (200) includes a receiver (212) that receives (602) a configuration message. The configuration message includes information that configures one or more gap periods within a transmission period. The apparatus (212) also includes a transmitter (210) that transmits (604) data in the transmission period. The receiver (212) receives (606) a control indication message in the one or more gap periods.

4 citations


Patent
19 Sep 2019
TL;DR: In this paper, an audio synthesizer can generate a voice-synthesized audio output stream as a function of one or more audible characteristics extracted from voice input received from an authorized user of the electronic device.
Abstract: An electronic device includes an audio synthesizer. The audio synthesizer can generate a voice-synthesized audio output stream as a function of one or more audible characteristics extracted from voice input received from an authorized user of the electronic device. The audio synthesizer can also apply an acoustic watermark to the voice-synthesized audio output stream, the acoustic watermark indicating that the voice-synthesized audio output stream is machine made.

Patent
Salkintzis Apostolis1
31 Oct 2019
TL;DR: In this article, an extensible authentication protocol (EAP) request with a first expanded type via the second access network is made, where the first message is the same type of message usable to establish a connection with the mobile communication network over the first access network.
Abstract: Apparatuses, methods, and systems are disclosed for authenticating with a mobile communication network. One apparatus (300) includes a processor (305), a first transceiver (325) that communicates with a mobile communication network via a first access network, and a second transceiver (330) that communicates with the mobile communication network via a second access network. The processor (305) sends (710) a request to start authentication via the second access network and receives (715) an extensible authentication protocol (“EAP”) request with a first expanded type via the second access network. The processor (305) sends (720) an EAP response via the second access network, the EAP response comprising the first expanded type, a first set of parameters, and a first message. Here, the first message is a same type of message usable to establish a connection with the mobile communication network over the first access network.

Proceedings ArticleDOI
25 May 2019
TL;DR: This paper aims to present the processes, tools and people responsible for running Dogfooding operations on a global scale and the lessons learned throughout the past 4 years and challenges that still lie ahead of us.
Abstract: Dogfooding refers to the idea of "eating your own dog food"[3]. In one of the largest players in the mobile industry, dogfooders use prototypes of unreleased products as their primary mobile device. This entails using on a daily basis both hardware and software that is still under development and constant changes. For the past 4 years, Dogfooding has been a fundamental piece of the product development process for a number of reasons. Firstly, it allows us to cover unpredicted test scenarios that traditional software quality assurance methodologies do not. Moreover, the usage of prototypes in more consumer-like environments provides valuable data from which we can assess key aspects of the product such as battery life and connectivity. Lastly, dogfooders serve as a user base for collecting feedback on more subjective topics such as design and usability also allowing to detect regional idiosyncrasies that regular test cases would not. Despite all of these benefits, running the operations of Dogfooding is far from trivial. We have a total of over 4,000 dogfooders spread across 4 different sites in United States, Brazil, India and China. The Dogfooding programs need to run in sync with the development of new products as well as over-the-air upgrades. This paper aims to present the processes, tools and people responsible for running Dogfooding operations on a global scale. We'll also cover the lessons learned throughout the past 4 years and challenges that still lie ahead of us.

Patent
23 May 2019
TL;DR: In this paper, an electronic device includes one or more sensors, a first authenticator and at least a second authenticator, where the first authenticator is operable to authenticate authentication input of a first type, while the second authenticates authentication input from a second type, which is different from the first type.
Abstract: An electronic device includes one or more sensors, a first authenticator, and at least a second authenticator. The first authenticator is operable to attempt to authenticate authentication input of a first type, while the second authenticator is operable to attempt to authenticate authentication input of a second type, wherein the second type is different from the first type. One or more processors launch or actuate the second authenticator where the first authenticator authenticates the authentication input of the first type and one or more sensors detect the authentication input of the second type.

