Patent application number | Description | Published |
20080259869 | METHOD AND APPARATUS FOR HANDOFF BETWEEN ACCESS SYSTEMS - Systems and methods for switching among networks (e.g., heterogeneous) and inter-working between a source access system and a target access system, by implementing tunneling from the AT to the target access system via the source access system. An inter-system handoff control component can facilitate setting tunneling by the mobile unit to the target access and/or between the source access system and the target access system—wherein signaling/packeting associated with the target system can be transferred over the source system. | 10-23-2008 |
20090252118 | HANDOFF BETWEEN PACKET-SWITCHED NETWORK AND CIRCUIT-SWITCHED NETWORK - Techniques for supporting handoff of terminals between a packet-switched network and a circuit-switched network are described. In an aspect, handoff between packet-switched and circuit-switched networks may be facilitated by a designated network entity in the packet-switched network. The designated network entity may interface with both the packet-switched network and the circuit-switched network, perform circuit-switched call origination, and perform handoff procedure. In one design, a first terminal may communicate with the packet-switched network for a packet-switched call with a second terminal. The first terminal may initiate handoff to the circuit-switched network via the designated network entity. The first terminal may perform handoff from the packet-switched network to the circuit-switched network based on an inter-MSC handoff procedure. The first terminal may then communicate with the circuit-switched network for the circuit-switched call with the second terminal after the handoff. | 10-08-2009 |
20100309843 | Apparatus and Method for Providing Mobility to IMS Sessions in Mobile IP Networks - An apparatus and method for providing mobility to IMS sessions comprising connecting to an APN through a 3GPP access; determining if a non-3GPP access is available; determining if the APN is specific to an IMS application being used or desired to be used, or if an IP header of an IMS application flow matches a configured pattern; and performing one of: a) triggering an IMS Session Continuity flow through the non-3GPP access for the IMS application based on one of the following: if the APN is specific to the IMS application or if the IP header of the IMS application flow matches the configured pattern; or b) triggering an IP mobility flow through the non-3GPP access for the IMS application or a non-IMS application if the APN is not specific to the IMS application and if the IP header of the IMS application flow does not match the configured pattern. | 12-09-2010 |
20110140846 | APPARATUS AND METHOD FOR NETWORK-INITIATED ATTACHMENT AND REGISTRATION-LESS PAGING - An apparatus and method for registration-less paging comprising establishing a mobile device identity for a mobile device in a wireless network; determining a time instance for the identified mobile device to listen to pages; sending a page from the wireless network to the identified mobile device during the determined time instance. In one example, the apparatus and method is for a network-initiated attach procedure comprising receiving a request to attach a mobile device in a wireless network; generating a paging message based on the request to attach the mobile device; sending a paging indicator to a mobile device based on the paging message during a time instance based on an agreed rule; and accepting an attach procedure from the mobile device based on the paging indicator. | 06-16-2011 |
20110223886 | ACCESS POINT-BASED CONTROL OF ACCESS CONTROL LIST - Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point. | 09-15-2011 |
20110223902 | ACCESS CONTROL BASED ON RECEIPT OF DEFINED INFORMATION FROM ACCESS TERMINAL - Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point. | 09-15-2011 |
20110223912 | ACCESS CONTROL BASED ON RECEIPT OF MESSAGE FROM ACCESS TERMINAL - Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point. | 09-15-2011 |
20110256896 | Signaling Identification of Machine to Machine Devices and Services - Certain aspects of the present disclosure propose methods for identifying machine to machine (M2M) devices and services. Each device may indicate its M2M functionality either for each of the services performed by the device or for all of its services to a core network. The core network may report the M2M functionality of the device to other nodes in the network that may be involved with the M2M functionality of the device. | 10-20-2011 |
20120020291 | Packet Data Service With Circuit-Switched Call Notification - Systems and techniques are disclosed relating to wireless communications. The systems and techniques involve wireless communications wherein a packet data session may be established between a wireless communications device and a packet data serving node to support a network connection to a packet-switched network. The wireless communications device may be configured to receive a notification of an incoming call from a circuit-switched network even when the network connection is active. | 01-26-2012 |
