Various embodiments comprise a wireless communication network to qualify user devices for network policy association. In some examples, the wireless communication network comprises a network data system. The network data system receives an equipment identity check request transferred by a control plane that comprises an International Mobile Equipment Identifier (IMEI) for a User Equipment (UE). The network data system reads the IMEI to determine a Type Allocation Code (TAC) for the UE. The network data system compares the TAC for the UE to an IMEI TAC database indicating when Policy Control Function (PCF) registration is available for the UE and determines when the PCF registration is when is available for the UE. The network data system transfers an equipment identity check response that indicates when the PCF registration is available for the UE to the control plane.
In order to reduce power consumption, an access node may turn off transmissions from one or more rows or columns of antennas in a mMIMO array. To help prevent the beam from overshooting (i.e., going beyond) an intended area of coverage when the access node turns off transmission by one or more rows, the access node also increases the electrical down tilt of the beam (i.e., angle of depression) to help contain the beam within its intended area of coverage. To help prevent problems with SSB beam selection and/or beam switching, when the access node turns off transmission by one or more columns, the access node reduces the number of SSB beams that are transmitted while sweeping SSBs over the sector thereby reducing the overlap of the (now) wider SSB beams.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Systems and methods are provided for communicating multiple data packet types between user equipment (UE) and a single application, such as an extended reality application. The wireless network is configured such that each data packet type is communicated via a different wireless network slice. When notification of congestion in the wireless network is received for one or more of the wireless network slices, different congestion control algorithms are applied to the congested wireless network slices.
A method is provided for adapting, in a server, application software executing on the server to a change in a dependency software component. The server receives a software bundle with application software, source code of the application software, testing software with test scripts and self-adaptation software. The self-adaptation software obtains a changed dependency component and rebuilds the application software with the changed dependency. If the rebuild was unsuccessful, it sends a rebuild failure message to a user. If the rebuild was successful, the testing software tests the rebuilt application. If the testing was unsuccessful, it sends a testing failure message to a user. If the rebuild was successful, the self-adaptation software loads the rebuilt application software, stops execution of the application software, and begins execution of the rebuilt application software.
A method of dynamic beam blanking in a network including an aerospace access point is provided. Multiple antenna beams may be provided in addition to a primary antenna beam. First a determination of an antenna beamwidth of a primary antenna beam is made. The antenna beamwidth is based on a usage threshold of the primary antenna beam. When the antenna beamwidth is above the usage threshold at least one dynamic antenna beam blanking commend is generated for at least one first neighboring co-channel antenna beam used by at least one second user device. The second user device is then directed to at least one second neighboring co-channel antenna beam that is not affected by the dynamic antenna beam blanking command. The blanked first neighboring co-channel antenna beam is then added to the primary antenna beam.
A method for on-demand cell site inventory update retrieval in a telecommunications carrier network comprises receiving, by an inventory application, updated component data associated with one or more components in a cell site, wherein the updated component data comprises a most up-to-date version of data describing the one or more components, storing, in a memory, a master inventory including data regarding a plurality of components in each of the cell sites in the RAN, and updating, by the inventory application, in the master inventory, records associated with each of the one or more components to include the updated component data when the master inventory excludes the updated component data associated with the one or more components.
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
7.
Systems and Methods for Automating Media Optimization Using Call Analytics
A method for automating media optimization for communication system providers using call analytics. The method includes monitoring activity of a user accessing an online platform of the communication system provider, and receiving a telephone call made by a caller to a call center of the communication system provider, the call being associated with an offer. The method additionally includes determining that an identity of the user accessing the online platform is the same as an identity of the caller. The method further includes providing feedback data to the communication system provider including the identity of the user, and optimizing a media experience hosted on the online platform of the communication system provider based on the feedback data.
A method for power balancing includes receiving data from wireless devices within a cell provided by an access node and estimating a downlink coverage distance of the cell based on signal strengths reported in the data. The method further includes estimating an average distance from the access node at which the wireless devices have insufficient transmit power to reach the access node based on the data. Additionally, the method includes comparing the downlink coverage distance to the average distance and adjusting the downlink coverage distance based on the comparison.
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
9.
DATA TRANSMISSIONS OVER AN ULTRA-RELIABLE LOW LATENCY COMMUNICATION (URLLC)
The technology disclosed herein relates to improved data transmissions over a radio access network (RAN). In embodiments, the RAN can receive, via a RAN node, a request for extended reality (XR) traffic (e.g., the request being associated with a user device). In embodiments, based on the request, one or more components of the RAN can allocate XR data for transmission over one or more ultra-reliable low latency communication (URLLC) slices that each have a latency parameter below an XR latency threshold. In embodiments, the XR latency threshold can be determined based on the request. In embodiments, one or more RAN components can identify a frequency band (e.g., associated with a RAN node) having a URLLC slice that has a latency parameter below the XR latency threshold. As such, XR data can be transmitted to the user device via the URLLC slice having the latency parameter below the XR latency threshold.
A communication device includes a central processing unit (CPU); a non-transitory memory; and an RFID application stored on the non-transitory memory and comprising executable instructions that when executed by the CPU, cause the communication device to be configured to provide the communication device in an environment; receive a radio frequency (RF) signal from an RFID reader at a plurality of locations in the industrial environment, wherein the RF signal comprises a frequency in the cellular frequency range; determine a receive signal strength (RSS) of the RF signal at each of the plurality of locations; determine the RSS of the RF signal at each of the plurality of locations; and generate a map of an RFID read zone in the industrial environment based on the RSS of the RF signal at the plurality of locations.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
11.
RFID READ ZONE MAPPING, TESTING, AND MONITORING USING A SILENT RFID TAG
A communication device includes a central processing unit (CPU); a non-transitory memory; and an RFID application stored on the non-transitory memory and comprising executable instructions that when executed by the CPU, cause the communication device to be configured to provide the communication device in an environment; receive a radio frequency (RF) signal from an RFID reader at a plurality of locations in the industrial environment, wherein the RF signal comprises a frequency in the cellular frequency range; determine a receive signal strength (RSS) of the RF signal at each of the plurality of locations; determine the RSS of the RF signal at each of the plurality of locations; and generate a map of an RFID read zone in the industrial environment based on the RSS of the RF signal at the plurality of locations.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
12.
Dynamic Attribute Driven Mobile Device Content Delivery
A method of providing media content to a communication device. The method comprises retrieving subscriber attributes by a media content provider application from a subscriber database; creating a manifest of media content artifacts by the media content provider application based on identifying alignment between at least some of the media content artifacts, attributes of the communication device, and the subscriber attributes, wherein the manifest of media content artifacts identifies a list of selected media content artifacts along with a location from which the communication device can retrieve the selected media content artifacts and identifies a retrieval priority of each of the selected media content artifacts; and sending the manifest by the media content provider application to the communication device, whereby the communication device is enabled to retrieve the selected media content artifacts in a prioritized manner and install some of the selected media content artifacts in the communication device.
