Patent application number | Description | Published |
20100138660 | SECURE COMMUNICATION SESSION SETUP - A device receives an encrypted key generating value from a first device and decrypts the encrypted key generating value. A temporary session key associated with the first device is generated based on the key generating value. A secure session invitation message is received from the first device. A master session key is generated and encrypted using the temporary session key associated with the first device. The encrypted master session key is transmitted to the first device. | 06-03-2010 |
20100167692 | METHODS, SYSTEMS, AND APPARATUS FOR HANDLING SECURE-VOICE-COMMUNICATION SESSIONS - An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed. | 07-01-2010 |
20120157045 | Methods, Systems, and Apparatus for Handling Secure-Voice-Communication Sessions - An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed. | 06-21-2012 |
20120159602 | MOBILE MIDDLEWARE FOR GENERIC BOOTSTRAPPING ARCHITECTURE - A mobile terminal receives a Global Bootstrapping Architecture (GBA) authentication request from an application client, executing on a processor of the device, in non-standard GBA syntax. The mobile terminal converts the GBA authentication request into standard GBA syntax for a Universal Integrated Circuit Card (UICC) and sends the GBA authentication request having standard GBA syntax to the UICC. The mobile terminal receives, from the UICC, GBA authentication information responsive to the GBA authentication request, the GBA authentication information having standard GBA syntax, and converts, the GBA authentication information having standard GBA syntax into GBA authentication information having non-standard GBA syntax supported by the application client. | 06-21-2012 |
20120252531 | PROVISIONING MOBILE TERMINALS WITH A TRUSTED KEY FOR GENERIC BOOTSTRAP ARCHITECUTRE - Mobile terminals may be authenticated separately from a smart card used by the mobile terminal. In one implementation, a mobile terminal may query a remote server, based on a value identifying the mobile terminal, for security information relating to the mobile terminal, where a copy of the security information is stored in the mobile terminal as part of the manufacture of the mobile terminal. A smart card may receive the security information in response to the query. The security information may be received in an encrypted format that is not accessible by the mobile terminal. The smart card may communicate with the mobile terminal to authenticate the mobile terminal based on the security information received in response to the query and the copy of the security information that is stored in the mobile terminal. | 10-04-2012 |
20120282915 | CONNECTING DEVICE VIA MULTIPLE CARRIERS - A user device establishes a first connection with a first carrier network of a first carrier. The first carrier issues a first phone number used by the user device. The user device further establishes a second connection with a second carrier network of a second carrier. The second carrier issues a second phone number used by the user device. The user device receives a notification about a call from the first carrier network while connected to the first carrier network and the second carrier network. | 11-08-2012 |
20130003652 | SPLIT USAGE OF RADIO ACCESS NETWORKS WITH IMS - Different access networks may perform signaling and data delivery (bearer connection) for communication services. A device may determine, in response to a request for a service from a user of the device, whether the device is connected to a non-cellular access network. The device may transmit, when it is determined that the device is connected to the non-cellular access network, one or more control messages, relating to establishment of the service, using the non-cellular access network. The device may transmit, when it is determined that the device is not connected to the non-cellular access network, the one or more control messages, using a cellular access network. The device may establish, with a party with which the service is to connect, a bearer connection for the service over the cellular access network. | 01-03-2013 |
20130044603 | RADIO ACCESS NETWORK TECHNOLOGY OPTIMIZATION BASED ON APPLICATION TYPE - A mobile device may monitor availability of access networks that provide connectivity for the mobile device. The mobile device may also store preference information, on a per-application basis, relating to preferences for using the access networks by applications executed by the mobile device. The mobile device may additionally select, in response to a request from an application to connect to the network, one of the access networks, based on the preference information for the application; and provide a communication channel for the application using the selected access network. | 02-21-2013 |
20130065632 | DYNAMIC HANDOFF PARAMETERS IN A WIRELESS NETWORK - A mobile device may determine applications that are executed by the mobile device. The mobile device may further determine handoff parameters, relating to performance of a handoff operation in a cellular network. The handoff parameters may be determined based on the applications being executed by the mobile device. A handoff operation may be performed based on the determined handoff parameters. | 03-14-2013 |
