Patent application number | Description | Published |
20110116499 | METHOD AND SYSTEM FOR SELECTIVELY BYPASSING PACKET CORE NETWORK WITHIN A SESSION BASED ON TRAFFIC TYPE - According to one aspect of the invention, packets of a first type within a first data flow are routed to a destination through a packet core network. In response to a detection that packets of a second type are to be routed while routing the first data flow, a second data flow is created which is a sub-flow of the first data flow. Packets of the second type are routed via the second data flow to the destination without traversing the packet core network, while packets of the first type are routed via the first data flow traversing the packet core network. | 05-19-2011 |
20110208959 | METHOD AND SYSTEM FOR REDUCING PACKET OVERHEAD FOR AN LTE ARCHITECTURE WHILE SECURING TRAFFIC IN AN UNSECURED ENVIRONMENT - A first packet is received at a network element from an E-UTRAN Node B (eNB) of an E-UTRAN access network via a secured communications tunnel of a secured connection, where the first packet encapsulates a second packet therein. It is determined whether the network element serves both a security gateway functionality and a serving gateway functionality of a core packet network based on the first packet and the second packet. The network element negotiates with the eNB to switch further communications from a tunnel mode to a transport mode of the secured connection if it is determined that the network element serves both the security gateway functionality and the serving gateway functionality. Thereafter, the network element exchanges further packets with the eNB via the transport mode of the secured connection after the eNB switches from the tunnel mode to the transport mode. | 08-25-2011 |
20120008578 | METHOD AND SYSTEM FOR INTERWORKING A WLAN INTO A WWAN FOR SESSION AND MOBILITY MANAGEMENT - According to one aspect, a mobility gateway device (MGW) receives a request from a wireless local area network (WLAN) controller of a WLAN for accessing the Internet or a packet core network, where the request is originated from a user equipment communicatively coupled to the WLAN. In response to the request, the MGW is configured to determine whether there is an active session associated with the UE over a wireless wide area network (WWAN). If so, the MGW assigns an IP address to the UE that was assigned to the UE during the active session of the WWAN. The assigned IP address is used by the UE to access the Internet or the packet core network over the WLAN. | 01-12-2012 |
20130021972 | METHOD AND SYSTEM FOR OPTIMIZED HANDLING OF CONTEXT USING HIERARCHICAL GROUPING (FOR MACHINE TYPE COMMUNICATIONS) - A hierarchical data structure for signaling and data handling at a packet core network is defined. A hierarchical data structure is applied to both persistent and dynamic information to support a type of devices that share the same characteristics. Subscription database, context information, and policy rule information is comprised of group level information and device level information. Group level information contains the information the devices that belong to the group share. Device level information contains the device specific information that is different from group level information. When a device belonging to a group requests access to a packet network or performs a procedure that changes the mobility or session state of the device, context management unit works with authentication unit, subscription database unit, and policy decision unit to construct a right information for the device to handle the control and user data traffic. | 01-24-2013 |
20140056132 | METHOD AND SYSTEM FOR SIGNALING SAVING ON RADIO ACCESS NETWORKS USING EARLY THROTTLING MECHANISM FOR COMMUNICATION DEVICES - An intelligent system and a method in a packet network to utilize the radio network resource and the core network resource in an optimized way so that more high priority, critical devices are granted access to the network while throttling the low priority, non-critical devices with the same given resource. The system collects all the necessary information from the signaling exchange between the radio access network and the core network and takes the device subscription characteristics and statically or dynamically defined throttling behavior rules into consideration to choose the optimal behavior to handle the requests from devices at any given time including deciding to reject the requests for certain types of devices under certain network conditions while granting the requests for other types of devices. This early throttling mechanism effectively increases the network resources, especially radio access network resources for high priority devices so that the quality of service does not change for those high priority devices even under network congestion condition. | 02-27-2014 |
20140078988 | METHOD AND SYSTEM FOR ELASTIC AND RESILIENT 3G/4G MOBILE PACKET NETWORKING FOR SUBSCRIBER DATA FLOW USING VIRTUALIZED SWITCHING AND FORWARDING - A system and method in a packet network for optimally separating control and data in the context of mobile networking. The embodiments disclosed herein utilize virtualization and elastic computing in the context of a control plane while the user plane flexibility is realized by application programming interfaces (APIs) between a control and user plane. The control plane is configured to receive a notification that a mobile device is done sending or receiving a communication; store in a flow table flow information associated with the communication; receive a trigger for resumption of flow when the communication is to be resumed; and pass the flow information to a cache in a data plane. | 03-20-2014 |
20140269345 | METHOD AND SYSTEM FOR NETWORK TROUBLESHOOTING AND IMPROVING KPI OF MOBILE DATA NETWORK - A mechanism to allow operators to automatically populate a knowledgebase with protocol characteristics of each mobile device type. In case a mobile device fails to complete signaling dialogue, it logs the messages exchanged till the point the failure occurred. On such failure it triggers a notification so that network operator is alerted with the fact that new device type is failing to get access to the network due to protocol error. Such notification can be used to debug the issue and correct the problem or update customer care information base so that when the affected customer calls, a Customer Service Representative has adequate information to explain to the customer. | 09-18-2014 |
20140349611 | Method and System for Selective and Secure interaction of BYOD (Bring Your Own Device) with Enterprise network through mobile wireless networks - A mechanism to allow provisioning and use of BYOD (Bring Your Own Device) for authorized access in the enterprise network through a 3G/4G/Wi-Fi access network is provided. A brokering entity in the mobile packet core is provisioned for each authorized employee with enterprise specific rules for security and steering of user traffic. An Enterprise Container is defined as entity on the User Equipment that is self-contained virtual machine with enterprise sanctioned applications. An intelligent mechanism for and steering of signaling and traffic from such BYOD devices to the brokering entity is defined. At any time by using the personal container or the default behavior of the user equipment the user can get mobile service as if the Enterprise Container did not exist. Further, when such employment relationship is terminated the user's BYOD needs to be restored to its pre-employment functionality. | 11-27-2014 |