NEC EUROPE, LTD. Patent applications |
Patent application number | Title | Published |
20160134727 | A METHOD FOR OPERATING A SOFTWARE DEFINED NETWORK AND A SOFTWARE DEFINED NETWORK - A method for operating a software defined network having forwarding elements (S) and a software defined network controller (C) for controlling the forwarding elements (S) includes creating packet template information (PTI), including at least one of one or more packet templates (PT) or packet template handling instructions (FII), providing the packet template information (PTI) to one or more selected forwarding elements, the one or more selected forwarding elements being selected from the forwarding elements (5), triggering the one or more selected forwarding elements to generate an output packet (RESP) based on the packet template information (PTI), and sending, by the selected forwarding elements, the generated output packet (RESP). | 05-12-2016 |
20160132681 | METHOD FOR PERFORMING A SECURE BOOT OF A COMPUTING SYSTEM AND COMPUTING SYSTEM - A method for performing a secure boot of a mobile device computing system that includes a tamper-resistant hardware that provides secure storage of at least a cryptographic private key includes performing a measurement on each system and/or application specific file before said file is being loaded or launched by a kernel module or an application loader of the computing system, directing the measurement results to the tamper-resistant hardware, maintaining an extend-only global counter at the tamper-resistant hardware, increasing the extend-only global counter upon receiving a measurement result, executing a signing process in which the tamper-resistant hardware signs the extend-only global counter together with the measurement result using the cryptographic private key, and keeping a measurement list at the computing system that includes signatures generated by the tamper-resistant hardware. | 05-12-2016 |
20160087793 | METHOD AND SYSTEM FOR ENFORCING ACCESS CONTROL POLICIES ON DATA - A method for enforcing access control policies on data owned by a plurality of users includes evaluating the access control policies of users, applying a collusion resistant sharing scheme for generating key shares of an encryption key and delegating the key shares to one or more designated users based on a result of the evaluation. The data is securely dispersed by applying an encryption scheme on all parts of the data to be encrypted to produce encrypted data shares. The encryption scheme is provided such that for decryption of the encrypted data, the encryption key and at least a predetermined number of data shares are provided. Each data share is delegated to one or more designated users, and the data shares and the key shares are distributed to the respective designated users. | 03-24-2016 |
20160036730 | METHOD AND SYSTEM FOR PROVIDING AN INFORMATION CENTRIC NETWORK - A method and system provide an information centric network with a software defined network based on an information centric networking protocol on top of a physical network based on the internet protocol. There are forwarding elements in the physical network and a controller in the software defined network for controlling the forwarding elements. A publicly routable network address per domain for outside data object requests of named data objects is announced via the information centric network, and upon a first packet of an object request being received by an ingress element of the information centric network, the first packet is forwarded to the controller. The controller determines an object source for the requested named data object, encodes a message id into a header of the packet and establishes a forwarding path to forward the packet and further packets to the determined object source. | 02-04-2016 |
20150326668 | ADAPTATION OF RADIO RESOURCES ALLOCATION IN AN INTELLIGENT TRANSPORT SYSTEM ENABLED CELLULAR MOBILE NETWORK AND METHOD FOR OPERATING SUCH NETWORK - An Intelligent Transport System enabled cellular mobile network, comprising an infrastructure including a number of base stations ( | 11-12-2015 |
20150294251 | DISTRIBUTED TASK SCHEDULING USING MULTIPLE AGENT PARADIGMS - A computer-implemented method for assigning tasks to a plurality of agents includes determining, by a processor, a stance for an agent of the plurality of agents; and, when an unassigned task is available, assigning, by the processor, the unassigned task to an agent in the second stance. The stance is selected from the group consisting of a first stance and a second stance. Determining the stance is based on whether an unassigned task is available. The first stance relates to balancing tasks among the plurality of agents and the second stance relates to maximizing an amount of tasks assigned to a subset of the plurality of agents. | 10-15-2015 |
20150271681 | METHOD AND NETWORK SYSTEM FOR SUPPORTING RADIO ACCESS NETWORK SHARING - A method for supporting radio access network sharing is usable in connection with a hosting RAN (radio access network) provided by a hosting RAN provider. The hosting RAN includes one or more cells that are served by radio access network resources of the hosting RAN. At least one participating operator uses allocated shared radio access network resources of the hosting RAN provided by the hosting RAN provider under a sharing agreement. A controlling entity supervises shared radio access network resource utilization of the participating operator in the cells of the hosting RAN. | 09-24-2015 |
20150257030 | LINK-ADAPTATION IN PARTLY CENTRALIZED RADIO ACCESS NETWORKS - A method and system provides for adapting a computational load in a partly centralized radio access network. A computational load of computational elements of a central processor is measured or estimated, which central processor communicates with a plurality of radio access points and user equipment in the partly centralized radio access network. It is determined, by the central processor, whether the computational load should be reduced or increased. The computational load is adjusted by changing at least one of a modulation and coding scheme of the user equipment or an uplink power. | 09-10-2015 |
20150254468 | METHOD AND SYSTEM FOR EXECUTING APPLICATIONS IN AN UNTRUSTED ENVIRONMENT - A method for executing applications on an untrusted device includes selecting one or more applications as sensitive applications. One or more instruction sequences of the said one or more sensitive applications are modified by an external dongle. The one or more sensitive applications are executed on the untrusted device according to the modified instruction sequences. Whether correct execution of the instructions of the said modified instruction sequences has Occurred is checked by the external dongle. | 09-10-2015 |
20150245305 | METHOD AND SYSTEM FOR SUPPORTING THE DISCOVERY OF SYNCHRONIZED CLUSTERS OF MOBILE STATIONS IN A WIRELESS COMMUNICATION NETWORK - A method for supporting the discovery of synchronized clusters ( | 08-27-2015 |
20150160035 | METHOD AND COMPUTER SYSTEM FOR DETECTING CROWDS IN A LOCATION TRACKING SYSTEM - A method and computer system for detecting crowds in a location tracking system utilizes a grid and the pigeonhole principle to minimize an amount of hardware, memory and/or processing capability required in the location tracking system. In particular, an amount of storage required to determine whether a location update has resulted in a crowd grows only linearly, rather than quadratically, with the number of objects being tracked because a number of active grid points will be, at most, four times the number of objects being tracked. By determining whether an individual active grid point is within a crowd area, the computational time required for detecting a crowd within this crowd area is independent from the total number of objects being tracked. | 06-11-2015 |
20150156191 | METHOD AND SYSTEM FOR ACCESSING SERVICE/DATA OF A FIRST NETWORK FROM A SECOND NETWORK FOR SERVICE/DATA ACCESS VIA THE SECOND NETWORK - The present invention relates to a method for accessing service/data of a first network from a second network for service/data access via the second network, comprising the steps of a) Pairing of a user device with the first network, b) Attaching the user device to the second network, c) Authenticating the user device with the second network, d) Providing connectivity information for services/data of the first network to the second network, e) Providing available services/data information by the first network to the second network, f) Accessing a service and/or data of the first network by the second network. The present invention relates also to a system for accessing service/data of a first network from a second network for service/data access via the second network. | 06-04-2015 |
20150134961 | A METHOD FOR IDENTIFYING POTENTIALLY MALICIOUS NETWORK ELEMENTS WITHIN A NETWORK USING CROSS-DOMAIN COLLABORATIVE DATA SHARING - A method for identifying potentially malicious network elements within a network is useable in a network which includes a plurality of domains administrated by different operators P1, . . . , Pn. In the method, a functional entity receives qualifying information regarding at least one network element that has been transmitted by at least some of the operators P1, . . . , Pn. The at least one network element is qualified as being potentially malicious. The functional entity provides at least one of an alarm information and an alarm activity based on a predefined number of the operators P1, . . . , Pn having transmitted the qualifying information regarding a same potentially malicious network element to the functional entity. | 05-14-2015 |
20150134730 | METHOD FOR PERFORMING DNS RESOLUTION IN A NETWORK, CONTENT DISTRIBUTION SYSTEM AND CLIENT TERMINAL FOR DEPLOYMENT IN A CONTENT DISTRIBUTION SYSTEM - A method for performing DNS resolution in a network, in particular in a content distribution network ( | 05-14-2015 |
20150121410 | METHOD AND A NETWORK FOR DETERMINING USER BEHAVIOR DURING DELIVERY OF VIDEO CONTENT - For allowing an intelligent and/or resource efficient delivery of video content and/or determining of video content popularity and/or user behavior a method for determining user behavior during delivery of video content is claimed, wherein a user is requesting a delivery of a video content from a provider via a network. The method is characterized in that the provider exploits information transmitted between the user and the provider due to the execution of a trick play function by the user for scheduling the delivery and/or determining video content popularity and/or user behavior. Further, an according network is claimed, preferably for carrying out the above mentioned method. | 04-30-2015 |
20150121062 | METHOD AND SYSTEM FOR MODIFYING AN AUTHENTICATED AND/OR ENCRYPTED MESSAGE - A method and system for modifying an authenticated and/or encrypted message by a modifying party exchanged between a sending party and a receiving party based on a secure communication protocol, the method includes the steps of
| 04-30-2015 |
20150113539 | METHOD FOR EXECUTING PROCESSES ON A WORKER MACHINE OF A DISTRIBUTED COMPUTING SYSTEM AND A DISTRIBUTED COMPUTING SYSTEM - The invention relates to a method for executing processes, preferably media processes on a worker machine of a distributed computing system, with a plurality of worker machines, comprising the steps of a) Selecting one of the worker machines out of the plurality of worker machines for execution of a process to be executed in the distributed computing system and transferring said process to the selected worker machine, b) Executing the transferred process on the selected worker machine, and c) Removing the executed process from the selected worker machine after finishing of the execution of the process, wherein statistical information of resource usage of the process to be executed on one of the worker machines is collected and that the selection of the worker machine is based on a probability resource usage qualifier, wherein the probability resource usage qualifier is extracted from combined statistical information of the process to be executed and already executed and/or executing processes on the worker machine. The invention relates also to a system and a use. | 04-23-2015 |
20150101009 | METHOD FOR PROVIDING ACCESS OF AN USER END DEVICE TO A SERVICE PROVIDED BY AN APPLICATION FUNCTION WITHIN A NETWORK STRUCTURE AND A NETWORK STRUCTURE - For allowing a simple and reliable differentiation of UEs behind a GW from an AF side a method for providing access of an User End device (UE) to a service provided by an Application Function (AF) within a network structure is claimed, wherein the UE is authenticated by a Gateway (GW) to which the UE is attached and which provides access to the AF via a Broadband Access Network (BB Access Network). The method is characterized in that the GW informs a state database (SDB) on service flow requests to or from the authenticated UE towards the AF, that the GW additionally sends NAT (Network Address Translation) or NAPT (Network Address and Port Translation) binding information of a respective NAT or NAPT binding created by the GW regarding the authenticated UE and a respective service flow request to the SDB and that the SDB sends the NAT or NAPT binding information or an UE identifier to the AF, so that the AF—after having received the service flow request from the GW—can correlate the authenticated UE with the service flow request. Further an according network structure is claimed, preferably for carrying out the above mentioned method. | 04-09-2015 |
