摘要:
Embodiments of inductive communication devices include first and second galvanically isolated IC die. The first IC die has a first coil proximate to a first surface of the first IC die, and the second IC die has a second coil proximate to a first surface of the second IC die. The first and second IC die are arranged so that the first surfaces of the first and second IC die face each other, and the first coil and the second coil are aligned across a gap between the first and second IC die. One or more dielectric components are positioned within the gap directly between the first and second coils. During operation, a first signal is provided to the first coil, and the first coil converts the signal into a time-varying magnetic field. The magnetic field couples with the second coil, which produces a corresponding second signal.
摘要:
An example of this invention provides low latency handovers between Mobile WiMAX and 2G/3G/LTE networks with only a single radio transmitting at any given point in time, by establishing L2 tunnel between 3GPP MME and WiMAX ASN for control plane signaling to perform pre-registration, pre-authentication and context transfer to the target network, while UE maintains its connection to the source network, and by setting up bearer path for packet forwarding between Servicing Gateway and WiMAX ASN. An example of this invention uses a virtual eNB to facilitate low latency L2 handoffs to legacy 2G/3G networks with minimum impact to SGSN and MME.
摘要:
Examples are disclosed for roaming between wireless local area networks (WLANs) belonging to a social network. In some examples, configuration information for a WLAN may be received for setting up the WLAN for a social network. The social network may have one or more roaming members. Information about the roaming members and one or more policies for the roaming members to connect to the WLAN may also be received. For these examples, the configuration information, roaming member information and the one or more policies may be maintained at a server for a service provider related to the WLAN. Other examples are described and claimed.
摘要:
Embodiments of computer-implemented methods, systems, computing devices, and computer-readable media are described herein for allowing a mobile network operator to perform services on behalf of a non-internet protocol multimedia subsystem (non-IMS) data provider. In various embodiments, an application server (“AS”) front end of the data provider is communicatively connected to a user data repository (“UDR”) and a home subscription server (“HSS”). The HSS is also connected to the UDR. Neither the non-IMS AS nor the HSS store user data, but instead communicate with the UDR across various reference points. The communication across the reference points facilitates the HSS performing various user services on behalf of the non-IMS AS. Other embodiments include user access and authentication procedures in such a network architecture, as well as corresponding policy and charging architecture.
摘要:
One example embodiment relates to a computer-implemented method including receiving from a user, via a network, data relating to an item to be listed for sale at an item price in an electronic marketplace. An interactive pricing page is presented to the user, the pricing page including one or more interface elements to receive a pricing structure relating to the item to be listed for sale, the one or more interface elements allowing the user to define, as part of the pricing structure, at least a first item price and one or more future price changes in the item price during an item listing period. The method includes displaying the item listing with at least the first item price in the electronic marketplace, and automatically changing, during the item listing period, the displayed item price based on the received pricing structure.
摘要:
Examples are disclosed for roaming between heterogeneous wireless networks. In some examples, an authorization request for user equipment (UE) to access a visited wireless local area network (WLAN) may be received via a first protocol. The authorization request may be interworked by an authentication, authorization and accounting (AAA) interworking function (AIF) to enable the UE to be authenticated and authorized for access to the visited WLAN via information exchanged between a visited AAA server and a home AAA server. The visited home AAA server may be associated with different types of wireless networks to include wireless wide area networks (WWANs) or with a different WLAN. Interworking by the AIF may include translating the authentication request received via the first protocol to a second protocol to allow for the exchange of information between the visited AAA server and the home AAA server. Other examples are described and claimed.
摘要:
A system and method of determining whether to make an item listing visible to a user are disclosed. A user is enabled to navigate an e-commerce site. A returns frequency index is calculated for the user based on the user's transaction history. The user's transaction history includes the user's history of item returns. It is determined whether or not to make an item listing visible to the user on the e-commerce site based on the returns frequency index for the user. In some embodiments, the returns frequency index is calculated using the mathematical expression (VRet/NRet)/(VPurch/NPurch), wherein VRet is a total value of items returned by the user, NRet is a total number of items returned by the user, VPurch is a total value of items purchased by the user, and NPurch is a total number of items purchased by the user.
摘要:
Embodiments of a mobile device and methods automatically connecting to a Wi-Fi Hotspot 2.0 are generally described herein. In some embodiments, subscription information for one or more service providers (SP) that operate Wi-Fi networks is stored in a subscription data object of the mobile device. The subscription information includes home service provider information, policy information and pre-provisioned credentials. The mobile device may be configured to determine, without user interaction, if the subscription information is applicable to an available Wi-Fi network and perform without user interaction, an extensible authentication protocol (EAP) based authentication using the pre-provisioned credentials with the available Wi-Fi network to establish a Wi-Fi connection with the available Wi-Fi network. This automatic connectivity may allow a mobile device to roam across Wi-Fi hotspots of Wi-Fi networks and offload traffic to Wi-Fi networks.
摘要:
A composite quality measure helps determine a target for a vertical handover between different connection types. Various measurements are normalized, weighted and summed to produce composite quality measures. A composite quality measure may be compared to a target value and the corresponding connection may be added to a feasibility table if the composite quality measure is above the target.
摘要:
Described herein are systems, methods, and apparatus for automatically establishing secure connections to wireless networks using a wireless local area network access point which calls for acceptance of terms and conditions of use. During an initial connection, the user is prompted to review and accept terms and conditions associated with use of that wireless network. Once accepted, future connections at that or other access points, which use those same terms and conditions, occur free from user intervention.