H04M 1/72406 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
13.
Incorporating radar technology in a time-division duplex radio access network
System and method are provided to incorporate radar technology in a time-division duplex radio access network. Information in the guard period between the downlink transmission and uplink transmission, such as the capturing of the UL RF signal landscape, is modified to capture radar signals (RF signals) that reflect from objects. The reflected radar signals are stored, process, and analyzed by a connected computer to determine stationary and moving objects.
G01S 13/52 - Discriminating between fixed and moving objects or between objects moving at different speeds
G01S 7/00 - Details of systems according to groups , ,
G01S 13/00 - Systems using the reflection or reradiation of radio waves, e.g. radar systemsAnalogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
Devices and systems for increasing the gain and/or offering multiple antenna frequencies while conserving space on the antenna are provided. According to various aspects of the technology, panels with antenna elements are stacked to create a MIMO antenna array with more antenna elements while conserving space. In some aspects, the antenna elements are the same size and produce the same frequency while their physical configuration increases the gain of the antenna. In alternative aspects, the antenna elements are different sizes and produces different frequencies such that the antenna offers a greater variety or bandwidth of frequencies while conserving physical space on the antenna (i.e., maximizing a total quantity of antenna elements associated with the antenna). Using an antenna system and device with an increased quantity of antenna elements increases one or more of the system capacity, data rates, reliability, gain, coverage range, and the like.
H01Q 21/30 - Combinations of separate antenna units operating in different wavebands and connected to a common feeder system
H01Q 21/08 - Arrays of individually energised antenna units similarly polarised and spaced apart the units being spaced along, or adjacent to, a rectilinear path
H01Q 21/29 - Combinations of different interacting antenna units for giving a desired directional characteristic
Devices and systems for increasing the gain and/or offering multiple antenna frequencies while conserving space on the antenna are provided. According to various aspects of the technology, panels with antenna elements are stacked to create a MIMO antenna array with more antenna elements while conserving space. In some aspects, the antenna elements are the same size and produce the same frequency while their physical configuration increases the gain of the antenna. In alternative aspects, the antenna elements are different sizes and produces different frequencies such that the antenna offers a greater variety or bandwidth of frequencies while conserving physical space on the antenna (i.e., maximizing a total quantity of antenna elements associated with the antenna). Using an antenna system and device with an increased quantity of antenna elements increases one or more of the system capacity, data rates, reliability, gain, coverage range, and the like.
Systems and methods are provided for determining that the device is not reporting precise location information, based on output from one or more sensors determining that the device is located indoors and determining the altitude of the device. Based on the determination that the device is located indoors, suspending precise location services until it is determined that the device is back outdoors.
Systems and methods are provided for determining that the device is not reporting precise location information, based on output from one or more sensors determining that the device is located indoors and determining the altitude of the device. Based on the determination that the device is located indoors, suspending precise location services until it is determined that the device is back outdoors.
A method for transitioning a roaming user equipment (UE) to its home network. The method includes detecting by a roaming transition manager the presence of the UE in an idle state, and detecting by the roaming transition manager that a signal strength of a roaming connection established between the UE and a visited network of the user is less than a predefined threshold. The method additionally includes triggering by the roaming transition manager, the UE to search for an access node of a home network of the user within range of the UE. The method further includes terminating the roaming connection in response to locating an access node of the home network within range of the UE, and establishing a home connection between the UE and the home network in response to locating the access node of the home network within range of the UE.
Technology is disclosed herein for operating a wireless network including deregistering a user device from the network. In an implementation, a first network element deregisters the user device from the wireless network. The first network element determines a cause of the deregistration from among a plurality of possible causes and generates a notification message indicating the cause of the deregistration. The first network element communicates the notification message to a second network element which purges subscriber data from a data repository of the network and updates a subscriber profile of the user device with the cause of the deregistration. In an implementation, the first network element is an Access and Mobility Management function (AMF), the second network element is a Unified Data Management function (UDM), and the data repository is a Unified Data Repository (UDR) of the network.
The technology disclosed herein relates to enhancing satellite coverage and improving user device experiences. For example, the technology discussed herein can include establishing a radio resource control (RRC) connection between a first satellite and a user device (e.g., an active or idle RRC connection). Based on the RRC connection, the first satellite can generate a message (e.g., an RRC connection release message) that includes a next satellite pass parameter within a field of the message. Based on the satellite transmitting the next satellite pass parameter to the user device, the user device can initiate one or more user device actions. For example, the user device can initiate a timer corresponding to scanning for a frequency band of the second satellite corresponding to the next satellite pass parameter.
A data communication system determines a combination of communication slices for a user communication device. The data communication system selects a scheduling priority for the user communication device based on the combination of the communication slices. The data communication system schedules data transfers for the user communication device based on the selected scheduling priority. The data communication system wirelessly transfers user data for the user communication device based on the scheduling of the data transfers.
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
H04W 72/1263 - Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
22.
WIRELESS USER EQUIPMENT (UE) CONTROL OVER WIRELESS NETWORK SLICES BASED ON SLICE REQUIREMENTS
A wireless communication system comprises a wireless network slice, a source network function, and target network functions. The wireless network slice serves a wireless communication device. The wireless network slice has a slice requirement. The source network function controls the wireless network slice. The target network functions transfer their network function characteristics to the wireless communication device. The wireless communication device selects one of the target network functions based on the slice requirement and the network function characteristics. The selected one of the target network functions controls the wireless network slice in response to the selection by the wireless communication device.
H04W 76/27 - Transitions between radio resource control [RRC] states
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
Systems and methods are provided for providing a zero touch operations and self-healing data platform. Initially, data corresponding to a mobile communications network is received from a plurality of sources. A machine learning model is trained to detect anomalies corresponding to the data. Upon detecting an anomaly, self-remediation is initiated. Upon determining the self-remediation exceeds a configurable number of attempts or duration, an action is automatically performed. In various aspects, the action includes automatically initiating an alert corresponding to the anomaly or automatically creating a ticket corresponding to the anomaly.
In a wireless communication system, wireless network applications determine their priority indicators. The wireless network applications transfer their priority indicators to a data storage element like a Uniform Data Repository (UDR). In response, the data storage element transfers wireless network data to the wireless network applications in a priority order based on the priority indicators.
The technology disclosed herein relates to enhancing satellite coverage and improving user device experiences. For example, the technology discussed herein can include establishing a radio resource control (RRC) connection between a satellite and a user device (e.g., an active or idle RRC connection). Based on the RRC connection, the satellite can generate a message (e.g., an RRC connection release message) that includes a time to live parameter within a spare field of the message. Based on the satellite transmitting the time to live parameter to the user device, the user device can initiate one or more user device actions. For example, the user device can initiate a timer corresponding to scanning for a frequency band.