Patent
17 Jan 2019
TL;DR: In this paper, a computing device displays a virtual control button at a first location, such as a location based upon a grip profile, at some point later, the computing device detects movement via a sensor included in the computer device.
Abstract: Various embodiments provide dynamic display locations of virtual control buttons based upon detected movement of a computing device. A computing device displays a virtual control button at a first location, such as a location based upon a grip profile. At some point later, the computing device detects movement via a sensor included in the computing device. Upon detecting the movement, the computing device visually moves the virtual control button to at least a second location based upon the detected movement.

Patent
Song Miao1, Wang Yunming1
29 Oct 2019
TL;DR: In this article, a mobile device includes a correlation module that receives an indication a user of the mobile device has positioned a hand proximate an item based on a pose of the user.
Abstract: In aspects of user pose and item correlation, a mobile device includes a correlation module that receives an indication a user of the mobile device has positioned a hand proximate an item based on a pose of the user. The mobile device includes wireless radio systems to scan for wireless-enabled devices corresponding to items tagged with the wireless-enabled devices. The correlation module of the mobile device is implemented to receive the indication that the hand of the user of the mobile device is positioned proximate the item, and initiate a scan from the mobile device for the wireless-enabled devices proximate the user based on the indication of the hand of the user positioned proximate the item. The correlation module receives identifying data of the item that is proximate the hand of the user responsive to the scan of the wireless-enabled devices, and can correlate the item with the user.

Patent
13 Mar 2019
TL;DR: In this paper, a wearable, stretchable article comprising stretchable material is selected from a group comprising: clothing, a hat, a headband, a wristband, socks, footwear, handwear, shorts, or an undergarment.
Abstract: An article of manufacture comprises a wearable, stretchable article comprising stretchable material. The wearable, stretchable article is selected from a group comprising: clothing, a hat, a headband, a wristband, socks, footwear, handwear, shorts, or an undergarment. At least one RFID tag is mounted on the wearable, stretchable article and includes a stretch-activated switch on the at least one RFID tag. The stretch-activated switch has a first mode and a second mode. The first mode is associated with a first RFID tag state and the second mode is associated with a second RFID tag state. The stretch-activated switch comprises a ground contact, an RFID enable contact and a contact to slidably engage the ground contact and the RFID enable contact to transition between the first RFID tag state and the second RFID tag state.

Patent
17 Jan 2019
TL;DR: In this article, a computing device receives audio input, and analyzes the audio input to identify an input command, which can sometimes include voice authentication associated with a user, and visually displays a virtual control button on a touchscreen display.
Abstract: Various embodiments provide activation of virtual control buttons through verbal commands. In some embodiments, a computing device receives audio input, and, upon receiving the audio input, analyzes the audio input to identify an input command. The analysis can sometimes include voice authentication associated with a user. Upon identifying the input command, the computing device visually displays a virtual control button on a touchscreen display. In some embodiments, the computing device displays the virtual control button at a location corresponding to a current grip in contact with the touchscreen display.

Patent
28 Nov 2019
TL;DR: In this article, the authors present a method for detecting when a display, having at least one hinge area that bends or folds, is placed in an angled position, and monitoring a time duration during which the display is in the angled position.
Abstract: A method, electronic device, and computer program product for countering a semi-permanent deformation at an area of a foldable display. The method includes detecting when a display-having at least one hinge area that bends or folds, is placed in an angled position, and in response to the display being placed in the angled position, monitoring a time duration during which the display is in the angled position. The method further includes, in response to the display being placed in a fully-opened position after being in the angled position, calculating a degree of semi-permanent deformation associated with the at least one area of the display, in part based on the time duration, and triggering an increase in temperature at the at least one area of the display to counter the degree of semi-permanent deformation.

