Patent application number | Description | Published |
20090254969 | Method and system for managing security of mobile terminal - A method for enabling security on a mobile terminal having a communication link with a circuit switched network against suspicious activities is provided. Activities performed at the mobile terminal are performed according to a security policy provided from the circuit switched network. Detection of a suspicious activity is alerted to the circuit switched network when the suspicious activity is detected. A policy manager server of the circuit switched network changes the security policy to cure the suspicious activity on the mobile terminal. Call traffic delivered to/sent from the mobile terminal is filtered out, which causes the suspicious activity according to the security policy. The mobile terminal enforces a security measure on a suspicious activity according to the security policy. | 10-08-2009 |
20100138660 | SECURE COMMUNICATION SESSION SETUP - A device receives an encrypted key generating value from a first device and decrypts the encrypted key generating value. A temporary session key associated with the first device is generated based on the key generating value. A secure session invitation message is received from the first device. A master session key is generated and encrypted using the temporary session key associated with the first device. The encrypted master session key is transmitted to the first device. | 06-03-2010 |
20100167692 | METHODS, SYSTEMS, AND APPARATUS FOR HANDLING SECURE-VOICE-COMMUNICATION SESSIONS - An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed. | 07-01-2010 |
20120002537 | BASE STATION FAILOVER USING NEIGHBORING BASE STATIONS AS RELAYS - A method performed by a base station in a network, includes detecting a malfunction associated with a backhaul link to the network; identifying one or more neighboring base stations located within a transmission range of the base station; selecting at least one of the one or more neighboring base stations based on one or more parameters, associated with the one or more neighboring base stations, in response to detecting the malfunction; receiving, by a radio frequency (RF) transceiver associated with the base station, a signal from a user equipment; and transmitting, by an RF transceiver associated with the base station, the signal to the selected at least one of the one or more neighboring base stations. | 01-05-2012 |
20120005177 | AUTOMATED DEVICE REPORTING - A method performed by a device includes detecting a first condition to generate a report record associated with the device; generating the report record associated with the device, in response to detecting the first condition, where generating the report record includes recording environment conditions associated with the device, recording device conditions associated with the device, and recording signal conditions associated with the device; detecting a second condition to send the generated report record to a server device; and sending the generated report record to the server device, in response to detecting the second condition. | 01-05-2012 |
20120023360 | MOBILITY MANAGEMENT ENTITY FAILOVER - A method, performed by a first mobility management entity (MME) device in a network, includes receiving, from a second MME device, standby database information associated with user equipment (UE) registered with the second MME device; detecting that the second MME device has failed or lost connectivity; designating that the UEs registered with the second MME device will be registered with the first MME device, in response to detecting that the second MME device has failed or lost connectivity; detecting a request to activate a particular UE registered with the second MME device; and paging the particular UE to register with the first MME device, using the standby database information and in response to detecting the request to activate the particular UE. | 01-26-2012 |
20120157045 | Methods, Systems, and Apparatus for Handling Secure-Voice-Communication Sessions - An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed. | 06-21-2012 |
20120163265 | AUTONOMOUS NETWORK ACCESS CONGESTION AND COLLISION CONTROL - A mobile terminal receives a class identifier and receives a broadcast message with a backoff period definition for multiple classes of mobile terminals. The mobile terminal applies the class identifier to the backoff period definition to determine a backoff interval for the mobile terminal. The mobile terminal sends, to a base station, a radio resource control (RRC) connection request using the calculated backoff interval. Different backoff intervals are assigned to different classes of mobile terminals to control network access congestion at the base station. | 06-28-2012 |
20120163369 | LOW LATENCY CALL TRANSFER - A system is configured to receive, from a user device, voice traffic to be sent to another user device; determine whether the voice traffic is local traffic based on whether an eNodeB, associated with the user device, and another eNodeB, associated with the other user device, are served by a particular network device; forward the voice traffic, as non-local traffic, to another network device, associated with a packet data network, for processing when the eNodeB or the other eNodeB are not served by the particular network device; process the voice traffic as local traffic when the eNodeB and the other eNodeB are served by the particular network device; and forward, to the other user device via the other eNodeB, the voice traffic, as local traffic, where the forwarding is performed in a manner that does not include routing the voice traffic via the other network device. | 06-28-2012 |
