Patent application number | Description | Published |
20120083240 | Enhancements to IP Multimedia Subsystems (IMS) Emergency Services Architecture - Embodiments contemplate methods and systems that may route an emergency call from an enterprise user and/or a user in a private number plan, or an emergency call that may be initiated by a service on behalf of the user. Architectural extensions to the IMS emergency services architecture may allow an emergency call to be handled in a home network or a local network in which the user may be visiting (e.g., roaming) such that appropriate public safety systems may be apprised of the emergency communication. | 04-05-2012 |
20120120845 | PEER DISCOVERY, TARGET SELECTION, AND FLOW REPLICATION FOR INTER USER EQUIPMENT TRANSFERS - Systems, methods, and apparatus are described herein for enabling the transfer of media flow to user equipment (UE) in a network using a mobile IP (MIP) protocol. The media flow may be transferred among UEs that are members of the same group of UEs. UEs, Home Agents (HAs), and/or Session Controllers (SCs) may be implemented in the network to maintain each group and/or transfer media flow between members of the group of UEs. The media flow may be replicated before being sent to the members of the group of UEs. UEs, HAs, SCs, REPLICATORs, and/or Authorization Entities (AEs) may be implemented in replicating media flows as described herein. | 05-17-2012 |
20120169825 | IP Multimedia Subsystem (IMS)-Based Pre-negotiation of Video Codec For Video Single Radio Video Call Continuity - Systems, methods, and instrumentalities are disclosed to provide pre-negotiation of a video codec. An IP multimedia subsystem (IMS) entity, such as a service centralization and continuity application server (SCC AS), may send a first session initiation protocol (SIP) message to a circuit switched domain entity via an IMS core network. The first SIP message may correspond to a video call in an on-going IP multimedia subsystem (IMS) session. The first SIP message may include one or more video codecs supported by the SCC AS and the UE associated with the video call. The SCC AS may receive a second SIP message from the circuit switched domain entity. The second SIP message may include the video codec, which may be one of the video codecs included in the first SIP message. The SCC AS may send the video codec to a user equipment (UE) associated with the video call. | 07-05-2012 |
20120244844 | PRIVACY FOR INTER-USER EQUIPMENT TRANSFER (IUT) SUBSCRIBERS AND FOR REMOTE PARTIES INVOLVED IN SESSIONS WITH IUT SUBSCRIBERS - Systems, methods, and instrumentalities are disclosed to provide privacy for inter-user equipment transfer (IUT) subscribers and remote parties involved in sessions with IUT subscribers. A first UE may establish a session with a remote party. The first UE may seek to perform an IUT to a second UE. The first UE may send a first request for the IUT to a service centralization and continuity application server (SCC AS). The SCC AS may receive the first request and perform an authorization. The SCC AS may determine that the requested IUT is allowed for the session. The SCC AS may send a second request to the remote party indicating the requested IUT. The remote party may evaluate the second request and may accept or reject the second request. | 09-27-2012 |
20120281621 | WIRELESS PEER-TO-PEER NETWORK TOPOLOGY - A method and apparatus for generating a topology for wireless peer-to-peer (P2P) networks. A network architecture comprises a traffic optimization service including a traffic optimization server and an adaptor to effect bi-directional translation of a request-response protocol of the traffic optimization service and a signaling protocol of a multimedia network. The traffic optimization server stores information related to wireless communication systems comprising user/location id information including cache proxies, media gateways, and network peers of multiple access networks and cost metric information including maximum bit rate, guaranteed bit rate, storage capacity, CPU capabilities, number of clients serving, battery capabilities, reliability of path, and supported video/audio codec. | 11-08-2012 |
20120324100 | METHODS, SYSTEMS AND APPARATUS FOR MANAGING AND/OR ENFORCING POLICIES FOR MANAGING INTERNET PROTOCOL ("IP") TRAFFIC AMONG MULTIPLE ACCESSES OF A NETWORK - Methods, systems and apparatus for managing and/or enforcing one or more policies for managing internet protocol (“IP”) traffic among multiple accesses of a network in accordance with a policy for managing bandwidth among the multiple accesses are disclosed. Among the methods, systems and apparatus is a method that may include obtaining performance metrics associated with the multiple accesses. The method may also include adapting one or more rules of one or more the policies for managing IP traffic among the plurality of accesses based, at least in part, on the performance metrics and the policy for managing bandwidth among the plurality of accesses. The method may further include managing IP traffic associated with at least one wireless transmit and/or receive unit (“WTRU”) among the plurality of accesses responsive to the adapted rules. | 12-20-2012 |
20130007186 | CONTROLLING CONTENT CACHING AND RETRIEVAL - A tracker application server (AS) instructs a content cache server (CCS) to join a peer-to-peer (P2P) swarm based on the status of the P2P swarm. The tracker AS determines whether to invite a CCS to join the P2P swarm be based on an underlying network condition change, a peer node joining or leaving the P2P swarm, change(s) in traffic condition, location, capability or workload of the peer node(s) in the swarm. The tracker AS sends an invitation message to the CCS, indicating the content of interest and a peer list identifying the peer nodes of the P2P swarm. Upon receiving the invitation message from the tracker AS, the CCS sends a response to the tracker AS. Upon receiving a response indicating the acceptance of the invitation, the tracker AS puts the CCS into the P2P swarm, and the CCS joins the swarm using a P2P protocol. | 01-03-2013 |
20130084829 | METHOD AND APPARATUS FOR ENABLING ACCESS TO APPLICATIONS INTEGRATED WITH A VISITED NETWORK - A method and apparatus for interworking between a mobile network operator and an application provider are disclosed. A network application function (NAF) may be co-located with an OpenID provider such that an application server may communicate with the NAF to access a home subscriber server (HSS) via a bootstrapping server function (BSF). The interfaces between BSF and HSS, and between BSF and NAF may be enhanced to carry information that is available through Sh interface between the application server and the HSS. When the WTRU is roaming in a visited network, the application server may communicate with the visited network for charging and policing for serving the service request from the WTRU. The application server may be co-located with an NAF, and may authenticate the WTRU using Generic Bootstrapping Architecture, and may communicate with a BSF in a home network via an eZn-proxy function to access an HSS. | 04-04-2013 |