20150055517 | METHOD FOR RESOURCE MANAGEMENT IN A TDD CELLULAR COMMUNICATION NETWORK AND RESOURCE MANAGEMENT SYSTEM - A method for resource management in a cellular communication network, wherein said network includes at least one base station per cell for a plurality of cells that operates in TDD (Time Division Duplex) transmission mode, each base station having a respective coverage area is characterized in that said base stations are operated such that spatial zones exist—overlap areas—in which the coverage areas of at least two of said base stations overlap, wherein UEs within an overlap area utilize UL and/or DL resources from those of the respective base stations that best match their particular traffic demands in the UL and/or in the DL. Furthermore, a corresponding resource management system for use in a cellular communication network is disclosed. | 02-26-2015 |
20140344455 | METHOD AND SYSTEM TO MEASURE USER ENGAGEMENT WITH CONTENT THROUGH EVENT TRACKING ON THE CLIENT SIDE - A method of tracking and analyzing user engagement with content includes receiving content to be displayed on a client device over a network from a publisher, and receiving one or more processing functions on the client device over the network. The processing functions are configured to cause the client device to track and to analyze user events on the client device. The method further includes executing the one or more processing functions on the client device to track and to analyze user events on the client device, and sending results of analyzing user events over the network from the client device to an analytics server. A system for measuring user engagement with content, including an analytics server and a client device configured to track and analyze user events on the client device, and to send the results of analyzing user events to the analytics server is described. | 11-20-2014 |
20140334664 | METHOD AND SYSTEM FOR IDENTIFYING CONTENT - Disclosed is a method for identifying content, preferably media content for publishing including the steps of a) Providing a content element for a user, b) Marking the content element with a global mark, c) Marking the content element with a local mark, d) Presenting the marked content element, e) Detecting at least part of the presented content element, f) Extracting the global mark and the local mark from the detected part of the content element, g) Identifying the extracted local mark and the global mark, and h) Identifying the content element based on the global and local mark. The invention relates also to a corresponding system and a use of the method and the system. | 11-13-2014 |
20140328321 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 11-06-2014 |
20140307629 | PER-HOST LOCATOR TO ENABLE MOBILITY GATEWAY RELOCATION IN DISTRIBUTED MOBILITY MANAGEMENT - A method and system of relocating user equipment, such as a mobile device in a network from a first mobility anchor to a second mobility anchor, includes providing an identifier address to the user equipment when the latter is anchored to the first mobility anchor or gateway. When the user equipment is relocated to be anchored at the second mobility anchor or gateway, a per-host locator address is associated with the user equipment, the per-host locator address directing network packets to be routed to the second mobility anchor. A destination address of network packets addressed to the identifier address is translated to the per-host locator address, such that the network packets are routed to the second mobility anchor, and the destination address of network packets that are addressed to the per-host locator address are reverse translated to the identifier address, and the packets are forwarded to the user equipment. | 10-16-2014 |
20140233390 | METHOD AND SYSTEM FOR CONGESTION AVOIDANCE IN MOBILE COMMUNICATION NETWORKS - In a method for congestion avoidance in mobile communication networks, the mobile communication network includes a sender and a receiver, one located in a mobile network, the mobile network being connected to a network of the mobile communication network. Steps include: detecting congestion in a first communication plane of the mobile communication network between the sender and the receiver; b) providing a congestion notification further downstream in the direction of a data transmission path between the sender and the receiver; c) providing congestion notification information on the opposite data transmission path on a second communication plane of the mobile communication network; and d) initiating congestion avoidance. The congestion notification and congestion notification information are transmitted between mobile network entities. The data transmission path and the opposite data transmission path are on the same communication plane. | 08-21-2014 |
20140201184 | SEARCH ENGINE AND METHOD FOR PERFORMING A SEARCH FOR OBJECTS THAT CORRESPOND TO A SEARCH REQUEST - A search engine for finding objects that correspond to a search request, including an input module for receiving a keyword query from a user, and a search module being configured to map the keyword query to the identifiers of objects that semantically match the keyword or the plurality of keywords contained in the keyword query, and to generate a search result that contains a listing of matching object identifiers, is characterized in that the search module is further configured to generate the search result by considering network layer information about the user within the process of mapping the keyword query to identifiers of matching objects, wherein the network layer information include sophisticated information the search module receives from a dedicated entity. | 07-17-2014 |
20140194109 | METHOD AND SYSTEM FOR MEASURING NETWORK OPERATION RELATED PARAMETERS IN A MOBILE COMMUNICATION NETWORK - A method for measuring network operation related parameters in a mobile communication network with a core network and a radio-access network, preferably in form of a LTE- or UMTS-network, includes the steps of a) configuring an entity in the mobile communication network for measuring including network operation related parameters to be measured, b) selecting a measuring entity, c) measuring the network operation related parameters by the measuring entity, and d) analyzing the measured parameters wherein a filtering is performed prior to step d), wherein the filtering is performed on an entity in the radio access network of the mobile communication network and wherein the filtering reduces the amount of data of the measured network operation related parameters for step d). A system for measuring network operation related parameters is also described. | 07-10-2014 |
20140192646 | USER TRAFFIC ACCOUNTABILITY UNDER CONGESTION IN FLOW-BASED MULTI-LAYER SWITCHES - A method of policing network traffic based on congestion on a flow-based programmable switch, such as an OpenFlow switch is provided. The method polices congestion-causing flows in a network by detecting congestion at a flow-based programmable switch on the network. Once congestion has been detected, the method identifies one or more flows that are causing the congestion at the flow-based programmable switch, and penalizes the flows that were identified as causing congestion. A flow-based programmable switch including a data plane having input ports, output ports, and forwarding rules that map packets received on an input port to an output port based on a packet matching a rule in the forwarding rules is also described. | 07-10-2014 |
20140177830 | Method and system for providing a public key/secret key pair for encrypting and decrypting data - A method for providing a public key/secret key pair for encrypting and decrypting data, wherein the public key of the public key/secret key pair and a master secret key are generated based on predefined policy information, and wherein the secret key of the public key/secret key pair is generated based on the generated master secret key and predefined attribute information. A method for accessing a system in an untrusted environment and a system for providing a public key/secret key pair for encrypting and decrypting data as well as a use for access control are also described. | 06-26-2014 |
20140169332 | METHOD FOR SUPPORTING SELECTION OF PDN CONNECTIONS FOR A MOBILE TERMINAL AND MOBILE TERMINAL - A method for supporting selection of PDN connections for a mobile terminal, in particular in decentralized mobile operator networks, wherein the mobile terminal is connected to an access point, wherein the mobile terminal is in active mode having at least one ongoing IP session to a Packet Data Network (PDN) via a PDN gateway-first PDN gateway-, wherein monitoring whether a more suitable PDN gateway-second PDN gateway-than the first PDN gateway becomes available for the mobile terminal is performed, and wherein in case of detecting the second PDN gateway, any new IP session of the mobile terminal to the PDN is established by initiating a new PDN connection to the second PDN gateway, while an already ongoing session associated with the existing PDN connection to the first PDN gateway is kept. Furthermore, a mobile terminal with PDN connection selection support is disclosed. | 06-19-2014 |
20140162675 | METHOD AND SYSTEM FOR DATA COMMUNICATION IN HIERARCHICALLY STRUCTURED NETWORK - A method for data communication in a hierarchically structured network including at least two lower level entities on a lower level, at least one higher level entity on a higher level, wherein each higher level entity provides lowlink connections to each of the lower level entities and highlink connections to at least one further high level entity wherein a lower level entity the higher level entity connected to the low level entity and the high level entity connected to the higher level entity defines a connection branch, includes: determining communication capabilities of the lowlink and highlink connections in each branch; providing communication capability information according to the determined communication capabilities to the lower level entities; determining the connections in each branch having the lower one of the data communication capability; and adapting the data communication capabilities of the connections in each branch according to the determined lower data communication capability. | 06-12-2014 |
20140153454 | METHOD FOR RESOURCE MANAGEMENT IN A CELLULAR COMMUNICATION NETWORK AND RESOURCE MANAGEMENT SYSTEM - A method for resource management in a cellular communication network, wherein the network includes at least one base station per cell for a plurality of cells that operates in TDD (Time Division Duplex) transmission mode, wherein the base stations implement a respective UL/DL configuration mode in which frames are composed of a specific sequence of downlink DL, uplink UL and special S subframes, is characterized in that the base stations are operated such that neighboring base stations with adjacent and/or overlapping coverage areas employ different UL/DL configuration modes, wherein interference between neighboring base stations is taken account of by implementing power control on a subframe basis. Furthermore, a resource management system for use in a cellular communication network is described. | 06-05-2014 |
20140137132 | METHOD AND SYSTEM FOR MANAGING APPLICATIONS ON HOME USER EQUIPMENT - A system and method for managing an application on a home user equipment, preferably a set-top-box of a television, the method includes the steps of:
| 05-15-2014 |
20140126541 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 05-08-2014 |
20140126448 | ENERGY AWARENESS IN MOBILE COMMUNICATION USER EQUIPMENT AND NETWORKS, INCLUDING OPTIMIZATIONS BASED ON STATE COMPRESSION - A mobile communication system includes a core network having one or more elements that handle bearer processing and/or that store user equipment context information for at least one user equipment or device. Elements of the core network are configured to suspend some or all bearer processing and/or to compress portions of or the whole user equipment context information for the at least one user equipment or device. Elements of the core network may also be configured to transfer portions or all of the user equipment context information to other elements of the core network and/or to remove portions or all of the user equipment context information. Suspending some or all bearer processing and/or compressing portions of or the whole user equipment context information may be done for a user equipment or device in an energy saving state. Related methods and a user equipment device are also described. | 05-08-2014 |
20140047018 | METHOD FOR OPERATING A NETWORK AND A NETWORK - For allowing a reliable and high performance of a network, a method for operating a network is described, wherein the network includes a server and at least one client for communication with the server, an application computation or operation will be performed by the server and the result of the application computation or operation will be displayed at the client. The method is characterized in that a network element will be provided for use by the client, wherein the network element performs at least one application computation or operation on behalf of the server. Further, a corresponding network for carrying out the above mentioned method is also disclosed. | 02-13-2014 |
20140022996 | METHOD AND A SYSTEM FOR DISTRIBUTING OF USER EQUIPMENT CONTEXT IN AN EVOLVED PACKET SYSTEM - A method for distributing user equipment context in an evolved packet system, including a plurality of user equipment, at least one eNodeB, a first mobility management entity and a second mobility management entity and one serving gateway connected to the first and second mobility management entity, the plurality of user equipment being connected via one of the eNodeBs to the second mobility management entity and to the serving gateway, wherein the user equipment context for the plurality of user equipment is each stored at the second mobility management entity, includes:
| 01-23-2014 |
