Systems and methods are provided for providing network notifications of triggering events. Triggering events can be any event identified by one or more sensors that meets predetermined triggering event criteria such that a notification should be communicated via a telecommunications network. The present disclosure describes aspects where triggering events (e.g., natural disasters, mass casualty events, etc.) are detected and all user devices within a predetermined area of the triggering event are notified via the telecommunications network, leveraging network data of user device locations.
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
H04W 68/06 - User notification, e.g. alerting or paging, for incoming communication, change of service or the like using multi-step notification by changing the notification area
2.
AUTOMATED HOLOGRAPHY USING WIFI RADIATION FOR INTERIOR MAPPING
Automated holography using WiFi radiation may be triggered by an event such as a shooting, weather event, fire, or mass casualty. A method begins with sensors detecting a triggering event. The sensors may be mounted on access points, buildings, or other nearby structures. The sensors may be of different types, including aural sensors for detecting noises, such as gunshots, visual sensors, vibration sensors, and the like. The sensors then contact nodes within a predetermined distance of the triggering event using a network router. Additional nodes may include other access nodes within the predetermined distance, relays, repeaters, other network routers, and user devices. After contacting the applicable nodes, automatic mapping of an interior of the location of the triggering event is performed using WiFi radiation. The interior mapping of the location of the triggering event is then transmitted to at least one emergency service.
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G01S 7/00 - Details of systems according to groups , ,
G01S 13/00 - Systems using the reflection or reradiation of radio waves, e.g. radar systemsAnalogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
G01S 13/89 - Radar or analogous systems, specially adapted for specific applications for mapping or imaging
G03H 5/00 - Holographic processes or apparatus using particles or using waves other than those covered by groups or for obtaining hologramsProcesses or apparatus for obtaining an optical image from them
Systems and methods enable a framework that manages multiple discovery servers and different device activations and provisioning. Initially, a request for a service corresponding to a user equipment (UE) is received at a discovery management server. The discovery management server determines a discovery server corresponding to the UE. A push notification or a pull request is communicated by the discovery management server to the discovery server. Information corresponding to the service in association with the UE is stored at a database of the discovery management server.
Embodiments of the present disclosure are directed to systems and methods for reporting user equipment (UE) capabilities for carrier aggregation sessions. Instead of, or in addition to, reporting maximum bandwidth processing capabilities, the present disclosure utilizes an information element reported by the UE that includes the maximum number of resource blocks or subcarriers that can be processed by the baseband processor of the UE.
A method comprises storing, in an over-the-air (OTA) system of the core network, an update to an electronic subscriber identity model (eSIM) profile, transmitting, by the OTA system, the update to the eSIM profile to a remote subscriber identity module provisioning (RSP) system of the core network, updating, by an update application of the RSP system, the eSIM profile based on the update to the eSIM profile received from the OTA system by adding the one or more files to the eSIM profile, modifying the one or more files in the eSIM profile, or updating the file in the eSIM profile to include the additional or modified data, and downloading, by the download application of the UE, the eSIM profile to the UE.
A method comprises generating, by a storage application in a data store implemented as an interplanetary file system (IPFS), a slice data structure dedicated for the network slice in response to receiving the parameters from the slice application, in which the slice data structure comprises the parameters of the network slice, monitoring, by the slice application, usage of the one or more NEs in the network slice by the client, storing, by the storage application in the slice data structure, usage data describing the usage of the one or more NEs in the network slice, and updating, by the storage application, the slice data structure to indicate update data describing an update to one or more parameters of the network slice in response to receiving update data from the slice application.
According to aspects herein, methods and systems for capacity management of virtual spaces are provided. The method begins with estimating a capacity size need of a virtual space in a metaverse. A first quantity of avatars is monitored as avatars enter, leave, and occupy the virtual space. The first quantity of avatars in the virtual space is compared with a predetermined fill threshold. Based on the comparing, a duplicate virtual space may be created if the first quantity of avatars in the virtual space exceeds the predetermined fill threshold. A user may transmit a request to join a virtual space in a metaverse to a network. The request to join the virtual space contains at least one avatar identification and may be a request for a group to join. The user or group receives a sequential identifier of the virtual space and then joins the virtual space.
A data communication system delivers quantum capabilities over network slices. The data communication system receives a user application characteristic from a user communication device for a user application in the user communication device. The data communication system selects one of the quantum capabilities based on the user application characteristic. The data communication system connects the user communication device to the selected one of the quantum capabilities over one of the network slices.
The technology disclosed herein relates to a modular antenna (a single multi-band antenna system) having various sets of antenna elements for transmitting a plurality of frequency bands. In some embodiments, the sets of antenna elements can be configured vertically in a column based on the frequency band (e.g., a first vertical column for low-band frequencies, a second vertical column for high-band frequencies, and third vertical column for millimeter wave frequencies). In other embodiments, the antenna elements that transmit longer wavelengths can be positioned around the antenna elements that transmit shorter wavelengths. Each portion of the modular antenna that includes a particular set of antenna elements corresponding to a particular frequency range can each have an individual dedicated reflector and separate printed circuit board. Further, each of the antenna elements of the modular antenna can have the same gain.
H04B 1/00 - Details of transmission systems, not covered by a single one of groups Details of transmission systems not characterised by the medium used for transmission
H01Q 1/24 - SupportsMounting means by structural association with other equipment or articles with receiving set
In some examples, a method of managing communication includes receiving, at an access point, communication from multiple user devices, aggregating the communication from the multiple user devices to form a first aggregated communication, transmitting the first aggregated communication to a mobile core network, aggregating, at the first mobile network core, the first aggregated communication with communication from a second access point to form a second aggregated communication, and transmitting the second aggregated communication to a macro core network.
In some examples, a data management method in a transportation vehicle includes receiving, at an access point, data from a plurality of sensor devices, aggregating the sensor data, transmitting the aggregated sensor data to a mobile core network located in the transportation vehicle, and caching, at the mobile core network, the aggregated sensor data.
In some examples, a method of communication management includes receiving, at a user device programmed to communicate with a macro core network via a baseband processing unit of the user device according to a first subscriber identity module (SIM), a traveling SIM (tSIM), receiving, at the user device, an instruction to initiate the tSIM, responsive to the instruction, programming, on the user device, a second SIM based on the tSIM, the second SIM including multiple profiles programmed according to the programming, wherein the multiple profiles control communication of the user device via the baseband processing unit, and communicating with a mobile core network via the baseband processing unit according to the second SIM.
The technology disclosed herein relates to providing sector management utilizing a multi-band antenna system. The disclosed multi-band antenna system can combine multiple sets of antenna elements for transmitting on a plurality of different frequency bands. A location or a utilization corresponding to one or more UEs attached to a cell provided by a first set of antenna elements of the multi-band antenna system is initially detected. Based on the detecting, an action is performed. The action comprises one or more of: implementing carrier aggregation for a UE of the one or more UEs; dynamically adjusting power provided to the first set of antenna elements; or providing, by a non-multi-band antenna system collocated with the multi-band antenna system, multiple individual cells to the one or more UEs.