20120026981 | MOBILE STATION MESSAGE HAVING A STATION CLASS MARK FIELD FOR INDICATING AN MEID CAPABLE MOBILE STATION - A mobile station for wireless communication includes a control processor configured to generate a message for transmission on a reverse signaling channel, the message including a Station Class Mark field having a plurality of bits, a portion of the Station Class Mark field indicating that the mobile station is uniquely identified by a Mobile Station Equipment Identifier. | 02-02-2012 |
20120233685 | METHOD FOR AUTHENTICATION OF A REMOTE STATION USING A SECURE ELEMENT - Disclosed is a method for authentication of a remote station by a management station using a secure element. In the method, the remote station receives an identity request from the secure element. The identity request includes a first challenge provided to the secure element by the management station. The remote station forwards an identity response to the secure element. The identity response includes a response to the first challenge that is signed by a key of the remote station, and the signed response to the first challenge is for use by the management station to authenticate the remote station. | 09-13-2012 |
20120269059 | METHODS AND APPARATUS FOR CONTEMPORANEOUSLY PROVIDING QUALITY OF SERVICE FUNCTIONALITY AND LOCAL IP ACCESS - A splitter component may be used by itself or with one or more ancillary devices to provide client devices local IP access (LIPA) using local area network (LAN) addresses, while contemporaneously providing quality of service (QoS) functionality to the access terminal for data communicated via a modem, contemporaneously with providing the LIPA. The splitter device may assign a higher priority to traffic of a type having QoS functionality. The QoS functionality may include any combination of a latency requirement, a signal quality requirement, or a signal strength requirement. Providing the one or more devices LIPA using one or more LAN addresses may include assigning each of the client devices an IP address and implementing a dynamic host configuration protocol (DHCP) relay on an associated router, or other LIPA functions. | 10-25-2012 |
20130132734 | Computing device integrity protection - A method of operating a computer system includes: obtaining, at the computer system, verification-input information associated with each of multiple hardware components of the computer system; cryptographically processing, at the computer system, the verification-input information to obtain a cryptographic result; and determining, at the computer system, whether to allow or inhibit, depending upon a comparison of the cryptographic result with a verification value, further operation of at least one of the hardware components. | 05-23-2013 |
20130142118 | SYSTEMS AND METHODS FOR MACHINE TO MACHINE DEVICE CONTROL AND TRIGGERING - Systems and methods for control and triggering of machine to machine (M2M) devices (e.g., smart meters). More specifically how to allow an M2M service provider (e.g., utility company) to use an operator's network to communicate with the M2M device connected with a UE/GW associated with the operator's network. The M2M service provider may receive identification of the UE/GW, but not for the M2M device. By transmitting an identifier for the M2M device along with an identifier for the UE/GW, the network operator may define establish and maintain a communication path specific to M2M devices. Similar techniques may be incorporated to allow the M2M service provider to locate and trigger the M2M device. | 06-06-2013 |
20140310402 | APPLICATION TRAFFIC PAIRING - Systems, devices, and methods for reporting information in real time about traffic generated by each application for a device are described. In one aspect, the network can configure a list of applications user equipment (UE) devices need to report traffic information for and then when one of these applications starts a communication, the UE may send traffic descriptor(s) describing the traffic generated by the application. In this way the network can accurately identify the traffic and take actions based on UE report and local policy or subscription. | 10-16-2014 |
20140376414 | VOIP EMERGENCY CALL SUPPORT - Techniques to support emergency voice-over-Internet Protocol (VoIP) calls are described. The techniques may be used for various 3GPP and 3GPP2 networks, various location architectures, and various types of User Equipment (UE). A UE communicates with a visited network to send a request to establish an emergency VoIP call. The UE interacts with a location server instructed by the visited network to obtain a first position estimate for the UE. The UE performs call setup via the visited network to establish the emergency VoIP call with a PSAP, which may be selected based on the first position estimate. The UE may thereafter perform positioning with the location server to obtain an updated position estimate for the UE, e.g., if requested by the PSAP. | 12-25-2014 |