Patent
Lei Haipeng1, Yan Zhi, Wu Lianhai
14 Feb 2019
TL;DR: In this article, a hybrid automatic repeat request acknowledgement (HARQ-ACK) feedback timing for semi-persistent scheduling (SPS) physical downlink shared channel (PDSCH) transmission was investigated.
Abstract: Apparatuses, methods, and systems are disclosed for determining hybrid automatic repeat request acknowledgement ("HARQ-ACK") feedback timing for semi-persistent scheduling ("SPS") physical downlink shared channel ("PDSCH") One apparatus (300) includes a receiver (335) that receives (805) a radio resource control ("RRC") signal from a base unit and a processor (305) that determines (810) a feedback timing for a SPS PDSCH transmission The processor (305) uses the RRC signal to determine the feedback timing The apparatus also includes a transmitter (330) that transmits (815) HARQ-ACK feedback to the base unit in a first slot defined by the feedback timing information Here, the HARQ-ACK feedback indicating whether the SPS PDSCH transmission was successfully received

Patent
Amit Kumar Agrawal1
04 Apr 2019
TL;DR: In this paper, a computing device collects information associated with a user that can be used to generate context information, and analyzes the context information using the identified characteristics, to identify context information relevant to the incoming communication.
Abstract: Various implementations provide context-based action recommendations based on an incoming communication. To provide the context-based action recommendation, a computing device collects information associated with a user that can be used to generate context information. Upon receiving an incoming communication, the computing device identifies various characteristics associated with the incoming communication. In turn, the computing device analyzes the context information, using the identified characteristics, to identify context information relevant to the incoming communication. Some implementations generate an action recommendation based on the identified context information, and notify the user of the action recommendation. In one or more implementations, when an audio control mode is enabled, the computing device the user of the action recommendation using an audible notification.

Patent
14 Nov 2019
TL;DR: In this article, a configuration that configures a set of SPDCCH candidates can be received and a configuration can be monitored using a TTI of a subframe, where a first subset of the set of candidates associated with a first set of aggregation levels in a first TTI is monitored.
Abstract: A configuration that configures a set of SPDCCH candidates can be received. A first subset of the set of SPDCCH candidates associated with a first set of aggregation levels in a first TTI of a subframe can be monitored. A second subset of the set of SPDCCH candidates associated with a second set of aggregation levels in a second TTI of the subframe can be monitored. The first subset of the set of SPDCCH candidates and the second subset of the SPDCCH candidates can be different at least in one SPDCCH candidate. The first subset of the set of SPDCCH candidates can be based on a first index associated with the first TTI within the subframe. The second subset of the set of SPDCCH candidates can be based on a second index associated with the second TTI within the subframe.

Patent
30 Apr 2019
TL;DR: In this article, a delay index based on the amount of repeated data received by the electronic device is calculated to determine whether the electronic devices are communicating with the network via a high data rate mode or a low rate mode.
Abstract: Systems and methods modify the behavior and operation of an electronic device and also enable a server to intercept and process incoming communications for the electronic device, based on whether the electronic device is communicating with a network via a high data rate mode or a low data rate mode. According to certain aspects, whether the electronic device is communicating with the network via a high data rate mode or a low data rate mode may be determined by calculating a delay index based on the amount of repeated data received by the electronic device. The electronic device may be able to maintain a more consistent connection with the network and improve the experience and satisfaction of users.

Patent
03 Sep 2019
TL;DR: In this article, an electronic device includes one or more sensors having at least an audio sensor and one or multiple processors, and the sensors detect multiple persons within an environment about the electronic device and identify at least one person as an authorized user.
Abstract: An electronic device includes one or more sensors having at least an audio sensor and one or more processors. The one or more sensors detect multiple persons within an environment about the electronic device and identify at least one person as an authorized user of the electronic device. The audio sensor receives audio input from the environment, and the one or more processors filter the audio input into authorized user generated audio input and other audio input, record audio signals representing the authorized user generated audio input, and preclude the recording of other audio signals representing to the other audio input.

Patent
12 Dec 2019
TL;DR: In this paper, a method in an electronic device includes identifying an authorized user of the electronic device being present within an environment of the device, and at least one other person also being present in the environment.
Abstract: A method in an electronic device includes identifying an authorized user of the electronic device being present within an environment of the electronic device. The method also includes identifying at least one other person also being present within the environment of the electronic device. The method then includes selecting, with one or more processors of the electronic device, content previously partially consumed by the authorized user and the at least one other person and presenting, with the one or more processors, the content on a user interface of the electronic device.