H04B 1/00 - Details of transmission systems, not covered by a single one of groups Details of transmission systems not characterised by the medium used for transmission
H01Q 1/24 - SupportsMounting means by structural association with other equipment or articles with receiving set
A first wireless network slice executes a first slice input and generates a first slice output. The first slice transfers the first slice output to a second wireless network slice. The second slice receives and authorizes the first slice output and transfers a first acknowledgement to the first slice. The first slice receives the first acknowledgement and responsively uses the first slice output to deliver a data communication service. The second slice executes a second slice input and generates a second slice output. The second slice transfers the second slice output to the first slice. The first slice receives and authorizes the second slice output and transfers a second acknowledgement to the second slice. The second slice receives the second acknowledgement and responsively uses the second slice output to deliver the data communication service.
H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
In some examples, a mobile core network is implemented in a movable platform. The mobile core network includes a user plane function (UPF), a mobility management function (AMF), and a session management function (SMF). The mobile core network is configured to authenticate a user device located on the movable platform into first or second states, the first state providing local access on the movable platform, and the second state providing local access on the movable platform and access to a macro core network via the mobile core network.
A wireless communication network selects a relay slice and a network slice for a user communication device. The wireless communication network transfers network signaling for the user communication device to the relay slice and to the network slice. The relay slice exchanges user data for the user communication device with the network slice in response to the network signaling. The network slice exchanges the user data for the user communication device with the relay slice in response to the network signaling.
A system and method for enabling fine-grained access to enterprise applications in an enterprise network. The method includes receiving, via a discovery application running on a computing device, user input from a user, where the user input identifies at least one of an application name, a server name, or an Internet Protocol (IP) address associated with a computing resource for accessing an enterprise application; comparing, via the discovery application, the user input to application information stored in a database accessible by the discovery application; sending, via the discovery application, a message to the user in response to determining a match between the user input and the application information, where the message identifies a membership group containing the computing resource for accessing the enterprise application; and enabling the user to access the membership group using the computing resource when the user is a member of the membership group.
Systems, methods, and devices are provided for adjusting the IMS APN/P-GW for a roaming wireless device. Methods include receiving an attach request for data services from a roaming wireless device at an IMS APN/P-GW of a visited network. Methods further include obtaining the home IMS APN/P-GW for the home network for the roaming wireless device and adjusting the IMS APN/P-GW for the roaming mobile to the IMS APN/P-GW of the visited network.
Systems and methods are provided for using a telecommunications network to estimate a total number of vehicles in a predetermined place at a predetermined time. Based on the total number of vehicles, the network can estimate greenhouse gas emissions for a particular area in real-time.
A method is disclosed for providing, in a server computer, a data set to a subscriber. The method includes receiving a first subscription request from a subscriber specifying first data content and format for members of a first data set, sending a second subscription request to a data set provider specifying a second data content and format for members of a second data set, receiving RFID reader locations, receiving a second data set member having RFID tag data read by the RFID readers, generating an object location based on the RFID tag data read and the RFID reader locations, receiving real-time data relating to the object; converting the real-time data to converted real-time data having the first data set data format; generating a first data set member from the object location, the tag data, and the converted real-time data, and sending the first data set member to the subscriber.
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
21.
MEASURING ATMOSPHERIC GREENHOUSE GAS CONCENTRATIONS USING TELECOMMUNICATION NETWORK INFRASTRUCTURE
The present technology relates to a systems and methods for monitoring gas concentrations, specifically greenhouse gasses, using a cellular network. A target site receives a signal with predetermined signal strength from a base station. Changes in signal strength are monitored to determine alterations in gas concentration, providing near real-time access to this data through an application programing interface. The technology also provides for monitoring multiple base stations, aggregating data, and creating a near real-time geographical map of greenhouse gas concentrations.
In some examples, a computer program product comprises computer-executable instructions stored in a non-transitory computer readable medium. The instructions are executable by a processor to cause the processor to partition a data structure into a plurality of parts, distribute and store the plurality of parts among a plurality of data stores according to a randomization factor, generate a look-up table including an association between each of the parts and respective storage location of the parts among the plurality of data stores, responsive to a request to access the data structure, query the look-up table to determine the respective storage locations of the parts among the plurality of data stores, access the respective storage locations to obtain the parts, and reassemble the parts to obtain the data structure.
Methods, media, and systems are provided for a priority-based multi-user (MU) multiple-input multiple-output (MIMO) pairing threshold for codebook beamforming. The methods, media, and systems identify a plurality of user device candidates for a user device pairing. A first user device of the plurality of user device candidates having a higher priority than another user device of the plurality of user device candidates is identified. Correlations between one or more beams associated with one or more of the plurality of user device candidates are determined. Based on determining the correlations, user devices can be paired for resource sharing. In some embodiments, the user devices are paired based on beam correlations being below a threshold. For example, the threshold can be determined based on a priority of one or more of the user devices.
H04B 7/0408 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas using two or more beams, i.e. beam diversity
H04B 7/0456 - Selection of precoding matrices or codebooks, e.g. using matrices for antenna weighting
H04B 7/0491 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas using two or more sectors, i.e. sector diversity
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04W 72/044 - Wireless resource allocation based on the type of the allocated resource
H04W 72/0453 - Resources in frequency domain, e.g. a carrier in FDMA
H04W 72/121 - Wireless traffic scheduling for groups of terminals or users
H04W 72/1273 - Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of downlink data flows
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
24.
DYNAMIC USER EQUIPMENT ANTENNA TRANSMISSION PROFILE SWITCHING
Embodiments of the present disclosure are focused on systems and methods for enhanced management of transmission profiles within a communication network. The disclosure includes the continuous monitoring of signal to interference plus noise ratios (SINR) and throughput for the UE operating within the coverage area of the base station. Upon the detection that the SINR falls below or surpasses a dynamically adjustable pre-determined threshold, the transmission profile of the UE is dynamically adjusted. The UE can switch between a two-antenna transmission profile and a four-antenna transmission profile, depending on the SINR, ensuring optimized communication within the network.
H04B 1/401 - Circuits for selecting or indicating operating mode
H04B 17/309 - Measuring or estimating channel quality parameters
H01Q 3/24 - Arrangements for changing or varying the orientation or the shape of the directional pattern of the waves radiated from an antenna or antenna system varying the orientation by switching energy from one active radiating element to another, e.g. for beam switching
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Systems, methods and devices are provided for providing millimeter wave coverage for capable devices connected to standalone networks. Methods include receiving a capability report and a measurement report from a wireless device and determining based on the capability report that the wireless device supports millimeter wave (mmWave) coverage, but does not support new radio dual connectivity (NRDC). Methods provided herein further include determining, based on the measurement report, that the wireless device is in a location having a threshold strength of mmWave coverage; and transitioning the wireless device to another access node to allow for the mm Wave coverage.