20120236753 | CONDITION DETECTION BY A CALL SESSION CONTROL FUNCTION (CSCF) - A system configured to receive, from a user device, traffic associated with a request to initiate a call session; detect a condition associated with the traffic; determine whether to establish the call session based on whether the condition, associated with the traffic, is a particular type of condition; send, to a server device, a notification to perform an operation to remedy the condition when the condition does not correspond to the particular type of condition, where sending the notification enables the server device to identify a type of condition, identify an operation that remedies the condition based on the type of condition, or initiate the operation to remedy the condition; and establish the call session when the type of condition corresponds to the particular type of condition, where establishing the call session enables a call, placed by the user device, to be processed as a normal call. | 09-20-2012 |
20120272320 | METHOD AND SYSTEM FOR PROVIDING MOBILE DEVICE SCANNING - An approach for providing mobile device scanning is described. A file stored within a mobile device is received. A scan of the received file is initiated to determine a status relating to presence of an unauthorized code or to execution of an unauthorized activity. A notification message is generated based on the scan, wherein the notification message specifies information relating to the determined status. | 10-25-2012 |
20120314568 | INTEROPERABLE QUALITY OF SERVICE PRE-NEGOTIATION - A system configured to receive a request to identify a quality of service (QoS) policy to be used to process traffic that is received from a user device associated with another network; obtain an interoperable QoS policy, where the interoperable QoS policy identifies a first QoS level, associated with the other network, that corresponds to a type of traffic received from the user device; obtain, from the interoperable QoS policy, a second QoS level that corresponds to the first QoS level; and send, to a device, an instruction to process the traffic based on the second QoS level. | 12-13-2012 |
20120314641 | MULTICAST-UNICAST HANDOFF SERVICES - A system may receive, from a user device, a request to receive content via a first base station, where the content was previously being received, as multicast content, via a second base station; determine, in response to the request, whether the first base station can process multicast content; transmit a copy of the content, to the user device via the first base station, as multicast content, based on a determination that the first base station can process multicast content; and transmit the content, to the user device via the first base station, as unicast content, based on a determination that the first base station cannot process multicast content. | 12-13-2012 |
20130003652 | SPLIT USAGE OF RADIO ACCESS NETWORKS WITH IMS - Different access networks may perform signaling and data delivery (bearer connection) for communication services. A device may determine, in response to a request for a service from a user of the device, whether the device is connected to a non-cellular access network. The device may transmit, when it is determined that the device is connected to the non-cellular access network, one or more control messages, relating to establishment of the service, using the non-cellular access network. The device may transmit, when it is determined that the device is not connected to the non-cellular access network, the one or more control messages, using a cellular access network. The device may establish, with a party with which the service is to connect, a bearer connection for the service over the cellular access network. | 01-03-2013 |
20130044603 | RADIO ACCESS NETWORK TECHNOLOGY OPTIMIZATION BASED ON APPLICATION TYPE - A mobile device may monitor availability of access networks that provide connectivity for the mobile device. The mobile device may also store preference information, on a per-application basis, relating to preferences for using the access networks by applications executed by the mobile device. The mobile device may additionally select, in response to a request from an application to connect to the network, one of the access networks, based on the preference information for the application; and provide a communication channel for the application using the selected access network. | 02-21-2013 |
20130070669 | LATENCY-INSENSITIVE RAN - HIGH-CAPACITY/LATENCY-TOLERANT SESSION MANAGEMENT - A telecommunications network receives an indication that a user device, communicatively coupled to the telecommunications network, is a latency-insensitive device; receives connection information associated with a connection between the user device and the telecommunications network; stores, based on the indication that the user device is a latency-insensitive device, at least a portion of the connection information, associated with the connection between the user device and the telecommunications network, in a virtual memory of the server device; receives an indication that the connection is to become active; and places, based on receiving the indication that the connection is to become active, at least the portion of the connection information, associated with the connection between the user device and the telecommunications network, in a physical memory of the server device. | 03-21-2013 |
20130081138 | RESPONDING TO IMPERMISSIBLE BEHAVIOR OF USER DEVICES - A device detects an impermissible behavior by a user device. The device further identifies a rule associated with the impermissible behavior and executes a response to the impermissible behavior based on the rule. The response restricts access of the user device to a service provided by or via a network device. The device also transmits, to the user device, a message that specifies the response. The device also verifies a termination of a cause of the impermissible behavior and restores the access of the user device to the service. | 03-28-2013 |
