Patent application number | Description | Published |
20080267186 | Method to Transfer Data Packets From First Portable Source Endpoint Belonging to Moving Network to Second Destination Endpoint Belonging to Second, Preferably Packet Oriented Network - Address translation is performed by a home domain of a first, e.g., mobile, network which may be moving relative to a second, e.g., packet oriented network, to convert the address of a first endpoint in the mobile network, associated with the home address of the first network to a second destination endpoint belonging to the second network. | 10-30-2008 |
20110310842 | METHOD AND DEVICE FOR DATA PROCESSING IN A MOBILE COMMUNICATION NETWORK - A method and a device for data processing in a mobile communication network are provided, wherein a control information is conveyed between a mobile terminal and an anchor node within said mobile communication network, and wherein based on said control information, a handover synchronization between a source network and a target access network is conducted utilizing an intermediate state of a mobility management. Furthermore, a communication system is suggested comprising said device. | 12-22-2011 |
20120008567 | Reachability maintenance of a moving network based on temporary name identifiers - A reachability service is provided to connect portable nodes of a moving network to at least one external, fixed network via at least one mobile router. Temporary name identifiers are allocated to the portable nodes and mapped to current reachable addresses of the portable nodes by at least one proxy name server. | 01-12-2012 |
20120250658 | METHOD, APPARATUS AND RELATED COMPUTER PROGRAM FOR DETECTING CHANGES TO A NETWORK CONNECTION - A method, a device, and a computer program product detect changes to the connection of a device, such as a mobile device to a network, and initiate at least one measure when changes are detected. Changes might be caused by malicious users or malicious mobile phone SW in order to perform Denial of Service (DoS) attacks to the network. Those changes could be, for example, frequent handover actions, frequent attach/detach actions or frequent Packet Data Protocol context activation, deactivation or modification actions initiated by a mobile device or a group of mobile devices. The changes to the connection are detected by checking if parameters related to the mobile device, or related to network elements, violate defined policy rules. The detection itself is done in a network element, such as a core network element. | 10-04-2012 |
20140379872 | CUSTOMER EXPERIENCE MANAGEMENT INTERACTION WITH CACHING - One embodiment includes a method and apparatus for allocating resources for the streaming of multimedia content in a network. The method includes analyzing multimedia content to determine media characteristics of the multimedia content, receiving a request to access the multimedia content from a user, and sending a request for resources for the multimedia content to a traffic management node. The request for resources includes the determined media characteristics of the multimedia content. | 12-25-2014 |