The technology disclosed herein relates to enhancing millimeter (mm) wave coverage within a wireless telecommunications network. It is commonly known that mm waves have difficulty propagating through materials. Urban areas pose significant hurdles for mm waves since a line of sight (LOS) to a user device is often times blocked by a physical object (e.g., building, tree, car, etc.). However, mm waves are desirable because of the wide bandwidths available for carrying communications at that frequency range. Embodiments herein provide methods, systems, and computer-storage media for adjusting a transmission power of a mm wave such that it can propagate through a physical object when a permittivity of an external material of the physical object is within a specified range where power adjustment would successfully propagate the mm wave through the physical object.
A method for tracking device control includes generating alerts from a network component based on a movement and location of a wireless tracking device. The method includes receiving, at an access node of a wireless network, a signal indicating a location from a tracking device and comparing the location to stored locations. The method further includes identifying the location as one of the stored locations and monitoring the tracking device for movement from the location. Responsive to detecting the movement from the stored location, the method includes sending an instruction to the tracking device to generate an alert.
Methods, media, and systems are provided for improving beamset management and enhancing coverage in a wireless telecommunication network utilizing millimeter wave (mmWave) communications. The wireless telecommunication network can correspond to an urban area, for example. As one example, the technology disclosed herein can reduce dropped call rates within the wireless telecommunication network. In embodiments, sector metrics are received for one or more sectors of the wireless telecommunication network and stored at a primary-secondary cell and a special cell of at least one of the sectors of the wireless telecommunication network. A beamset (or at least one parameter thereof) corresponding to a sector is changed based on the sector metrics stored at the primary-secondary cell and the special cell. The sector metrics include beamset data (e.g., beamset data corresponding to an alpha sector of the one or more sectors of the wireless telecommunication network).
H04B 7/08 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
Aspects herein provide a system, media, and methods for provisioning and establishing multiple network slices for use by an application. In aspects, a particular application is able to provision a URLLC slice and an eMBB slice from a network. Based on a predefined policy associated with the application, the application communicates high priority data using a URLLC slice and non-priority data using the eMBB slice. The application can utilize unique headers on high priority data and non-priority data to implement the data prioritization schema, which the network can further use as filters. As such, the application can leverage the distinct characteristics of URLLC and eMBB to optimize the application's performance and operations at a user device and/or within the network.
Systems, methods and non-transitory computer-readable mediums are provided for remediating failures in container-based telecommunications systems. A method includes accessing by a container as a service (CaaS) server a continuous integration (CI)/continuous delivery (CD) tool server. The method additionally includes experiencing a connectivity failure with the CI/CD tool server and accessing by the CaaS server an alternative repository created through real time replication of the CI/CD tool server contents.
H04L 41/0663 - Performing the actions predefined by failover planning, e.g. switching to standby network elements
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
32.
Roaming Data Capturing Via Subscriber Identity Module (SIM) Applet
A system and method for monitoring and collecting network data in different roaming environments. The method includes searching, by a mobile device, for one or more home networks in a list of available networks; attaching, by the mobile device, to a home network selected from the list of available networks; monitoring, by the mobile device, location of the mobile device after attaching to the home network; detecting, by the mobile device based on the location of the mobile device, a roaming scenario when the mobile device moves outside the home network and attaches to a visited network not on the list of available networks; and collecting, by a subscriber identification module (SIM) applet on the mobile device, performance data associated with the visited network upon detecting that the mobile device is roaming in the visited network.
An apparatus configured to control operation of a product. The apparatus includes an integrated RFID tag embedded in the product and configured to communicate with an external user device. The integrated RFID tag stores a first working key associated with the product and is further configured to receive a second working key transmitted from the external user device. The apparatus includes control logic operatively coupled to the integrated RFID tag and configured to read the first working key and the second working key from the integrated RFID tag. The control logic determines whether the first and second working keys match and, in response to a determination that the first and second working keys match, the control logic enables a controlled functionality of the product.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
34.
LIGHT DETECTION AND RANGING (LIDAR) BASED NETWORK DESIGN AND OPTIMIZATION
Methods and systems for LIDAR-based network design and optimization are provided. A network operator monitors signal quality from each access point antenna and collects signal quality metrics. LIDAR may be used to measure a distance to the obstruction. Based on the monitoring of the at least one signal quality metric from an access point antenna, the network operator may determine that the access point antenna signal may be blocked, completely or partially by an obstruction. The network may then direct a LIDAR module located at the base of the access point antenna to measure a distance from the access point to the obstruction. Based on the LIDAR measurements, at least one antenna operating parameter of the access point antenna is then adjusted. The at least one antenna operating parameter may be an azimuth setting, a tile angle, and an antenna power setting.
Embodiments of the present disclosure are focused on systems and methods for enhanced management of transmission profiles within a communication network. The disclosure includes the continuous monitoring of signal to interference plus noise ratios (SINR) and throughput for the UE operating within the coverage area of the base station. Upon the detection that the SINR falls below or surpasses a dynamically adjustable pre-determined threshold, the transmission profile of the UE is dynamically adjusted. The UE can switch between a two-antenna transmission profile and a four-antenna transmission profile, depending on the SINR, ensuring optimized communication within the network.
H04B 17/336 - Signal-to-interference ratio [SIR] or carrier-to-interference ratio [CIR]
H04B 7/0404 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas the mobile station comprising multiple antennas, e.g. to provide uplink diversity
H04W 24/02 - Arrangements for optimising operational condition
Various embodiments comprise a wireless communication network to select Shared Data Support (SDS) rules for a user device. In some examples, the wireless communication network comprises a network controller and a network data system. The network controller receives a registration request from the user device and transfers a subscription data request to the data system. The network data system retrieves subscription data for the user device from the device's subscriber profile. The network data system determines the device type, slice ID, billing ID, region, software version, and PLMN ID for the user device. The network data system selects SDS rules based on the determined information and selects shared subscription data based on the SDS rules. The network data system transfers the subscription data and shared subscription data to the network controller. The network controller generates device context using the subscription data and shared subscription data to serve the user device.
Systems and methods are provided for establishing single-layer connections between user equipment (UEs) and a telecommunications network based on the UEs' device types. UEs are classified as either stationary devices or mobile devices based on device information, such as subscriber identity module (SIM) profiles. When a multi-layer connection should not be maintained with a UE, if the UE is classified as a stationary device, the telecommunications network establishes a spatial multiplexing single layer (SMSL) connection with the UE. If the UE is classified as a mobile device, the telecommunications network establishes a single input, single output (SISO) connection with the UE.