20130070669 | LATENCY-INSENSITIVE RAN - HIGH-CAPACITY/LATENCY-TOLERANT SESSION MANAGEMENT - A telecommunications network receives an indication that a user device, communicatively coupled to the telecommunications network, is a latency-insensitive device; receives connection information associated with a connection between the user device and the telecommunications network; stores, based on the indication that the user device is a latency-insensitive device, at least a portion of the connection information, associated with the connection between the user device and the telecommunications network, in a virtual memory of the server device; receives an indication that the connection is to become active; and places, based on receiving the indication that the connection is to become active, at least the portion of the connection information, associated with the connection between the user device and the telecommunications network, in a physical memory of the server device. | 03-21-2013 |
20130081138 | RESPONDING TO IMPERMISSIBLE BEHAVIOR OF USER DEVICES - A device detects an impermissible behavior by a user device. The device further identifies a rule associated with the impermissible behavior and executes a response to the impermissible behavior based on the rule. The response restricts access of the user device to a service provided by or via a network device. The device also transmits, to the user device, a message that specifies the response. The device also verifies a termination of a cause of the impermissible behavior and restores the access of the user device to the service. | 03-28-2013 |
20130114432 | CONNECTING TO AN EVOLVED PACKET DATA GATEWAY - A user device may receive an access request to access an application provided by a cellular carrier associated with the user device. The user device may use a first type of tunneling protocol to establish a connection, via an evolved packet data gateway (ePDG), to a server that provides the application; determines whether the connection is established using the first type of tunneling protocol; and use a second type of tunneling protocol to establish the connection when the connection is not established using the first type of tunneling protocol. The user device may also use the connection to access the application via the ePDG. | 05-09-2013 |
20130115943 | LOCATION-BASED MICROCELL SEARCH - A network device may store information identifying a coverage area associated with each of one or more cells that are associated with the network device. The network device may receive information identifying a geographic location of a user device. The network device may compare the geographic location of the user device to one or more of the stored coverage areas. The network device may also determine, based on the comparing, that the user device is within a particular coverage area of a particular cell, of the one or more cells. The network device may further send, to the user device, and based on determining that the user device is located within the particular coverage area of the particular cell, an instruction for the user device to connect to the particular cell, where the user device is to attempt to connect to the particular cell in response to the instruction. | 05-09-2013 |
20130267227 | LOCATION-BASED MICROCELL SEARCH - A network device may be configured to receive information regarding a location of a user device; compare the location of the user device to one or more coverage areas associated with each of one or more cells that are associated with a base station of a wireless telecommunications network; determine that the user device is within a particular coverage area of a particular cell, of the one or more cells; and instruct the user device, based on determining that the user device is within the particular coverage area of the particular cell, to connect to the particular cell. | 10-10-2013 |
20130325952 | SHARING INFORMATION - A server is configured to receive a portion of content from a first user device, where the portion of content is less than an entirety of content that is playing on the first user device; receive information identifying a second user device with which to share the portion of content; store the portion of content; send a request to the second user device to share the portion of content that is playing on the first user device; receive an acceptance of the request from the second user device; determine whether the portion of content is compatible for playing on the second user device; and send, based on the determination that the portion of content is compatible for playing on the second user device, the portion of content, playing on the first user device, to the second user device, to cause the second user device to play the portion of content. | 12-05-2013 |
20130339546 | DEVICE IDENTIFICATION - A mobile device is configured to create a network address for the mobile device, the network address allowing the mobile device to communicate across a mobile network; associate the network address with a name for the mobile device; store the network address and the name for the mobile device in a first component, the first component being a part of the mobile device; update the network address, for the mobile device, to a new network address; associate the new network address with the name for the mobile device; store the new network address in the first component; and send, using the first component, the new network address to a first server. | 12-19-2013 |