20130115943 | LOCATION-BASED MICROCELL SEARCH - A network device may store information identifying a coverage area associated with each of one or more cells that are associated with the network device. The network device may receive information identifying a geographic location of a user device. The network device may compare the geographic location of the user device to one or more of the stored coverage areas. The network device may also determine, based on the comparing, that the user device is within a particular coverage area of a particular cell, of the one or more cells. The network device may further send, to the user device, and based on determining that the user device is located within the particular coverage area of the particular cell, an instruction for the user device to connect to the particular cell, where the user device is to attempt to connect to the particular cell in response to the instruction. | 05-09-2013 |
20130163464 | HANDING OVER A USER DEVICE FROM ONE TECHNOLOGY TO ANOTHER - A server device may identify that a user device is connected to a first radio access network (“RAN”), via a first technology. The server device may identify that the user device is capable of accessing a second RAN, via a second technology, where the second RAN is different from the first RAN, and where the second technology is different from the first technology. The server device may also receive an indication that the first RAN is congested. The server device may further determine, based on the indication that first RAN is congested, and further based on identifying that the user device is capable of accessing the second RAN via the second technology, that the user device should be handed over to the second RAN. Additionally, the server device may instruct the user device to connect to the second RAN via the second technology. | 06-27-2013 |
20130216027 | MITIGATING DENIAL OF SERVICE ATTACKS ON CALL CENTERS - A device receives, from a user device, a call destined for a call center, and provides an audio CAPTCHA (Completely Automated Public Turing test to Tell Computer and Humans Apart) to the user device in response to the call. The device also receives, from the user device, a response to the audio CAPTCHA, and determines whether the response is correct. The device forwards the call to the call center when the response is correct, and drops the call when the response is incorrect. | 08-22-2013 |
20130267227 | LOCATION-BASED MICROCELL SEARCH - A network device may be configured to receive information regarding a location of a user device; compare the location of the user device to one or more coverage areas associated with each of one or more cells that are associated with a base station of a wireless telecommunications network; determine that the user device is within a particular coverage area of a particular cell, of the one or more cells; and instruct the user device, based on determining that the user device is within the particular coverage area of the particular cell, to connect to the particular cell. | 10-10-2013 |
20130333032 | NETWORK BASED DEVICE SECURITY AND CONTROLS - Protection against security attacks involves monitoring network traffic for a computing device security attack and determining whether there is a security event, using one or more network based security tools. Next, it is determined whether an event pattern involving two or more security events meets a predetermined criteria. Upon determining that there is a security attack, corrective action is tailored, based on the type of the computing device, the operating system of the computing device, the type of security attack, and/or the available protection tools. A course of action is performed depending on whether an account of the computing device includes a security protection service. If there is a security protection service, a message is sent over a secure link to the computing device. This message includes the corrective action to cure the computing device from the security attack. | 12-12-2013 |
20140066046 | RADIO ACCESS NETWORK INTEGRATED SET-TOP DEVICE - A device may receive a signal strength indicator associated with a connection between a mobile device and a first base station. The signal strength indicator may indicate a strength of a radio signal received by the mobile device from the first base station. The device may transmit the signal strength indicator to a network device, and may receive, from the network device, a first notification to activate a second base station based on the signal strength indicator. The device may activate the second base station based on the first notification. The second base station may provide temporary wireless connectivity for the mobile device. | 03-06-2014 |
20140066052 | DEVICE AND NETWORK MONITORING CORRELATION SYSTEM FOR NETWORK TROUBLESHOOTING - A monitoring device may determine an application to monitor, may determine a parameter to monitor, where the parameter is associated with at least one of a network or a device, may determine user devices from which to collect the parameter, and may transmit, to the user devices, information that identifies the application and information that identifies the parameter. The monitoring device may receive, from the user devices, information that identifies values of the parameter, may analyze the values of the parameter, may determine, based on the analysis, that the application is a cause of a problem associated with the network or the device. The monitoring device may perform an action based on determining that the application is a cause of the problem. | 03-06-2014 |
20140071889 | OVER-THE-TOP (OTT) VIDEO / VOICE CONFIGURATION - A user equipment (UE) provides for display, to a user, information identifying available over-the-top (OTT) services provided via voice-over-Long-Term Evolution (VoLTE), and receives, from the user, a selection of a particular OTT service of the available OTT services. The UE receives, from the user, information identifying a selected contact associated with the particular OTT service, and determines whether a particular UE associated with the selected contact is a VoLTE capable device or a non-VoLTE capable device. The UE provides a call to the particular UE, via a LTE network and an Internet protocol (IP) Multimedia Subsystem (IMS) network, when the particular UE is a VoLTE capable device. | 03-13-2014 |