A method of controlling assignment and management of identities in ambient electromagnetic power harvesting (AEPH) chips. The method comprises allocating a plurality of unique AEPH identities by an AEPH management application executing on a computer system, receiving a plurality of requests by the AEPH management application to update a state associated in a blockchain with the unique AEPH identity identified in each request; determining by the AEPH management application that the blockchain is to be terminated; adding by the AEPH management application a terminal block to the blockchain; receiving a request by the AEPH management application to update a state associated with a unique AEPH identity in the blockchain; and sending a request rejection by the AEPH management application to the affiliated device that sent the request to update the state associated with the unique AEPH identity in the blockchain after the terminal block was added to the blockchain.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
39.
KEY PERFORMANCE INDICATOR (KPI) ANONYMIZATION FOR MACHINE LEARNING TRAINING IN WIRELESS COMMUNICATION NETWORKS
Various embodiments comprise a wireless communication network configured to anonymize network Key Performance Indicators (KPIs) to train a machine learning model. In some examples, the wireless communication network comprises a network analytics system and a KPI store. The network analytics system retrieves the network KPIs generated by network KPI sources. The analytics system filters the network KPIs based on an intended function of the machine learning model. The analytics system identifies correlated ones of the filtered KPIs and groups the correlated ones of the filtered KPIs into KPI groups based on a network condition. For each KPI group, the analytics system sorts the filtered KPIs into KPI ranges. For each KPI range, the analytics system tokenizes the KPI range by converting the filtered KPIs that compose the KPI range into strings. The KPI store stores the tokenized KPIs in a KPI database accessible by the machine learning model for training.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
A method to trigger, by a RAN, a secure edge (SE) connection service over the RAN between a known user equipment (UE) and an SE application server is disclosed. The method comprises the RAN enabling an SE connection service. Responsive to the UE's registration request, the RAN registers the UE and loads associated user subscription data into a session manager (SM). Based on this data, an SE connection is configured within the RAN, and the SM establishes a PDU session between the UE and the SM by establishing a secure path between the UE and the SE application server over the configured SE connection between the UE and the RAN. The SM informs the UE of a resolver. After PDU session establishment, the resolver receives a resolution request from the UE and responds by sending an IP address directing the UE over the secure path to the SE application server.
Various embodiments comprise a wireless communication network to synchronize Unified Data Registries (UDRs) during data migration. In some examples, the wireless communication network comprises a provisioning orchestrator, UDR provisioning controllers, and a migration controller. The provisioning orchestrator receives an update for a subscriber profile, determines the subscriber profile has been migrated to the second UDR based on the subscriber Identifier (ID), and directs the second UDR provisioning controller to implement the provisioning data update. The second UDR provisioning controller updates the subscriber profile stored on the second UDR and triggers a synchronization update on the first UDR. The data migration controller detects the trigger and audits the first UDR to identify a subscription alias for the subscriber profile. The migration controller directs the first UDR provisioning controller to update the alias. The first UDR provisioning controller updates the alias to synchronize the first UDR with the second UDR.
Systems and methods are provided for providing an anti-spam artificial intelligence service. Initially, a message is received at a user equipment (UE) corresponding to a user. Text corresponding to the message is forwarded to an anti-spam engine to determine if the message is spam. A response is received, at the UE, from the anti-spam engine. The user is prompted, at the UE, to select an action to perform corresponding to the message. In various aspects, the action is to ignore, delete, or read the message.
Systems, methods, and computer-readable media herein provide for adjustment of transmit power of a user device based on transitioning from one configuration to another configuration. Transitioning a user devices to a configuration may involve modifying the number of layers and/ports used for uplink communications. In response to modifying the number of layers and/or ports, a user device may alter the transmit power used for uplink communication so that a target power can be utilized by the user device. Adjustments to the transmit power enables a higher coverage and performance of the user device in a communication network.
H04W 52/24 - TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
Embodiments of the present disclosure include systems and methods for communicating information regarding medical events detected at a wearable electronic device. Communications may be transmitted to one or more of a first mobile device, home security system, speaker, second mobile device, medical facility, and emergency response center, for example.
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
G08B 21/04 - Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
45.
WIRELESS DATA SERVICE FOR A WIRELESS USER EQUIPMENT BASED ON A SECURITY POLICY
A wireless communication network performs a wireless handover of a user device, and in response to the handover, transfers signaling to reestablish security context with the user device. The wireless communication network exchanges security information with the user device to reestablish the security context in response to the signaling. The wireless communication network wirelessly exchanges user data with the user device based on the security context.
A method comprises maintaining a maintenance identifier identifying the maintenance event and an identity of a maintenance technician responsible for performing the maintenance event, obtaining the alarm created during a maintenance interval associated with the maintenance event, wherein the maintenance interval is a preset period of time during which the maintenance event is to be performed at a cell site, and in response to the alarm still being active after the maintenance interval has expired adding the maintenance identifier to the alarm, generating, by the incident reporting application, and transmitting a notification associated with incident report directly to the maintenance technician via the method of communicating with the maintenance device.
Embodiments of the present disclosure are directed to systems and methods for improved cell search based on a location of a user equipment (UE). By querying a locally-stored dataset to identify one or more cell search parameters associated with the location of the UE, the UE may perform a targeted cell search. The targeted cell search may be based on one or more of a frequency band, radio access technology, and a network identifier (e.g., a public land mobile network (PLMN) identifier).
Systems and methods are provided for managing power usage in a wireless network. Methods include monitoring a channel quality of communications between an access node and a wireless device. Methods further include determining that there is a trend in channel quality changing over time. Methods further include adjusting a power output from the access node based at least in part on the determined trend.
Systems and methods are provided for pre-caching content to customer premises equipment (CPE) such as set-top boxes, fixed wireless access devices, etc. Video streaming services are increasingly popular and can put a strain on network resources during peak hours. Wireless network peak hour capacity demand can be reduced by utilizing off-peak hour content/video caching. A cache time during off-peak hours can be determined through the interaction of wireless network and content provider servers.
Systems and methods are provided for managing wireless devices, specifically for managing transitions between SU-MIMO pairing and MU-MIMO pairing based on group membership and signal quality. Methods include monitoring a signal quality between an access node and one or more wireless devices, determining that a signal quality metric is below a threshold, and determining that the one or more wireless devices belongs to one or more groups based at least in part on a required Quality of Service (QoS) of the one or more wireless devices. The methods further include transitioning the one or more wireless devices from SU-MIMO pairing to MU-MIMO pairing based on the determining that the one or more wireless devices belongs to the one or more groups and the determining that the signal quality metric is below the threshold.
Systems and methods are provided for ducting-based traffic steering. A telecommunications network manager can identify when tropospheric ducting is experienced, or expected to be experienced, at a network layer band and dynamically adjust traffic steering. Specifically, the manager can reallocate user devices to layers that are not experiencing or not anticipated to experience ducting. A load capacity of different layers is monitored such that devices are not transferred to already-overloaded layers. Once ducting is no longer experienced at the layer, any offloaded devices can be transferred back to their original layer.