20140071889 | OVER-THE-TOP (OTT) VIDEO / VOICE CONFIGURATION - A user equipment (UE) provides for display, to a user, information identifying available over-the-top (OTT) services provided via voice-over-Long-Term Evolution (VoLTE), and receives, from the user, a selection of a particular OTT service of the available OTT services. The UE receives, from the user, information identifying a selected contact associated with the particular OTT service, and determines whether a particular UE associated with the selected contact is a VoLTE capable device or a non-VoLTE capable device. The UE provides a call to the particular UE, via a LTE network and an Internet protocol (IP) Multimedia Subsystem (IMS) network, when the particular UE is a VoLTE capable device. | 03-13-2014 |
20140109209 | HOSTED IMS INSTANCE WITH AUTHENTICATION FRAMEWORK FOR NETWORK-BASED APPLICATIONS - A device is configured to receive an authentication credential from a user device, and is configured to authenticate the user device based on the authentication credential. The device is configured to transmit, based on authenticating the user device, a first application for establishing a tunnel that permits the user device to access a second application using an Internet protocol multimedia subsystem (IMS) network architecture. The device is configured to establish, based on the first application, a tunnel for transferring IMS traffic to or from the user device, and is configured to transfer the IMS traffic to or from the user device, using the tunnel, where transferring the IMS traffic permits the user device to access the second application. | 04-17-2014 |
20140115673 | AUTHENTICATION PROCESS - A first network device is configured to receive a request for content from a user device, determine that the user device is not authenticated, and send information to the user device that the user device requires authentication. The first network device is configured further to receive authentication information for the user device from a second network device. The first network device is configured further to generate a secret key, authenticate the user device. The first network device is configured further to request user knowledge information from the user device, validate the user knowledge information and send the content to the user device. | 04-24-2014 |
20140187210 | FILTERING AND ENHANCEMENT OF VOICE CALLS IN A TELECOMMUNICATIONS NETWORK - Voice calls may be filtered and/or modified to enhance the clarity of a speaker's voice. In one implementation, a device may receive an indication, from a caller associated with a call, that speech of the caller is to be modified to deemphasize an accent of the caller. The device may modify, based on the received indication, the speech of the caller to deemphasize the accent of the caller and transmit the modified speech to a callee associated with the call. | 07-03-2014 |
20140187236 | QUICK RECOVERY OF RF SESSIONS AFTER BACKHAUL LINK FAILURE - Communication sessions with mobile devices may be suspended, in a wireless communications network, after failure of one or more backhaul network links In one implementation, a device may detect failure of a backhaul network connecting a cell site to a core portion of a wireless network; and suspend, based on the detected failure, communication sessions with mobile devices connected to the cell site through radio interfaces, the suspending of the communication sessions including preventing loss of the communication sessions despite the failure of the backhaul network. The device may further detect cessation of the failure of the backhaul network; and resume, based on the detected cessation of the failure of the backhaul network, the communication sessions with the mobile devices. | 07-03-2014 |
20140188873 | Presenting Information Based on User Profiles - A server may be configured to receive behavior information associated with a user device. The behavior information may indicate a set of geographical locations at which the user device has been present. The server may generate a mode based on the behavior information. The mode may indicate a set of conditions based on which the mode is to be activated, and a set of information to be presented when the mode is activated. The server may output the mode to the user device. The user device may determine, after receiving the mode, that the set of conditions has been satisfied. The determining may be based on a geographical location of the user device. The user device may activate the mode, based on determining that the set of conditions has been satisfied; and may present at least a portion of the set of information, based on activating the mode. | 07-03-2014 |
20140189034 | Adapative, Personal Localized Cache Control Server - A server may be configured to receive an indication that a first user device stores a particular content item; receive, from a second user device, a request for content; and determine that the requested content is available from the first user device. The determining may include determining that the particular content item stored by the first user device corresponds to the request for content, and determining that a local peer connection is available between the first user device and the second user device. The server may further output, to the first user device, an instruction to output the requested content to the second user device via the local peer connection, and/or the server may output, to the second user device, information which may allow the second user device to request the content from the first user device via a local peer connection. | 07-03-2014 |
20140278589 | MOBILE DEVICE ESTABLISHMENT SYSTEM - A method and system and may receive an information request from a user device. An establishment list may be transmitted to the user device in response to the information request, wherein the establishment list includes at least one subscribing establishment. An establishment selection may be received and an establishment option associated with the establishment selection may then be transmitted to the user device. An option selection may then be received from the user device and an establishment record may be updated in response to the selected option, wherein the user device and the subscribing establishments have a pre-existing relationship within the establishment record. | 09-18-2014 |
20140278915 | PROVIDING PROMOTIONAL CONTENT - Systems and methods for providing promotional content are provided. Criteria defining a plurality of different activity-related modes for a user of a mobile station are stored. A message from the mobile station containing that contains information about an activity engaged in by the user is received through a mobile communication network. One of the activity-related modes for a user of a mobile station is selected upon determining that the information about the activity satisfies at least one criterion corresponding to the selected activity-related mode. Promotional content associated with the selected activity-related mode is obtained. The obtained promotional content is transmitted through the mobile communication network to the mobile station for presentation to the user. | 09-18-2014 |
20150036494 | GROUPED MULTICAST/BROADCAST SINGLE FREQUENCY NETWORK (MBSFN) SPLITTING - A reporting server receives reports on content items being accessed by a plurality of UE devices through a first multicast/broadcast single frequency network (MBSFN). The reporting server determines, for each content item being accessed, which of the UE devices is accessing the content item. The UE devices are then grouped by the accessed content items such that at least one content item is accessed by a first group of UE devices and not accessed by a second group of UE devices. The reporting server then sends data representing the first and second groups to a broadcast video provisioning system (BVPS) with a recommendation to split the MBSFN into second and third MBSFNs. In another implementation, the reporting server receives reports from fourth and fifth MBSFNs and recommends joining the fourth and fifth MBSFNs to form a sixth MBSFN if broadcast bandwidth requirements are met. | 02-05-2015 |
20150040162 | DYNAMIC SPLITTING OF EVOLVED MULTICAST BROADCAST MULTIMEDIA SERVICE (EMBMS) - A reporting server receives reports on unicast and/or broadcast multimedia content items being accessed by respective user equipment (UE) devices through a network. The reporting server determines, for each multimedia content item, a number of UE devices that are accessing the multimedia content item and whether it is being unicast or broadcast. The reporting server ranks the multimedia content items by the number of UE devices accessing each item. In several disclosed examples, a broadcast video provisioning system switches unicast transmissions to broadcast transmissions based on the ranked list, based on this ranking and possibly on the available unicast and broadcast bandwidth. | 02-05-2015 |
20150066545 | MOBILE PARKING SYSTEMS AND METHODS FOR PROVIDING REAL-TIME PARKING GUIDANCE - Parking guidance is provided to a user of a mobile device requesting information on parking spots at a requested location for a requested time. In response to receiving a parking information request, parking spots having locations proximate to the requested location and having availability at the requested time are identified in a database of parking spot information of a parking management server. A notification of the identified parking spots is transmitted to the user device from which the information request was received. In response to receiving a reservation request identifying a parking spot to be reserved from the user device, the database is updated to identify the identified parking spot as being unavailable at the requested time. Additionally, a notification of the reservation request is transmitted to a parking manager associated with the identified parking spot, the notification identifying the particular parking spot and the requested time. | 03-05-2015 |
20150067816 | AUTOMATED SECURITY GATEWAY - A security device may be configured to receive information regarding traffic that has been outputted by a particular user device; and compare the information regarding the traffic to security information. The security information may include device behavior information, traffic policy information, or device policy information. The security device may determine, based on the comparing, that a security threat exists with regard to the traffic; and take, based on determining that the security threat exists, remedial action with respect to the traffic. Taking the remedial action may include preventing the traffic from being forwarded to an intended destination associated with the traffic, providing an alert, regarding the security threat, to the particular user device, or providing an alert, regarding to the security threat, to another device. | 03-05-2015 |