Abstract:
The period for Tracking Area Update (TAU) requests, that are made by Machine-to-machine (M2M) User Equipment (UE) in a wireless cellular network, may be dynamically modified. In one implementation, the period for the TAU request may be dynamically increased for M2M UEs that tend to be stationary. Increasing the period at which M2M UEs initiate TAU requests with the wireless network can reduce the amount of control signaling that needs to be performed over the radio links.
Abstract:
A system may be configured to identify that a user device is connected to a first radio access network (“RAN”), via a first technology; and to identify that the user device is capable of accessing a second RAN, via a second technology. The system may further be configured to instruct the user device to concurrently connect to the second RAN and the first RAN, send or receive a first type of traffic via the first RAN, and send or receive a second type of traffic via the second RAN.
Abstract:
Voice over LTE (VoLTE) services may be provided to a roaming mobile device, even when the home network of the mobile device does not provide VoLTE service. In one implementation, one or more devices in a network may determine based on a mobile device attaching to a network as a roaming device for the network, a home network of the mobile device. The devices may further determine whether the home network, associated with the mobile device, provides VoLTE services; transmit, based on the determination that the home network does not provide VoLTE services, a VoLTE client application to the mobile device, the VoLTE client application providing functionality, for the mobile device, relating to usage of VoLTE services in the network. The devices may further communicate with the mobile device and the VoLTE client application, to provide one or more VoLTE services to the mobile device.
Abstract:
A method, performed by a computer device, may include receiving an indication that a first user has acquired rights to access a digital content; generating a key for the digital content; encrypting the digital content using the generated key to generate encrypted digital content; obtaining a first passcode; and providing the first passcode and the encrypted digital content to a user device associated with the first user. The method may further include receiving, from the user device, a request for the key, wherein the request include the first passcode; determining that the first passcode is valid; determining that the key has not expired; and providing the key to the user device, in response to determining that the first passcode is valid and that the key has not expired.
Abstract:
A request to access a location-based service is received via a wireless access point (WAP). A WAP identifier associated with the WAP may be identified based on the request and a particular geographic location associated with the WAP may be determined based on the identifier. For example, a WAP information service (WIS) may store data associating geographic locations and WAP identifiers corresponding to a plurality of WAPs that include the WAP, and the particular geographic location may be determined by querying the WIS, based on the particular WAP identifier, to identify the particular geographic location. A communication may be established between the user device and location-based service based on the particular geographic location associated with the WAP.
Abstract:
A method for determining a Quality of Service (QoS) policy can be based on requested bandwidth. The method may initially receive a connection request which includes a requested bandwidth that corresponds to an application. The method may then determine a policy for an application data flow associated with the application based on the connection request. A bandwidth designation, which is based on the requested bandwidth, may be assigned to the application data flow based on the determined policy. Finally, the policy and the bandwidth designation may be provided so that a bearer can be assigned.
Abstract:
A device may receive connection information associated with a connection, between a user device and a network, used to provide an application service to the user device. The connection information may include information identifying a network type of the network. The connection information may include information identifying an access point name associated with the connection. The application service may be provided by a device associated with providing the application service to the user device. The device may store the connection information based on receiving the connection information. The device may determine that the connection information is to be provided to the device associated with providing the application service to the user device, and may provide the connection information to the device associated with the application service. The connection information may permit the application service to be provided based on the network type of the network
Abstract:
A server may be configured to receive behavior information associated with a user device. The behavior information may indicate a set of geographical locations at which the user device has been present. The server may generate a mode based on the behavior information. The mode may indicate a set of conditions based on which the mode is to be activated, and a set of information to be presented when the mode is activated. The server may output the mode to the user device. The user device may determine, after receiving the mode, that the set of conditions has been satisfied. The determining may be based on a geographical location of the user device. The user device may activate the mode, based on determining that the set of conditions has been satisfied; and may present at least a portion of the set of information, based on activating the mode.
Abstract:
An access control device may include logic configured to receive a request from a user device to set up a packet connection for an emergency session to a packet data network via an access network. The logic may be further configured to determine a location associated with the user device; identify a public safety answering point associated with the determined location; determine whether a connection capacity associated with the identified public safety answering point has been reached; and reject the request to set up the packet connection for the emergency session, in response to determining that the connection capacity associated with the identified public safety answering point has been reached.
Abstract:
Systems and method are provided to reduce redundant data transfers for service profiles within a wireless core network. A network device in the core network receives, from a mobility management entity (MME), a user profile request. The user profile request includes a user identifier for an end device. The network device determines that a user profile corresponding to the user identifier includes a shared service profile and determines, when the user profile includes a shared service profile, whether the MME has stored the shared service profile. When the MME has not stored the shared service profile, the network device sends, to the MME, the shared service profile and a shared profile identifier for the shared service profile. The network device sends, to the MME, a response to the user profile request, the response including the user identifier and the shared profile identifier for the shared service profile.