Methods and computer-readable media for providing customer issue troubleshooting are provided. Customer service representatives may use the graphical user interface (GUI) to more effectively diagnose issues subscribers may be experiencing with the network service. The GUI provides a window containing diagnostic segments displayed on a computer screen. The window is monitored to detect a selection of a diagnostic segment. The diagnostic segments provide categories of possible network service issues and include: a coverage segment, a voice segment, a data segment, and a device segment. Once a diagnostic segment has been selected the window automatically displays the diagnostic result. In addition, information on a network service degradation event may be displayed on an event timeline segment of the window. The window also provides segments for customer information, recommendations to the customer, and a slider allowing adjusting of a date timeline for network service disruptions.
Various embodiments comprise a wireless communication network to dynamically manage network slices. The wireless communication network comprises a Network Slice Control Function (NSCF). The NSCF retrieves network slice Key Performance Indicators (KPIs) that indicate traffic patterns and network parameters related to a wireless network slice. The NSCF generates a prediction of network conditions for the wireless network slice based on the network slice KPIs. The NSCF updates one or more network slice parameters for the wireless network slice based on the prediction. The NSCF modifies the wireless network slice based on the one or more updated network slice parameters.
Systems and methods are provided for providing explicit MU-MIMO pairing indicator. Methods include maintaining a profile of one or more wireless devices in a wireless network using MU-MIMO. Methods further include receiving an indicator from one or more access nodes identifying MU-MIMO pairing for one or more wireless devices. Methods further include adjusting one or more of beamforming, layer assignment or throughput of the wireless network.
H04W 72/232 - Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal the control data signalling from the physical layer, e.g. DCI signalling
A method for tracking the location of wireless gateway devices (such as home internet devices) that includes collecting location coordinates for wireless gateway devices. The method additionally includes determining the location coordinates satisfy a threshold distance from a fixed location, such as a subscriber home location. The method further includes adjusting the wireless gateway device access to the wireless network based on satisfying the threshold distance from the fixed location.
Systems and methods are provided for managing wireless devices, specifically for managing transitions between SU-MIMO pairing and MU-MIMO pairing based on group membership and signal quality. Methods include monitoring a signal quality between an access node and one or more wireless devices, determining that a signal quality metric is below a threshold, and determining that the one or more wireless devices belongs to one or more groups based at least in part on a required Quality of Service (QoS) of the one or more wireless devices. The methods further include transitioning the one or more wireless devices from SU-MIMO pairing to MU-MIMO pairing based on the determining that the one or more wireless devices belongs to the one or more groups and the determining that the signal quality metric is below the threshold.
A wireless communication system manages a wireless network slice. The wireless communication system executes an operating system and executes wireless network slice software under the control of the operating system. The wireless communication system generates microprocessor measurement data that indicates microprocessor performance during the execution of the operating system and the wireless network slice software. The wireless communication system generates operating system measurement data that indicates operating system performance during the execution of the operating system. The wireless communication system generates wireless network slice information based on the microprocessor measurement data and the operating system measurement data. The wireless communication system modifies the execution of the wireless network slice software based on the wireless network slice information.
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04W 48/18 - Selecting a network or a communication service
58.
MITIGATING MALICIOUS EXPLOITATION OF NETWORK DEVICES
Systems and methods are provided for mitigating malicious attacks by IMSI-catchers. IMSI-catchers act as "fake" towers to intercept mobile device traffic and obtain private user data. These unauthorized devices pose a serious risk to user privacy. Aspects herein detect the presence of IMSI-catchers using RF footprints of cell sites to detect changes in RF footprint metrics that indicate the presence of IMSI-catchers. Once detected, beamforming techniques can be used to target a specific area surrounding the IMSI-catcher with a high-powered beamform that emits at a power level higher than the IMSI-catcher in order to reacquire any user devices that may have unknowingly connected to the IMSI-catcher.
H04W 12/122 - Counter-measures against attacksProtection against rogue devices
H04W 12/30 - Security of mobile devicesSecurity of mobile applications
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Systems and methods are provided for mitigating malicious attacks by IMSI-catchers. IMSI-catchers act as “fake” towers to intercept mobile device traffic and obtain private user data. These unauthorized devices pose a serious risk to user privacy. Aspects herein detect the presence of IMSI-catchers using RF footprints of cell sites to detect changes in RF footprint metrics that indicate the presence of IMSI-catchers. Once detected, beamforming techniques can be used to target a specific area surrounding the IMSI-catcher with a high-powered beamform that emits at a power level higher than the IMSI-catcher in order to reacquire any user devices that may have unknowingly connected to the IMSI-catcher.
Systems and methods are provided for pre-caching content to customer premises equipment (CPE) such as set-top boxes, fixed wireless access devices, etc. Video streaming services are increasingly popular and can put a strain on network resources during peak hours. Wireless network peak hour capacity demand can be reduced by utilizing off-peak hour content/video caching. A cache time during off-peak hours can be determined through the interaction of wireless network and content provider servers.
Systems and methods are provided for managing a UE in a cellular wireless network capable of dual SIM dual standby (DSDS). A first communication is received or initiated and determined to be associated with a first subscriber identity module (SIM) of the UE. In response, a set of parameters are implemented for the first communication. A second set of parameters are implemented for communications associated with a second SIM of the UE. The parameters include a time frame to receive calls at the SIM, a designated voice message box for the SIM, automated SMS messaging responses for the SIM, a designated contact group, and a designated e-mail address for the SIM.
In some examples, a method includes establishing via a first communication device, a communication session in a network slice through a first network attachment type. The method also includes transitioning through a radio access network (RAN) from the first network attachment type to a second network attachment type. The method also includes continuing, via a second communication device, the communication session in the network slice through the second network attachment type simultaneously with the communication session in the network slice through the first network attachment type.
Systems, methods and non-transitory computer-readable mediums are provided for an entitlement system and method having an E911 address check bypass function. Methods provided herein include receiving a request from a mobile device for enabling voice over WiFi (VoWiFi) service and checking E911 address status. Methods further include applying a filter to the request to determine that the E911 address check can be bypassed and transmitting a response to the mobile device indicating that E911 address status is not required and that VoWiFi connection is permitted, thereby bypassing the E911 address check.
A data communication system comprises wireless network slices and Internet Protocol (IP) system slices that provide a communication service. A network control system selects one of the wireless network slices and one of the IP system slices to provide the communication service to a user communication device. The selected one of the wireless network slices and the selected one of the IP system slices provide the communication service to the user communication device.