Various embodiments comprise a wireless communication network to qualify user devices for network policy association. In some examples, the wireless communication network comprises a control plane. The control plane detects a registration request for a User Equipment (UE) and registers the UE for network data services. The control plane receives a device type indication from the UE and determines when Policy Control Function (PCF) registration is available based on the device type indication. When the PCF registration is available, the control plane registers with a PCF, receives network policies from the PCF, and transfers a registration accept message with at least some of the network policies to the UE. When PCF registration is not available, the control plane forgoes the PCF registration and transfers the registration accept message to UE without the network polices.
A data communication system receives and verifies provider hardware-trust data from a data service provider, and in response, transfers a provider digital certificate to the data service provider. The data communication system receives and verifies customer hardware-trust data from a data service customer, and in response, transfers a customer digital certificate to the data service customer. The data service customer transfers the customer digital certificate to the data service provider, and the data service provider verifies the customer digital certificate to establish hardware-trust with the data service customer. The data service provider transfers the provider digital certificate to the data service customer, and the data service customer verifies the provider digital certificate to establish hardware-trust with the data service provider.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
28.
INDOOR-OUTDOOR DETECTION BY SMARTPHONE WITHOUT USING GPS INFORMATION
Systems and methods are provided for determining that the device is not reporting precise location information, based on output from one or more sensors determining that the device is located indoors and determining the altitude of the device. Based on the determination that the device is located indoors, suspending precise location services until it is determined that the device is back outdoors.
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
29.
DEFAULT BEARER USE FOR MULTIMEDIA SESSIONS IN WIRELESS COMMUNICATION NETWORKS
Various embodiments comprise a wireless communication network to maintain multimedia sessions in response to bearer failure. In some examples, the wireless communication network comprises Call Session Control Function (CSCF) circuitry. The CSCF circuitry requests a dedicated bearer to serve a requested multimedia session in response to a multimedia session request for a user device received over a default bearer. The CSCF circuitry receives an error message that comprises an error code indicating the dedicated bearer could not be established. The CSCF circuitry determines when the default bearer can support the requested multimedia session based on the error code. The CSCF circuitry maintains the default bearer for the user device and establishes the requested multimedia session over the default bearer when the default bearer can support the requested multimedia session.
A system comprises a network access server, a back-end network node, and a diameter routing agent (DRA). The network access server is configured to send, to the back-end network node, attribute-value pairs (AVP) of the network access server; receive, from a communication device, an authentication request; send, to the back-end network node, a Transmission Control Protocol (TCP) request responsive to receiving the authentication request; and send the authentication request to the DRA for authenticating a subscriber identity module (SIM) card. The back-end network node is coupled to the network access server and to the DRA, wherein the back-end network node is configured to send, to the DRA, configuration information for pre-configuring the network node at the DRA, and wherein the configuration information includes an IP address of the network node. The DRA coupled to the network node and configured to pre-configure the network node based on the configuration information.
H04L 61/503 - Internet protocol [IP] addresses using an authentication, authorisation and accounting [AAA] protocol, e.g. remote authentication dial-in user service [RADIUS] or Diameter
H04W 12/088 - Access security using filters or firewalls
Various embodiments comprise a wireless communication network to qualify user devices for network policy association. In some examples, the wireless communication network comprises a control plane. The control plane detects a registration request for a User Equipment (UE) and registers the UE for network data services. The control plane retrieves network slice information for the UE from a network data system and determines when Policy Control Function (PCF) registration is available based on the network slice information. When the PCF registration is available, the control plane registers the UE with a PCF, receives network policies for the UE from the PCF, and transfers a registration accept message with the network policies to the UE. When PCF registration is not available, the control plane forgoes the PCF registration for the wireless UE and transfers the registration accept message to UE without the network polices.
A system for controlling assignment and management of identities in ambient electromagnetic power harvesting (AEPH) chips. The system comprises a processor; a non-transitory memory; and an application stored in the non-transitory memory that, when executed by the processor, allocates a plurality of unique AEPH identities, wherein each unique identity comprises an identity of a product item and an instance identity; stores the plurality of unique AEPH identities in a first immutable record in a datastore, wherein the unique AEPH identities are associated with an initial state; provides the plurality of unique AEPH identities to an original equipment manufacturer of AEPH chips; provides an application programming interface (API); authorizes a request to update a state associated with a first unique AEPH identity in the datastore; and adds a second immutable record to the database that associates the first unique AEPH identity with an updated state of the first unique AEPH identity.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
A method for dynamically improving monitoring miss resolution comprises obtaining an incident report describing a monitoring miss, wherein the monitoring miss is associated with an outage in the communication system that has not yet been resolved, adding, by the incident reporting application, a flag to the incident report, wherein the flag indicates that the incident report is associated with one or more monitoring misses in the communication system that have not yet been resolved, extracting identification data identifying the outage in the communication system from the incident report, wherein the identification data comprises an identification of one or more network elements (NEs) at which the outage has occurred, and obtaining, based on the identification data, incident data describing a context of the outage in the communication system to identify a cause of the monitoring miss.
A method of resolving cell site backhaul link redundancy failures in a communication system comprises receiving a plurality of alarms from a plurality of network elements (NEs) in the communication system, determining that the alarms include at least two alarms associated with a cell site, including a first alarm indicating that a path through an alternative access vendor network to the cell site is down and a second alarm indicating that the cell site is unreachable, generating a first incident report indicating a lack of diverse paths through the alternative access vendor network to the cell site, and obtaining, based on an LSE incident report for the alarms, a second incident report comprising a compensation or credit from the alternative access vendors for failing to provide contracted-for diverse paths through the alternative access vendor networks.
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
A method for implementing a software-based (SB) radio frequency identification (RFID) tag is disclosed. The method comprises storing first RFID identity data in a memory of the SB RFID tag, storing second RFID identity data in the memory of the SB RFID tag; and receiving via an antenna coupled to the SB RFID tag an RFID interrogation signal from an RFID reader and, in response determining by a processor of the SB RFID tag a status of an RFID identity selection criterion, selecting one of the first RFID identity data and the second RFID identity data, based on the status of the RFID identity selection criterion; and sending the selected one of the first RFID identity data and the second RFID identity data to the RFID reader via an antenna coupled to the SB RFID tag.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
36.
TERRESTRIAL SYSTEM AND METHOD FOR MITIGATING INTERFERENCE THROUGH INTER-FREQUENCY OFFLOADING
Aspects herein for mitigating degraded communication quality experienced between a user device and a satellite due to overlapping radio frequency spectrum reuse by user devices communicating with terrestrial base stations via a telecommunications network. When the uplink quality is below a quality threshold, the telecommunications network identifies base stations with coverage areas that overlap with the coverage area of the satellite. The telecommunications network instructs and causes those base stations to adjust inter-frequency mobility thresholds for their uplink channels. Using an adjusted inter-frequency mobility threshold, user devices in communication with the terrestrial base stations are transferred to an uplink channel that does not overlap in the radio frequency spectrum used to communicate with the satellite. This mitigates degraded communication quality experienced between a user device and a satellite.
