Patent application number | Description | Published |
20090135795 | FEMTOCELL ARCHITECTURE IN SUPPORT OF VOICE AND DATA COMMUNICATIONS - Methods and systems for providing voice and date services in a femtocell wireless network. The proposed approach integrates IWLAN architecture into femtocell architecture by introducing a gateway to serve both IWLAN and femtocell users. The proposed approach handles the voice and data in a different way so that it enhances the data handling efficiency while re-using existing MSC investment. The proposed approach carries the data traffic from a femtocell base station to the gateway in native IP packet, instead of encapsulating them in 3G data, thus enhancing the efficiency and performance for the data traffic. The data traffic can then be sent to GGSN or directly to packet data network. The approach tunnels voice traffic to MSC through the gateway as in conventional Iu-CS approach. | 05-28-2009 |
20100027533 | METHOD AND SYSTEM FOR BYPASSING 3GPP PACKET SWITCHED CORE NETWORK WHEN ACCESSING INTERNET FROM 3GPP UES USING 3GPP RADIO ACCESS NETWORK - Techniques for bypassing a packet core network for Internet bound traffic from user equipment (UE) via a RAN are described herein. According to one embodiment, it is determined whether a packet of data is destined for the Internet, in response to receiving the packet from a radio network controller (RNC) of a radio access network (RAN). The packet is originated from user equipment (UE) over the RAN. The packet is routed directly to the Internet without sending the packet to an SGSN (serving GPRS support node) of a packet core network, if the packet is destined to the Internet. Other methods and apparatuses are also described. | 02-04-2010 |
20100077102 | METHOD AND SYSTEM FOR BYPASSING 3GPP PACKET SWITCHED CORE NETWORK WHEN ACCESSING INTERNET FROM 3GPP UES USING IP-BTS, FEMTO CELL, OR LTE ACCESS NETWORK - A type of network traffic associated with a packet received from a remote node of an access network is determined. A first interface logic routes the packet to a radio network controller (RNC) if the packet is received from an Internet protocol-basestation (IP-BTS) access network and destined to a packet core network. The RNC forwards the packet to a component of the packet core network. A second interface logic routes the packet to the component of the packet core network, including aggregating other packets of the same type received from other remote nodes, if the packet is received from a femto cell and destined to the packet core network. A breakout logic routes the packet to a destination of the Internet directly to enable the packet to reach the Internet without having to route the packet to the component of the packet core network, if the packet is destined to the Internet. | 03-25-2010 |
20100097981 | METHODS AND SYSTEMS FOR PROVIDING MULTIPLE MEDIA STREAMS IN A HYBRID WIRELESS NETWORK - A hybrid cellular and IWLAN network having an access gateway providing a user with simultaneous access to GGSN base packet data services and PDG based broadband multi-media services with one IP address. The system further comprises an authentication center retrieving the user's subscription profile information from an operator network to check the user's subscription to simultaneous GGSN and PDG services, wherein said access gateway multiplexes and de-multiplexes the service sessions without any change to said user. | 04-22-2010 |
20110075659 | METHOD AND SYSTEM FOR INSERTING A NEW NODE INTO A COMMUNICATIONS PATH BETWEEN TWO EXISTING NODES WITHOUT DISRUPTION - Techniques for inserting a new node into a communications path of existing nodes of a 3GPP network are described herein. According to one embodiment, state information is captured within a transport protocol layer of a first node. The state information pertains to an existing communications session between a second node and a third node, while the first node routing packets exchanged between the second and third nodes via the existing communications session. The transport protocol layer of the first node is then configured using the captured state information to enable the transport protocol layer of the first node to independently communicate with a transport protocol layer of the second node and the third node respectively without terminating the existing communications session. | 03-31-2011 |
20110116499 | METHOD AND SYSTEM FOR SELECTIVELY BYPASSING PACKET CORE NETWORK WITHIN A SESSION BASED ON TRAFFIC TYPE - According to one aspect of the invention, packets of a first type within a first data flow are routed to a destination through a packet core network. In response to a detection that packets of a second type are to be routed while routing the first data flow, a second data flow is created which is a sub-flow of the first data flow. Packets of the second type are routed via the second data flow to the destination without traversing the packet core network, while packets of the first type are routed via the first data flow traversing the packet core network. | 05-19-2011 |
20110208959 | METHOD AND SYSTEM FOR REDUCING PACKET OVERHEAD FOR AN LTE ARCHITECTURE WHILE SECURING TRAFFIC IN AN UNSECURED ENVIRONMENT - A first packet is received at a network element from an E-UTRAN Node B (eNB) of an E-UTRAN access network via a secured communications tunnel of a secured connection, where the first packet encapsulates a second packet therein. It is determined whether the network element serves both a security gateway functionality and a serving gateway functionality of a core packet network based on the first packet and the second packet. The network element negotiates with the eNB to switch further communications from a tunnel mode to a transport mode of the secured connection if it is determined that the network element serves both the security gateway functionality and the serving gateway functionality. Thereafter, the network element exchanges further packets with the eNB via the transport mode of the secured connection after the eNB switches from the tunnel mode to the transport mode. | 08-25-2011 |