Systems and methods are provided for providing an equitable availability distribution real-time calculator. More particularly, systems and methods reduce the potential for telecommunications outages following upgrades and allow markets better control over availability metrics. To do so, an outage indication is initially received that identifies a plurality of cell sites affected by an outage and a timeframe for an update corresponding to the outage to be deployed to each of the plurality of cell sites. A selection of a portion of the plurality of cell sites to deploy the update at a particular time within the timeframe is received. Real-time data is received from each cell site of the portion of the plurality of cell sites corresponding to the particular time within the timeframe. Using the real-time data, the impact of deploying the update for the portion of the plurality of cell sites at the particular time is determined.
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
H04L 47/629 - Ensuring fair share of resources, e.g. weighted fair queuing [WFQ]
Aspects herein provide a system, media, and methods for/of an application that utilizes collected telecommunication data, to accurately identify directions from a UE to a nearest coverage area. In aspects, the technology assists a user (i.e., subscriber) by navigating the user, via a UE, to a geolocation that includes some type of wireless cellular coverage, for example, through a telecommunications carrier, a roaming carrier, and/or an emergency carrier. If the user is currently and physically located in an area with no coverage, the system will generate a map on the user's device showing a distance and a direction to the nearest coverage area
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
A method for providing, in a computer connected via a network to a 5G core network, a security gateway function is provided. The method includes connecting the security gateway function to the 5G core network via a non-3GPP access network, registering the security gateway function with the non-3GPP access network, establishing a secure tunnel between the security gateway function and the 5G core network, obtaining authentication keys and security association keys for the security gateway function from the 5G core network, and establishing user plane and control plane connectivity between the security gateway function and the 5G core network. The security gateway function is configured to establish a secure connection to an external device coupled to the computer.
Aspects herein provide a system, media, and methods for/of an application that utilizes collected telecommunication data, to accurately identify directions from a UE to a nearest coverage area. In aspects, the technology assists a user (i.e., subscriber) by navigating the user, via a UE, to a geolocation that includes some type of wireless cellular coverage, for example, through a telecommunications carrier, a roaming carrier, and/or an emergency carrier. If the user is currently and physically located in an area with no coverage, the system will generate a map on the user's device showing a distance and a direction to the nearest coverage area
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
69.
Automated Subscription Transfer Using Electronic Subscriber Identity Module (eSIM)
A method comprises obtaining, by a provisioning application of a remote subscriber identity module (SIM) provisioning (RSP) system of a core network subscription data associated with at least one of a line of service or a subscription account including the line of service, generating and reserving the electronic SIM (eSIM) profile for a next user equipment (UE) in association with the line of service, wherein the eSIM profile also comprises the subscription data, transmitting the eSIM profile to the next UE while the first UE is still activated in association with the line of service, receiving a notification indicating that the eSIM profile has been downloaded at the next UE, and transmitting a message indicating that the eSIM profile is ready for activation at the next UE while the first eSIM profile is ready for deactivation at the first UE.
Systems and methods are provided for notifying third-party servers, such as law enforcement agency servers, of updates to wireless user equipment identifiers. The method includes receiving a replacement wireless user equipment identifier to replace a current wireless UE identifier. It is determined that a third-party server (law enforcement agency) information request is associated with the current wireless UE identifier (such as an IMEI or PEI). Responsive to determining there is an information request from a third-party server associated with the current wireless UE identifier, notification of the replacement wireless user equipment identifier is generated and transmitted to the third-party server.
Validating network features in a wireless network includes receiving information associated with a network feature for use by at least one access node from a set of access nodes in a geographic area, the network feature having at least one network operating parameter not previously available in the wireless network, performing a configuration operation, in an audit mode, on the set of access nodes to use the network feature based on a set of existing profiles for the set of access nodes, determining if the configuration operation in the audit mode resulted in a validation error for one of the access nodes from the set of access nodes, and performing a configuration operation, in a realtime mode, on the set of access nodes to use the network feature if it is determined that configuration operation in the audit mode did not result in a validation error.
H04L 41/0869 - Validating the configuration within one network element
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/0893 - Assignment of logical groups to network elements
72.
IDENTIFYING NEIGHBOR ACCESS NODES IN A WIRELESS NETWORK
Identifying neighbor access nodes in a wireless network includes determining a first region around an antenna of a source access node, the first region bound by a maximum sector distance from the antenna of the source access node within a communication sector of the antenna of the source access node, the source access node being an access node selected from a set of access nodes in a geographic region, determining a second region around the source access node, the second region bound by a maximum circumferential distance from the source access node, the maximum circumferential distance being less than the maximum sector distance, determining a third region around the source access node, the third region bound by the maximum circumferential distance from the source node within the communication sector, and identifying an access node from the set of access nodes as a neighbor access node to the source access node.
A wireless communication system delivers a wireless data service to a wireless communication device using content-addressing. The wireless communication system generates a content-address from a data set. The wireless communication system stores the content-address in association with the data set. The wireless communication system encrypts the content-address with a system key and transfers the encrypted content-address to the wireless communication device. The wireless communication device decrypts the encrypted content-address with a user key to obtain the content address. The wireless communication device re-encrypts the content-address with the user key. The wireless communication system receives the re-encrypted content-address from the wireless communication device and decrypts the re-encrypted content-address with the system key to obtain the content-address. The wireless communication system retrieves the data set from the memory circuitry with the decrypted content-address. The wireless communication system delivers the wireless data service to the wireless communication device based on the retrieved data set.
Systems, methods and devices are provided for sensing a trigger event and receiving, at an emergency navigational pathing system, a notification of a trigger event from at least one sensor. Based on the notification, the system determines an impacted area and formulates at least one navigational path based on the determination of the impacted area. The system further transmits at least one formulated navigational path to a navigation system.
Systems and methods for ambient noise mitigation as a network service are provided. In some embodiments, an ambient noise mitigation server establishes at least one low latency network slice for at least one UE coupled to a radio access network. The ambient noise mitigation server generates a cancelation signal based on ambient sound mitigation data received by the radio access network, the ambient sound mitigation data including acoustic sensor data representing an ambient sound signal. The cancelation signal is generated to comprise a phase shift with respect to the ambient sound signal computed at least in part as a function of a location of the at least one UE, and causes at least one acoustic emitter to emit an acoustic cancelation signal based on the cancelation signal. In some embodiments, the phase shift may be adjusted by controlling a latency characteristic of the low latency network slice.
G10K 11/178 - Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effectsMasking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
76.
RELAY DEVICE SELECTION FOR SIDELINK COMMUNICATION OF WIRELESS DEVICES
Technology is disclosed herein for selecting a relay wireless device for sidelink communication with a remote wireless device. In an implementation, a wireless communication device determines to establish a sidelink connection to a wireless communication network. The wireless device discovers one or more relay devices in connection with the wireless network. The wireless device selects a relay device from among the one or more relay devices based on one or more selection factors including throughput. The wireless device connects to the wireless network via the sidelink connection to the relay device. In an implementation, the wireless device determines to establish the sidelink connection based on being outside the coverage area of the wireless communication network.