20140109187 | SECURE PROVISIONING OF COMMERCIAL OFF-THE-SHELF (COTS) DEVICES - A device receives identification information associated with a mobile commercial off-the-shelf (COTS) device, and receives configuration and security requirements defined for the mobile COTS device. The device creates secure configuration software for the mobile COTS device based on the identification information and the configuration and security requirements, and provides the secure configuration software to the mobile COTS device for installation. | 04-17-2014 |
20140109209 | HOSTED IMS INSTANCE WITH AUTHENTICATION FRAMEWORK FOR NETWORK-BASED APPLICATIONS - A device is configured to receive an authentication credential from a user device, and is configured to authenticate the user device based on the authentication credential. The device is configured to transmit, based on authenticating the user device, a first application for establishing a tunnel that permits the user device to access a second application using an Internet protocol multimedia subsystem (IMS) network architecture. The device is configured to establish, based on the first application, a tunnel for transferring IMS traffic to or from the user device, and is configured to transfer the IMS traffic to or from the user device, using the tunnel, where transferring the IMS traffic permits the user device to access the second application. | 04-17-2014 |
20140185521 | INSTALLATION OF A VOICE CLIENT FOR ROAMING DEVICES IN A WIRELESS NETWORK - Voice over LTE (VoLTE) services may be provided to a roaming mobile device, even when the home network of the mobile device does not provide VoLTE service. In one implementation, one or more devices in a network may determine based on a mobile device attaching to a network as a roaming device for the network, a home network of the mobile device. The devices may further determine whether the home network, associated with the mobile device, provides VoLTE services; transmit, based on the determination that the home network does not provide VoLTE services, a VoLTE client application to the mobile device, the VoLTE client application providing functionality, for the mobile device, relating to usage of VoLTE services in the network. The devices may further communicate with the mobile device and the VoLTE client application, to provide one or more VoLTE services to the mobile device. | 07-03-2014 |
20140187210 | FILTERING AND ENHANCEMENT OF VOICE CALLS IN A TELECOMMUNICATIONS NETWORK - Voice calls may be filtered and/or modified to enhance the clarity of a speaker's voice. In one implementation, a device may receive an indication, from a caller associated with a call, that speech of the caller is to be modified to deemphasize an accent of the caller. The device may modify, based on the received indication, the speech of the caller to deemphasize the accent of the caller and transmit the modified speech to a callee associated with the call. | 07-03-2014 |
20140187236 | QUICK RECOVERY OF RF SESSIONS AFTER BACKHAUL LINK FAILURE - Communication sessions with mobile devices may be suspended, in a wireless communications network, after failure of one or more backhaul network links In one implementation, a device may detect failure of a backhaul network connecting a cell site to a core portion of a wireless network; and suspend, based on the detected failure, communication sessions with mobile devices connected to the cell site through radio interfaces, the suspending of the communication sessions including preventing loss of the communication sessions despite the failure of the backhaul network. The device may further detect cessation of the failure of the backhaul network; and resume, based on the detected cessation of the failure of the backhaul network, the communication sessions with the mobile devices. | 07-03-2014 |
20140188873 | Presenting Information Based on User Profiles - A server may be configured to receive behavior information associated with a user device. The behavior information may indicate a set of geographical locations at which the user device has been present. The server may generate a mode based on the behavior information. The mode may indicate a set of conditions based on which the mode is to be activated, and a set of information to be presented when the mode is activated. The server may output the mode to the user device. The user device may determine, after receiving the mode, that the set of conditions has been satisfied. The determining may be based on a geographical location of the user device. The user device may activate the mode, based on determining that the set of conditions has been satisfied; and may present at least a portion of the set of information, based on activating the mode. | 07-03-2014 |
20140189034 | Adapative, Personal Localized Cache Control Server - A server may be configured to receive an indication that a first user device stores a particular content item; receive, from a second user device, a request for content; and determine that the requested content is available from the first user device. The determining may include determining that the particular content item stored by the first user device corresponds to the request for content, and determining that a local peer connection is available between the first user device and the second user device. The server may further output, to the first user device, an instruction to output the requested content to the second user device via the local peer connection, and/or the server may output, to the second user device, information which may allow the second user device to request the content from the first user device via a local peer connection. | 07-03-2014 |