20120008578 | METHOD AND SYSTEM FOR INTERWORKING A WLAN INTO A WWAN FOR SESSION AND MOBILITY MANAGEMENT - According to one aspect, a mobility gateway device (MGW) receives a request from a wireless local area network (WLAN) controller of a WLAN for accessing the Internet or a packet core network, where the request is originated from a user equipment communicatively coupled to the WLAN. In response to the request, the MGW is configured to determine whether there is an active session associated with the UE over a wireless wide area network (WWAN). If so, the MGW assigns an IP address to the UE that was assigned to the UE during the active session of the WWAN. The assigned IP address is used by the UE to access the Internet or the packet core network over the WLAN. | 01-12-2012 |
20130017831 | FEMTOCELL Architecture In Support Of Voice And Data Communications - Methods and systems for providing voice and date services in a femtocell wireless network. The proposed approach integrates IWLAN architecture into femtocell architecture by introducing a gateway to serve both IWLAN and femtocell users. The proposed approach handles the voice and data in a different way so that it enhances the data handling efficiency while re-using existing MSC investment. The proposed approach carries the data traffic from a femtocell base station to the gateway in native IP packet, instead of encapsulating them in 3G data, thus enhancing the efficiency and performance for the data traffic. The data traffic can then be sent to GGSN or directly to packet data network. The approach tunnels voice traffic to MSC through the gateway as in conventional Iu-CS approach. | 01-17-2013 |
20130021972 | METHOD AND SYSTEM FOR OPTIMIZED HANDLING OF CONTEXT USING HIERARCHICAL GROUPING (FOR MACHINE TYPE COMMUNICATIONS) - A hierarchical data structure for signaling and data handling at a packet core network is defined. A hierarchical data structure is applied to both persistent and dynamic information to support a type of devices that share the same characteristics. Subscription database, context information, and policy rule information is comprised of group level information and device level information. Group level information contains the information the devices that belong to the group share. Device level information contains the device specific information that is different from group level information. When a device belonging to a group requests access to a packet network or performs a procedure that changes the mobility or session state of the device, context management unit works with authentication unit, subscription database unit, and policy decision unit to construct a right information for the device to handle the control and user data traffic. | 01-24-2013 |
20140029519 | Wireless Architecture in Support of Voice and Data Communications - A wireless access network including a wireless base station configured to, for Iu-CS voice traffic, act as a network controller, by, terminating Iu-b signals from user equipment, and relaying the voice traffic over Iu-CS via an IP sec tunnel. And for data traffic, wireless base station is configured to act as the network controller, by, terminating Iu-b signals from the user equipment, striping IP payload, and sending the data traffic inside IPsec. Further, the wireless access network includes a wireless gateway configured to act as a security gateway for Iu-CS voice traffic, by, establishing the IP sec tunnel with the femtocell base station without the support of a GPRS Tunneling Protocol (GTP) as defined over Iu-PS. Also receiving and forwarding the tunneled Iu-CS voice traffic to a mobile switching center, and for data traffic, encapsulate the IP payload and send it via Gn to GGSN. | 01-30-2014 |
20140056132 | METHOD AND SYSTEM FOR SIGNALING SAVING ON RADIO ACCESS NETWORKS USING EARLY THROTTLING MECHANISM FOR COMMUNICATION DEVICES - An intelligent system and a method in a packet network to utilize the radio network resource and the core network resource in an optimized way so that more high priority, critical devices are granted access to the network while throttling the low priority, non-critical devices with the same given resource. The system collects all the necessary information from the signaling exchange between the radio access network and the core network and takes the device subscription characteristics and statically or dynamically defined throttling behavior rules into consideration to choose the optimal behavior to handle the requests from devices at any given time including deciding to reject the requests for certain types of devices under certain network conditions while granting the requests for other types of devices. This early throttling mechanism effectively increases the network resources, especially radio access network resources for high priority devices so that the quality of service does not change for those high priority devices even under network congestion condition. | 02-27-2014 |
20140078988 | METHOD AND SYSTEM FOR ELASTIC AND RESILIENT 3G/4G MOBILE PACKET NETWORKING FOR SUBSCRIBER DATA FLOW USING VIRTUALIZED SWITCHING AND FORWARDING - A system and method in a packet network for optimally separating control and data in the context of mobile networking. The embodiments disclosed herein utilize virtualization and elastic computing in the context of a control plane while the user plane flexibility is realized by application programming interfaces (APIs) between a control and user plane. The control plane is configured to receive a notification that a mobile device is done sending or receiving a communication; store in a flow table flow information associated with the communication; receive a trigger for resumption of flow when the communication is to be resumed; and pass the flow information to a cache in a data plane. | 03-20-2014 |