H04W 40/22 - Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
H04W 88/04 - Terminal devices adapted for relaying to or from another terminal or user
77.
INTERWORKING BETWEEN FIFTH GENERATION CORE (5GC) AND EVOLVED PACKET CORE (EPC) IN WIRELESS COMMUNICATION NETWORKS
Various embodiments comprise a Fifth Generation (5G) visited wireless communication network to interwork with a Long Term Evolution (LTE) home network. In some examples, the 5G visited wireless communication network comprises an Access and Mobility Management Function (AMF) and an Interworking Function (IWF). The AMF receives a service request from a 5G capable visiting user device. The AMF generates Fifth Generation Core (5GC) authentication signaling to authenticate the visiting user device. Prior to delivering the 5GC authentication signaling to the home network, the IWF translates the 5GC authentication signaling into Evolved Packet Core (EPC) authentication signaling and transfers the EPC authentication signaling to the home network. The IWF receives an EPC authentication response from the home network and translates the EPC authentication response into a 5GC authentication response. The AMF authenticates the visiting user device for service on the 5G visited wireless communication network based on the 5GC authentication response.
Methods and systems are provided for identifying the true identity of senders of messages, for example based on hardware identifiers and other information, such as timestamps and/or register-transfer level licenses. In some cases, a hyper ledger contains an identifier and a timestamp, such as a timestamp associated with a request to send a message. Embodiments can be used to authorize transmission of messages, such as SMS or RCS messages, and to provide an archive or message information. In some cases, messages from certain domains can be aggregated for routing.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04W 4/14 - Short messaging services, e.g. short message service [SMS] or unstructured supplementary service data [USSD]
Disclosed is a method of gathering data from a hybrid RFID chip to determine usage of an item or article of clothing using a mobile device like a phone, laptop, or tablet. The hybrid RFID chip consists of a processor, a memory, a radio transceiver, a power harvesting antenna, and an impedance circuit that converts ambient radio frequency (RF) energy to electrical energy. The RFID chip receives a first power level from ambient RF energy and periodically broadcasts an identity. The mobile device can receive the broadcast identity, store the identity, transmit the identity and location to a remote server, and receive a notification message from the remote server. The remote serve can determine usage of the item or article of clothing by comparing current records to previous records of RFID chip identity, location, and mobile device application identity.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
H04B 5/72 - Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for local intradevice communication
H04B 5/77 - Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
A wireless access node wirelessly transfers an identifier and location to a communication satellite. The communication satellite transfers the identifier and location to a data communication system. The data communication system determines a node configuration for the wireless access node based on the identifier and location and transfers the node configuration for the wireless access node to the communication satellite. The communication satellite wirelessly transfers the node configuration to the wireless access node. The wireless access node wirelessly exchanges user data with user communication devices based on the node configuration. The wireless access node exchanges the user data with the data communication system based on the node configuration.
Methods and systems for providing congestion-based scheduling in a network, based on device capabilities are provided. A method begins with receiving, from a first user device, a device capability message, wherein the device capability message comprises a number of receive antennas of the first user device for each supported frequency band. Next, a determination that the number of receive antennas of the first user device is not equal to the number of receive antennas required by the network operator for the assigned frequency band. Based on the determining, the method continues with prioritizing at least one downlink transmission to at least one second user device. The at least one second user device comprises the number of receive antennas required by the network operator for the assigned frequency band. The prioritization information is then transmitted to the first user device and the at least one second user device.
Systems and methods are provided for automatic PLMN serving system reselection based on E911 PSAP termination failures. For example, a UE may initiate a call for emergency services on a network provided by a cell site simulator. When the connection fails, metrics corresponding to the termination failure are communicated to the PLMN the next time the UE connects to a legitimate network. The fraudulent cell sites may be communicated by the UE to other UEs via peer-to-peer communication and/or added to an FPLMN list to prevent other UEs from connecting to networks provided by the fraudulent cell sites.
Systems and methods are provided for intelligent beamforming leveraging service type and mobility dynamics of individual users. Initially, one or more services being provided to a UE over a network are determined by the node. Mobility dynamics corresponding to the UE are also determined by the node. Based on the one or more services and the mobility dynamics, a beam providing a connection between the UE and the network is adjusted at the node. In aspects, the beam may be a broadcast beam or a traffic beam.
H04B 7/0408 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas using two or more beams, i.e. beam diversity
H04B 7/08 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
Systems and methods are provided approving or denying a request for user account authentication for a mobile network operator (MNO). The method includes receiving a location of a wireless user device associated with a request for user account authentication for an MNO. The location of the wireless user device for the request for user account authentication is compared with known locations of the wireless user device over time to determine whether to approve or deny the authentication request.
A method comprises storing a plurality of rules by which a rules engine is configured to determine an application to perform an enterprise function for the enterprise related service, wherein the application is a shared application, determining, based on a first rule stored in the data store, the shared application to perform a first enterprise function, wherein the first rule indicates that first enterprise function is capable of being performed by the shared application that is shared across a plurality of different enterprise servers, determining, by the rules engine in the communications system, based on a second rule stored in the data store, the shared application to perform a second enterprise function, where the second rule indicates that second enterprise function is also capable of being performed by the shared application that is shared across the different enterprise servers.
In various embodiments, systems and methods for a trust architecture for telecommunication network slice security are disclosed. In some embodiments a trust architecture for telecommunication network slice security distributes network security functionality to individual network entities that constitute elements of a network slice instance. Slice network functions each individually implement components of the trust architecture for the network slice using a policy enforcement point (PEP) and a policy decision point (PDP). Each slice network function thus validates the authenticity and authorized privileges associated with the subject entity seeking a service from that slice network function, and grants or denies such service requests based on a policy implemented by the PEP and PDP.
In various embodiments, ledger-based telecommunications network event archiving for trusted model non-3GPP devices and systems are provided. Trusted model non-3GPP devices can access network functions and services to utilize a ledger-based event recordation service. Through the recordation service, network events associated with trusted model non-3GPP UE device usage of network functions and services may be recorded to an event ledger. The event ledger may comprise a hyperledger and/or blockchain technology, and/or may comprise an element of a distributed ledger network (DLN) and/or distributed ledger technology (DLT)-based records repository. In some embodiments, to function as a trusted model device, a non-3GPP device is configured with a 3GPP compatible universal connectivity stack (UCS). The UCS may comprise software for creating a secure tunnel using 3GPP authentication and security protocols to functionally extend the N3 user plane tunnel from an N3IWF of the core network to the UCS within the non-3GPP device.
A method of storing and managing access to information about electronic transactions completed by users collected from a plurality of transaction processors. The method comprises storing information associated with transactions by an application; receiving a first user information management request by the application from a user; sending a user management report by the application to the user; receiving a second user information management request message by the transaction record repository application from the user; and responsive to receiving the second user information management request message, restricting access by the application to one or more of the types of information on electronic transactions associated with the user that can be accessed by one or more of the transaction processors.
