Patent application number | Description | Published |
20080263631 | USER PROFILE, POLICY, AND PMIP KEY DISTRIBUTION IN A WIRELESS COMMUNICATION NETWORK - An authentication server may be adapted to (a) authenticate an authentication peer seeking to establish communications via a first network access node; (b) retrieve user profile information associated with the authentication peer; and/or (c) send the user profile information to a network gateway node that facilitates communication services for the authentication peer. A PMIP network node may be adapted to (a) provide wireless network connectivity to an authentication peer via a first network access node; (b) provide a PMIP key to both ends of a PMIP tunnel between the first network access node and a PMIP network node used to provide communications to the authentication peer; (c) provide the PMIP key to a first authenticator associated the first network access node; (d) receive a request at the PMIP network node from a requesting entity to reroute communications for the authentication peer; and/or (e) verify whether the requesting entity knows the PMIP key. | 10-23-2008 |
20080310303 | QUALITY OF SERVICE INFORMATION CONFIGURATION - Quality of service information can be used to facilitate wireless communication. A network entity, such as a terminal, as well as a network can initialize an authorization to establish a link using quality of service information. Various features can be integrated with the use of quality of service information, such as having quality of service reservation before a call and supplying a permanent identity for use in correlation. | 12-18-2008 |
20090182883 | POLICY CONTROL AND CHARGING (PCC) RULES BASED ON MOBILITY PROTOCOL - Techniques for supporting policy control and charging (PCC) functions in a wireless communication network are described. In one design, a Policy Control and Charging Rules Function (PCRF) may receive a request from a first network entity (e.g., a home agent) to establish a PCC session for a user equipment (UE) accessing the first network entity using a mobility protocol (e.g., Mobile IP). The PCRF may determine the mobility protocol used by the UE based on an IP-CAN Type parameter included in the request. The PCRF may determine PCC rules for the PCC session based on the mobility protocol and may send the PCC rules to the first network entity. The first network entity may apply the PCC rules on packets for the PCC session and may count each packet for charging. A second network entity may forward the packets but would not count these packets for charging. | 07-16-2009 |
20090190471 | Method and Apparatus for Optimized Session Setup with Network-Initiated QoS Policy Control - Apparatus and methods operable by a network in configuring quality of service (QoS) for an access terminal are operable to receive, at a network, a request for packet data access from an access terminal. The apparatus and methods are further operable to determine, at the network and based on establishment of the packet data access, an initial QoS policy configuration for at least one reservation link corresponding to at least one application on the access terminal, wherein the initial QoS policy configuration is based on preconfigured information and comprises initial QoS parameters for the at least one application. Additionally, the apparatus and methods are operable to establish the at least one reservation link with the access terminal, prior to initiation of the at least one application on the access terminal, wherein the at least one reservation link includes the initial QoS parameters for the at least one application. | 07-30-2009 |
20090191841 | Method and Apparatus for Extended Call Establishment for IMS Emergency Calls - Apparatus and methods of establishing an emergency voice call include user equipment transmitting, and a first serving core network receiving, a request for an emergency call via a wireless access network. The apparatus and methods further include a determination by the first serving core network of an alternative serving core network. In some aspects, the determination may be made based on a user equipment location from a location retrieval function, which may obtain such information from other network components or from the user equipment. In other aspects, the determination may be based on lack of capability or lack of capacity. Further, the apparatus and methods also include establishment of the emergency call with a second serving core network different from the serving core network based on the determination. | 07-30-2009 |
20090196231 | MOBILE IP MULTIPLE REGISTRATIONS AND PCC INTERACTIONS - In a wireless communication system having multiple access nodes, a home agent (HA) maintains home address (HoA) for a mobile node so that an IP session can be established. As the mobile node moves within a coverage area of various access nodes, the mobile node can establish a secure relationship with a local access gateway and thereby register a local IP address, referred to as a care-of-address (CoA), with the HA. Mobile IP protocol can be established so that multiple sessions can be conducted. In maintaining policy and charging control (PCC), HA informs a policy and charging rules function (PCRF), which in turn can then send the appropriate PCC rules (e.g., IP flows and related policies) to a policy and charging enforcement function (PCEF) for a particular access gateway. Coordination necessary to associate CoA and HoA can further include filter information as to application can run on a particular interface. | 08-06-2009 |
