Patent application number | Description | Published |
20140105011 | METHODS, APPARATUS, A SYSTEM, AND A RELATED COMPUTER PROGRAM PRODUCT FOR ACTIVATION AND DEACTIVATION OF BEARERS - Methods, apparatuses, system and computer program product for activation and/or deactivation of bearers for a group of devices are disclosed. The method comprises receiving an attach request for a device belonging to a group of devices, obtaining an identity of the group of devices, allocating a first bearer identity for the group of devices, and sending the identity of the group and the first bearer identity to a first network element, wherein the first network element is involved in transmission of user data of the group of devices. | 04-17-2014 |
20140219182 | DEVICE TRIGGERING SOLUTIONS - For many machine to machine applications a poll model can be used for communications between machine type communication devices and the machine type communication server. In such and other communication systems device triggering solutions can permit efficient communication. According to certain embodiments, a method can include preparing an attach request to be sent to a network element, wherein the attach request includes an indication of a device trigger capability of a user equipment. The method can also include activating the user equipment in response to a received device trigger. | 08-07-2014 |
20140286221 | ACTIVATION OF MULTICAST SERVICE - Activation of multicast service may benefit various communication systems. For example, communication systems of the evolved packet system may benefit from the use of properly established bearers. A method may include establishing, by a device, a bearer with a gateway. The method may also include initiating a request for multicast services, using the bearer to initiate the request for multicast services. The gateway may be a packet data network gateway or a multimedia broadcast multicast services gateway, and the device may be a user equipment. | 09-25-2014 |
20150030019 | MOBILE SWITCHING CENTER ACTING AS A SHORT MESSAGE SERVICE GATEWAY - Communications systems, such as the evolved packet system, may benefit from configurations and methods for a mobile switching center. For example, a mobile switching center may be configured to act as a short message service gateway. A method can include communicating, by a mobility management entity, regarding a user equipment with a home subscriber server of the user equipment. The method can also include determining whether a mobility management entity communicates with a short message service gateway mobile switching center regarding the user equipment based on communication with the home subscriber server. | 01-29-2015 |
20150119083 | METHOD TO TRIGGER DEVICES BASED ON THEIR LOCATION - Communication systems including the evolved packet system can include machine type communication. Location device triggering can be a feature related to machine type communication (MTC) and can also be applied to other areas, such as public safety networks. In this feature, the network can initiate a trigger to the device, such as MTC devices, based on area information provided to the network operator. A method can include triggering a group of devices using a triggering request. The triggering request includes at least one of geographic information or a group identifier based on geographic information. The method can also include receiving the request and determining at least one serving node based on the geographic information when the triggering request geographic information. The method can further include sending a device trigger request including at least one of a tracking area identifier, a cell identifier, or the group identifier. | 04-30-2015 |
20150139095 | METHOD TO ADDRESS INFREQUENT TRANSMISSION - Communication systems, such as an evolved packet system, may benefit from methods for addressing infrequent transmissions. In particular, certain communication systems in which machine type communication devices are deployed may benefit from a machine type communication feature for infrequent transmission. A method for providing such a feature can include negotiating at least one characteristic of a bearer. The method can also include deactivating the bearer based on the at least one characteristic. | 05-21-2015 |
20150208232 | MACHINE-TYPE COMMUNICATION PROXY FUNCTION - One embodiment includes a method and apparatus for routing messages in a machine-type communication (MTC) architecture. The method includes receiving a request at a MTC-proxy residing at an egress of a network. The request includes an international mobile subscriber identity (IMSI) for which a destination is outside the network. The method further includes replacing, by the MTC-proxy, the IMSI in the request with an external identifier. | 07-23-2015 |
20150230063 | GROUP MESSAGING IN A COMMUNICATION NETWORK - An apparatus of a communication network performs processing ( | 08-13-2015 |
20150236985 | Optimizations for Frequent Small Data Transmission - Communication systems, such as an evolved packet system, may benefit from optimizations for frequent small data transmissions. In particular, certain communication systems in which mobile applications require numerous keep-alive messages or presence information may benefit from optimizations to state transitions between active and idle states. A method may include detesting a plurality of small packets that are mobile terminated. The method may also include indicating an inactivity time based on the detecting of the small packets and providing this indication in user plane packets or control signaling to the radio access network. | 08-20-2015 |
