Abstract:
Systems and techniques for detecting movement of machine type communication devices. An allowed location area is configured for one or more machine type communication devices, and a machine type communication device, upon detecting movement between an area outside its allowed location area and an area inside its allowed location area, notifies a network of the movement.
Abstract:
Communication systems, including cellular networks, and the devices that are connected to them, can have both legitimate and illegitimate uses. Such communication systems, including systems that utilize, permit, or leverage machine-type-communications, may benefit from monitoring for suspicious events. A method can include receiving a monitoring request regarding a user equipment or a category of devices. The method can also include performing a monitoring activity regarding the user equipment or the category of devices with respect to at least one suspicious event. The method can further include responding to the monitoring request indicating whether monitoring will be performed for the user equipment or the category of devices.
Abstract:
Communication systems, including cellular networks, and the devices that are connected to them, can have both legitimate and illegitimate uses. Such communication systems, including systems that utilize, permit, or leverage machine-type-communications, may benefit from monitoring for suspicious events. A method can include receiving a monitoring request regarding a user equipment or a category of devices. The method can also include performing a monitoring activity regarding the user equipment or the category of devices with respect to at least one suspicious event. The method can further include responding to the monitoring request indicating whether monitoring will be performed for the user equipment or the category of devices.
Abstract:
The specification and drawings present a new method, apparatus and software related product (e.g., a computer readable memory) for load balancing in a network (e.g., LTE wireless network) and between networks based on reselection priority and/or a level of congestion. The embodiments of the invention describe different options to move the UE to another cell which may be in the same or in a different RAT, to avoid congestion and/or overloading of the network. This will help to avoid subsequent RRC connection reject messages being sent to the UE from the congested cell.
Abstract:
To perform a handover of a mobile station from a source base station to a target base station, the source base station determines a delay of a connection between the source base station and the target base station. The source base station computes an action time taking into account the determined delay, the action time specifying a time when the target base station is able to allocate resources to the mobile station for the handover.
Abstract:
Improved systems and techniques for controlling access to network resources. A base station broadcasts extended access barring (EAB) and access class barring (ACB) information. Upon a determination by a user equipment that the user equipment requires service from the base station, the user equipment determines its EAB category and call type. The user equipment receives the EAB and ACB information broadcast by the base station and determines if it is subject to EAB based on its EAB category. If the user equipment is not subject to EAB, the user equipment determines if its call type is subject to ACB and, if the call type is subject to ACB, applies access class barring based on its call type.
Abstract:
Provided is a method and apparatus for handover data integrity of a mobile station in a wireless data network with a plurality of wireless network service areas. The method and apparatus includes initiation of a handover by a mobile station, identifying at least one target access network (ASN) for handover from a serving ASN that services wireless data communications with the mobile station. When at least one target ASN is identified, receiving a data integrity capability from the at least one target ASN. With the received data integrity capability, determining whether a direct data delivery mode is available as a data integrity mode based upon the received data integrity capability. When the direct data delivery mode is available as a data integrity mode, direct data delivery if performed with the data associated with the service flow from the serving ASN to the at least one target ASN. When the direct data delivery is accomplished, the mobile station handover is completed from the serving ASN to one of the target ASNs.
Abstract:
Device-side, translator functions may be authenticated by elements of a 5G core network before communications involving such functions are allowed to occur, or continue to occur.
Abstract:
One embodiment includes a method and apparatus for routing messages in a machine-type communication (MTC) architecture. The method includes receiving a request at a MTC-proxy residing at an egress of a network. The request includes an international mobile subscriber identity (IMSI) for which a destination is outside the network. The method further includes replacing, by the MTC-proxy, the IMSI in the request with an external identifier.
Abstract:
Communication systems including the evolved packet system can include machine type communication. Location device triggering can be a feature related to machine type communication (MTC) and can also be applied to other areas, such as public safety networks. In this feature, the network can initiate a trigger to the device, such as MTC devices, based on area information provided to the network operator. A method can include triggering a group of devices using a triggering request. The triggering request includes at least one of geographic information or a group identifier based on geographic information. The method can also include receiving the request and determining at least one serving node based on the geographic information when the triggering request geographic information. The method can further include sending a device trigger request including at least one of a tracking area identifier, a cell identifier, or the group identifier.