20140274107 | PERSONALIZED NAVIGATION INFORMATION BASED ON USER BEHAVIOR - A user device may be configured to receive information regarding a set of points of interest that have been determined based on behavior information associated with a user of the user device. The information regarding the set of points of interest may indicate geographical locations associated with one or more of the points of interest, of the set of points of interest. The user device may determine a present geographical location associated with the user device; compare the geographical locations associated with the one or more points of interest to the present geographical location associated with the user device; identify, based on the comparing, a particular point of interest, of the set of points of interest, that is within a particular distance of the present geographical location of the user device; and output, via a display device, information regarding the identified particular point of interest. | 09-18-2014 |
20140278589 | MOBILE DEVICE ESTABLISHMENT SYSTEM - A method and system and may receive an information request from a user device. An establishment list may be transmitted to the user device in response to the information request, wherein the establishment list includes at least one subscribing establishment. An establishment selection may be received and an establishment option associated with the establishment selection may then be transmitted to the user device. An option selection may then be received from the user device and an establishment record may be updated in response to the selected option, wherein the user device and the subscribing establishments have a pre-existing relationship within the establishment record. | 09-18-2014 |
20140278915 | PROVIDING PROMOTIONAL CONTENT - Systems and methods for providing promotional content are provided. Criteria defining a plurality of different activity-related modes for a user of a mobile station are stored. A message from the mobile station containing that contains information about an activity engaged in by the user is received through a mobile communication network. One of the activity-related modes for a user of a mobile station is selected upon determining that the information about the activity satisfies at least one criterion corresponding to the selected activity-related mode. Promotional content associated with the selected activity-related mode is obtained. The obtained promotional content is transmitted through the mobile communication network to the mobile station for presentation to the user. | 09-18-2014 |
20140286309 | HANDING OVER A USER DEVICE FROM ONE TECHNOLOGY TO ANOTHER - A system may be configured to identify that a user device is connected to a first radio access network (“RAN”), via a first technology; and to identify that the user device is capable of accessing a second RAN, via a second technology. The system may further be configured to instruct the user device to concurrently connect to the second RAN and the first RAN, send or receive a first type of traffic via the first RAN, and send or receive a second type of traffic via the second RAN. | 09-25-2014 |
20150036494 | GROUPED MULTICAST/BROADCAST SINGLE FREQUENCY NETWORK (MBSFN) SPLITTING - A reporting server receives reports on content items being accessed by a plurality of UE devices through a first multicast/broadcast single frequency network (MBSFN). The reporting server determines, for each content item being accessed, which of the UE devices is accessing the content item. The UE devices are then grouped by the accessed content items such that at least one content item is accessed by a first group of UE devices and not accessed by a second group of UE devices. The reporting server then sends data representing the first and second groups to a broadcast video provisioning system (BVPS) with a recommendation to split the MBSFN into second and third MBSFNs. In another implementation, the reporting server receives reports from fourth and fifth MBSFNs and recommends joining the fourth and fifth MBSFNs to form a sixth MBSFN if broadcast bandwidth requirements are met. | 02-05-2015 |
20150040162 | DYNAMIC SPLITTING OF EVOLVED MULTICAST BROADCAST MULTIMEDIA SERVICE (EMBMS) - A reporting server receives reports on unicast and/or broadcast multimedia content items being accessed by respective user equipment (UE) devices through a network. The reporting server determines, for each multimedia content item, a number of UE devices that are accessing the multimedia content item and whether it is being unicast or broadcast. The reporting server ranks the multimedia content items by the number of UE devices accessing each item. In several disclosed examples, a broadcast video provisioning system switches unicast transmissions to broadcast transmissions based on the ranked list, based on this ranking and possibly on the available unicast and broadcast bandwidth. | 02-05-2015 |
20150067816 | AUTOMATED SECURITY GATEWAY - A security device may be configured to receive information regarding traffic that has been outputted by a particular user device; and compare the information regarding the traffic to security information. The security information may include device behavior information, traffic policy information, or device policy information. The security device may determine, based on the comparing, that a security threat exists with regard to the traffic; and take, based on determining that the security threat exists, remedial action with respect to the traffic. Taking the remedial action may include preventing the traffic from being forwarded to an intended destination associated with the traffic, providing an alert, regarding the security threat, to the particular user device, or providing an alert, regarding to the security threat, to another device. | 03-05-2015 |