20150264634 | PROVISIONING EXTERNAL IDENTIFIERS - The present invention provides a method, an apparatus and computer program product relating to provisioning external identifiers. The present invention includes receiving a request including an interworking function address, a subscriber identifier, a device identifier and at least one application identifier, generating, by the interworking function or by a home subscriber server, at least one external identifier based on the received subscriber identifier, device identifier and at least one application identifier. | 09-17-2015 |
20160050544 | ENHANCEMENTS TO EMBMS FOR GROUP COMMUNICATION - Various communications may benefit from enhancements for group communication. For example, evolved packet system including an evolved multimedia broadcast/multicast service may benefit from such enhancements. For example, a method may include preparing a list of area names, identities, or both area names and identities to a network element. Moreover, a method may also include requesting the network to broadcast data to a broadcast area defined by the list. The list can define an allowed area, a broadcast area, or both. | 02-18-2016 |
20160050545 | IDENTIFYING DOWNLINK USER PACKETS - A method and apparatus can be configured to transmit, by a first user equipment, a first communication. The method can also receive, by the first user equipment, a group communication. The group communication is directed to a group. The group comprises the first user equipment and a second user equipment. The group communication comprises the first communication. The group communication also comprises an identifier that identifies the first communication of the group communication as originating from the first user equipment. The method can also identify, by the first user equipment, that the first communication of the group communication originates from the first user equipment based on the identifier. The method can also ignore the first communication of the group communication. | 02-18-2016 |
20160057652 | ENHANCED BACK-OFF TIMER SOLUTION FOR GTP-C OVERLOAD CONTROL - A system, a method, an apparatus, and a computer program product for general packet radio service (GPRS) tunneling protocol control plane (GTP-C) overload control is provided. One method includes sending a message indicating overload to a network entity. The message may comprise a back-off time value to indicate the overload. The method may further include selectively reducing signaling based on the message. | 02-25-2016 |
20160100326 | CORRELATION IDENTIFIER FOR USER PLANE CONGESTION AND OTHER USE CASES - Various communication systems may benefit from an identifier that can correlate a user equipment or a packet data network connection with a particular cell. For example, a correlation identifier may be useful to address management of user plane congestion and other use cases. A method can include generating a correlation identifier for a user equipment and/or a packet data network connection. The method also includes the ability to identify the user context information with the same correlation ID in the core network and in the radio access network. The method can also include sending the correlation identifier to a network element. | 04-07-2016 |
Patent application number | Description | Published |
20090098851 | Simplified Method for IMS registration in the Event of Emergency Calls - Simplification of IMS registration in the event of emergency calls is made possible by apparatuses and a method for setting up an emergency-call connection from a terminal to an IMS via a network visited by the terminal, where, if the terminal is already registered in the IMS, setup of an emergency-call connection dispenses with IMS registration of the terminal in the IMS for this emergency-call connection if a comparison between a network identification for the visited network, of which the terminal was notified when it registered in the visited network, and a network identification for the terminal's home network reveals a match between these network identifications. | 04-16-2009 |
20100208659 | LOCAL BREAK OUT IN CASE OF WIMAX ROAMING - Architecture, in particular a home agent being placed in a visited connectivity service network in order to separate a data traffic path to a home connectivity service network and a data traffic path to the internet in order to minimise a number of hops and delay times. | 08-19-2010 |
20150111533 | MONITORING SUSPICIOUS EVENTS IN A CELLULAR NETWORK - Communication systems, including cellular networks, and the devices that are connected to them, can have both legitimate and illegitimate uses. Such communication systems, including systems that utilize, permit, or leverage machine-type-communications, may benefit from monitoring for suspicious events. A method can include receiving a monitoring request regarding a user equipment or a category of devices. The method can also include performing a monitoring activity regarding the user equipment or the category of devices with respect to at least one suspicious event. The method can further include responding to the monitoring request indicating whether monitoring will be performed for the user equipment or the category of devices. | 04-23-2015 |