According to aspects herein, methods and systems for enriching location session record data are provided. More particularly, missing data of the location session record, such as an IMSI or MSISDN, is enriched with data from AMF probes. Initially, a location session record (LSR) dataset is received from an LSR probe. At least a portion of data from an access and mobility management function (AMF) dataset is compared to at least a portion of data from an LSR dataset to identify a match between a record in the AMF dataset and a corresponding record in the LSR dataset. Upon identifying the match, the corresponding record in the LSR dataset is enriched with IMSI or MSISDN from the record in the AMF dataset.
A method for managing a dual subscriber identity module (SIM) device is performed by an entitlement server. The method comprises receiving and storing a status of a SIM indicating that the SIM is off from a mobile communication device comprising at least two SIMs. The method also comprises receiving a transfer SIM request from a transfer mobile communication device to transfer the SIM from the mobile communication device to the transfer mobile communication device. The method further comprises, in response to receiving the transfer SIM request, notifying, by the entitlement server based on the stored status of the SIM, at least one of the mobile communication device or the transfer mobile communication device that the SIM is off on the mobile communication device to enable the SIM to be turned on for initiation of the transfer of the SIM from the mobile communication device to the transfer mobile communication device.
A system for recording authentication requests for access to a Wi-Fi network. The system includes a processing node coupled to a processor. The processor is configured to receive, from a Wi-Fi access point, a request to authenticate a first wireless device for access via the Wi-Fi access point. The processor is further configured to transmit, to a billing processing node, a record of the request to authenticate the first wireless device.
Methods, systems, and a graphical user interface (GUI) are provided for determining an amount of additional network capacity at an event. The GUI provides data fields for inputting parameters of both the user devices expected at the event and the desired network throughput needed to provide users attending the event with a desired quality of service (QoS). The GUI provides a user criteria segment and a throughput criteria segment. Data entry fields describe metrics of the user devices expected to be at the event. The throughput criteria segment includes data entry fields for target data throughput variables that the network operator wants to achieve at the event. Once data entry is complete, a network operator selects a “CALCULATE” button on the GUI. The calculation outputs a number of sectors, a number of baseband frequencies, and a backhaul event for multiple types of wireless networks.
Systems, methods and devices are provided for subscriber prioritization upon initial attachment. Methods include receiving notification of an initial attach request from a wireless device at a core network component, obtaining a subscriber priority during the initial attach procedure, and sharing the subscriber priority with the network component responding to the initial attach request.
Various embodiments comprise a wireless communication network to perform slice-based steering for User Equipment (UE). In some examples, a control plane detects an event UE and responsively selects a network slice to support the traffic type for the event UE. The control plane selects a Radio Access Network (RAN) to serve the event UE based on Key Performance Indicators (KPIs) for the RAN and directs the RAN to broadcast a slice Identifier (ID) for the selected slice. The RAN receives the direction from the control plane and responsively broadcasts the slice ID for the event UE. The event UE detects the slice ID broadcast by the RAN, matches the slice ID to a provisioned slice ID, and responsively attaches to the RAN. The event UE wirelessly exchanges user data over the RAN.
Systems and methods are provided for monitoring one or more connection parameters for a local router. The local router is connected to a cellular network and a mobile phone. If one or more connection parameters satisfy the connection threshold, the local router or the mobile device switch from communicating with the network using a first communication technology to communicate with the network using a second communication technology.
In various examples, a user seeking to switch network providers may reserve an eSIM profile through touch selection of the display of a UE, which causes encoding and transmission of an identifier associated with the UE to a network operator. As a result, human error both in transmitting and receiving the identifier needed to reserve an eSIM profile is eliminated. And the time needed to identify and transmit the identifier is significantly reduced in comparison to orally conveying the identifier to a customer services representative or keying in the identifier, and then verifying the identifier with the representative.
A Session Initiation Protocol (SIP) system receives a SIP message for a terminating User Equipment (UE). An E.164 Number Mapping (ENUM) system determines routing information based on the terminating UE. The SIP system transfers the SIP message for delivery to the terminating UE based on the routing information. The SIP system may retransfer the SIP message when an error message is received.
A visited network receives communication context from a home distributed ledger node in a home network and stores the communication context in a visited distributed ledger node in the visited network. The home distributed ledger node and the visited distributed ledger node comprise a distributed ledger that is shared by the home network and the visited network. To serve a User Equipment (UE) that is visiting from the home network, the visited network retrieves the communication context for the home network from the visited distributed ledger node and exchanges network signaling with the home network based on the communication context. The visited network delivers a wireless data service to the UE that is visiting from the home network in response to the network signaling.
System and method for creating application-specific TCP profiles to customize TCP parameters for an individual application that operates in the application layer of an OSI model. TCP parameters are set for a specific TCP profile that corresponds to the application. The TCP profiles are stored, and later selected and implemented when characteristics of the application are detected in the application layer.
A federated identity manager server configured to receive, from a metaverse server, a virtual identity and user credentials associated with the virtual identity; receive, from a mobile network operator (MNO), subscriber information of the user; create a trusted identity based on the virtual identity and the subscriber information; receive, from the metaverse server, a request to purchase the digital content by the virtual identity; send, to the metaverse server, a verification request that includes a validation challenge for the virtual identity in the metaverse application; send, to a communication device, a verification result that indicates the user of the communication device is verified to purchase the digital content; send, to the MNO, billing confirmation for the digital content, wherein the billing confirmation indicates the digital content is allocated to the user; and receive, from the MNO, a confirmation message that indicates the user is carrier billed for the digital asset.
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
49.
Internet protocol multimedia subsystem (IMS) slicing
An Internet Protocol Multimedia Subsystem (IMS) uses IMS slices in association with wireless network slices. The IMS receives an IMS registration from an IMS user device. In response, a wireless communication network identifies the wireless network slice that currently serves the IMS user device. The wireless communication network and/or the IMS selects an IMS slice for the IMS user device based on the wireless network slice that currently serves the IMS user device. The IMS serves an IMS service to the IMS user device from the selected IMS slice over the identified wireless network slice.
Technology is disclosed herein for WPS call handling for at a roaming or non-WPS supported locations. In an implementation, a wireless network receives a SIP invite for user device from a roaming RAN of a visited network. The user device is subscribed to the wireless network and is authorized for WPS service by the wireless network. The IMS core of the wireless network sends a request to the subscriber management function of the network for a user profile for the user device including the PLMN of the roaming RAN. The subscriber management function identifies a user profile from multiple user profiles for the user device based on the PLMN. Each of the multiple user profiles corresponds to a PLMN category of multiple PLMN categories. The session manager of the wireless network sends a request to establish a default bearer to the roaming RAN based on the user profile.
A wireless communication system serves wireless communication devices based on individual subscriber profiles and a shared subscriber profile. The wireless communication system stores the individual subscriber profiles and stores the shared subscriber profile. The wireless communication system serves the wireless communication devices based on the individual subscriber profiles. The wireless communication system determines when the individual subscriber profiles are unavailable for the wireless communication devices. In response, the wireless communication system serves the wireless communication devices based on the shared subscriber profile.
