Monitoring suspicious events in a cellular network
    22.
    发明授权
    Monitoring suspicious events in a cellular network 有权
    监控蜂窝网络中的可疑事件

    公开(公告)号:US09294924B2

    公开(公告)日:2016-03-22

    申请号:US14391793

    申请日:2012-04-13

    Abstract: Communication systems, including cellular networks, and the devices that are connected to them, can have both legitimate and illegitimate uses. Such communication systems, including systems that utilize, permit, or leverage machine-type-communications, may benefit from monitoring for suspicious events. A method can include receiving a monitoring request regarding a user equipment or a category of devices. The method can also include performing a monitoring activity regarding the user equipment or the category of devices with respect to at least one suspicious event. The method can further include responding to the monitoring request indicating whether monitoring will be performed for the user equipment or the category of devices.

    Abstract translation: 包括蜂窝网络在内的通信系统以及与它们相连接的设备可能具有合法和非法的用途。 包括利用,允许或利用机器类型通信的系统的这种通信系统可以受益于对可疑事件的监视。 一种方法可以包括接收关于用户设备或一类设备的监视请求。 该方法还可以包括关于至少一个可疑事件执行关于用户设备或设备类别的监视活动。 该方法还可以包括响应监视请求,指示是否将对用户设备或设备的类别执行监视。

    MONITORING SUSPICIOUS EVENTS IN A CELLULAR NETWORK
    23.
    发明申请
    MONITORING SUSPICIOUS EVENTS IN A CELLULAR NETWORK 有权
    监测细胞网络中的可疑活动

    公开(公告)号:US20150111533A1

    公开(公告)日:2015-04-23

    申请号:US14391793

    申请日:2012-04-13

    Abstract: Communication systems, including cellular networks, and the devices that are connected to them, can have both legitimate and illegitimate uses. Such communication systems, including systems that utilize, permit, or leverage machine-type-communications, may benefit from monitoring for suspicious events. A method can include receiving a monitoring request regarding a user equipment or a category of devices. The method can also include performing a monitoring activity regarding the user equipment or the category of devices with respect to at least one suspicious event. The method can further include responding to the monitoring request indicating whether monitoring will be performed for the user equipment or the category of devices.

    Abstract translation: 包括蜂窝网络在内的通信系统以及与它们相连接的设备可能具有合法和非法的用途。 包括利用,允许或利用机器类型通信的系统的这种通信系统可以受益于对可疑事件的监视。 一种方法可以包括接收关于用户设备或一类设备的监视请求。 该方法还可以包括关于至少一个可疑事件执行关于用户设备或设备类别的监视活动。 该方法还可以包括响应监视请求,指示是否将对用户设备或设备的类别执行监视。

    LOAD BALANCING IN A NETWORK AND BETWEEN NETWORKS
    24.
    发明申请
    LOAD BALANCING IN A NETWORK AND BETWEEN NETWORKS 审中-公开
    网络中的负载平衡和网络之间的负载平衡

    公开(公告)号:US20130337814A1

    公开(公告)日:2013-12-19

    申请号:US13495397

    申请日:2012-06-13

    CPC classification number: H04W48/20 H04W36/22

    Abstract: The specification and drawings present a new method, apparatus and software related product (e.g., a computer readable memory) for load balancing in a network (e.g., LTE wireless network) and between networks based on reselection priority and/or a level of congestion. The embodiments of the invention describe different options to move the UE to another cell which may be in the same or in a different RAT, to avoid congestion and/or overloading of the network. This will help to avoid subsequent RRC connection reject messages being sent to the UE from the congested cell.

    Abstract translation: 说明书和附图提出了一种用于基于重选优先级和/或拥塞级别的网络(例如,LTE无线网络)和网络之间的负载平衡的新方法,装置和软件相关产品(例如,计算机可读存储器)。 本发明的实施例描述了将UE移动到可以在相同或不同的RAT中的另一小区的不同选项,以避免网络的拥塞和/或超载。 这有助于避免从拥塞小区向UE发送后续的RRC连接拒绝消息。

    Handover data integrity in a wireless data network
    27.
    发明授权
    Handover data integrity in a wireless data network 有权
    在无线数据网络中切换数据完整性

    公开(公告)号:US08045525B1

    公开(公告)日:2011-10-25

    申请号:US12244506

    申请日:2008-10-02

    CPC classification number: H04W36/02 H04W36/14

    Abstract: Provided is a method and apparatus for handover data integrity of a mobile station in a wireless data network with a plurality of wireless network service areas. The method and apparatus includes initiation of a handover by a mobile station, identifying at least one target access network (ASN) for handover from a serving ASN that services wireless data communications with the mobile station. When at least one target ASN is identified, receiving a data integrity capability from the at least one target ASN. With the received data integrity capability, determining whether a direct data delivery mode is available as a data integrity mode based upon the received data integrity capability. When the direct data delivery mode is available as a data integrity mode, direct data delivery if performed with the data associated with the service flow from the serving ASN to the at least one target ASN. When the direct data delivery is accomplished, the mobile station handover is completed from the serving ASN to one of the target ASNs.

    Abstract translation: 提供了一种用于在具有多个无线网络服务区域的无线数据网络中切换移动站的数据完整性的方法和装置。 该方法和装置包括启动移动台的切换,识别至少一个目标接入网(ASN),用于从服务于移动台的无线数据通信的服务ASN进行切换。 当识别出至少一个目标ASN时,从至少一个目标ASN接收数据完整性能力。 利用所接收的数据完整性能力,基于所接收的数据完整性能力,确定直接数据传递模式是否可用作数据完整性模式。 当直接数据传递模式可用作数据完整性模式时,如果使用与从服务ASN到至少一个目标ASN的服务流相关联的数据执行直接数据传送。 当完成直接数据传送时,移动台切换从服务ASN完成到目标ASN之一。

    Machine-type communication proxy function

    公开(公告)号:US10917783B2

    公开(公告)日:2021-02-09

    申请号:US14371881

    申请日:2012-01-13

    Abstract: One embodiment includes a method and apparatus for routing messages in a machine-type communication (MTC) architecture. The method includes receiving a request at a MTC-proxy residing at an egress of a network. The request includes an international mobile subscriber identity (IMSI) for which a destination is outside the network. The method further includes replacing, by the MTC-proxy, the IMSI in the request with an external identifier.

    Method to trigger devices based on their location

    公开(公告)号:US10028082B2

    公开(公告)日:2018-07-17

    申请号:US14396145

    申请日:2012-04-23

    Abstract: Communication systems including the evolved packet system can include machine type communication. Location device triggering can be a feature related to machine type communication (MTC) and can also be applied to other areas, such as public safety networks. In this feature, the network can initiate a trigger to the device, such as MTC devices, based on area information provided to the network operator. A method can include triggering a group of devices using a triggering request. The triggering request includes at least one of geographic information or a group identifier based on geographic information. The method can also include receiving the request and determining at least one serving node based on the geographic information when the triggering request geographic information. The method can further include sending a device trigger request including at least one of a tracking area identifier, a cell identifier, or the group identifier.

Patent Agency Ranking