20140018092 | METHOD FOR OPERATING A BASE STATION AND BASE STATION - A method for operating a base station of a mobile wireless system, in particular of a mobile communications network, wherein the base station is configured to operate in different operation states, wherein the operation states at least include an active operational mode, in which the radio interface subsystem of the base station is fully activated, and a low-duty operational mode with reduced radio transmission activity, is characterized in that in the low-duty operational mode the base station implements a window mechanism including availability intervals during which radio transmissions are allowed and unavailability intervals in which no radio transmissions are allowed. Furthermore, a corresponding base station for deployment in a mobile wireless system is disclosed. | 01-16-2014 |
20140016476 | METHOD FOR OPERATING A FLOW-BASED SWITCHING SYSTEM AND SWITCHING SYSTEM - A method for operating a flow-based switching system in a network, including at least one network node designed to transport incoming network packets, in particular a switch ( | 01-16-2014 |
20140010080 | METHOD FOR OPERATING A WIRELESS NETWORK, A WIRELESS NETWORK AND A DEVICE - Method for operating a wireless network, wherein at least one MIMO (Multiple Input Multiple Output) group of different stations will be constructed by a grouping algorithm based on a grouping metric for providing a MIMO group of different stations addressable simultaneously in space by a base station using MIMO techniques and meeting a definable level of performance quality, the grouping metric being based on an SINR (Signal-to-Interference and Noise Ratio) experienced by each station within the MIMO group. The method includes: computing an SNR (Signal-to-Noise Ratio) that a new station would experience without any interference when added to an existing MIMO group; computing an SINR estimate by correcting the SNR with the sum of spatial correlations between the new and each of the stations already present in the existing MIMO group; and using the SINR estimate for deciding whether the new station can be added to the existing MIMO group. | 01-09-2014 |
20130235778 | METHOD FOR SWITCHING A BASE STATION FROM AN INACTIVE OPERATIONAL MODE TO AN ACTIVE OPERATIONAL MODE IN A HIERARCHICALLY STRUCTURED MOBILE - A method and system for switching a base station from an inactive operational mode to a more active operational mode in a hierarchically structured mobile communication network preferably a WiMAX or LTE network, with at least one small cell base station and at least one macro cell base station in a radio access network includes:
| 09-12-2013 |
20130227141 | METHOD FOR ACCESSING CONTENT IN NETWORKS AND A CORRESPONDING SYSTEM - A method for accessing content in networks, preferably in wide area networks, includes: determining a resource for content by a resource identifier; sending a DNS-query for resolving an IP-address for a host identifier specified as a part of the resource identifier by a client; determining a preferred hosting server hosting the content according to the resource identifier; sending a DNS-response including the IP-address of the determined hosting server to the client; accessing the content from the determined hosting server by the client by providing at least one hosting server identifier or one IP-address corresponding to the resource identifier to a sorting server; sorting the at least one hosting server identifier or IP-address by the sorting server according to client specific information or according to network guiding information provided by the client, determining a preferred hosting server according to the sorted at least one hosting server identifier or IP-address. | 08-29-2013 |
20130225130 | METHOD FOR OPERATING A NETWORK AND A NETWORK - Method for operating a network or allowing a simplified use of an M2M (Machine to Machine) node or M2M nodes for providing Machine-Type Communication (MTC), wherein at least one M2M node providing and/or using an M2M service is assigned to a cellular network and will be authorized for communication therewith for providing MTC. At least one M2M node will be associated with at least one master terminal that owns a unique master terminal ID (Identifier), which uniquely identifies the master terminal within the cellular network, and a state of authentication of the M2M node or M2M nodes will be initialized, based on authentication data of the master terminal, so that the M2M node or nodes can be addressed using the master terminal ID and can directly communicate with the cellular network on the basis of the initialized state of authentication. A network for carrying out the method is also described. | 08-29-2013 |
20130223219 | METHOD FOR SUPPORTING CONGESTION MANAGEMENT IN A CONGESTION EXPOSURE-ENABLED NETWORK - A method for supporting congestion management in a congestion exposure-enabled network, wherein sending hosts and receiving hosts communicate with each other by sending flows of packets over network paths via intermediate routers, which, upon detecting congestion, mark packets of the flows as congestion packets by including congestion information, wherein congestion is indicated to the sending hosts via a congestion feedback mechanism, and wherein the sending hosts, upon receiving congestion indications, declare a subset of the packets they send as congestion response packets by including congestion information, depending on whether the amount of congestion response packets is balanced with the indicated congestion level or not is characterized in that aggregated congestion is determined on the basis of congestion information included in packets that are sent over the network paths between the sending hosts and the receiving hosts. Furthermore, a corresponding congestion exposure-enabled network system and a corresponding intermediate router are disclosed. | 08-29-2013 |
20130219474 | METHOD AND SYSTEM FOR PROVIDING SERVICE ACCESS TO A USER - A method and system for providing service access to a user, includes the steps of:
| 08-22-2013 |
20130217389 | METHOD AND SYSTEM FOR CONNECTING A USER EQUIPMENT TO A NETWORK DEVICE VIA A MOBILE COMMUNICATION NETWORK - A method for connecting a user equipment to a network device via a mobile communication network wherein the equipment includes at least a deregistered and a registered state, the deregistered state including at least a normal and an attempting-to-attach substate, for defining a connectivity state of the equipment to the mobile communication network, the equipment being connectable to the mobile communication network and the network device being connected to the mobile communication network includes:
| 08-22-2013 |
20130215864 | METHOD AND BASE STATION FOR SUPPORTING A CONNECTION BETWEEN A COMMUNICATION DEVICE AND A DESTINATION DEVICE IN A TARGET NETWORK - A method for supporting a connection between a communication device and a destination device in a target network over intermediate network nodes, in particular in the context of Internet Protocol based communication, wherein data between the communication device and the destination device is transmitted via a tunnel established between the communication device or a base station connected to the communication device, as a first tunnel endpoint and a gateway in the target network as a second tunnel endpoint. One or more dummy packets are sent via the tunnel from the first tunnel endpoint towards the second tunnel endpoint, information is encoded in the packet headers of the one or more dummy packets, and at least one of the intermediate network nodes, upon receiving the one or more dummy packets, performs the steps of detecting and/or decoding the encoded information and performing a predefined action dependent on the encoded information. | 08-22-2013 |
20130214615 | METHOD FOR COLABORATIVE ENERGY TRANSFER IN A WIRELESS NETWORK AND CORRESPONDING WIRELESS NETWORK - For allowing a prolongation of the operation time of individual network elements and/or of the whole network in a simple way a method for operating a wireless network is claimed, wherein the network comprises a number of network elements being configured for wireless communication with each other and for wireless energy transfer from one network element to another network element and wherein energy will be transferred wirelessly from one network element to another network element according to negotiations between the network elements for optimizing a network element's individual and/or network's overall energy budget and/or lifetime. Further, an according network is claimed, preferably for carrying out the above mentioned method. | 08-22-2013 |
20130198816 | METHOD AND SYSTEM FOR SECURE PAIRING OF WIRELESS DEVICES - A method and system for securely pairing wireless devices, includes deploying a master device in a network environment, and a new device to be securely integrated into the network environment executes an unauthenticated key exchange with the master device. The master device has a security association with a camera system that monitors an operational area where the new device is placed, based on the exchanged key, the master device and the new device each compute a key confirmation code. The camera system learns the key confirmation code from the master device. The camera system watches for devices transmitting the key confirmation code and provides images of such identified devices to the master device, based on an analysis of an image of a device identified by the camera system, an authorization decision is made with respect to accepting the identified device as new device of the network environment. | 08-01-2013 |
20130171944 | METHOD OF MANAGING TRACE SESSIONS IN A NETWORK AND TRACE SESSION MANAGEMENT SYSTEM - A method of managing trace sessions in a network, wherein each trace session is assigned a Trace ID and a specific trace collection entity TCE ( | 07-04-2013 |
20130136113 | COMMUNICATION NETWORK AND METHOD FOR OPERATING A COMMUNICATION NETWORK - A communication network, wherein the network includes a plurality of communication elements that function as transmitters and/or receivers, in particular base stations and operating nodes being associated to at least one of the base stations, wherein the communication between the transmitters and the receivers is performed by way of generating and transmitting signals based on a multi-carrier modulation with a number of N subcarriers around a carrier frequency f | 05-30-2013 |
20130136047 | SLEEPING EPC FOR ENERGY SAVING IN LTE - In order to save energy in EPS network, some of the MMEs and/or S-GWs are allowed to sleep (power down), when network's traffic load is decreased. When the traffic load becomes heavier, the network can power up some of the formerly sleeping MMEs and/or S-GWs. | 05-30-2013 |
20130130670 | METHOD FOR OPERATING AN ENERGY MANAGEMENT SYSTEM IN A WIRELESS RADIO NETWORK - For allowing a particularly economic operation of a network with a high degree of energy conservation a method for operating a wireless radio network, especially a radio access network, is claimed, wherein the wireless radio network includes a core network, a number of base stations and at least one mobile host for wireless communication via at least one base station, wherein the method is characterized in that an association of powered on and powered off base stations within definable base station partitions will be arranged in a coordinated manner, thereby maintaining a minimum number or the smallest possible number of powered on base stations being necessary for accommodating a current traffic demand. Further, a network is claimed, preferably for carrying out the above mentioned method. | 05-23-2013 |
20130124850 | SMART GRID AND METHOD FOR OPERATING A SMART GRID - Method for operating a smart grid including a plurality of smart meters configured to monitor at least one physical measured quantity and to provide measurement results of the at least one physical measured quantity to a central entity, includes the following steps:
| 05-16-2013 |
20130124754 | FRAMEWORK OF AN EFFICIENT CONGESTION EXPOSURE AUDIT FUNCTION - A method of operating a packet dropper in a congestion exposure-enabled network, wherein sending hosts and receiving hosts communicate with each other by sending flows of packets over network paths via intermediate routers, which, upon detecting congestion, mark packets of the flows as congestion packets, wherein congestion is indicated to the sending hosts by way of a congestion feedback mechanism, and wherein the sending hosts, upon receiving congestion indications, declare a subset of the packets they send as congestion response packets, thereby producing either conformant flows or non-conformant flows, depending on whether the amount of congestion response packets is balanced with the indicated congestion level or not, is characterized in that the packet dropper carries out in succession a series of traffic analyzing steps for identifying the non-conformant flows. Furthermore, a corresponding packet dropper for use in a congestion exposure-enabled network is described. | 05-16-2013 |
20130122911 | APPARATUS AND METHOD FOR LOCAL MOBILITY MANAGEMENT IN A CLUSTERED FEMTOCELL NETWORK - A clustered femtocell network including a plurality of femtocell access points that are connected via a logical interface to a mobile network in order to provide user equipments with radio access to the mobile network, wherein the mobile network includes a Mobility Management Function—MMF—, is characterized in that a logical function—Proxy Mobility Management Function P-MMF—is provided that localizes mobility management of the user equipments in the clustered femtocell network, wherein the P-MMF intercepts and interprets mobility-related signaling between the MMF and the femtocell access points in such a way that it emulates towards the femtocell access points the behavior of the mobile network's MMF and towards the mobile network's MMF the behavior of the femtocell access points. Furthermore, a method for operating a clustered femtocell network is disclosed. | 05-16-2013 |
20130121228 | METHOD FOR MANAGING ENERGY CONSUMPTION IN A WIRELESS NETWORK AND CORRESPONDING WIRELESS NETWORK SYSTEM - A method for managing energy consumption in a wireless network, in particular a mobile radio network, wherein the wireless network includes radio access points that provide uplink and downlink connections to the wireless network for mobile stations, and wherein the uplink and the downlink connection of at least one mobile station being connected to the wireless network are physically served by different radio access points is characterized in that, at least temporarily, one or more of the radio access points function as unidirectional radio access points that provide either uplink connections or downlink connections—radio resource access—for the at least one mobile station. Furthermore, a corresponding wireless network system is disclosed. | 05-16-2013 |
20130083650 | METHOD FOR HANDLING FAILURE OF A MME IN A LTE/EPC NETWORK - Method for handling failure of a MME (Mobility Management Entity) in a Long Term Evolution/Evolved Packet Core network or an Evolved Packet System, wherein multiple UEs (User Equipment) are attached to a first MME, which stores first context information representing the UEs attached to the first MME, the UEs are connected to one of multiple eNBs (evolved NodeB), the eNB may communicate with the first MME and with at least one neighboring MME, and the UEs may communicate with the first MME and with the at least one neighboring MME via the eNB, includes: detecting failure of the first MME, gathering information related to UEs attached to the first MME, restoring parts of the first context information at one or several of the neighboring MME using the gathered information, and re-establishing network internal logical connections with the one or several of the neighboring MME using the restored first context information. | 04-04-2013 |
20130077494 | METHOD AND APPARATUS FOR PERFORMING RELAY NODE CONFIGURATION AND RE-CONFIGURATION IN RELAY ENHANCED NETWORKS - A method for performing relay node configuration and re-configuration in relay enhanced networks, in particular in a 3GPP LTE-Advanced architecture, wherein the network includes a plurality of eNBs that function as donor eNBs providing wireless access to associated relay nodes, wherein the relay nodes function as eNBs from a UE perspective, is characterized in that the network is divided into clusters such that each cluster includes exactly one donor eNB and that each relay node is associated to at least one donor eNB any point in time, wherein the load of donor eNBs and the handover rates among relay nodes as well as between donor eNBs and relay nodes are monitored and/or estimated, wherein the association of relay nodes to donor eNBs is performed on the basis of the results of the monitoring and/or estimation. Furthermore, an apparatus for performing centralized relay node configuration in relay enhanced networks is disclosed. | 03-28-2013 |
20130016677 | METHOD FOR OPERATING A NETWORK AND A NETWORKAANM Kunz; AndreasAACI HeddesheimAACO DEAAGP Kunz; Andreas Heddesheim DEAANM Kolbe; Hans-JoergAACI DarmstadtAACO DEAAGP Kolbe; Hans-Joerg Darmstadt DEAANM Punz; GottfriedAACI DossenheimAACO DEAAGP Punz; Gottfried Dossenheim DE - For allowing a reliable communication between the wireless part and the core network part via the fixed line network a method for operating a network, especially for policy control within the network, is provided, wherein the network includes a mobile network and a fixed line network, wherein the mobile network includes a wireless part and a core network part and wherein the mobile network and the fixed line network cooperate for providing communication between the wireless part and the core network part via the fixed line network. The method is characterized in that information regarding the wireless part will be provided via the mobile network to the fixed line network for controlling the communication within the fixed line network. Further, a corresponding network, preferably for carrying out the above mentioned method is disclosed. | 01-17-2013 |
20130016610 | METHOD FOR OPERATING A WIRELESS NETWORK AND A WIRELESS NETWORKAANM Kutscher; DirkAACI HeidelbergAACO DEAAGP Kutscher; Dirk Heidelberg DEAANM Mir; Faisal-GhiasAACI HeidelbergAACO DEAAGP Mir; Faisal-Ghias Heidelberg DEAANM Lundqvist; HenrikAACI MunchenAACO DEAAGP Lundqvist; Henrik Munchen DE - For allowing a best possible usage of network resources even under congestion conditions a method for operating a wireless network, especially an IP (Internet Protocol) network, is described, wherein a queue management function based on an average queue length in a network element is used. The method is characterized in that a result of a weighting function will be combined or multiplied with the average queue length for determining a combined congestion contribution for use within the queue management function, wherein the weighting function takes into account per-user information on a wireless channel condition. Further, a corresponding wireless network, preferably for carrying out the above mentioned method, is also described. | 01-17-2013 |
20130003693 | METHOD FOR OPERATING A CELLULAR RADIO SYSTEM AND A CELLULAR RADIO SYSTEM - For allowing a very high performance level without adding significant complexity to known methods a method for operating a cellular radio system within which at least two different Fractional Frequency Reuse (FFR) zones are defined in a downlink frame, the method including the following steps: providing a metric for assigning a respective preference criterion to each of at least some flows to be served within the radio system, wherein the metric is related to the relative resource quality in the zones for the at least some flows and to the relative zone size; assigning the respective preference criterion to each of the at least some flows; and assigning the at least some flows to the zones according to the respective preference criterion. Further, a corresponding cellular radio system, preferably for carrying out the above mentioned method, is described. | 01-03-2013 |
20120324084 | METHOD FOR OPERATING A NETWORK AND A NETWORK - For allowing a very effective traffic localization within ALTO (Application-Layer Traffic Optimization) a method for operating a network, especially an IP network, is described, wherein an ALTO process is performed with regard to at least one application or resource consumer. The method is characterized in that traffic information with respect to the at least one application or resource consumer will be provided and used within the ALTO process. Further, an according network is claimed, preferably for carrying out the above mentioned method. | 12-20-2012 |
20120322437 | METHOD AND FEMTOCELL BASE STATION FOR SUPPORTING WIRELESS CONNECTIVITY OF A MOBILE STATION TO A CELLULAR NETWORK - A method for supporting wireless connectivity of a mobile station to a cellular network, wherein the mobile station is located within the coverage area of a femtocell base station of which it is a non-CSG mobile station, and wherein the mobile station experiences interference which it indicates to the femtocell base station, is characterized in that the femtocell base station, upon receiving the experienced interference indication from the non-CSG mobile station, triggers the non-CSG mobile station to report interference related information, wherein, based on the interference related information, the femtocell base station performs a first check whether it is originator of the interference experienced by the non-CSG mobile station. Furthermore, a corresponding femtocell base station for supporting wireless connectivity of a mobile station to a cellular network is disclosed. | 12-20-2012 |
20120314688 | METHOD FOR ROUTING TRAFFIC WITHIN A NETWORK AND A NETWORK - A method for routing traffic within a network for allowing an efficient offloading of LIPA/SIPTO traffic from the core network even upon handoff of a UE to a new cell, wherein the network includes a core network and a LIPA/SIPTO (Local IP Access/Selected IP Traffic Offload) enabled network, wherein traffic between a UE (User Equipment) and the LIPA/SIPTO enabled network—a so called LIPA/SIPTO traffic—is broken out at a local breakout point and wherein a mobility support for ongoing broken out LIPA/SIPTO traffic will be provided by an MMF (Mobility Management Function) for realizing a continuation of the LIPA/SIPTO traffic upon a handoff of the UE from one cell to another cell. The continuation of the LIPA/SIPTO traffic will be performed by a forwarding mechanism providing direct LIPA/SIPTO traffic between local breakout points of different cells. A network for carrying out the method is also described. | 12-13-2012 |
20120307799 | METHOD AND MOBILE TERMINAL DEVICE FOR SUPPORTING MULTIPLE SIMULTANEOUS PDN CONNECTIONS TO THE SAME APN - A method for supporting selection of PDN connections for a mobile terminal, wherein the mobile terminal is connected to an access point, and wherein the mobile terminal is in active mode having at least one ongoing session to an APN via a PDN gateway—first PDN gateway—, includes the steps of monitoring whether a more suitable PDN gateway—second PDN gateway—than the first PDN gateway becomes available for the mobile terminal, and, if available, establishing any new sessions of the mobile terminal to the APN by establishing a new PDN connection to the second PDN gateway, while keeping already ongoing sessions associated with the existing PDN connection to the first PDN gateway. Furthermore, a mobile terminal with PDN connection selection support is disclosed. | 12-06-2012 |
20120303137 | METHOD AND SYSTEM FOR CONTROLLING DEVICES AND/OR APPLIANCES BEING INSTALLED AND/OR IMPLEMENTED IN A USER NETWORK - A method for controlling devices and/or appliances being installed and/or implemented in a user network, includes the steps of providing a management application, and associating one or more UEs with the management application, providing location information of the associated UEs to the management application, and, based on the location information and configured policy rules, performing control actions on the devices and/or appliances. Furthermore, a corresponding system is described. | 11-29-2012 |
20120294150 | METHOD FOR OPERATING A WIRELESS NETWORK AND A WIRELESS NETWORK - In order to allow an efficient use of data or frame aggregation techniques with real-time communications a method for operating a wireless network, especially a Wi-Fi technology based network, is described, wherein the network includes at least one wireless device for transmission of data and wherein the device may use a data or frame aggregation technique to provide an adjustable amount of aggregation. The method is characterized in that the amount of aggregation provided by the aggregation technique will be adjusted depending on a level of congestion in the network. Further, an according wireless network is described, preferably for carrying out the above mentioned method. | 11-22-2012 |
20120281577 | METHOD AND SYSTEM FOR SERVICE MANAGEMENT FOR TERMINALS WITH BROADBAND CONNECTIONS - A method for service management for terminals with broadband connections, wherein the terminal ( | 11-08-2012 |
20120271940 | METHOD AND SYSTEM FOR PROBABILISTIC PROCESSING OF DATA - A method for probabilistic processing of data, wherein the data is provided in form of a data set S composed of multidimensional n-tuples of the form (x | 10-25-2012 |
20120266224 | METHOD AND SYSTEM FOR USER AUTHENTICATION - A method for user authentication for accessing from a client to a server over a packet based network using an one-time password, wherein the client includes a first secret, and the server includes a database for storing a second secret and a chosen username associated with the second secret, wherein the method includes providing the second secret associated with the first secret by the client to the server and storing the second secret and the chosen username in the database; transmitting a challenge from the server to the client; computing the one-time password by the client using the second secret and the random data decoded from the challenge; submitting the one-time password and the chosen username on the client to access the server; validating the one time password received from the client with the one-time password. | 10-18-2012 |
20120265992 | METHOD FOR PROCESSING A SOAP MESSAGE WITHIN A NETWORK AND A NETWORK - For allowing a one-pass streaming processing of XML (Extended Markup Language) based SOAP (Simple Object Access Protocol) messages with signed and/or encrypted MTOM attachments in a simple way, a method for processing a SOAP message within a network is provided. The SOAP message includes a fragment with binary content that will be moved into an MTOM (Message Transmission Optimization Mechanism) attachment of the SOAP message with a remaining reference to the binary content within the SOAP message and wherein the attachment will be signed and/or encrypted by a signing and encryption process, respectively. During signing process in addition to the hash of the signed fragment itself the same fragment excluding the binary content will be hashed and/or during encryption process in addition to the encryption of the fragment itself the fragment including only the reference to the binary content instead of the binary content will be encrypted. | 10-18-2012 |
20120260092 | METHOD FOR SUPPORTING A REPUTATION MECHANISM IN A NETWORK AND NETWORK - Method for supporting a reputation mechanism in a network including one or more domains with one or more users being connected to the domains, one or more Identity Providers that manage identity information, and at least one entity that functions as Web Service Consumer for the users. When a user requests a Web Service Consumer of one of the domains for a web service provided by a Web Service Provider, the requested Web Service Consumer requests its known Identity Providers regarding a recommendation of the Web Service Provider. The Identity Providers function as recommendation aggregators by collecting reputation assessments of the Web Service Provider from entities registered on the Identity Providers who return an aggregated recommendation to the requested Web Service Consumer that determines a trust assessment about the Web Service Provider. A privacy homomorphism is employed for providing an encrypted exchange of recommendation related information. | 10-11-2012 |
20120257505 | METHOD FOR RESOURCE MANAGEMENT WITHIN A WIRELESS NETWORK AND A WIRELESS NETWORK - For allowing a very effective resource management and network utilization a method for resource management within a wireless network, especially EPS (Evolved Packet Core) of LTE (Long Term Evolution) network, is described, wherein a congestion control of data-traffic is performed. The method is characterized in that for congestion control a Re-ECN (Explicit Congestion Notification) function will be used wherein the Re-ECN function includes a policing function and a dropping function. Further, a corresponding wireless network is described, preferably for carrying out the above mentioned method | 10-11-2012 |
20120243432 | METHOD FOR OPERATING A MOBILE NETWORK FOR CHARGING TRAFFIC AND CORRESPONDING MOBILE NETWORK - A method for operating a mobile network, especially for charging traffic within the mobile network, wherein monitoring of chargeable events regarding traffic from and/or to a mobile node will be performed by a Charging Function for collecting charging data. The method is characterized in that a Charging Function's sub-function for monitoring of chargeable events on a data flow level or IP (Internet Protocol) flow level will be additionally located—as an additional sub-function D-CEMF (Delegated Chargeable Event Monitoring Function)—on at least one further network element, which is different from the Charging Function and which allows to traverse breakout and/or localized traffic of the mobile node, so that the Charging Function and the further network element each are including such a sub-function, and that the additional sub-function D-CEMF will report information regarding monitored chargeable events to the Charging Function. A mobile network for carrying out the method is described. | 09-27-2012 |
20120239819 | A METHOD FOR OPERATING A NETWORK AND A NETWORK - For allowing a high degree of resource consumption within a network a method for operating a network is claimed, wherein at least one end user device is connected to an access network, wherein the method is characterized in that the at least one end user device or an application on the end user device queries at least one network element of the access network and/or at least one network element attached to the access network about low layer parameters information for optimizing connection and/or protocol parameters after having received the queried low layer parameters information. Further, a network is claimed, preferably for carrying out the above mentioned method. | 09-20-2012 |
20120215850 | METHOD AND SYSTEM FOR SUPPORTING THE SELECTION OF COMMUNICATION PEERS IN AN OVERLAY NETWORK - A method for supporting the selection of communication peers in an overlay network, wherein a multitude of communication peers participate in the overlay network by providing certain pieces of information, and wherein at least one peer-to-peer server—tracker—is provided that maintains a database of the participating communication peers and the information possessed by them, wherein the tracker, upon receiving a query regarding a specific piece of information from a communication peer—requesting client—, answers the query by providing the requesting client a list that includes a subset of all communication peers possessing the requested piece of information, includes providing a network entity located such that it receives messages directed from the requesting client to the tracker, wherein the network entity stamps topological location information of the requesting client into any of the messages directed from the requesting client to the tracker. Furthermore, a corresponding system is disclosed. | 08-23-2012 |
20120213199 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 08-23-2012 |
20120207046 | METHOD FOR MONITORING A NETWORK AND NETWORK INCLUDING A MONITORING FUNCTIONALITY - A method for monitoring a network, wherein the network has a connected graph topology, in particular a tree structure, including a plurality of monitoring nodes that collect network measurement data, a plurality of mediator nodes each performing at least the task of aggregating network measurement data received from different monitoring nodes and/or other mediator nodes, and at least one root entity that receives network measurement data and/or aggregated network measurement data from the mediator nodes, is characterized in that the aggregation of network measurement data is performed by condensing network measurement data into a summarized probabilistic data structure. Furthermore, a network including a monitoring functionality is disclosed. | 08-16-2012 |
20120202523 | SYSTEM AND A METHOD FOR EMPLOYING SWARMS OF ELECTRONIC DEVICES TO LOCATE SURVIVORS IN THE EVENT OF CATASTROPHIC STRUCTURE COLLAPSE - The present invention provides a system and method for locating survivors after a collapse of a man-made structure. A plurality of electronic devices is distributed in the structure, the electronic devices comprising a wireless transmitter. The devices self-organize into a network and record the positions of the electronic devices in three dimensions relative to each other using a known position of at least one of the electronic devices. Upon the collapse of the structure, at least one additional electronic device is introduced into the network and the positions of the electronic devices are re-calculated using the known position of the additional electronic device. Potential positions of survivors are determined using the re-calculated positions of the electronic devices after the collapse. | 08-09-2012 |
20120201131 | METHOD FOR CONTROLLING THE ADMISSION OF A FLOW TO A NETWORK AND A NETWORK - A method for controlling the admission of a flow to a network, particularly a WiMAX (Worldwide Interoperability for Microwave Access) network, wherein an estimation of maximum capacity required within a link of the network and/or within the network will be performed for examining, whether the flow requesting to enter the network with at least one QoS (Quality of Service) reservation of resources can be admitted, by finding first sets of intersections between all pairs of QoS reservations, i.e. the QoS reservations already accepted within the link and/or within the network and the at least one QoS reservation requested by the flow. The method is characterized by structuring the found sets of intersections by building a matrix of intersections of QoS reservations and—based on the matrix—deriving the rest of the sets of intersections between the intersections found, based on information obtained regarding the QoS reservations involved in each intersection. | 08-09-2012 |
20120198062 | METHOD FOR MONITORING TRAFFIC IN A NETWORK AND A NETWORK - For providing a simple monitoring mechanism with reduced resource and performance requirements a method for monitoring traffic in a network is claimed, wherein a monitoring activity of at least two monitoring probes of the network is coordinated by a coordinating element, wherein at least two nodes of the network are able to operate as coordinating elements and wherein the responsibility for coordinating the monitoring activity of the monitoring probes is split between the nodes according to a compressed representation of flow parameter keys. Further, an according network is described, preferably for carrying out the above mentioned method. | 08-02-2012 |
20120195193 | METHOD FOR OPERATING A MOBILE TERMINAL AS ACCESS POINT AND CORRESPONDING MOBILE TERMINAL - A method for operating a mobile terminal as access point, wherein the access point composes a network together with one or more associated client stations, wherein the access point has an operational mode of alternating awake and sleep periods, and wherein the access point broadcasts beacon frames at regular intervals for signaling communication parameters to the associated client stations, is characterized in that the access point, based on the level of activity in the network, adjusts the communication parameters by slowing down or accelerating the access of the associated client stations to the network. Furthermore, a corresponding mobile terminal is disclosed. | 08-02-2012 |
20120188964 | METHOD FOR ENABLING MULTI-CHANNEL SIGNALING IN A COMMUNICATION NETWORK - A method for enabling multi-channel signaling in a communication network, including a multitude of communication nodes, wherein the communication among the communication nodes is performed by sending and receiving messages on communication channels including a control channel and at least one service channel, is characterized in that communication nodes embed information related to communication channel usage in messages sent on one of the communication channels, in particular the control channel, wherein the information indicates to others of the communication nodes a communication channel, in particular a service channel, intended to be employed for a specific service and/or application by the communication node having sent the respective message, and wherein communication nodes that receive a message including information related to communication channel usage forward the information by embedding the information in any of their own messages to be sent on a communication channel, in particular on the control channel. | 07-26-2012 |
20120188895 | SYSTEM AND METHOD FOR SUPPORTING LOCAL IP CONNECTIVITY FOR AN (E)NODEB - A system for supporting local IP connectivity for an (e)NodeB, the system including a mobile operator network with a PDN-Gateway or a GGSN, and at least one User Equipment (UE) that is associated with the (e)NodeB, is characterized in that a local gateway function (L-GW) is provided for the (e)NodeB, wherein an extension tunnel is established between the local gateway function (L-GW) and the PDN-Gateway or the GGSN of the mobile operator network. Furthermore, a corresponding system is disclosed. | 07-26-2012 |
20120185100 | METHOD AND SYSTEM FOR CONTROLLING PHYSICAL ACTUATORS IN PERVASIVE COMPUTING ENVIRONMENTS - For achieving a coordinated and opportunistic actuator control a method for controlling physical actuators in pervasive computing environments is claimed, wherein an entity—actuation space—is provided, the actuation space being configured to manage actuation requests and actuation status information, wherein at least one resource user sends one or more actuation requests to the actuation space that stores the one or more actuation requests, wherein at least one actuator resource controls at least one physical actuator on the basis of one or more of the actuation requests stored in the actuation space, wherein the at least one actuator resource sends actuation status information corresponding to one or more of the actuation requests to the actuation space, and wherein the at least one resource user and the at least one actuator resource share the actuation space. Furthermore, a corresponding system is disclosed. | 07-19-2012 |
20120184321 | METHOD FOR PERFORMING COMMUNICATION IN A SELF-ORGANIZED WIRELESS NETWORK - A method for performing communication in a self-organized wireless network, in particular a vehicular network, preferably based on the IEEE 802.11 MAC protocol, wherein the network includes a plurality of network nodes each being equipped with a communication system, wherein the communication systems generate periodic messages that are transmitted via a dedicated wireless communication channel, wherein each of the communication systems employs specific transmission parameters—message interval and transmit power—for transmitting the periodic messages, is characterized in that a reliability threshold for a maximum admissible load of the communication channel is defined, and that each network node, taking into consideration information on network nodes in its surrounding, establishes a relation between the message interval and the transmit power—interval-power-relation—such that the reliability threshold is not exceeded, wherein each network node applies its established interval-power-relation to adjust transmit power and/or message interval of its outgoing periodic messages. | 07-19-2012 |
20120182940 | METHOD FOR CONTROLLING THE TRAFFIC WITHIN A NETWORK STRUCTURE AND A NETWORK STRUCTURE - A reliable and flexible method for controlling traffic within a network structure without the addition of remarkable complexity to the core network is provided, the structure including a PDN (Packet Data Network), an operator core network with a DNS (Domain Name System) server, a HeNB (Home evolved Node B) or HNB (Home Node B) and/or eNB (Evolved Node B) or NB (Node B) and a UE (User Equipment) that is associated with the HeNB or HNB and/or eNB or NB. On the basis of a predefinable routing policy the DNS server is controlling whether a traffic from a UE to a destination address within a local network associated to the HeNB or HNB or eNB or NB or within a PDN and/or vice versa will be routed via the core network or directly via the local network in support of local network protocol access or selected network protocol traffic offload. | 07-19-2012 |
20120178429 | METHOD FOR OPERATING A WIRELESS TERMINAL AS AN ACCESS POINT AND WIRELESS TERMINAL - A method for operating a wireless terminal as an access point—access point terminal ( | 07-12-2012 |