20090252118 | HANDOFF BETWEEN PACKET-SWITCHED NETWORK AND CIRCUIT-SWITCHED NETWORK - Techniques for supporting handoff of terminals between a packet-switched network and a circuit-switched network are described. In an aspect, handoff between packet-switched and circuit-switched networks may be facilitated by a designated network entity in the packet-switched network. The designated network entity may interface with both the packet-switched network and the circuit-switched network, perform circuit-switched call origination, and perform handoff procedure. In one design, a first terminal may communicate with the packet-switched network for a packet-switched call with a second terminal. The first terminal may initiate handoff to the circuit-switched network via the designated network entity. The first terminal may perform handoff from the packet-switched network to the circuit-switched network based on an inter-MSC handoff procedure. The first terminal may then communicate with the circuit-switched network for the circuit-switched call with the second terminal after the handoff. | 10-08-2009 |
20090280770 | SYSTEM, APPARATUS AND METHOD TO ENABLE MOBILE STATIONS TO IDENTIFY CALLS BASED ON PREDETERMINED VALUES SET IN A CALL HEADER - A mobile device/UE identifies calls to or callbacks from a Public Safety Access Point (PSAP) in order to provide priority handling. When the UE does not detect that the call being made is an emergency call, then the network facilitates identification during call establishment of the emergency nature. The network identifies the call as emergency call in a SIP response by setting the Priority header to distintive value (e.g., “emergency-call”) or the “P-Asserted-Identity to a distinctive value (e.g., urn:services:sos). When PSAP chooses to call back the mobile/UE, the mobile/UE can terminate any ongoing calls and accept this call from the PSAP and can disable other supplementary services (e.g., call waiting, three-way calling etc.) during the call. A P-Asserted-Identity of the incoming call is set to a distinctive location associated with PSAP (e.g., urn:services:sos). Alternatively, the incoming call has a Priority header set to a distinctive value (e.g., “emergency”, “emergency-callback”). | 11-12-2009 |
20090319676 | Conveying Session Continuity Information in a Multi-Component Communication Session - In a multimedia communication session with multiple media components, one or more media components can be transferred from one access network to another access network and yet maintain the continuity of the overall communication session. Each session is first identified and thereafter the media component intended to be transferred is also identified. The identities of the identified session and component are sent to one or more entities within the communication network for executing the media component transfer. | 12-24-2009 |
20100048216 | SYSTEM AND METHOD FOR HANDOFF FROM A MACRO ACCESS NETWORK TO A FEMTO ACCESS POINT - Devices and methods are provided for handing off an access terminal from a macro base station to a femto access point (AP). In one embodiment, the method involves receiving a facilities directive or the like from a communication network entity, such as, for example, a serving mobile switching center (MSC). The method may involve selecting the femto AP based at least in part on femto configuration information, which may include at least one global identifier of the femto AP. The method may involve determining a uniform resource identifier of the femto AP based at least in part on at least one global identifier (e.g., MSC identifier and/or cell identifier). | 02-25-2010 |
20100080172 | PROXY MOBILE INTERNET PROTOCOL (PMIP) IN A MULTI-INTERFACE COMMUNICATION ENVIRONMENT - A communication entity (such as a User Equipment (UE), an Access Gateway (AGW), a Packet Data Network Gateway (PGW), a Policy Charging Rule Function (PCRF), and so forth) notifies another communication entity that the UE intends to use a single Internet Protocol (IP) address for connections to multiple AGWs. The communication entity also sends information that is related to at least one of the UE's IP flows to another communication entity. | 04-01-2010 |
20100085898 | METHODS FOR DETECTING ROUTING LOOPS BETWEEN HOME AGENTS - Certain aspects of the present disclosure provide methods for detecting a routing loop between at least two home agents utilizing the mobile internet protocol (MIPv6) standard. In a first method, the home agent sends a test message to the last care of address associated with a mobile node and receives a reply if there is no loop. In a second method, the home agent parses a packet and checks if the address of any of the inner headers matches the address of the home agent to find a loop between home agents. | 04-08-2010 |
20100130171 | METHOD AND APPARATUS TO PERFORM SECURE REGISTRATION OF FEMTO ACCESS POINTS - Methods, apparatus, and systems to perform secure registration of a femto access point for trusted access to an operator-controlled network element. Method steps include establishing a security association for at least one said femto access point, making a request using the security association to an operator-controlled network element, which requests a secure registration credential from an authorizing component. The operator-controlled network element constructs a secure registration credential and sends the secure registration credential to the requesting femto access point, thus authorizing trusted access by the requesting femto access point to access operator-controlled network elements. Embodiments include establishing a security association via an IPsec security association received from a security gateway which is within an operator-controlled domain and using an operator-controlled database of IPsec inner addresses. In some embodiments the femto access point conducts message exchanges using one or more IMS protocols and components, including call session control function elements, which elements in turn may authorize a femto access point within the IMS domain, may or access non-IMS network elements for authorization. | 05-27-2010 |
20100142373 | PERFORMING PACKET FLOW OPTIMIZATION WITH POLICY AND CHARGING CONTROL - Policy and charging control (PCC) is a framework within a Third or Fourth Generation (3G/4G) network that allows operators to authorize and enforce policy, Quality of Service (QoS), and charging control over communication sessions by mobile devices. PCC mechanism is used to determine the type QoS based on a request received from a User Equipment (UE) or network. PCC is one important element within System Architecture Evolution (SAE) architecture to allow the network to perform policy and charging control. A mechanism is provided so that PCC can allow packet flow optimization. Thereby, the network can detect Internet Protocol (IP) flows based on operator defined criteria and can perform policy and QoS control. | 06-10-2010 |