20140349611 | Method and System for Selective and Secure interaction of BYOD (Bring Your Own Device) with Enterprise network through mobile wireless networks - A mechanism to allow provisioning and use of BYOD (Bring Your Own Device) for authorized access in the enterprise network through a 3G/4G/Wi-Fi access network is provided. A brokering entity in the mobile packet core is provisioned for each authorized employee with enterprise specific rules for security and steering of user traffic. An Enterprise Container is defined as entity on the User Equipment that is self-contained virtual machine with enterprise sanctioned applications. An intelligent mechanism for and steering of signaling and traffic from such BYOD devices to the brokering entity is defined. At any time by using the personal container or the default behavior of the user equipment the user can get mobile service as if the Enterprise Container did not exist. Further, when such employment relationship is terminated the user's BYOD needs to be restored to its pre-employment functionality. | 11-27-2014 |
Patent application number | Description | Published |
20090250268 | METHOD FOR RAPIDLY TESTING CAPACITANCE SENSING ARRAY FAULT CONDITIONS - The testing of a multi-touch sensor panel for opens and shorts on its drive and sense lines is disclosed by placing a substantially ungrounded conductor diagonally over the touch sensor panel so that at least a portion of every drive line and every sense line is covered by the substantially ungrounded conductor. Pixels under the substantially ungrounded conductor can have strongly positive pixels, while pixels outside the substantially ungrounded conductor can have negative pixels. With the substantially ungrounded conductor in place, a backdrop of negative pixels is formed, and an image of touch can be obtained. By analyzing the image of touch, any opens and shorts on the drive and sense lines, any shorts between a drive and a sense line, or any open drive and sense lines can be quickly identified against the backdrop of negative pixels. | 10-08-2009 |
20090273584 | FLEXIBLE CALIBRATION SURFACE - The efficient calibration of multi-touch sensor panels that have non-flat surfaces is disclosed. The calibration of the sensor panels can be accomplished using a calibration device with a flexible calibration surface. The flexible calibration surface is particularly well-suited for curved or other non-flat touch sensor panels, such as those that might be present on a mouse or other device designed to be grasped by a user's hand. The flexible apparatus can conform to the non-flat touch sensor panel and apply the equivalent of a conductive touch over most or all of the pixels. | 11-05-2009 |
20110037735 | FULL SCALE CALIBRATION MEASUREMENT FOR MULTI-TOUCH SURFACES - Normalization of regions of a sensor panel capable of detecting multi-touch events, or a sensor panel capable of detecting multi-hover events, is disclosed to enable each sensor in the sensor panel to trigger a virtual button in a similar manner, given the same amount of touch or hover. Each sensor produces an output value proportional to the level or amount of touch or hover. However, due to processing, manufacturing and physical design differences, the sensor output values can vary from region to region or panel to panel for a given amount of touch or hover. To normalize the sensor output values across regions, gain and offset information can be obtained in advance, stored in nonvolatile memory, and later used to normalize the sensor output values so that all regions in the sensor panel can trigger virtual buttons similarly, providing a uniform “response function” at any location on the sensor panel. | 02-17-2011 |
20120154339 | FULL SCALE CALIBRATION MEASUREMENT FOR MULTI-TOUCH SURFACES - Normalization of regions of a sensor panel capable of detecting multi-touch events, or a sensor panel capable of detecting multi-hover events, is disclosed to enable each sensor in the sensor panel to trigger a virtual button in a similar manner, given the same amount of touch or hover. Each sensor produces an output value proportional to the level or amount of touch or hover. However, due to processing, manufacturing and physical design differences, the sensor output values can vary from region to region or panel to panel for a given amount of touch or hover. To normalize the sensor output values across regions, gain and offset information can be obtained in advance, stored in nonvolatile memory, and later used to normalize the sensor output values so that all regions in the sensor panel can trigger virtual buttons similarly, providing a uniform “response function” at any location on the sensor panel. | 06-21-2012 |
Patent application number | Description | Published |
20130060560 | SERVER-BASED SPELL CHECKING - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for server-based spell check. One aspect of the subject matter described in this specification can be embodied in methods performed by a server. The methods include the actions of receiving a request to spell check text; dividing the text into multiple segments, each segment including no more than a predetermined number of terms; providing each segment to a spell checker programmed to spell check an input including no more than the predetermined number of terms; receiving, from the spell checker, one or more spelling correction suggestions, each spelling correction suggestion corresponding to a term in a segment, the term being designated as misspelled by the spell checker; and assembling the received one or more spelling correction suggestions into a response to the request to spell check the text. | 03-07-2013 |
20130061139 | SERVER-BASED SPELL CHECKING ON A USER DEVICE - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for server-based spell check. One aspect of the subject matter described in this specification can be embodied in methods performed by a user device. The methods include the actions of receiving user input text; identifying a candidate term for spelling correction from the received text, the candidate term including a term designated as a misspelled term by a local spell checker, the local spell checker executing on the user device; sending the candidate term to a remote spell checker, the remote spell checker executing on a server that is connected to the user device through a communications network; receiving, from the remote spell checker, a spelling correction suggestion for the candidate term; and providing the spelling correction suggestion for display on the user device. | 03-07-2013 |