20120173718 | METHOD AND NETWORK FOR MANAGING PORT RANGES - For allowing a very efficient use of available port space without requesting clients to interrupt ongoing sessions a method for operating a network, particularly an IP (Internet Protocol) network or mobile network is disclosed, wherein a network address and at least one port range associated to the network address and including ports or port numbers are assigned to a client by an address and/or port range manager. The method is characterized in that one or more port ranges will be marked by the manager with an attribute that signals to the client not to allocate any more ports or port numbers in marked port ranges. Further, a network is described, preferably for carrying out the above mentioned method. | 07-05-2012 |
20120172082 | MOBILITY DETECTION AND REPORTING SYSTEM AND METHOD FOR DETECTING AND REPORTING CELL CHANGES OF A MOBILE TERMINAL IN A MOBILE TELECOMMUNICATION NETWORK - A mobility detection and reporting system for detecting and reporting cell changes of a mobile terminal ( | 07-05-2012 |
20120170592 | METHOD OF SUPPORTING POWER CONTROL IN A COMMUNICATION NETWORK - A method of supporting power control in a communication network, the network including a plurality of network elements ( | 07-05-2012 |
20120170457 | METHOD FOR SUPPORTING ADMISSION CONTROL AND/OR PATH SELECTION IN A COMMUNICATION NETWORK AND COMMUNICATION NETWORK - A method for supporting admission control and/or path selection in a communication network, the network including a plurality of wireless communication links, possibly of different link technologies, established between a plurality of network nodes, includes the steps of partitioning the communication links of the network into groups of communication links—link groups—, assigning each link group an associated link group controller that is configured to observe and/or measure the performance and/or quality of the link group, based on the observations and/or measurements, computing estimates of metrics for the capacity of the respective link group and the costs for using each of the communication links of the respective link group, and transmitting the estimates to at least one resource management entity being configured to take admission control and/or path selection decisions on the basis of the estimates. A communication network with admission control and/or path selection supporting functionality is described. | 07-05-2012 |
20120163380 | METHOD FOR SUPPORTING DISTRIBUTION OF WARNING MESSAGES - A method for supporting distribution of warning messages, is characterized in that an NGN (Next Generation Network) infrastructure is employed for distribution, wherein the infrastructure includes a plurality of network elements including endpoints, wherein a hierarchical architecture is defined for the network elements, wherein groups of network elements including endpoints with specific characteristics are defined, wherein each of the network elements provides its group membership information to at least one higher-tier network element, and wherein at least one group warning controller is provided that, upon receiving a request from a source node, generates a warning message for one or more target groups and forwards the warning message to lower-tier network elements of the respective target group or groups towards endpoints. | 06-28-2012 |
20120147876 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 06-14-2012 |
20120147853 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 06-14-2012 |
20120147851 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 06-14-2012 |
20120140742 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 06-07-2012 |
20120140739 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 06-07-2012 |
20120140738 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 06-07-2012 |
20120140737 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 06-07-2012 |
20120140736 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 06-07-2012 |
20120140735 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 06-07-2012 |
20120140729 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 06-07-2012 |
20120140637 | COMMUNICATION NETWORK AND METHOD FOR OPERATING A COMMUNICATION NETWORK - A communication network includes a plurality of network elements—communicating nodes—that are enabled to request the establishment of connections—flows—among each other, and a plurality of network elements—switches ( | 06-07-2012 |
20120134342 | METHOD FOR COORDINATION OF WIRELESS TRANSCEIVERS OF A NETWORK NODE AND NETWORK NODE - A method for coordination of wireless transceivers of a network node, in particular for application in communication nodes of a vehicular network, wherein the network node is equipped with one or more wireless transceivers that are capable of simultaneously generating and/or receiving electromagnetic signals on different electromagnetic channels, the electromagnetic signals being potentially able to interfere with each other, is characterized in the steps of, for each pending packet transmission on a particular of the electromagnetic channels, checking the presence of ongoing and/or scheduled activity on one or more of the other of the electromagnetic channels, and deferring the pending packet transmission in case ongoing and/or scheduled activity is detected on one or more of the other of the electromagnetic channels, at least until the detected ongoing and/or scheduled activity on one or more of the other of the electromagnetic channels is completed. Furthermore, a corresponding network node is disclosed. | 05-31-2012 |
20120088506 | METHOD FOR OPERATING A NETWORK AND A NETWORK - For allowing a reliable communication within a network by simple constructive features a method for operating a network is claimed, wherein a number of base stations are grouped into a cluster and are connected to a cluster controller and wherein the cluster controller is providing access of the base stations to a main network. The method is characterized in that the cluster controller is mitigating interference within and/or outside the cluster on the basis of a measurement information and/or report from at least one base station. Further, an according network is claimed, preferably for carrying out the above mentioned method. | 04-12-2012 |
20120044887 | COMMUNICATION NETWORK AND METHOD FOR OPERATING A COMMUNICATION NETWORK - A communication network, includes at least one mobile terminal ( | 02-23-2012 |
20120042042 | METHOD FOR SUPPORTING MANAGEMENT AND EXCHANGE OF DISTRIBUTED DATA OF USER OR AN ENTITY - A method for supporting management and exchange of distributed data of a user or an entity, in particular user profile information data, is characterized in that a protocol is provided that employs SAML (Security Assertion Markup Language) as bearer protocol in such a way that SAML messages function as containers for DST (Data Service Template) or DST-like messages in order to compose SAML DST messages, wherein the DST or DST-like messages include data processing information, and wherein for the DST or DST-like messages unified protocol namespaces are defined as the protocol specific namespaces. | 02-16-2012 |
20120028632 | METHOD FOR OPERATING A BASE STATION AND BASE STATION - A method for operating a base station of a mobile wireless system, in particular of a mobile communications network, wherein the base station is configured to operate in different operation states, wherein the operation states at least include an active operational mode, in which the radio interface subsystem of the base station is fully activated, and a low-duty operational mode with reduced radio transmission activity, is characterized in that in the low-duty operational mode the base station implements a window mechanism including availability intervals during which radio transmissions are allowed and unavailability intervals in which no radio transmissions are allowed. Furthermore, a corresponding base station for deployment in a mobile wireless system is disclosed. | 02-02-2012 |
20120021760 | TRACKING SYSTEM AND A METHOD FOR TRACKING THE POSITION OF A DEVICE - For allowing a reliable and fast determination of the position of devices with a high degree of privacy preservation a tracking system for determination of the position of devices within a wireless network is claimed, wherein the tracking system is including a number of tracking stations, each tracking station being adapted for wireless communication with at least one device. The system is characterized by a management unit for control of a tracking activity of the tracking stations. Further, an according method for tracking the position of a device within a wireless network is claimed, preferably for use with the above mentioned tracking system. | 01-26-2012 |
20120008527 | METHOD FOR SUPPORTING ROUTING DECISIONS IN A WIRELESS MESH NETWORK AND WIRELESS MESH NETWORK - A method for supporting routing decisions in a wireless mesh network, wherein the network ( | 01-12-2012 |
20110320619 | METHOD FOR OPERATING A NETWORK AND A NETWORK - For allowing an enhancement of diversity of network applications in a simple way a method for operating a network, especially an IP (Internet Protocol) network, is claimed, wherein a local network is in connection with the network via a gateway and wherein a UE (User Equipment) of the local network is performing a session setup by communicating with a functional entity of the network in order to communicate with or to start a UE-related and/or session-related application. The method is characterized in that the application is communicating with a local network controller, wherein the network controller is receiving a UE-related and/or session-related parameter (LID—Local Identifier) from the application for locating a UE and/or a specific session within the local network based on the received parameter. Further, an according network is claimed, preferably for carrying out the above mentioned method. | 12-29-2011 |
20110310755 | METHOD FOR LINK QUALITY ESTIMATION IN A WIRELESS NETWORK - A method for link quality estimation in a wireless network, is characterized in that nodes of the wireless network perform the steps of sending packets to other nodes, monitoring all packets received from other nodes being located within their communication range, and calculating sent-received ratios with respect to other nodes and deriving thereof a link quality towards the respective nodes. | 12-22-2011 |
20110300855 | METHOD FOR SUPPORTING AN OPERATIONAL WIRELESS CONNECTION OF A MOBILE STATION TO A MACROCELL OR FEMTOCELL BASE STATION - A method for supporting an operational wireless connection of a mobile station to a macrocell or femtocell base station—current base station—, wherein the mobile station is located both within the coverage area of the current base station and in the coverage area of another base station—foreign base station—, in particular a femtocell base station, wherein the mobile station has access authorization to the current base station and no access authorization to the foreign base station, is characterized in that a restricted connection is permitted between the mobile station and the foreign base station. | 12-08-2011 |
20110292912 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 12-01-2011 |
20110287775 | METHOD FOR INTERFERENCE MITIGATION FOR FEMTOCELL BASE STATIONS OF A WIMAX NETWORK - A method for interference mitigation for femtocell base stations of a WiMAX network, wherein the femtocell base station is located within the transmission range of at least one macrocell base station and/or at least one other femtocell base station, is characterized in that the femtocell base station performs downlink measurements to detect neighboring macrocell and/or femtocell base stations and reports results of the downlink measurements to at least one higher layer network controller, wherein the network controller allocates transmission parameters to the WiMAX femtocell base stations on the basis of at least the reported measurement results and the current resource occupation in the network. | 11-24-2011 |
20110286430 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 11-24-2011 |
20110286410 | COMMUNICATION SYSTEM AND COMMUNICATION CONTROLLING METHOD - A communication method in LIPA/SIPTO architecture is provided which, when a user equipment (UE) is to connect from a serving area to an external network, allows re-selection of an optimal gateway. The communication method allows selecting a gateway apparatus physically or topologically close to a site, where the user equipment is attached. | 11-24-2011 |
20110286395 | RADIO NETWORK AND A METHOD FOR OPERATING A RADIO NETWORK - A radio network allows a flexible distribution of data flows between a mobile station and a mobility anchor of the network over different interfaces. Data flows are routed between at least one mobile station and a mobility anchor of the network. The mobile station can connect to the mobility anchor using multiple network interfaces simultaneously, the radio network including an application function capable of processing and/or analyzing information about routing policies contained in a signalling received from a mobile station, which is able to push or signal the processed and/or analyzed information from the application function to an entity that can enforce routing policies to forward the data flows to one or more selected interfaces and which is able to signal routing policies received from the network to the mobile station. Further, an according method for operating a radio network, especially for routing data flows within the network, is disclosed. | 11-24-2011 |
20110283336 | METHOD AND SYSTEM FOR SUPPORTING THE GENERATION OF ACCESS CONTROL PREFERENCES AND/OR PRIVACY PREFERENCES FOR USERS IN A PERVASIVE SERVICE ENVIRONMENT - A method and a system for supporting the generation of access control preferences and/or privacy preferences for users in a pervasive service environment, wherein an automated user information management system stores and/or manages personal information items owned by and/or associated to a user, wherein an access control system is provided for processing requests from a pervasive service and/or application that query a set of the user-specific information items being stored in and/or managed by the user information management system, are characterized in that an entity—feedback collector—is provided, the feedback collector being configured to collect individual access control and/or privacy preferences from a plurality of users, to derive a popular rule set of access control and/or privacy preferences from the collected individual access control and/or privacy preferences, and to provide the popular rule set of access control and/or privacy preferences to users of the pervasive service environment. | 11-17-2011 |
