Abstract:
A method and apparatus for facilitating WLAN access, both trusted and un-trusted, to a mobile core network. A device identity attribute is created and incorporated into the authentication and response messaging to enable the device identity to be promulgated in the communication network.
Abstract:
A method and apparatus for facilitating WLAN access, both trusted and un-trusted, to a mobile core network. A device identity attribute is created and incorporated into the authentication and response messaging to enable the device identity to be promulgated in the communication network.
Abstract:
An embodiment of the present invention is a method for the support of Circuit Switched CS fallback in an Evolved Packet System EPS, said support including moving an User Equipment UE from an evolved Radio Access Network RAN to a legacy RAN for access to CS domain services, and moving back said UE from said legacy RAN to said evolved RAN at the end of said CS domain services, said support including moving back said UE to said evolved RAN in a PLMN that was serving said UE over said evolved RAN before moving said UE to said legacy RAN.
Abstract:
In an embodiment, there is provided a method for notifying a User Equipment UE (or a group of UE), over a mobile network, of an UE Application trigger request from a Network Application Server, said method comprising: sending UE Application trigger request information using a control plane path from the Network Application Server to the UE (or to an UE of the group) via a subscriber database (such as the HLR/HSS) and a node controlling UE access to the mobile network (such as a SGSN/MME).
Abstract:
In an embodiment, a method for the control of access network/access technology selection for the routing of IP traffic by a User Equipment UE in a multi-access communication system, based on operator's policies, is provided, wherein: -said operator's policies include Quality of Service QoS-based policies, based on IP traffic matching specific QoS filters.
Abstract:
In an embodiment, there is provided a method for reducing the load due to user location change reporting for location-based policy and/or charging control services for said user, in a mobile communication system wherein granularity of user location includes granularity at cell level and/or granularity at service area level, a service area (or Location or Routing or Tracking Area) comprising a set of cells defined at network operation level, a method wherein said user location change reporting is based on at least one of: a granularity of reporting at a base station level, whereby a user location change is reported upon change of serving base station, a granularity of reporting at a policy area level, whereby a user location change is reported upon entering or leaving a policy area, a policy area comprising a set of cells and/or serving areas, defined at policy and/or charging control level, for a granularity of reporting at a cell level or at a service area level or at a policy area level, a deferred user location change reporting until user plane activity is resumed, in case said user is not currently active in the user plane.
Abstract:
In an embodiment, there is provided a method for overload control in a packet mobile communication system, said method comprising a step of: in case of overload, throttling downlink traffic received for mobile terminals in idle mode when this traffic belongs to a mobile terminal or to a mobile terminal connection declared as candidate for throttling.
Abstract:
The invention concerns a radio network controller (BSCI), for a radio access communication network, comprising processing means (MT), upon receiving from an alarm center (CA) a message of a first SMS-CB type associated with a selected class of alarm of a selected level, containing an alarm text message addressed to mobile terminals (T) located in at least one selected cell controlled thereby, for interrupting transmission to the mobile terminals, located in each selected cell, of any message of SMS-CB type associated with a class of level lower than that of the selected alarm class, and optionally all other communication of said terminals (for example, telephone calls thereof), so that the first message may be broadcast to the mobile terminals which are located in each selected cell controlled thereby and so that some at least of said mobile terminals should transmit an alarm signal (for example radio) and display the alarm text message contained in the first message.
Abstract:
An object of the present invention is a method for the handling of user access-dependent information in a system comprising a core network subsystem accessed by an access network, said method comprising: a step wherein an entity of said core network subsystem obtains user access-dependent information from said access network, a step wherein an entity of said core network subsystem signals to another entity, in the context of a core network subsystem procedure relating to a user's terminal, user access-dependent information obtained from said access network, a step wherein an entity of said core network subsystem uses user access-dependent information obtained from said access network, for control of service delivery to said user.
Abstract:
A method of managing a token in a telecommunications network to allocate an exclusive right to one user out of a group of users who can request simultaneously to benefit from the same service; the method consisting in: a requesting user (EUA) sending (1) a token request to an application server (AS); the application server (AS) then allocating (2) a single token to a requesting user; the requesting user who has received the token then sending (3) data to a media server (MS) suitable for transporting the data; said user (EUA) sending (4) a token-release request to the application server (AS); and finally said application server (AS) broadcasting (5) a message to all of the users (EUA, . . . , EUD) indicating that the token is available.