METHODS AND APPARATUS FOR DYNAMIC CONTROL AND UTILIZATION OF QUASI-LICENSED WIRELESS SPECTRUM

    公开(公告)号:US20200228993A1

    公开(公告)日:2020-07-16

    申请号:US16741626

    申请日:2020-01-13

    Abstract: Methods and apparatus for providing quasi-licensed spectrum access within an area or venue. In one embodiment, the quasi-licensed spectrum utilizes 3.5 GHz CBRS (Citizens Broadband Radio Service) spectrum allocated by a Federal or commercial SAS (Spectrum Access System) to a managed content delivery network that includes one or more wireless access nodes (e.g., CSDs and APs) in data communication with a controller. In one variant, the controller dynamically allocates (i) spectrum within the area or venue within CBRS bands, and (ii) MSO users or subscribers to CBRS bands or WLAN (e.g., public ISM) bands in to manage interference between the coexisting networks, and maximize user experience. In another variant, the controller cooperates with a provisioning server to implement a client device application program or “app” on MSO user or subscriber client devices which enables inter-RAT access.

    Backhaul selection in a wireless network

    公开(公告)号:US10708845B2

    公开(公告)日:2020-07-07

    申请号:US16103662

    申请日:2018-08-14

    Abstract: According to one configuration, an example communication system includes a primary wireless station, multiple candidate wireless stations, and a remote network. The primary wireless station is in communication with one or more of the multiple candidate wireless stations. During operation, when the primary wireless station needs to provide one or more communication devices access to a remote network, the primary wireless station monitors presence of the multiple candidate wireless stations. Each of the multiple candidate wireless stations is available to support a wireless backhaul link from the primary wireless station to a remote (such as a core) network. The primary wireless station is operable to select an appropriate candidate wireless station amongst the multiple candidate wireless stations. Via the selected candidate wireless station, the primary wireless station establishes a backhaul link to the remote network.

    Methods and apparatus for client-based dynamic control of connections to co-existing radio access networks

    公开(公告)号:US10368255B2

    公开(公告)日:2019-07-30

    申请号:US15659021

    申请日:2017-07-25

    Abstract: Methods and apparatus for monitoring and controlling access to coexisting first and second networks, such as within a venue. In one embodiment, the first network is a managed network that includes wireless access points (APs) in data communication with a backend controller, which communicates with a client process on a user device. The client process uses indigenous radio technology of the user device to scan for coexisting networks, and report results to the controller. In one variant, the controller dynamically adjusts transmit characteristics of the AP(s) to manage interference between the coexisting networks. In another variant, the controller causes the energy detect threshold of the user device to be lowered so that it may detect WLAN signals when a coexisting RAT (for example, LTE-U or LTE-LAA) occupies the same channel and/or frequency. In another variant, the client process autonomously adjusts user device operation based on the scan.

    AUTHENTICATION MANAGEMENT IN A WIRELESS NETWORK ENVIRONMENT

    公开(公告)号:US20220322083A1

    公开(公告)日:2022-10-06

    申请号:US17668657

    申请日:2022-02-10

    Abstract: During registration, a mobile communication device derives a first instance of biometric information from a user operating the mobile communication device. The communication device retrieves an encryption key assigned to the mobile communication device. Via application of the encryption key to the first instance of biometric information, the communication device produces first encrypted biometric information and forwards it to an authentication resource. The authentication resource stores the first encrypted biometric information for later authentication of the communication device. During subsequent authentication, the mobile communication device derives a second instance of biometric information from the user operating the mobile communication device. The communication device encrypts the second instance of biometric information with the encryption key and forwards it to the authentication resource. The authentication resource requires a substantial match of the second encrypted biometric information to the first encrypted biometric information to authenticate the communication device to use a wireless network.

Patent Agency Ranking