20110264816 | METHOD FOR ACCESS CONTROL WITHIN A NETWORK AND A NETWORK - For allowing an effective handling of obligations a method for access control within a network, especially for control of access of a subject to a resource of the network, is disclosed, wherein a PEP (Policy Enforcement Point) sends an access request for evaluation to a PDP (Policy Decision Point) and wherein the PDP sends a reply which contains at least one obligation to the PEP. Whereby for specifying obligations a meta-language as for example OASIS XALML is used. | 10-27-2011 |
20110263264 | METHOD FOR OPERATION OF A WIMAX NETWORK AND WIMAX NETWORK - A method for operation of a WiMAX network, the network including a WiMAX macrocell network with one or more macrocell base stations and at least one femtocell base station, the macrocell base stations and the at least one femtocell base station being configured to offer connectivity to mobile stations is described. The method is characterized in that a communication scheme between the macrocell network and the at least one femtocells base station is defined according to which a direct wireless link is established between the at least one femtocell base station and one or more of the macrocell base stations located within the coverage area of the at least one femtocell base station. Furthermore, a corresponding WiMAX network is disclosed. | 10-27-2011 |
20110246647 | METHOD FOR OPERATING AT LEAST ONE VIRTUAL NETWORK ON A SUBSTRATE NETWORK AND A VIRTUAL NETWORK ENVIRONMENT - For allowing an efficient consumption of resources of a physical substrate network a method for operating at least one virtual network on a substrate network is claimed, especially within a framework of a self-organizing model for optimizing resource consumption of the substrate network, wherein the virtual networks are including a plurality of virtual nodes each being assigned to respective substrate nodes of the substrate network and wherein two adjacent virtual nodes of the same virtual network are connected by a virtual link which is corresponding to one or more respective substrate node links, including the following steps: Identifying a traffic pattern within at least two substrate nodes with regard to the resources individually consumed by the virtual networks; reallocating of the resources depending on an evaluation of the identified traffic patterns for optimizing resource consumption within the substrate nodes, wherein the identifying step and the evaluation and decision to execute the reallocation of resources is performed locally at each individual substrate node. Further, an according virtual network environment on a substrate network is claimed, preferably for carrying out the above mentioned method. | 10-06-2011 |
20110239295 | METHOD FOR SUPPORTING ATTACK DETECTION IN A DISTRIBUTED SYSTEM - A method for supporting attack detection in a distributed system, wherein a message being sent within the distributed system from a source entity to one or more target entities is transmitted via one or more intermediate entities, and wherein at least one of the one or more intermediate entities—tagging entity—appends an attack information tag to the message indicating whether the message constitutes or is part of an attack, is characterized in that a reputation system is provided, the reputation system being configured to receive the attack information tag generated by the tagging entity, and to generate a rating of the attack information tag. | 09-29-2011 |
20110237256 | METHOD FOR SUPPORTING QUALITY OF SERVICE MECHANISMS DURING A HANDOVER PROCESS OR IN PREPARATION OF A HANDOVER PROCESS - A method for supporting quality of service (QoS) mechanisms during a handover process or in preparation of a handover process, wherein a user equipment (UE) attaches to an access network (AN) via points of attachment (PoA), wherein the handover process supports changing connection of the UE from one of the points of attachment—current PoA—to another one of the points of attachment—target PoA—while maintaining all ongoing connections of the UE, wherein signalling messages are exchanged between the current PoA and a second PoA during or in preparation of the handover process, the second PoA including the target PoA or a candidate for the target PoA, and wherein the AN supports inner QoS mechanisms on a communication path within the AN, the communication path being used for communication between one of the PoA and a core network (CN) or between one of the PoA and a network entity within the AN, is characterized in that a triggering message is sent to the second PoA by the current PoA, the triggering message being received by an UE proxy located on the second PoA, wherein the UE proxy, in reaction to the triggering message, controls the inner QoS mechanisms to ensure QoS on the communication path. | 09-29-2011 |
20110222496 | METHOD FOR OPERATING A MULTI-CELL RADIO SYSTEM AND A MULTI-CELL RADIO SYSTEM - For enhancing user throughput and coverage within a multi-cell radio system a method for operating a multi-cell radio system, especially an OFDMA-based radio system including a plurality of base stations, wherein different frequency reuse factors are used within different reuse zones of one cell by a fractional frequency reuse (FFR) scheme, the method includes the following steps: allocating a size or resource to the different reuse zones, and allocating users into different reuse zones. Further, a multi-cell radio system is described, preferably for carrying out the above mentioned method. | 09-15-2011 |
20110216742 | METHOD FOR SUPPORTING HANDOVER MECHANISMS - A method for supporting handover mechanisms, in particular Media Independent Handover (MIH) mechanism according to the IEEE 802.21 standard, wherein a user equipment (UE) attaches to an access network (AN) via points of attachment (PoAs), wherein signalling messages are exchanged between the entities participating in the handover process, in particular between the user equipment and the points of attachment, and wherein the handover mechanism supports changing the network connection of the user equipment from one of the points of attachment—current point of attachment (PoA)—to another one of the points of attachment—target point of attachment—while maintaining all ongoing communication of the user equipment, is characterized in that information about the user equipment's ongoing communication is added to the signalling messages exchanged in the handover process, wherein the information is employed to treat individual traffic flows of the user equipment's ongoing communication selectively during the handover process. | 09-08-2011 |
20110213688 | PROCESS FOR PROVIDING NETWORK ACCESS FOR A USER VIA A NETWORK PROVIDER TO A SERVICE PROVIDER - For providing a simple network access process which can be used for accessing network with focus on a single service a process for providing network access for a user via a Network Provider (NP) to a Service Provider (SP) is claimed, the process including: establishing a connection between the user and the Network Provider (NP) by user's request to access the Service Provider (SP); authenticating of the user by a user's Identity Provider (IdP) on request of the Network Provider (NP); transmitting data from the Identity Provider (IdP) to the Network Provider (NP), so that the Network Provider (NP) has the information that the Service Provider (SP) or a third party is payee of the access fees; and providing the access for the user via the Network Provider (NP) to the Service Provider (SP) by the Network Provider (NP). | 09-01-2011 |
20110212723 | METHOD FOR SUPPORTING NETWORK BASED MOBILITY FOR A MOBILE TERMINAL IN AN IMS (IP MULTIMEDIA SUBSYSTEM) ARCHITECTURE - Method for supporting network based mobility for a mobile terminal in an IMS (IP Multimedia Subsystem) architecture, wherein the mobile terminal is connected to a femto cell or to a macro cell—source cell—and wherein handover of an actual session of the mobile terminal is performed to another femto cell or macro cell—target cell—, wherein the femto cells and the macro cells are provided with an eMSC-server (Mobile Switching Center Server enhanced for IMS Centralized Services) function, and wherein the source cell's eMSC-server function hosts a source user agent and the target cell's eMSC-server function hosts a target user agent, is characterized in that the source user agent contacts the target user agent directly or indirectly prior to executing the actual handover, and wherein the source user agent prepares the target user agent together with the corresponding access network by exchanging handover related information. | 09-01-2011 |
20110209152 | METHOD AND SYSTEM FOR SCHEDULING PERIODIC PROCESSES - A method of scheduling periodic processes for execution in an electronic system, in particular in a network, in a data processor or in a communication device, wherein the electronic system includes a controller for performing the scheduling, wherein a number of N processes P | 08-25-2011 |
20110207461 | METHOD FOR CONFIGURATION OF A FEMTO RADIO BASE STATION - A method for configuration of a femto radio base station is characterized in the steps of establishing a connection of the femto radio base station ( | 08-25-2011 |
20110176488 | METHOD FOR FACILITATING COMMUNICATION IN A MOBILE COMMUNICATION SYSTEM AND MOBILE COMMUNICATION SYSTEM - A method for facilitating communication in a mobile communication system in which address-delegating entities are involved, wherein mobile nodes attaching to the communication system get assigned an address or address prefix, wherein the address or address prefix assignment is delegated from an entity being associated with mobility management—mobility entity—to some other configuration component ( | 07-21-2011 |
20110172937 | METHOD AND SYSTEM FOR ENERGY CONSUMPTION MONITORING IN AN ICT ENVIRONMENT - A method for energy consumption monitoring in an ICT environment, wherein the ICT environment ( | 07-14-2011 |
20110170437 | METHOD OF SUBCARRIER ALLOCATION IN AN OFDMA-BASED COMMUNICATION NETWORK AND NETWORK - A method of subcarrier allocation in an OFDMA-based communication network, wherein the network includes a network controller and a number of base stations, wherein the network is divided into different cells and/or sectors, and wherein subchannels are generated by forming subsets of active orthogonal subcarriers of the OFDMA frame structure, is characterized in that the base stations measure the traffic load and/or the interference from neighboring and/or other cells and/or sectors, wherein an allocation of the subchannels to the cells and/or sectors is performed on the basis of the results of the measurements. Furthermore, a network applying OFDMA technology is disclosed. | 07-14-2011 |
20110161658 | METHOD FOR ENABLING LIMITATION OF SERVICE ACCESS - A method for enabling limitation of service access, wherein a service provider offers at least one service and a user possesses multiple different digital identities that can be used to invoke or register with the service, access to the service requiring an account at a third party entity, the user registers his digital identities with the account and agrees on a secret with the third party entity, the method including:
| 06-30-2011 |
20110154016 | METHOD FOR AGGREGATING INFORMATION VALUES IN A NETWORK - A method for aggregating information values in a network, the network including trusted network nodes and untrusted network nodes, wherein a communication session is established by directing messages through the network along a network path from an originating network node ( | 06-23-2011 |
20110149899 | METHOD FOR COMMUNICATION BETWEEN NODES IN A WIRELESS NETWORK - A method for communication between nodes in a wireless network, in particular in a wireless ad hoc or mesh network, wherein multiple wireless channels with different frequency bands are provided and wherein the nodes are enabled to operate on the different channels is characterized in that each the node has assigned a home channel where it usually resides, wherein a node that leaves its home channel and switches to another of the multiple channels—temporary operating channel—provides information about the temporary operating channel on the node's home channel. | 06-23-2011 |
20110138032 | METHOD FOR MANAGING A NETWORK AND A NETWORK - For providing a significant reduction of resource consumption and network traffic within a network a method for managing a network is claimed, the network including: a plurality of network elements, each of which being able to run at least one network management function and to store management information being necessary for running the at least one management function, the method being characterized by randomly activating and deactivating the at least one management function on one or more of the network elements by a randomization process. Further, an according network is claimed, preferably for carrying out the above mentioned method. | 06-09-2011 |
20110119145 | GROUP CONTENT ON DEMAND ACCESS CONTROL - Digital content on demand (CoD) is provided under a group purchase option that permits separately located users to receive access on demand to a desired content with group-related benefits including discounted price discount or synchronized viewing. | 05-19-2011 |
