WIDE AREA NETWORK (WAN) BACKHAUL FOR WIRELESS RELAYS IN A DATA COMMUNICATION NETWORK

    公开(公告)号:US20180262969A1

    公开(公告)日:2018-09-13

    申请号:US15977093

    申请日:2018-05-11

    Inventor: Zheng Fang

    CPC classification number: H04W88/04 H04W72/00

    Abstract: A wireless relay to serve User Equipment (UE) over a wireless communication network and a wireline communication network. A wireless access point exchanges user signaling with the UE and exchanges S1-MME signaling with an Ethernet switch. The Ethernet switch exchanges the S1-MME signaling between the wireless access point and a Mobility Management Entity (MME) over a wireline communication network. The Ethernet switch exchanges S11 signaling between the MME and a Local Gateway (L-GW) over the wireline communication network. The L-GW exchanges the S11 signaling with the Ethernet switch. The wireless access point exchanges user data between the UE and the L-GW responsive to the S1-MME signaling. The L-GW exchanges the user data between the wireless access point and the Ethernet switch responsive to the S11 signaling. The Ethernet switch exchange the user data between the L-GW and a Packet Data Network Gateway (P-GW) over a wireless communication network.

    Token based content distribution to wireless communication devices

    公开(公告)号:US10069957B1

    公开(公告)日:2018-09-04

    申请号:US15784079

    申请日:2017-10-13

    Abstract: A mobile communication device. The device comprises a processor, a mobile application that requests content to be rendered, and a content presentation mediation application comprising logic provided by a primary software development kit (SDK) and logic provided by a secondary SDK embedded in the primary SDK. The content presentation mediation application receives a request by the primary SDK from the mobile application for content to be rendered, transmits a request by the primary SKD for content to a content bidding exchange, receives a winning content bid that comprises a content token by the primary SDK from the content bidding exchange, transmits a request by the secondary SDK for content comprising the content token to a content server, receives content by the secondary SDK from the content server, and renders the content received from the content server by the secondary SKD according to rendering logic provided by the secondary SDK.

    Controlling a high availability computing system

    公开(公告)号:US10069788B1

    公开(公告)日:2018-09-04

    申请号:US15084188

    申请日:2016-03-29

    Abstract: A method for providing high availability computing service. The method comprises monitoring a high availability computing service by monitoring applications, each monitoring application executing on a different computer system, one of the monitoring applications executing in a primary role, and the remaining monitoring applications executing in a secondary role. The method further comprises writing a last touched time value into a DNS resource record of a domain name system (DNS) server by the monitoring application executing in the primary role, reading the last touched time value in the DNS resource record of the DNS server by each of the monitoring applications executing in the secondary role. The method comprises determining by one of the monitoring applications executing in the secondary role to assume the primary role based on determining that the last touched time value in the DNS resource record of the DNS server exceeds a predetermined age threshold.

    Testing open mobile alliance server payload on an open mobile alliance client simulator

    公开(公告)号:US10055516B1

    公开(公告)日:2018-08-21

    申请号:US14318185

    申请日:2014-06-27

    CPC classification number: G06F11/00 G06F11/263 G06F11/3684

    Abstract: An Open Mobile Alliance client mobile communication device simulator. A computer system comprising at least one processor and a memory, an application, when executed by the processor, sets up a configuration file for a simulated device, retrieves test conditions for device capabilities to be configured on the device from a data store, builds an expected test result file in an Open Mobile Alliance tree structure with tree node set up with device settings and leaf node with device setting values, sends a request to the Open Mobile Alliance Device Management server for initiating the device configuration, receives an extensible markup language payload from the Open Mobile Alliance Device Management server for a mobile communication device, processes contents of the extensible markup language payload, and builds a test file in the form of an Open Mobile Alliance tree structure wherein the contents of the test file resides in memory contiguously.

    Long term evolution scheduler to mitigate interference

    公开(公告)号:US10039116B1

    公开(公告)日:2018-07-31

    申请号:US14466590

    申请日:2014-08-22

    CPC classification number: H04W72/082 H04L5/0044 H04L5/0069 H04L5/0073

    Abstract: A computer-implemented method, system, and computer-readable storage media for scheduling physical resource blocks (PRBs) comprises a communication radio access network (RAN) base station with a scheduler that assigns one or more PRBs to a communication channel of a user device. The PRBs can be prioritized according to a radio frequency (rf) interference level across the contiguous band of PRBs. The rf interference level of a communication channel of the user device can be monitored by the scheduler. The scheduler assigns one or more of the prioritized PRBs according to the rf interference level of the PRBs and according to the rf interference level of the communication channel of the user device.

    Handoff of virtual machines based on security requirements

    公开(公告)号:US10019281B2

    公开(公告)日:2018-07-10

    申请号:US15184046

    申请日:2016-06-16

    Abstract: A computer system transitions a virtual machine from a host computer to a target computer having a security key. The host computer transfers a security phrase to the target computer. The target computer applies the security key to the security phrase to generate a security response. That target computer transfers the security response to the host computer. The host computer determines whether the target computer can support the virtual machine based on the security response from the target computer. If the target computer is capable of supporting the virtual machine, then the host computer initiates a transition of the virtual machine from the host computer to the target computer. The determination of whether the target computer can support the virtual machine may be further based on resource availability, time-slice availability, and the other virtual machines executing on the target computer.

Patent Agency Ranking