In various embodiments, systems and methods for ledger-based cookie management are provided. Rather than store cookie data as text files on the local device drive, cookie data is recorded to a blockchain technology cookie ledger store on a network resource. When a client application (e.g., a browser) on the UE is directed to a cloud-based service, and that cloud-based service calls for access to a cookie, that call is processed by a cookie gateway executing on the UE. The cookie gateway may verify authenticity of the user and generate a cookie access token that it transmits to the cloud-based service. The cloud-based service may use the cookie access token to locate the cookie ledger and access one or more records storing cookie data used by the cloud-based service. The cookie access token may expire upon termination of the session between the user equipment and the cloud-based service.
Embodiments of the present disclosure are directed to systems and methods for improved management of extraterrestrial base stations' coverage areas. The system comprises one or more extraterrestrial base stations of a radio access network and one or more computer processing components. The disclosure involves continuously monitoring signal metrics or load levels from multiple base station coverage areas. Upon detection that a particular metric or load level surpasses a preset threshold, devices in overlapping coverage zones between multiple base stations are identified. Specific devices may then be directed to attach to an alternate base station.
In various embodiments, systems and methods for quantum-based network traffic anomaly detection are disclosed. Embodiments for a network integrity monitor are disclosed that leverage a quantum computing-based network assessment function to evaluate network event data for the purposes of identifying and/or predicting anomalies indicative of network threats. To identify network anomalies, the network assessment function may treat the anomaly identification as a quantum search task by searching the task data using an amplitude amplification quantum search algorithm and/or using quantum machine learning models to infer a threat prediction that may include a single or multiclass classification characterizing the task data. Such classification(s) may be further assessed by the network integrity monitor as the basis to trigger one or more mitigating steps.
Methods, systems, and a non-transitory computer-readable medium for optimizing uplink configured grants in a network. The method begins with establishing, by at least one user device, a network connection to a primary cell in a carrier aggregation network. The primary cell has a first multiplexing scheme with a first latency. Next, the method continues with configuring the uplink configured grant on a secondary cell in the carrier aggregation network. The secondary cell has a second multiplexing scheme with a second latency, the second latency lower than the first latency. The method then moves at least one traffic stream from the primary cell to the secondary cell, based on the second latency.
Technology, including systems, methods, and devices, is disclosed herein for operating a wireless network including a control plane element and data repository. A method of operating the wireless network includes the data repository storing subscriber datasets received from the control plane element. The wireless network monitors a capacity of the data repository and detects that the capacity of the repository is at a threshold value. The wireless network classifies a subscriber dataset for handling based on a parameter associated with the subscriber dataset. The handling includes deletion, compression, or preservation of the subscriber dataset. The wireless network performs the handling with respect to the subscriber dataset. In some implementations, the control plane device includes one of a Unified Data Manager, a Policy Charging Function, and Network Exposure Function and the data repository includes a Unified Data Repository.
A method for maintaining a telecommunications carrier network that provides communication services to subscribers. The method includes associating each of a plurality of cell sites of the telecommunications carrier network with a Voronoi cell in a Voronoi diagram; trimming at least one of the Voronoi cells that includes a coastal border or a national border; receiving a first plurality of alarms associated with some of the cell sites; determining that a subset of the first plurality of alarms are associated with an LSE based on a) alarm quantity, b) alarm signature, c) occurrence time of the alarm, and d) the distance between Voronoi cell of each alarm; generating an LSE incident report; and resolving the LSE incident report by implementing a control response for the cell sites associated with the LSE incident report to clear the alarms on those cell sites.
Systems and methods are provided for tracking handover types in a wireless network. An originating radio access technology (RAT) and a destination radio access technology (RAT) are determined from the initial request from a UE to attach to the wireless network. The originating RAT and destination RAT for the initial attach request are transmitted and maintained in a subscriber profile associated with the wireless device for subscriber tracking and network analysis.
Systems, methods and devices are provided for minimizing unnecessary inter-radio access technology (IRAT) transitions. A method includes determining that a wireless device has experienced a threshold number IRAT handovers in a predetermined time period, identifying a trigger for the inter-RAT handovers and assigning the wireless device to a selected RAT based on the identified trigger.
Systems and methods for carrier aggregation-based base station band resource management are provided. Embodiments provide for, among other things, solutions that address the problem of underutilization of small bandwidth channel layers determining when a UE can be permitted to camp on a small bandwidth channel layer based at least on the UE's carrier aggregation capabilities. When carrier aggregation capability information indicates that the UE supports uplink carrier aggregation, the UE can be controlled to use the small bandwidth channel layer as the primary serving cell. When carrier aggregation capability information indicates that the UE does not support uplink carrier aggregation, the UE can be controlled to use another band layer as the primary serving cell. Configuration and/or reconfiguration of the UE with respect to which cell of the base station it uses for the PCell is based on SIB cell priority parameters that may be provided to the UE.
An Internet Protocol Multimedia Subsystem (IMS) serves an IMS service to user communication devices based on individual subscriber profiles and a shared subscriber profile. The individual subscriber profiles and the shared subscriber profile are stored. The IMS serves the IMS service to the user communication devices based on the individual subscriber profiles. When an individual subscriber profile is unavailable for a user communication device, the IMS serves the IMS service to the user communication device based on the shared subscriber profile.
The technology disclosed herein relates to antenna beam directivity corresponding to one or more non-terrestrial access nodes. For example, a user device having antenna elements and a sensor can determine an orientation of the user device and transmit one or more signals from one or more antenna elements based on the orientation of the user device. In embodiments, the user device can transmit signals towards a non-terrestrial access node, towards a portion of an atmosphere layer of the Earth, away from a gravitational force of the Earth, towards outer space, in another non-terrestrial direction, or one or more combinations thereof. In some embodiments, the user device uses one or more accelerometers and/or one or more other sensors for determining the orientation of the user device relative to the antenna elements of the device, the gravitational force of the Earth, a geomagnetic field, another direction, or one or more combinations thereof.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
100.
Inhibiting active session drop during registration expiration in wireless communication networks
Various embodiments comprise a wireless communication network to inhibit multimedia session drop. In some examples, the wireless communication network comprises Call Session Control Function (CSCF) circuitry. The CSCF circuitry receives a multimedia registration request from a user device that comprises a registration timer indication. The CSCF circuitry registers the user device for multimedia services and sets a registration timer based on the registration timer indication. The CSCF circuitry receives a multimedia session request from the user device and establishes a multimedia session based on the session request. The CSCF circuitry determines when the registration timer expires and when the multimedia session is active. When the registration timer expires and the multimedia session is active, the CSCF circuitry maintains the registration of the user device. When the registration timer expires and the multimedia session is inactive, the CSCF circuitry deregisters the user device.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs