Patent application number | Description | Published |
20130305292 | MEDIA SYNCHRONIZATION WITHIN HOME NETWORK USING SET-TOP BOX AS GATEWAY - Techniques disclosed herein include systems and methods for transmitting TV program related content to IP connected devices on a home network, or other local area network. Users can watch television while simultaneously receiving content related to TV programs currently being displayed on a television. TV centric and TV program related content can be transmitted to IP connected devices. Moreover, this TV program related content can be displayed at the same time as a television program is being displayed on a television. As such, the system can provide media synchronization within home network using the set-top box as a gateway for delivering the content. Users can watch TV at home, and at the same time receive TV program related content on a laptop, tablet computer, mobile phone, etc. | 11-14-2013 |
20140059636 | METHODS AND APPARATUS THAT SUPPORT ADDRESSABLE INTERACTIVE APPLICATIONS - Methods and apparatus for supporting targeted advertising and/or other targeted applications in set top boxes which use data and/or applications, e.g., EBIF (Enhanced TV Binary Interchange Format) applications, are described. Application level targeting is supported in which an application running on different STBs presents different application behavior and/or presents different visual sub-elements depending on the content of a subscriber profile on the particular individual STB. In the case of addressability at the Application Layer an EBIF application can target different viewers by checking private User Preference Items at runtime. Addressability at the signaling/platform level is also supported allowing targeting of a specific application or a sub-element within an application to a specific target group. In this scenario the particular applications/sub-elements are loaded on the set-tops that belong to a target group, e.g., satisfy targeting constraints specified in private targeting metadata that is received in an MPEG stream. | 02-27-2014 |
20140130073 | SYSTEM AND METHOD FOR DELIVERING MEDIA BASED ON VIEWER BEHAVIOR - Methods, systems and devices are provided for communicating multimedia content over a service provider network. A network server may receive an audio-video stream from a content provider server, relaying the audio-video stream to a receiver device via the service provider network, receive an operating mode notification identifying a user behavior from the receiver device, and ceasing the relaying of the audio-video stream to the receiver device based on the user behavior. The network server may also alter the audio-video stream based on the received operating mode notification and send the altered audio-video stream to the receiver device via the service provider network. | 05-08-2014 |
20140215539 | APPARATUS AND METHODS FOR CATALOG DATA DISTRIBUTION - Methods and apparatus for providing enhanced catalog data capacity and functionality within a content distribution network. In one embodiment, the apparatus includes an architecture configured to utilize an upstream out-of-band (OOB) channel for upstream catalog data request carriage, while a downstream in-band (IB) QAM is used for carriage of the catalog data issued by the network in response to the request. In another embodiment, the extant catalog structure is largely retained, yet modified so as to (i) eliminate redundancy within “barker” channel audio/video data delivery, and (ii) reduce the encoding resolution of the barker audio and/or video so as to utilize less bandwidth, thereby allowing enhanced capacity for catalog title expansion (and/or reduced latency in responding to catalog requests). | 07-31-2014 |
20140282777 | APPARATUS AND METHODS FOR DELIVERY OF MULTICAST AND UNICAST CONTENT IN A CONTENT DELIVERY NETWORK - Methods and apparatus for providing delivery of content to client devices of a network via both multicast and unicast mechanisms. In one embodiment, a system for use in a managed content delivery network is described to bridge multicast to unicast, so that the total network bandwidth consumption is significantly lower than a corresponding unicast-only delivery solution, yet which still provides improved quality of service and user viewing experience as compared to a multicast-only delivery solution. In addition, various exemplary aspects of the present disclosure are readily adapted for real-time multicast to unicast streaming of audio and data to, among other things, minimize network bandwidth usage, while maintaining the guaranteed delivery of unicast streams with little or no modification to the existing client device logic. | 09-18-2014 |
20140351860 | MEDIA SYNCHRONIZATION WITHIN HOME NETWORK USING SET-TOP BOX AS GATEWAY - Techniques disclosed herein include systems and methods for transmitting TV program related content to IP connected devices on a home network, or other local area network. Users can watch television while simultaneously receiving content related to TV programs currently being displayed on a television. TV centric and TV program related content can be transmitted to IP connected devices. Moreover, this TV program related content can be displayed at the same time as a television program is being displayed on a television. As such, the system can provide media synchronization within home network using the set-top box as a gateway for delivering the content. Users can watch TV at home, and at the same time receive TV program related content on a laptop, tablet computer, mobile phone, etc. | 11-27-2014 |
20150033256 | METHODS AND APPARATUS THAT SUPPORT ADDRESSABLE INTERACTIVE APPLICATIONS - Methods and apparatus for supporting targeted advertising and/or other targeted applications in set top boxes which use data and/or applications, e.g., EBIF (Enhanced TV Binary Interchange Format) applications, are described. Application level targeting is supported in which an application running on different STBs presents different application behavior and/or presents different visual sub-elements depending on the content of a subscriber profile on the particular individual STB. In the case of addressability at the Application Layer an EBIF application can target different viewers by checking private User Preference Items at runtime. Addressability at the signaling/platform level is also supported allowing targeting of a specific application or a sub-element within an application to a specific target group. In this scenario the particular applications/sub-elements are loaded on the set-tops that belong to a target group, e.g., satisfy targeting constraints specified in private targeting metadata that is received in an MPEG stream. | 01-29-2015 |
Patent application number | Description | Published |
20140283028 | MALICIOUS REQUEST ATTRIBUTION - Methods, apparatuses, and computer readable media for malicious request attribution are presented. For example, according to one aspect, requests for one or more records may be received from a requesting computing device. A determination may be made that the requests are of a malicious nature. Responsive to determining that the requests are of a malicious nature, one or more requests for obtaining information about the requesting computing device may be generated, and communicated to the requesting computing device. In some embodiments, at least one of the one or more requests for obtaining information about the requesting computing device may be configured to cause the requesting computing device to fail to properly render at least a portion of a web page comprising at least one of the one or more records. | 09-18-2014 |
20150052453 | Virtual Position Display and Indicators - Systems, methods and apparatuses for identifying and/or displaying an availability or virtual position of a user are provided. In some examples, a virtual position display may be provided and may include a plurality of user indicators. The user indicators may include an availability of the user. In some examples, a user may adjust a position of a user indicator. Adjustment of the user indicator closer to another user indicator may indicate an increased availability status of the user, while adjustment of the indicator away from another user indicator may indicate a decreased availability of the user. In some examples, the user indicator may include a level of activity indication received from one or more sensing devices associated with the user. | 02-19-2015 |
20150052519 | HYPERVISOR DRIVEN EMBEDDED ENDPOINT SECURITY MONITORING - Aspects of the present disclosure are directed to methods and systems of hypervisor driven embedded endpoint security monitoring. A computer implemented method may include providing one or more computer processors configured to operate a bare-metal hypervisor; launching a user OS virtual machine operatively connected to the hypervisor; launching a security virtual machine operatively connected to the hypervisor and receiving data from the security virtual machine via the hypervisor; and receiving data representative of security information from the computer processor processed by the security virtual machine. The hypervisor may include using a virtual switch for providing communications between the user OS virtual machine and the security virtual machine. The method may include using the security virtual machine to monitor malware on the user OS virtual machine. | 02-19-2015 |
20150052579 | ORGANIZATIONAL ATTRIBUTION OF USER DEVICES - A login request to access information associated with a website may be received from a user device accessing the website via a browser. A determination may be made as to whether a browser attribute of the browser, font type, or service set identifier (SSID) information is located within a database. A further determination may be made as to whether to grant access to the information associated with the website. The determination as to whether to grant access to the information associated with the website may be based at least in part on the browser attribute font type, or service set identifier (SSID) information. | 02-19-2015 |
20150052605 | MALWARE DETECTION AND COMPUTER MONITORING METHODS - A method is disclosed, where some embodiments of the method include installing at least one benign malware indicator on one or more computing devices, monitoring the one or more computing devices for the presence of the at least one benign malware indicator, and responsive to determining the benign malware indicator is no longer present, sending a notification indicating the benign malware indicator is no longer detected as present on the one or more computing devices. Other embodiments include performing an antivirus scan or identifying unauthorized software programs. An apparatus and one or more non-transitory computer-readable media storing computer-readable instructions capable of performing similar actions, the latter in conjunction with a computer executing instructions stored on the media, are also disclosed. | 02-19-2015 |
20150066763 | METHOD AND APPARATUS FOR CROSS CHANNEL MONITORING - Methods and apparatuses for detecting nefarious activity by providing to others false information and tracking the use of the false information to determine in what way unlawfully taken information is used across several banking channels are presented. An example system can be configured to introduce certain predetermined markers into account data when it is determined that a user's account has been compromised, for example, during an online banking session. In this way, when a party unlawfully takes the user's account information, that party will also copy the markers from the user's account data. Therefore, when the party attempts to use the user's account data, the party will also include the markers added to the user's account. The markers can be information that is added that does not affect the transaction so the transaction can be conducted, and the system can recognize that the transaction may be nefarious. | 03-05-2015 |
20150066989 | GRAPH DATABASE WITH ONE OR MORE INFRASTRUCTURE IMPARTED ASPECTS - Data specifying a new edge of a graph database may be received. A data store for storing the new edge may be identified from amongst a plurality of data stores utilized to store one or more portions of the graph database. Each of the plurality of data stores may be associated with a set of values corresponding to an aspect of edges of the graph database. The data store for storing the new edge may be identified based on the new edge being associated with a value corresponding to the aspect of edges of the graph database that is within a set of values corresponding to the aspect of edges of the graph database associated with the data store for storing the new edge. | 03-05-2015 |
20150067862 | MALWARE ANALYSIS METHODS AND SYSTEMS - Methods of analyzing malware and other suspicious files are presented, where some embodiments include analyzing the behavior of a first malware sample on both a virtual machine and a physical computing device, the physical device having been booted from a secondary boot source, and determining whether the behavior of the malware sample was different on the virtual machine and the physical computing device. In certain embodiments, a notification indicating that the behavior was different may be generated. In other embodiments, a malware analysis computing device that is configured to receive a base hard drive image may be networked booted, and the behavior of the malware sample on the malware analysis computing device may be analyzed. In certain embodiments, a malware-infected hard drive image may then be copied off the malware analysis computing device for further forensic analysis. | 03-05-2015 |
20150089643 | MALICIOUS REQUEST ATTRIBUTION - Methods, apparatuses, and computer readable media for malicious request attribution are presented. For example, according to one aspect, requests for one or more records may be received from a requesting computing device. A determination may be made that the requests are of a malicious nature. Responsive to determining that the requests are of a malicious nature, one or more requests for obtaining information about the requesting computing device may be generated, and communicated to the requesting computing device. In some embodiments, at least one of the one or more requests for obtaining information about the requesting computing device may be configured to cause the requesting computing device to fail to properly render at least a portion of a web page comprising at least one of the one or more records. | 03-26-2015 |
20150101050 | DETECTING AND MEASURING MALWARE THREATS - Methods, systems, computer-readable media, and apparatuses for detecting and measuring malware threats are presented. In some embodiments, a computing device may collect malware detection data from one or more monitored applications. Subsequently, the computing device may aggregate the collected malware detection data. Then, the computing device may generate a heat map based on the aggregation of the collected malware detection data, where the heat map is configured to identify one or more malware threats associated with one or more monitored applications. In some arrangements, collecting the malware detection data may include monitoring various aspects of a client computing device and/or the client computing device's communications with one or more servers and/or other devices that may be configured to provide the one or more monitored applications. | 04-09-2015 |
20150143537 | Identification of Unauthorized Disclosure - Systems, methods, computer-readable media, and apparatuses for identifying a source of an unauthorized disclosure of information are provided. For instance, a document may be generated and transmitted to a plurality of users. The document transmitted may be the same document (e.g., no additional documents are created for different users). Upon accessing the document, users in different groups of users may view different data items in a data item field in the document. If a disclosure is made, the data item disclosed may aid in identifying the group of users who viewed that data item and may be the source of the disclosure. That identified group may then be further sorted or divided into two or more subgroups and another document may be transmitted to the plurality of users. The process may continue in this manner until a source of the disclosure is identified. | 05-21-2015 |
20150154722 | Crime Deterrence Using Smartphone Signatures - A method and system of deterring crime by analyzing short-range signals broadcast by mobile wireless personal communication devices. Business places have sensors that are used to detect the short-range broadcast signals. The device signatures are identified by the short-range broadcast signals. When there is a crime event at the business place, a suspect device signature is identified. | 06-04-2015 |
20150248555 | Malware Detection and Computer Monitoring Methods - A method is disclosed, where some embodiments of the method include installing at least one benign malware indicator on one or more computing devices, monitoring the one or more computing devices for the presence of the at least one benign malware indicator, and responsive to determining the benign malware indicator is no longer present, sending a notification indicating the benign malware indicator is no longer detected as present on the one or more computing devices. Other embodiments include performing an antivirus scan or identifying unauthorized software programs. An apparatus and one or more non-transitory computer-readable media storing computer-readable instructions capable of performing similar actions, the latter in conjunction with a computer executing instructions stored on the media, are also disclosed. | 09-03-2015 |
20160028768 | Malware Analysis Methods and Systems - Methods of analyzing malware and other suspicious files are presented, where some embodiments include analyzing the behavior of a first malware sample on both a virtual machine and a physical computing device, the physical device having been booted from a secondary boot source, and determining whether the behavior of the malware sample was different on the virtual machine and the physical computing device. In certain embodiments, a notification indicating that the behavior was different may be generated. In other embodiments, a malware analysis computing device that is configured to receive a base hard drive image may be network booted, and the behavior of the malware sample on the malware analysis computing device may be analyzed. In certain embodiments, a malware-infected hard drive image may then be copied off the malware analysis computing device. | 01-28-2016 |
20160050200 | Network Identity Certificate Pinning - Systems, methods and apparatuses for ensuring that a computing device is attempting to connect to a network, such as a wireless network, provided by an expected or trusted entity. For instance, a certificate may be generated for a network and/or associated with the network. The certificate may then be transmitted to one or more computing devices that may be authorized to access the network. Accordingly, when the computing device selects the network for connection, the system may determine whether the certificate associated with the network is paired with the certificate provided on the computing device. If so, the computing device may be permitted to transmit data over the network. Alternatively, if the network certificate is not paired with the certificate provided on the computing device, the computing device may be prevented from transmitting data over the network. | 02-18-2016 |
20160063133 | COMPUTING ARCHITECTURE FOR STORING A GRAPH DATABASE BASED ON TEMPORAL ASPECTS OF ITS EDES - Data specifying a new edge of a graph database may be received. A data store for storing the new edge may be identified from amongst a plurality of data stores utilized to store one or more portions of the graph database. Each of the plurality of data stores may be associated with a set of values corresponding to an aspect of edges of the graph database. The data store for storing the new edge may be identified based on the new edge being associated with a value corresponding to the aspect of edges of the graph database that is within a set of values corresponding to the aspect of edges of the graph database associated with the data store for storing the new edge. | 03-03-2016 |
20160063134 | COMPUTING ARCHITECTURE FOR STORING A GRAPH DATABASE BASED ON TEMPORAL ASPECTS OF ITS EDGES - Data specifying a new edge of a graph database may be received. A data store for storing the new edge may be identified from amongst a plurality of data stores utilized to store one or more portions of the graph database. Each of the plurality of data stores may be associated with a set of values corresponding to an aspect of edges of the graph database. The data store for storing the new edge may be identified based on the new edge being associated with a value corresponding to the aspect of edges of the graph database that is within a set of values corresponding to the aspect of edges of the graph database associated with the data store for storing the new edge. | 03-03-2016 |
Patent application number | Description | Published |
20110261276 | Liquid Crystal Display (LCD) System and Method - A liquid crystal display (LCD) system is provided. The LCD system includes a light source and a self-contained display unit including at least a LCD panel and a light guide plate coupled together, wherein the light guide plate is configured to guide light from the light source to the LCD panel as backlight and to structurally support the LCD panel. Further, a plurality of pre-made hollow spaces are contained in the display unit configured to host components of the LCD system. The LCD system also includes a controller contained in the plurality of pre-made hollow spaces and coupled to the LCD panel to control the LCD panel such that the light passing through the light guide plate is used as backlight for operation of the LCD panel. | 10-27-2011 |
20110261280 | Liquid Crystal Display (LCD) System and Method - A liquid crystal display (LCD) system is provided. The LCD system includes a light-passable plate, an LCD panel and a controller. The light-passable plate is configured to allow natural light to pass through the light-passable plate; and the LCD panel is coupled to the light-passable plate and is configured to receive the natural light passing through the light-passable plate. Further, the controller is coupled to the LCD panel to control the LCD panel such that the natural light passing through the light-passable plate is used as backlight for operation of the LCD panel. The light-passable plate structurally supports the LCD panel in addition to providing the natural light to the LCD panel. | 10-27-2011 |
20120300298 | 3D VISUAL DISPLAY SYSTEM AND METHOD - A three-dimensional (3D) display system is provided. The 3D display system includes at least one 3D display element containing a series of element bases, and each element base includes a plurality of light-emitting elements in a predetermined arrangement. The 3D display system also includes a moving mechanism coupled to the 3D display element for causing the 3D display element to move along a predetermined direction. Further, the 3D display system includes a controller configured to control respective light-emitting conditions of the plurality of light-emitting elements contained in each element base, when each element base is moving in the predetermined direction, to create dynamic pixels based on persistence of vision so as to form a layer of 2D display. The layers of 2D display corresponding to the series of element bases overlap together to form a 3D display. | 11-29-2012 |
20130176145 | AUTOMOBILE BLIND SPOT DETECTION SYSTEM AND METHOD - A system is provided for detecting a blind spot for a driver of a vehicle. The system includes a side mirror. The side mirror is arranged on a body of the vehicle and includes a side mirror body, a mirror, and a supporting structure. The system also includes a detection system. The detection system is physically coupled with the side mirror to detect an object in a detection zone of the detection system. The detection zone covers the blind spot, and the detection system includes a detection module, an alert indicator, and a control module. The detection module includes at least one of a transmitter and a receiver, and the alert indicator is configured to send an alert light to the driver at a predetermined angle such that the alert light does not interfere with drivers of other vehicles close to the vehicle. | 07-11-2013 |
20150217696 | AUTOMOBILE BLIND SPOT DETECTION SYSTEM AND METHOD - A system is provided for detecting a blind spot for a driver of a vehicle. The system includes a side mirror. The side mirror is arranged on a body of the vehicle and includes a side mirror body, a mirror, and a supporting structure. The system also includes a detection system. The detection system is physically coupled with the side mirror to detect an object in a detection zone of the detection system. The detection zone covers the blind spot, and the detection system includes a detection module, an alert indicator, and a control module. The detection module includes at least one of a transmitter and a receiver, and the alert indicator is configured to send an alert light to the driver at a predetermined angle such that the alert light does not interfere with drivers of other vehicles close to the vehicle. | 08-06-2015 |
20160019845 | Liquid Crystal Display (LCD) System and Method - A liquid crystal display (LCD) system is provided. The LCD system includes a light source and a self-contained display unit including at least a LCD panel and a light guide plate coupled together, wherein the light guide plate is configured to guide light from the light source to the LCD panel as backlight and to structurally support the LCD panel. Further, a plurality of pre-made hollow spaces are contained in the display unit configured to host components of the LCD system. The LCD system also includes a controller contained in the plurality of pre-made hollow spaces and coupled to the LCD panel to control the LCD panel such that the light passing through the light guide plate is used as backlight for operation of the LCD panel. | 01-21-2016 |
Patent application number | Description | Published |
20130315092 | USER EQUIPMENT BATTERY SAVING IN A HETNET DEPLOYMENT WITH EICIC - Devices and methods are provided for reducing client node power consumption when monitoring first and second channels corresponding to first and second access nodes in a heterogeneous wireless-enabled communications environment. Enhanced Inter-Cell Interference Coordination (eICIC) operations are performed to mitigate interference between a first access node and a second access node. The client node monitors first and second channels corresponding to the first and second access nodes. The client node receives restricted measurement data transmitted on the first channel, which is then processed to schedule cessation of monitoring the first channel to reduce power consumption and thereby conserve battery resources. | 11-28-2013 |
20140079017 | System and Method for Uplink Timing Synchronization in Conjunction with Discontinuous Reception - A system and method are disclosed for providing uplink timing synchronization during DRX operation in a wireless communication system. | 03-20-2014 |
20140153466 | Precoding Matrix Index Feedback Interaction with Discontinuous Reception - A user equipment (UE) is provided that includes a processor configured to transmit a precoding matrix index (PMI) using one of an assigned periodic PMI reporting resource that precisely aligns with the start of an on-duration of a discontinuous reception (DRX) operation mode of the UE and a first assigned periodic PMI reporting after the start of an on-duration of a discontinuous reception (DRX) operation mode of the UE. | 06-05-2014 |
20140162673 | Rank Indicator Transmission During Discontinuous Reception - A user equipment (UE) is disclosed. The UE includes a processor configured to transmit a rank indicator (RI) using one of an assigned periodic RI reporting resource that precisely aligns with the start on an on-duration of a discontinuous reception (DRX) operation mode of the UE and a fast assigned periodic RI reporting resource after the start of the on-duration. | 06-12-2014 |
20140233408 | PROCEDURE FOR FORMULATING A SIGNAL TO INTERFERENCE PLUS NOISE RATIO - A method and system for formulating an SINR metric for cells using only the existing RSRP and RSRQ measurements. With this method and system side information is exchanged between eNBs of an E-UTRAN using the X2 interface where the X2 interface carries the X2 Application Protocol (X2AP). The side information is introduced either within X2AP messages exchanged between NB nodes or via modification of existing X2AP messages. Serving cell system information block (SIB) messages may also be modified or new SIB messages introduced to facilitate computation of an SNIR metric at a UE. | 08-21-2014 |
20140247810 | UE MEASUREMENT PROCEDURE IN A HETEROGENEOUS MOBILE NETWORK - A method and system for formulating an SINR metric for cells using only the existing RSRP and RSRQ measurements. With this method and system side information is exchanged between eNBs of an E-UTRAN using the X2 interface where the X2 interface carries the X2 Application Protocol (X2AP). The side information is introduced either within X2AP messages exchanged between eNB nodes or via modification of existing X2AP messages. Serving cell system information block (SIB) messages may also be modified or new SIB messages introduced to facilitate computation of an SNIR metric at a UE. | 09-04-2014 |
20140286234 | System and Method for Multi-User Multiplexing - A relay node is described herein, the relay node comprising a network connectivity device configured to receive a plurality of medium access control layer (MAC) packet data units (PDUs) from a plurality of user agents; a processor configured to multiplex the plurality of MAC PDUs to form a Super-MAC PDU; and wherein the network connectivity device is further configured to transmit the Super-MAC PDU to an access node. | 09-25-2014 |
20140362755 | System and Method for Hybrid Automatic Repeat Request (HARQ) Functionality in a Relay Node - Devices and methods related to relay nodes are provided. The relay node includes a first hybrid automatic repeat request (HARQ) entity providing a first HARQ functionality. The relay node further includes a second HARQ entity providing a second HARQ functionality. | 12-11-2014 |
20150016335 | Type II Relay Node Initialization Procedures - A relay node including one or more components configured to encode a message to be transmitted to an access node, the message used to identify the relay node as a relay node during initialization of the relay node. | 01-15-2015 |
20150043412 | System and Method for Uplink Timing Synchronization in Conjunction with Discontinuous Reception - A system and method are disclosed for providing uplink timing synchronization during DRX operation in a wireless communication system. | 02-12-2015 |
20150043508 | HARQ PROCESS NUMBER MANAGEMENT FOR DOWNLINK CARRIER AGGREGATION - A method for designating, by a user agent supporting multiple carriers in a wireless communication network, one assigned carrier as an anchor carrier, at least one assigned carrier as an inactive carrier, and at least one assigned carrier as an active carrier. The method can also include receiving a command from an enhanced node B causing a first carrier to transition from an inactive carrier to an active carrier. Additionally, the method can include responsive to reception of the command, monitoring a control channel corresponding to the first carrier. Further, the method can also include receiving downlink control information (DCI) via the control channel. The method can also include responsive to reception of the DCI, starting a timer, and deactivating the first carrier at the expiration of the timer. | 02-12-2015 |
20150055535 | Control Signal Management System and Method - A user equipment (UE) including a processor configured to transmit control plane data irrespective of on-duration/off-duration status. | 02-26-2015 |
20150237635 | Rank Indicator Transmission During Discontinuous Reception - A user equipment (UE) is disclosed. The UE includes a processor configured to transmit a rank indicator (RI) using one of an assigned periodic RI reporting resource that precisely aligns with the start on an on-duration of a discontinuous reception (DRX) operation mode of the UE and a first assigned periodic RI reporting resource after the start of the on-duration. | 08-20-2015 |
20150245338 | WIRELESS COMMUNICATION SYSTEM USING MULTIPLE-SERVING NODES - Methods, devices and systems for a wireless communication system using multiple-serving nodes are provided. In one embodiment, a method of wireless communication comprises sending from a wireless device an uplink control signal to a first node via a second node using a second communication link; receiving by said wireless device a downlink control signal from said first node using a first communication link; sending from said wireless device another uplink control signal to said second node using said second communication link; and receiving by said wireless device another downlink control signal from said second node via said first node using said first communication link. | 08-27-2015 |
20150312856 | System and Method for Uplink Timing Synchronization in Conjunction with Discontinuous Reception - A system and method are disclosed or providing uplink timing synchronization during DRX operation in a wireless communication system. | 10-29-2015 |
20150351155 | Method and System for the Control of Discontinuous Reception in a Wireless Network - Methods and apparatus for controlling discontinuous reception on a mobile device and in particular to control a short discontinuous reception timer in response to receipt of a medium access control control element. The methods and apparatus include stopping, restarting or maintaining the short discontinuous reception timer. Methods and apparatus for limiting or stopping a retransmission timer by providing user equipment with a maximum retry value for transmissions, by providing a maximum redundant version value, or by providing a medium access control control element to stop or prevent the start of a retransmission timer. | 12-03-2015 |
20160066292 | SYSTEM AND METHOD FOR UPLINK TIMING SYNCHRONIZATION IN CONJUNCTION WITH DISCONTINUOUS RECEPTION - A system and method are disclosed for providing uplink timing synchronization during DRX operation in a wireless communication system. | 03-03-2016 |