Patent
19 Feb 2019
TL;DR: In this article, a mobile device can receive wireless signal replies that include signal strength indicators from a wireless tag in response to wireless communications from the mobile device to the wireless tag, and a tracking module is also implemented to determine a direction toward the tag relative to the location of the mobile devices based on the signal strength indicator in the wireless signal reply from the wireless tags.
Abstract: In aspects of direction determination of a wireless tag, a mobile device can receive wireless signal replies that include signal strength indicators from a wireless tag in response to wireless communications from the mobile device to the wireless tag The mobile device can include a tracking module that is implemented to track movement of the mobile device based on motion sensor inputs, and identify a location of the mobile device based on the movement of the mobile device The tracking module is also implemented to determine a direction toward the wireless tag relative to the location of the mobile device based on the signal strength indicators in the wireless signal replies from the wireless tag

Patent
17 Oct 2019
TL;DR: In this paper, the authors determined the dynamic power sharing between LTE and NR for at least one LTE UL transmission occasion and NR UL scheduling information for an NR UL transmission event and a second NR UL UL event.
Abstract: LTE UL scheduling information for at least one LTE UL transmission occasion and NR UL scheduling information for an NR UL transmission occasion can be received. An LTE UL transmit power of an LTE UL transmission occasion of the at least one LTE UL transmission occasion and a first NR UL transmit power of the NR UL transmission occasion can be determined. If the LTE UL transmission occasion of the at least one LTE UL transmission occasion overlaps in time with the NR UL transmission occasion, a determination can be made as to whether dynamic power sharing between LTE and NR is applicable for the NR UL transmission occasion and a second NR UL transmit power can be determined. The second NR UL transmit power can be determined such that the LTE UL transmit power summed with the second NR UL transmit power is not higher than a threshold.

Patent
07 May 2019
TL;DR: In this paper, a method of operating a real-time locating system (RTLS) includes: receiving, by an RTLS tagged object, RTLS coordinates of the RTLS-tagged object within a RTLS perimeter; tracking inertial measurement unit (IMU) data by the RTL tagged object; determining, by the RLS-tags, RTL coordinate error in the RTL coordinates using the IMU data; and determining corrected RTL-coordinates for the corrected error using the error.
Abstract: A method of operating a real time locating system (RTLS) includes: receiving, by an RTLS tagged object, RTLS coordinates of the RTLS tagged object within an RTLS perimeter; tracking inertial measurement unit (IMU) data by the RTLS tagged object; determining, by the RTLS tagged object, RTLS coordinate error in the RTLS coordinates using the IMU data; and determining corrected RTLS coordinates for the RTLS tagged object using the error

Patent
Yang Ye1
20 Aug 2019
TL;DR: In this article, the substrate defines a first pixel portion and one or more second pixel portions of an organic light-emitting diode display, where the first pixel consists of transparent organic light emitting diode pixels, while other pixels formed in the second pixel portion include only reflective OLDD pixels.
Abstract: An organic light emitting diode display includes a substrate. The substrate defines a first pixel portion and one or more second pixel portions. Pixels formed in the first pixel portion include at least some transparent organic light emitting diode pixels, while other pixels formed in the one or more second pixel portions include only reflective organic light emitting diode pixels.

Patent
Mary Hor-Lao1, Ranjeet Gupta1
24 Jan 2019
TL;DR: In this article, the authors provide a user device that dynamically initiates a change to its connectivity configuration by modifying a connection type to a wireless networking device, based on its current connectivity configuration and a set of metrics associated with its current operating environment and/or current operating configuration.
Abstract: Various embodiments provide a user device that dynamically initiates a change to its connectivity configuration. Some embodiments of the user device determine its current connectivity configuration and, based upon its current connectivity configuration, obtains one or more metrics associated with its current operating environment and/or current operating configuration. In turn, the user devices analyzes the metrics to determine whether to alter its current connectivity configuration. Responsive to the analysis, some embodiments modify the current connectivity configuration by modifying a connection type to a wireless networking device.