20110066849 | METHOD AND SYSTEM FOR VERIFYING THE IDENTITY OF A COMMUNICATION PARTNER - A method for verifying the identity of a communication partner, in particular in real-time communications, wherein a caller (A) sends a message towards a callee (B), and wherein the caller (A) attaches a self-signed certificate to the message, characterized in that the caller (A) and the callee (B) are part of a web-of-trust, wherein certificates of users within the web-of-trust are stored by one or more key-servers ( | 03-17-2011 |
20110061106 | METHOD AND COMMUNICATION DEVICE FOR PROTECTING A USER'S PRIVACY - A method for protecting a user's privacy, wherein the user operates a communication device capable of processing context and wherein the user provides context information—real context—related to one or more reference context variables to a third party, is characterized in the steps of faking at least one of the one or more reference context variables, on the basis of the faked reference context variable, gathering real context information—decoy context—related to reference context variables other than the faked reference context variable, publishing the thus generated decoy context instead of the user's real context. In addition, a corresponding communication device is disclosed. | 03-10-2011 |
20110058525 | METHOD FOR FILLING A WIMAX DOWNLINK FRAME BY THE BASE STATION OF A WIMAX NETWORK - A method for filling a WiMAX downlink frame by the base station of a WiMAX network, wherein the downlink MAC Protocol Data Units (MPDUs) are fitted into the WiMAX downlink frame by means of a DL-MAP scheduler, which allows the concatenation of downlink MPDUs from different connections in single bursts, the bursts having a rectangular shape in terms of the two dimensions—OFDMA (Orthogonal Frequency Division Multiple Access) symbols and subchannels—of a WiMAX downlink frame, is characterized in that the DL-MAP scheduler is configured in a way that it considers the concatenation of downlink MPDUs from different connections in single bursts based on the available and/or the remaining free space in the WiMAX downlink frame, such that it simplifies the DL-MAP scheduler task of filling the WiMAX downlink frame minimizing the amount of wasted radio resources. | 03-10-2011 |
20110044342 | METHOD FOR POPULATING A FORWARDING INFORMATION BASE OF A ROUTER AND ROUTER - A method for populating a forwarding information base of a router of an autonomous system (AS) in the Internet's Default Free Zone (DFZ), wherein the forwarding information base contains a multitude of entries, each entry mapping a destination prefix to at least one route to reach the destination prefix, is characterized in that for each prefix advertised to the router, the autonomous system (AS) the advertisement was received from is determined, and that a decision is made whether to include the prefix into the forwarding information base of the router or not, wherein in the decision the autonomous system (AS) and/or predefined characteristics of the autonomous system (AS) the prefix is learned from is/are considered. Furthermore, a corresponding router for deployment in autonomous systems (AS) in the Internet's Default Free Zone (DFZ) is disclosed. | 02-24-2011 |
20110041181 | METHOD FOR DETECTING ATTACKS TO MULTIMEDIA SYSTEMS AND MULTIMEDIA SYSTEM WITH ATTACK DETECTION FUNCTIONALITY - A method for detecting attacks to multimedia systems, wherein a communication path ( | 02-17-2011 |
20110030003 | METHOD AND A SYSTEM FOR DISTRIBUTING TV CONTENT OVER A NETWORK - For allowing large numbers of users to receive targeted TV advertisements during advertisement breaks without requiring unicast content transmission a method is provided for distributing TV content over a network, especially an IP network, wherein the TV content includes a main content and an advertisement content and wherein a multicast address on which a TV channel for the main content is distributed within the network is transmitted to a user as a connectivity information. The method includes the step of transmitting further connectivity information to the user, the further connectivity information depending on at least one advertising segment of the advertisement content which the user is requesting or which the user is assigned to. Further, a system for distributing TV content over a network, preferably for carrying out the above mentioned method is also described. | 02-03-2011 |
20110026546 | METHOD OF ASSEMBLING A FRAME IN AN ORTHOGONAL FREQUENCY DIVISION MULTIPLE ACCESS (OFDMA)-BASED COMMUNICATION SYSTEM AND COMMUNICATION SYSTEM - A method of assembling a frame in an Orthogonal Frequency Division Multiple Access (OFDMA)-based communication system, wherein data packets to be transmitted from a broadcast station to a receiver are given a rectangular shape in terms of the two dimensions—time and frequency—of the OFDMA frame, and wherein the data packets are successively fitted into the OFDMA frame by way of a frame assembly scheduler, is characterized in that the filling process of the OFDMA frame is based on an ordered list of data structures that represent the current empty space within the OFDMA frame. Furthermore, a corresponding communication system is disclosed. | 02-03-2011 |
20100319068 | METHOD AND SYSTEM FOR PERFORMING DELEGATION OF RESOURCES - A method for performing delegation of resources, in particular services, wherein a user—resource owner—has access to a resource offered by a service provider and wherein the resource is delegated to at least one other user—delegate—by using delegation credentials, is characterized in that the method includes the steps of defining authorization rules for the delegate regarding resource access restrictions and registering the authorization rules at an identity provider thereby employing the delegation credentials, performing an authentication of the delegate at the service provider, and performing an authorization of the delegate at the identity provider based on the authorization rules. Furthermore, a corresponding system is disclosed. | 12-16-2010 |
20100309799 | METHOD AND SYSTEM FOR OPTIMIZING NETWORK PERFORMANCES - A method for optimizing network performances, wherein the network includes one or more network nodes ( | 12-09-2010 |
20100287247 | METHOD AND SYSTEM FOR SECURE WEB SERVICE DATA TRANSFER - Data transfer and staging services are common components in Grid-based or more generally in service-oriented applications. Security mechanisms are playing a central role in such services, especially when they are deployed in application fields like for instance e-health. The adoption of WS-Security and related standards to SOAP-based transfer services is, however, not straightforward. With MTOM, SOAP messages can be processed with WS-Security in a straightforward manner. The present invention provides an improved method for signing an MTOM-optimized SOAP message. A non-blocking signature generation approach is proposed enabling a stream-like processing with considerable performance enhancements. | 11-11-2010 |
20100223365 | METHOD FOR CONTROLLING PROXY BINDING OF A MOBILE NODE - A method for controlling proxy binding of a mobile node in a network that supports network-based mobility management, wherein the mobile node includes at least one network interface that is employed for attaching to the network via an access router, wherein a mobile node's binding for a network interface is initiated by a binding request, is characterized in that the mobile node's binding for a new network interface is qualified as a preliminary binding, which is not employed for downlink data transmission, and that the mobile node's preliminary binding is activated, after the mobile node's new network interface has been configured. | 09-02-2010 |
20100217824 | METHOD AND SYSTEM FOR DELIVERING MEDIA DATA TO A USER'S MOBILE DEVICE - A method and a system for delivering media data to a user's mobile device, wherein a service control ( | 08-26-2010 |
20100214970 | METHOD AND SYSTEM FOR TRANSMITTING DATA PACKETS FROM A SOURCE TO MULTIPLE RECEIVERS VIA A NETWORK - A method for transmitting data packets from a source to multiple receivers via a network is characterized in that a network element ( | 08-26-2010 |
20100185575 | METHOD FOR OPTIMIZING THE SCANNING PROCESS OF A MOBILE TERMINAL - A method for optimizing the scanning process of a mobile terminal, the scanning process being performed by the mobile terminal in order to discover an available network to which a connection is possible, wherein at least a part of existing networks is registered to a server, wherein the server provides its information regarding the registered networks to the mobile terminal, is characterized in that the scanning period of the mobile terminal is dynamically adjusted on the basis of information provided by the server. | 07-22-2010 |
20100177686 | METHOD FOR PERFORMING ROUTE OPTIMIZATION BETWEEN TWO NODES IN NETWORK BASED MOBILITY MANAGEMENT - A method for performing route optimization between two nodes in network based mobility management, wherein each of the two nodes is associated with an access network via attachment to an access router, the access routers having directly or indirectly assigned a Mobility Access Gateway (MAG) that signals the node's presence to a Mobility Anchor (MA) which maintains the current IP address information along with location information of the node, is characterized in that some specific control for setting up a route optimized path for data packet exchange between the two nodes is assigned to the Mobility Anchors (MA). | 07-15-2010 |
20100170942 | METHOD AND SYSTEM FOR INCREASING SECURITY IN THE CREATION OF ELECTRONIC SIGNATURES BY MEANS OF A CHIP CARD - The present invention relates to a method and system for increasing security in digital signatures by means of chip card. The method and system of the invention in particular provide for a visual verification of the data to be designed and select essential data therefrom in order to ensure a reliable signing process. The method for increasing security in the digital signing of data with a chip card comprises the following steps: providing a chip card ( | 07-08-2010 |
20100135494 | METHOD FOR AGGREGATING DATA IN A NETWORK - A method for aggregating data in a network, particularly in a wireless sensor network, wherein the network ( | 06-03-2010 |
20100098090 | METHOD FOR ELECTING AGGREGATOR NODES IN A NETWORK - A method for electing aggregator nodes in a network, wherein the network includes a plurality of sensor nodes to measure data, and at least one of the sensor nodes functioning as aggregator node to aggregate sensored data obtained by at least a subset of the sensor nodes, the network further including at least one sink node to collect data aggregated by the aggregator nodes, the method including: establishing pairwise secret keys between a current aggregator node and each sensor node of the subset of sensor nodes; at each of the sensor nodes of the subset, choosing a random number and encrypting the random number using the established key; providing a communication chain between the sensor nodes of the subset and summing the encrypted random numbers of all sensor nodes of the subset; and determining a new aggregator node on the basis of the resulting sum according to a predefined calculation scheme. | 04-22-2010 |
20100082739 | METHOD FOR SUPPORTING MEDIA INDEPENDENT HANDOVER (MIH) SERVICES - A method for supporting media independent handover (MIH) services, preferably according to the IEEE 802.21 standard, wherein communication nodes ( | 04-01-2010 |
20100008508 | METHOD FOR ESTABLISHING A SECRET KEY BETWEEN TWO NODES IN A COMMUNICATION NETWORK - A method for establishing a secret key between two nodes in a communication network, in particular in a wireless local area network (WLAN), includes concealment of the fact that a key exchange occurs, one of the nodes—first node (B)—broadcasts one or more packets (P | 01-14-2010 |
20090282249 | PROCESS FOR ESTABLISHING A SECRET KEY - A method for establishing a secret key for a data transmission between communication partners in a network, in particular in a personal area network (PAN), or in a body area network (BAN), wherein one or several inefficient communication partners (B) in comparison to a strong, preferably central communication partner (A) of the network, have reduced power resources, is characterized through the following steps: the strong communication partner (A) transmits a plurality of data pairs, each comprising a possible key (K | 11-12-2009 |
20090268909 | METHOD FOR OPERATING A WIRELESS SENSOR NETWORK - A method for operating a wireless sensor network, wherein the sensor network includes a multitude of distributed sensor nodes for sensing data within a pre-definable environment, and wherein the sensor nodes can exchange information via encrypted data transmissions over a radio Channel is—regarding the fact that during the operational phase of the network the Performance of changes in the network, in particular the composition of the sensor nodes that are integrated in the network, is allowed in a flexible way—characterized in that a subset of sensor nodes of the network is manipulated in order to establish a shared secret (x) by transferring a defined information to the sensor nodes of the subset over a secure out of band (OOB) Channel. | 10-29-2009 |
20090202057 | Method For Identifying Undesired Telephone Calls - A method for identifying undesired telephone calls (Spit/Spam over IP), preferably in a VoIP network, in which the telephone calls coming in for a telephone subscriber, the callee, from at least one calling telephone subscriber, the caller, are subjected to a test or more precisely to a statistical analysis. The method is developed in such a manner that in the framework of the test for incoming calls, the time of the receipt of each call is determined and in each case the probability that the call is undesired is determined, where for the calculation of the probability the time of the receipt of the call, or a parameter dependent thereon, is related to the temporal distribution of previous undesired calls. | 08-13-2009 |