Systems, methods, and devices that facilitate power transfer to a remote sensor using radio frequency (RF) signals described. A remote sensor may harvest energy from signals absorbed by the sensor's antenna. The harvested energy may power the remote sensor and facilitate data transmissions to a base station of a network.
H02J 50/00 - Circuit arrangements or systems for wireless supply or distribution of electric power
H02J 7/02 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries for charging batteries from AC mains by converters
Systems and methods are provided for using morphology to determine a confidence level of a civic address associated with an enhanced 911 call. After a request by a public safety answer point (PSAP) for a civic address corresponding to user equipment (UE) initiating a call for emergency services is received at a node, the node receives from the UE a geodetic location corresponding to the UE. The geodetic location corresponding to the UE is utilized to retrieve morphology information from a database. Based at least in part on the morphology information, a confidence level of the civic address can be determined. Upon the confidence level of the civic address satisfying a configurable threshold, the civic address is provided to the PSAP.
Methods and systems are provided herein for facilitating Rich Communication Services (RCS) error messaging in a non-RCS capable network. It is determined that a first device and a second device are communicating using encrypted RCS messaging in a terrestrial network. It is then determined that the second device has transitioned from the terrestrial network to a non-terrestrial network. A determination is made that the first device has sent an encrypted RCS message intended for the second device. Based on the second device transitioning to the non-terrestrial network that does not support the encrypted RCS messaging, an error message is communicated to the first device indicating that the encrypted RCS message cannot be received by the second device.
A telecommunication network management system. The system comprises an incident reporting application that creates incident reports pursuant to alarms on network elements of a telecommunication network and wherein one of the incident reports is associated with a large-scale event (LSE), wherein the LSE incident report identifies alarms at a plurality of different network elements as associated with the LSE; and an incident management application that analyzes attributes of cell sites identified in the LSE incident report as impacted by the LSE, determines that at least 75% of the cell sites receive backhaul service from a same alternative access vendor (AAV) and that at least one backhaul circuit of the at least 75% of the cell sites is in an alarmed state, causes the incident reporting application to record a root cause of the LSE incident report as an AAV fault.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
A method of managing execution of a secure application is disclosed. The method comprises receiving an initial profile of an wireless communication device (WCD) by a secure application manager executing on a computer system, storing the initial profile by the secure application manager in a datastore; receiving a request comprising a current profile of the WCD by the secure application manager from an API of a secure application executing on the WCD to invoke an operation of a secure application; comparing the current profile of the WCD by the secure application manager to the initial profile of the WCD stored in the immutable record in the datastore; and in response to determining that the current profile of the WCD matches the initial profile of the WCD, passing the request to invoke an operation of the secure application by the secure application manager to the secure application for execution.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
The technology described herein improves management of the optimization of a device configuration associated with one or more wireless communication technologies. An analysis is performed using performance data and device capability information for a plurality of user devices. An optimal device configuration associated with one or more wireless communication technologies is determined for one or more identified user devices of the plurality of user devices. The one or more identified user devices are instructed to operate using the determined optimized device configuration.
A method comprises generating, by a test application in a test system of the zero trust network, a test packet comprising a unique token identifying the penetration test based on a test log, wherein the test log indicates that the penetration test is to be performed on a communication between a source microsegment and a target microsegment, transmitting, by the test application, the test packet to a policy enforcement point in the target microsegment, wherein a result log stores data, in association with the unique token, regarding at least one of a reception or processing of the test packet by the policy enforcement point, and comparing, by a log application in the test system, the test log and the result log to determine that the test packet has impermissibly passed through the policy enforcement point or been processed by the policy enforcement point.
Methods and systems are provided for providing a children at play live indicator. A user device corresponding to a user is initially registered with a safety device. When the user device is within a configurable range of the safety device, an indication is received. A parent may configure the configurable range at a children at play service via a parent device. Based on the user device being within the configurable range of the safety device, the safety device emits a visual or audible indicator. Additionally or alternatively, a warning indicating the user device is within the configurable range of the safety device may be communicated to the user device, the parent device, or a connected vehicle approaching the safety device.
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
Methods and systems for providing mobile broadband services to high speed rail are provided. The method begins with determining that a user equipment (UE) is moving at a speed between a first threshold and a second threshold between a first location and a second location. The first and second thresholds may be selected to encompass typical speed ranges of high speed rail operation. Next, the method continues with identifying a set of access points between the first location and the second location. Then, the method continues with predicting an access point from the set of access points at which to transmit data to the access point. Because high speed rail uses a fixed track, the predicting may be performed in advance. The method concludes with dynamically selecting the access point from the set of access points based on at least one predefined antenna steering pattern to maintain antenna bandwidth.
A wireless communication system modifies wireless network slice information for a wireless communication user. The wireless communication system detects a modification to the wireless network slice information for the wireless communication user. In response to the modification detection, the wireless communication system transfers a slice information modification message to a wireless communication device for the wireless communication user. The wireless communication system detects a failure of the slice information modification message sent to the wireless communication device. In response to the failure detection, the wireless communication system transfers another slice information modification message to the wireless communication device.
Systems, methods and devices are provided for subscriber prioritization upon initial attachment. Methods include receiving notification of an initial attach request from a wireless device at a subscriber locator function (SLF) and performing a database lookup at the SLF. Methods further include obtaining a subscriber priority from the database lookup and transmitting the subscriber priority from the SLF to a network component responding to the initial attach request from the wireless device.
Aspects provided herein provide methods, apparatus, and a non-transitory computer storage medium storing computer instructions for vehicle disturbance alerting in a network. The method begins with receiving a vibration alert from a sensor installed in a vehicle. The sensor may be an accelerometer, gyroscope, or motion-capable sensor and is in communication with a low power radar sensor that is also installed in the vehicle. A low power radar sensor is activated in response to the vibration alert. At least one radar signature is received from the low power radar sensor. The radar signature is then compared with at least one driver radar signature. The driver radar signature is recorded when a driver occupies a driver seat position and operates the vehicle. Based on the comparison, a determination is made whether to issue a vehicle disturbance alert.
B60R 25/30 - Detection related to theft or to other events relevant to anti-theft systems
B60R 25/104 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device characterised by the type of theft warning signal, e.g. visual or audible signals with special characteristics
B60R 25/20 - Means to switch the anti-theft system on or off
B60R 25/31 - Detection related to theft or to other events relevant to anti-theft systems of human presence inside or outside the vehicle
B60R 25/32 - Detection related to theft or to other events relevant to anti-theft systems of vehicle dynamic parameters, e.g. speed or acceleration
G01S 13/88 - Radar or analogous systems, specially adapted for specific applications
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
A method for implementing a slice security zone (SSZ) in a 5G network. The method comprises storing by an SSZ function executing on a first network server an SSZ security profile of the SSZ in a secure storage function, receiving by the SSZ function from a slice management function a slice registration request comprising information relating to a slice security profile of a slice managed by the slice management function, if the slice security profile complies with the SSZ security profile, storing by the SSZ function a slice registration association between the slice and the SSZ in the secure storage function, and sending by the SSZ function to the slice management function a slice registration response comprising information relating to whether the slice was registered in the SSZ.
H04W 12/48 - Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
Methods, media, and systems are provided for adapting a beamforming mode based on channel state information. The methods, media, and systems receive, at a base station associated with an antenna array, the channel state information from one or more devices. Based on the channel state information, the methods, media, and systems determine whether an uplink signal measurement is above a first threshold and whether a downlink signal measurement is above a second threshold. Based on whether the uplink signal measurement is above the first threshold and whether the downlink signal measurement is above the second threshold, the methods, media, and systems instruct one or more antenna elements corresponding to the antenna array to schedule wireless transmissions utilizing closed-loop beamforming or open-loop beamforming.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Systems, methods, and devices are disclosed herein for an application service that utilizes a large language model (LLM) to assist with performing management tasks associated with a wireless communications network. In an implementation, the application service receives natural language input indicative of a management task to complete with respect to the network. The application service identifies a context of the management task, which helps constrain the LLM to the appropriate domain(s). The application service generates a prompt that incorporates the task and the context and submits the prompt to the LLM. The application service receives from the LLM a reply that includes a plan that details a series of steps and associated resources of the domain for completing the management task. Upon receiving the LLM's reply, the application service performs the management task based on the provided plan.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
G06F 40/40 - Processing or translation of natural language
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
Systems, methods and devices are provided for facilitating integration of haptic notifications with existing applications, particularly mobile applications. A method includes accessing, by a wireless device storing an application, a haptic notification library including haptic notifications and further accessing code correlating the haptic notifications from the haptic notification library with standard notifications within the application. The method further includes providing the correlated haptic notifications during execution of the application by the wireless device.
The technology described herein relates to N7 call flow in a standalone architecture. In embodiments, a computing system may comprise a Session Management Function (SMF) for management of a network session of a network, a first Policy Control Function (PCF) for policy management of network resources of the network, and a second PCF for policy management of the network resources of the network. The SMF can receive information from the first PCF and the second PCF via a first interface. In embodiments, an existing Packet Data Unit (PDU) session between a user device and the computing system is identified. The first PCF can determine, based on received indications, to transmit policy update information to the SMF. Based on a failure to transmit the policy update information to the SMF, the first PCF can transmit the policy update information to the second PCF for transmission to the SMF.
The technology described herein relates to Security Operations Center (SOC) operations in a standalone architecture. In embodiments, the SOC comprises a producer that communicates with a first Network Repository Function (NRF) and a second NRF over a network repository function service-based interface. In embodiments, the producer (e.g., a Session Management Function, a Policy Control Function) can monitor heartbeats received from the first NRF and the second NRF. The first NRF, in some embodiments, can transmit a notification to the producer indicating that the first NRF is out-of-service. In some embodiments, the first NRF can also transmit another notification to the producer that indicates the first NRF is in-service. Based on the producer receiving the notification that the first NRF is out-of-service, the producer can suspend the monitoring of the heartbeats sent by the first NRF.
A wireless communication network exchanges user data with a User Equipment (UE) over a set of Public Mobile Land Networks (PLMNs). The wireless communication network detects excessive PLMN switching by the UE among the set of the PLMNs, and in response, directs the UE to use a subset of the PLMNs to inhibit the excessive PLMN switching. The wireless communication network exchanges subsequent data with the UE over the subset of the PLMNs.
A wireless User Equipment (UE) selects a network slice. When in idle mode, the wireless UE wirelessly indicates the selected network slice to a serving wireless access node. In response, the wireless UE wirelessly receives a node identifier for another wireless access node that is co-located with the serving wireless access node and that supports the selected network slice. The wireless UE wirelessly communicates in parallel with the serving wireless access node and the other wireless access node to use the selected network slice.
Methods are provided for delivering goods to a connected vehicle using unmanned aerial vehicles (UAVs). Upon receiving a request comprising instructions to deliver a package to a customer, a connection is established between the connected vehicle paired to a user device and the UAV authorized to deliver the package to an interface of the connected vehicle. The connection enables data corresponding to the connected vehicle to be communicated to the UAV. In aspect, the data comprises speed and direction of the connected vehicle allowing an optimal route to intercept the connected vehicle to be determined.
Systems, methods and computer-readable mediums are provided for resource monitoring and optimization within a network. Monitoring network resource usage can be based on time of day, cell loading conditions, wireless device location, and cell size. Through the monitoring, methods include determining proportions of the network resources utilized by the wireless devices within the network for voice over new radio (VoNR), voice over LTE (VoLTE) and data services during the monitoring. Based on this determination, methods provided herein reallocate the network resources based on the monitored resource usage and the proportions.
A method for automatically managing user access to resources of a communication system. The method includes receiving by a requester interface of an automated resource access manager a request by a user for access to a resource of the communication system, the access request communicated from user equipment (UE) of the user to the requester interface, and providing automatically by an approver interface of the automated resource access manager the access request to UE of an approver associated with the requested resource, the requested resource including a requested application of the communication system. The method additionally includes receiving by the approver interface either a granting of access to the requested application or a denial of access to the requested application, and providing automatically, by the requester interface, the user access to the requested application in response to receiving by the approver the granting of access to the requested application.
Systems and methods are provided for managing uplink transmission power (UTP) plans for user devices. A manager can assess UTP adjustment criteria to determine if an updated UTP plan should be activated for the user device. UTP plans may need to be updated when devices are transmitting too much power or not enough in order to be received by a telecommunications network. Updated UTP plans can increase or decrease the power transmitted by the device.
H04W 52/14 - Separate analysis of uplink or downlink
H04W 52/28 - TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
76.
SANCTUARY ANTENNA FOR FREQUENCY DIVISION DUPLEX CARRIER DEGRADATION DUING TIME DIVISION DUPLEXING SOUNDING REFERENCE SIGNAL ANTENNA SHARING
Methods, systems, and a non-transitory computer-readable medium that provide a sanctuary antenna for mitigating FDD carrier degradation during TDD antenna sharing are provided. The method begins with determining that the carrier degradation will occur during at least one FDD receive signal slot in a FDD frequency band on at least one antenna of the TDD frequency band based on the at least one FDD receive signal slot coinciding with at least one scheduled TDD transmit slot. Then, based on the determining, switching at least one scheduled FDD receive signal slot from the at least one antenna of the TDD frequency band to a sanctuary antenna occurs. The sanctuary antenna is used for a duration of at least one sounding reference signal (SRS) symbol.
A method for throughput estimation and troubleshooting includes collecting RF parameters from wireless gateway devices. The method additionally includes estimating a throughput of multiple wireless gateway devices based on collected RF parameters and maintaining a profile including RF parameters and estimated throughput over time. The method further includes troubleshooting for selected wireless gateway devices based on the throughput estimate.
Various embodiments comprise a wireless access node configured to steer a wireless user device to a RAT type. The wireless access node comprises radio circuitry and node circuitry. The radio circuitry receives a measurement report from a wireless user device for a first RAT type and a second RAT type. The sampling rate for the first measured signal strength is different than the sampling rate for the second measured signal strength. The node circuitry applies a calibration factor to the second measured signal strength to normalize the second measured signal strength with the first measured signal strength. The node circuitry compares the normalized second measured signal strength to the first measured signal strength. The radio circuitry wirelessly transfers an attachement instruction to the wireless user device to attach to the first RAT type or the second RAT type based on the comparison.
The technologies discussed herein relate to methods, systems, media, etc., for automatically triggering a user device action based on utilizing one or more ethanol sensor devices. In embodiments, an ethanol sensor device can detect ethanol vapor concentrations and determine whether the concentration is above a threshold. In embodiments, the ethanol sensor device can transmit the detected concentrations to one or more servers, which can cause the user device to initiate an action based on a concentration level that is above the threshold. For example, the server can provide one or more ride hailing services, such that the server initiates the user device action that includes providing, for display on a user interface of the user device, one or more selectable ride hailing transportation options from a location corresponding to the user device. In some embodiments, the server provides services corresponding to physical or mental health.
A core network server for defining authentication credentials and authenticating a wireless communication device according to WIFI communication protocols includes a central processing unit (CPU) and a non-transitory memory comprising executable instructions that when executed by the CPU, causes the core network server to receive an encrypted authentication request from a wireless communication device; send the encrypted authentication request to an authentication server based on one or more attributes in the encrypted authentication request; receive an indicator of a specialized network slice associated with the wireless communication device based on sending the encrypted authentication request; communicate authentication messages to the wireless communication device according to one or more network functions of the specialized network slice; and authenticate the wireless communication device according to the specialized network slice responsive to communicating the authentication messages.
Systems and methods are provided for dynamically optimizing EN-DC networks and include a first node, a second node, and one or more processors. The one or more processors are configured to receive data indicating that a first set of bands is present within a first sector and determine a high priority band from the first set of bands within the first sector. The system also identifies a first set of devices within a sector and defines a time frame for receiving data indicating a number of instances in which each device connected to the high priority band. A first status report comprising data indicating the number of instances each device connected to the high priority band is received and a performance rating is determined for the high priority band. The time frame for receiving data may be adjusted based on the performance rating and data from the first status report.
The technologies discussed herein relate to methods, systems, media, etc., for transmitting out-of-band signals to initiate a user device trigger. In embodiments, an out-of-band node is configured to wirelessly transmit out-of-band signals to a user device that is within a threshold distance of the out-of-band node. For example, an out-of-band signal can include an ultrasonic wave. In some embodiments, two or more out-of-band nodes are positioned in an indoor room of a building. In embodiments, the transmitted out-of-band signals transmitted by the out-of-band node can include encoded data, which was received by the out-of-band node over a network from one or more servers, wherein the encoded data, when received by a user device via the out-of-band signal, triggers the user device to initiate an action. For example, the action may include automatically opening an application and initiating an update to a telecommunications service.
Methods and systems for preserving network capacity by successively sharing content serially using an event protocol are provided. The method begins with monitoring the RF signal conditions for user devices at an event. A first user device with RF signal conditions above a threshold is identified. A second user device within a predetermined distance from the first user device and is within predetermined RF signal conditions is also identified. The second user device is requesting a download of the same content as the first device. The first and second user devices are synchronized using an event protocol. The event protocol may automatically perform the synchronization and may use a handshaking protocol as part of the synchronization process. Once the event synchronization is complete the first device transmits the content to the second device. The synchronizing may be repeated with successive user devices to serially deliver the common content to the successive user devices at the event.
Systems, methods, and devices for managing network resources perform and/or comprise: setting a communication threshold; monitoring a communication parameter for a wireless device connected to a network, wherein the wireless device is configured for communicating with the network using a first communication technology and for communicating with the network using a second communication technology; receiving a resource status from the network; and in response to a determination that the communication parameter is below the communication threshold and based on the resource status, causing the wireless device to switch from communicating with the network using the first communication technology to communicating with the network using the second communication technology.
A method of installing an API in a user equipment (UE). The method comprises sending a request from the UE for an API to a distributed application executing on a computer system, wherein the request defines a context of the UE; receiving a template smart contract by the UE from the distributed application, wherein the template smart contract is identified by the distributed application based on the context of the UE and wherein the template smart contract defines a manifest for fetching a plurality of API smart contract components from a ledger data store and defines instructions for building the API by executing at least some of the API smart contract components; executing the at least some of the API smart contract components by the UE, whereby the API is built by the UE; and executing the API by the UE, whereby the UE accesses an application service.
According to aspects herein, methods and systems for providing multiple channel bundling for mobile phone satellite cellular systems are provided. More particularly, after a node comprising at last one time division duplex (TDD) layer and a frequency division duplex (FDD) layer determines a user equipment (UE) supports dual bands, the node initiates bundling of downlink communications over the FDD layer and a portion of the TDD layer. Additionally, the node instructs the UE to communicate uplink communications over the FDD layer and not uplink slots of the TDD layer. In this way, link budget is improved because only low band (FDD) is utilized in uplink communications from the UE to the node. Moreover, additional bandwidth is provided in downlink communications from the node to the UE because low band is bundled with the downlink slots of mid band (TDD).
A method for configuring a network of a communication system to secure applications executable on user equipment (UE) connectable to the network. The method includes receiving a predefined first traffic signature corresponding to a first application, and configuring a network traffic monitoring tool to detect an activation of the first application executing on the UE. The method additionally includes configuring the network traffic monitoring tool to monitor active traffic manifested on the network associated with the first application, configuring a traffic signature comparison tool to detect a security breach associated with the first application, and configuring an alarm tool issue an alarm and/or act against the first application.
A collector ambient electromagnetic power harvesting (AEPH) device for collecting and forwarding data is disclosed. The device includes an antenna, an AEPH circuit converting RF energy from the antenna into electrical power, and a memory and a controller powered by the AEPH circuit. The controller receives in a first RF signal information from a reporter AEPH device, including data and the reporter ID. The controller stores the data in the memory with an association to the reporter ID. The controller receives in a second RF signal an interrogation signal. In response, the controller transmits a response via the antenna including the reporter ID and data in the memory associated with the reporter ID. The interrogation signal may be received and the response transmitted in a first RF band and/or communication protocol, and the information may be received in a second RF band and/or communication protocol.
A data communication system serves a wireless communication device over a Non Third Generation Partnership Project (non-3GPP) network slice. The data communication system receives a request for the non-3GPP slice from the wireless communication device over a non-3GPP access node. The data communication system exchanges network signaling with a 3GPP network. The data communication system receives an authorization from the 3GPP network for the wireless communication device to use the non-3GPP network slice. The data communication system establishes a Virtual Private Network (VPN) for the wireless communication device over the non-3GPP access node in response to the authorization from the 3GPP network. The data communication system exchanges user data with the wireless communication device over the VPN. The data communication system exchanges the user data with a non-3GPP communication system over the VPN or another VPN for the non-3GPP communication system.
Aspects herein provide systems, methods, and media for terrestrially controlling whether user devices are allowed to or preventing from accessing and utilizing a non-terrestrial network. Using geofencing and time-based threshold techniques, a terrestrial network component determines and control whether user devices within a geofence should be prevented from accessing and utilizing the non-terrestrial network in order to avoid overloading the capacity of the non-terrestrial network. The terrestrial network component sends an indication and/or error to the non-terrestrial network for delivery to the user device to prevent the access. When the user device receives the indication and/or error from a satellite, for example, the user device that is within the geofence is caused to access and utilize the terrestrial network instead of the non-terrestrial network.
H04W 48/04 - Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction or speed
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04W 8/22 - Processing or transfer of terminal data, e.g. status or physical capabilities
A wireless communication network wirelessly receives a slice indicator from a wireless communication device. The wireless communication network selects an Artificial Intelligence (AI) engine based on the slice indicator. The wireless communication network may select the AI engine by selecting a wireless network slice that comprises the AI engine based on the slice indicator. The wireless communication network wirelessly receives user data from the wireless communication device for the wireless network slice. The wireless communication network transfers the user data to the selected AI engine. The selected AI engine generates an AI output based on the user data.
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
Methods for mitigating interference between satellite networks and terrestrial cellular networks are provided. Interference may occur when a UE uses an extraterrestrial network when a terrestrial network is available. A method of mitigating interference between an extraterrestrial network and a terrestrial network begins with detecting, by an extraterrestrial access point, that at least one terrestrial access point located within a first geographical area is attempting to communicate with the extraterrestrial access point. The extraterrestrial access point then determines that the first geographical area is covered by at least one terrestrial network. The determining that the first geographical area is covered by at least one terrestrial network may use a dataset of terrestrial network access points. Once the first geographical area has been determined to be covered by at least one terrestrial network, the extraterrestrial access point ceases transmissions to the first geographical network.
Aspects herein provide systems, methods, and media for mitigating uplink degradation, noise, and/or other interference experienced between a user device and a satellite. When the uplink degradation, noise, and/or other interference is below a signal quality threshold, the telecommunications network identifies base stations with coverage areas that overlap with the coverage area of the satellite. The telecommunications network instructs and causes those base stations to modify an amount of power to be utilized on the uplink channel between another user device and the base station. This power modification technique reduces or prevents uplink degradation, noise, and/or other interference experienced between a user device and a satellite and caused by communications between other user devices and the terrestrial base stations.
Aspects herein provide systems, methods, and media for mitigating uplink degradation, noise, and/or other interference experienced between a user device and a satellite by blanking of physical resource blocks that are being used on the same or an overlapping radio frequency spectrum by user devices communicating with terrestrial base stations via a telecommunications network. When the uplink degradation, noise, and/or other interference is below a signal quality threshold, the telecommunications network identifies base stations with coverage areas that overlap with the coverage area of the satellite. The telecommunications network instructs and causes those base stations to blank physical resource blocks on the uplink channel(s) that correspond to the portions of the radio frequency spectrum at issue. This blanking technique reduces or prevents uplink degradation, noise, and/or other interference experienced between a user device and a satellite and caused by communications between other user devices and the terrestrial base stations.
Aspects herein provide systems, methods, and media for mitigating uplink degradation, noise, and/or other interference experienced between a user device and a satellite by blanking of physical resource blocks that are being used on the same or an overlapping radio frequency spectrum by user devices communicating with terrestrial base stations via a telecommunications network. When the uplink degradation, noise, and/or other interference is below a signal quality threshold, the telecommunications network identifies base stations with coverage areas that overlap with the coverage area of the satellite. The telecommunications network instructs and causes those base stations to blank physical resource blocks on the uplink channel(s) that correspond to the portions of the radio frequency spectrum at issue. This blanking technique reduces or prevents uplink degradation, noise, and/or other interference experienced between a user device and a satellite and caused by communications between other user devices and the terrestrial base stations.
Aspects herein provide systems, methods, and media for mitigating uplink degradation, noise, and/or other interference experienced between a user device and a satellite. When the uplink degradation, noise, and/or other interference is below a signal quality threshold, the telecommunications network identifies base stations with coverage areas that overlap with the coverage area of the satellite. The telecommunications network instructs and causes those base stations to modify an amount of power to be utilized on the uplink channel between another user device and the base station. This power modification technique reduces or prevents uplink degradation, noise, and/or other interference experienced between a user device and a satellite and caused by communications between other user devices and the terrestrial base stations.
A method is provided of updating Subscriber Identity Module (SIM) data in a user equipment (UE) associated with a wireless communication service provider. An entitlement server receives a UE SIM update inquiry from a UE, the inquiry including UE identifying information and UE stored SIM configuration identifying information. The entitlement server sends a SIM update inquiry to a SIM configuration repository, the inquiry including the UE identifying information and the UE stored SIM configuration identifying information. The entitlement server receives a SIM status message from the SIM configuration repository, the message indicating whether SIM configuration data stored in the SIM configuration repository is more recent than the UE stored SIM configuration. The entitlement server sends a SIM update response to the UE, the UE SIM update response including the SIM status message.
Embodiments of the present disclosure are directed to systems and methods for group-based filtering of user devices on a wireless network. Upon a request from a user device to access a requested network service, a device specific identifier associated with the user device is used to determine one or more groups associated with the user device. Based on any access restrictions for the one or more groups associated with the user device, the requested network service may be selectively authorized or provided.
H04W 12/37 - Managing security policies for mobile devices or for controlling mobile applications
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
Systems and methods are provided for outputting audible sound processed with a hearing loss compensation algorithm for listening by a user of user smart phone. A method includes receiving live digital micro electrical-mechanical system (MEMs) sound data from a speaker phone. The method further includes processing, at a subscribed user smart phone, the live digital MEMS sound data from the speaker smart phone in accordance with a hearing loss compensation algorithm. The subscribed user smart phone generates and outputs audible sound waves for the live digital for listening by the user of the subscribed user smart phone.
H04M 1/60 - Substation equipment, e.g. for use by subscribers including speech amplifiers
H04M 1/72412 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
The present disclosure describes a system and method for managing site configuration in a radio access network (RAN) environment. Trigger events are identified through data analysis, including network congestion, signal degradation, or performance deviation. Upon detecting a trigger event, specific site configuration data associated with the event is extracted from the RAN node. The extracted site configuration data is utilized to generate a new configuration file, ensuring the seamless update of network settings while maintaining the integrity of the RAN.