20100197305 | CORRELATING REGISTRATIONS ORIGINATING FROM A DEVICE - Systems and methods for correlating multiple registrations from a single device are disclosed. A private ID used in an prior registration may be used to obtain subsequent private IDs. The subsequent private IDs may be used in subsequent registrations. An instance ID from an prior registration may be used in conjunction with different registration IDs in subsequent registrations. | 08-05-2010 |
20100226252 | INVOKING DATA SERVICE PRIORITY DURING NETWORK CONGESTION - A method for requesting and providing on-demand priority to internet protocol (IP) flows is disclosed. A request to invoke transmission priority is received. Whether to mark a priority invocation packet for an IP flow with a priority Differentiated Services Code Point (DSCP) marking is determined The priority invocation packet is marked based on the determination and sent. A priority invocation packet for an IP flow that has a priority DSCP marking is received from a wireless device. The priority invocation packet is sent to its destination. Transmission priority is provided to IP flows received from the wireless device or sent to the wireless device for a period of time or until an indication of failed authorization is received. | 09-09-2010 |
20100303012 | Fall Back Using Mobile Device Assisted Terminating Access Domain Selection - Fall back using mobile device assisted terminating access domain selection is provided. A network entity forwards an invitation to a session to a mobile device. Session has packet switched bearers for media. Mobile device replies with a rejection of the invitation and a request for network entity to hold the session. Rejection is based on mobile device determining circuit switched bearers should be utilized. Mobile device sends a circuit switched call and network entity correlates the circuit switched call with the session. A dialog is set up over circuit switched domain bearers and Internet Protocol Multimedia Subsystem bearers. | 12-02-2010 |
20100311386 | METHOD AND APPARATUS FOR PERFORMING HANDOVER OF AN EMERGENCY CALL BETWEEN WIRELESS NETWORKS - Techniques for supporting handover of an emergency call between wireless networks are described. A UE may communicate with a first wireless network (e.g., a 3GPP E-UTRAN) for an emergency call and may receive an indication to perform handover to a second wireless network (e.g., a CDMA2000 1xRTT network). In an aspect, the UE may send a message including an emergency indication (an emergency global number, or a reserved emergency number, or some other indication) to initiate handover to the second wireless network. A designated network entity may recognize the emergency call based on the emergency indication and may map the emergency indication to a local emergency number or an Emergency Session Transfer Number for SRVCC (E-STN-SR), which may be used to establish a new incoming call leg to a network server anchoring the emergency call. The UE may then communicate with the second wireless network via the network server for the emergency call after handover. | 12-09-2010 |
20110088080 | Apparatus and Method for Authorization for Access Point Name (APN) Usage in a Specific Access - An apparatus and method for receiving a request for authorization and access from a requestor; determining the association of a care-of-address (CoA) in the request with an access technology used by the requestor; administering authorization rules based on the association of the care-of-address (COA) and the access technology; and determining either to allow access or to deny access to the requestor using results from administering the authorization rules. | 04-14-2011 |
20110317667 | SOFT HANDOFF ACROSS DIFFERENT NETWORKS ASSISTED BY AN END-TO-END APPLICATION PROTOCOL - A method of handoff across different networks is disclosed. A first communication link through a first network is used for communicating between a first user agent and a second user agent. The user agents negotiate to use a second communication link for the same call. The second communication link is established through a second network between the first user agent and the second user agent while maintaining the first communication link. Related data is sent through the first communication link and the second communication link. The first communication link is dropped and communication is continued using the second communication link. | 12-29-2011 |
20120020291 | Packet Data Service With Circuit-Switched Call Notification - Systems and techniques are disclosed relating to wireless communications. The systems and techniques involve wireless communications wherein a packet data session may be established between a wireless communications device and a packet data serving node to support a network connection to a packet-switched network. The wireless communications device may be configured to receive a notification of an incoming call from a circuit-switched network even when the network connection is active. | 01-26-2012 |
20130064082 | PERFORMING PACKET FLOW OPTIMIZATION WITH POLICY AND CHARGING CONTROL - Policy and charging control (PCC) is a framework within a Third or Fourth Generation (3G/4G) network that allows operators to authorize and enforce policy, Quality of Service (QoS), and charging control over communication sessions by mobile devices. PCC mechanism is used to determine the type QoS based on a request received from a User Equipment (UE) or network. PCC is one important element within System Architecture Evolution (SAE) architecture to allow the network to perform policy and charging control. A mechanism is provided so that PCC can allow packet flow optimization. Thereby, the network can detect Internet Protocol (IP) flows based on operator defined criteria and can perform policy and QoS control. | 03-14-2013 |