Abstract:
Methods, systems, and devices are disclosed for wireless communication over unlicensed spectrum using a femto cell. In an implementation of the system, a dualmode mobile device adapted to communicate over a licensed frequency spectrum and over an unlicensed frequency spectrum is provided. The dual-mode mobile device detects the presence of a femto cell communicating over an unlicensed spectrum and in response, initiates a communication connection with the unlicensed spectrum femto cell. Subsequently, the connection over a license spectrum may be disconnected upon successful establishment of the connection over the unlicensed spectrum. In yet another implementation, a femto cell communicating over an unlicensed spectrum may be adapted to communicate with a mobile switching center and/or with a voice over IP switch.
Abstract:
Novel tools and techniques that can provide wireless service for multiple service providers from a single, multi-service provider wireless access point. In an aspect, a multi-service provider wireless access point might communicate with a plurality of wireless devices, each associated with a different wireless carrier, and route communications from each device to the appropriate carrier (and/or, similarly, transmit communications from each carrier to the appropriate wireless device). In this way, for example, a single wireless access point could provide service to cellphones of subscribers of a number of different carriers. Such a wireless access point can provide enhanced efficiency and reduced cost, along with the ability to provide higher service for a number of wireless carriers.
Abstract:
Disclosed embodiments include a multi-network gateway system providing one or more third-party telecommunications service providers access to a third-party network interface across an otherwise proprietary access network maintained by a primary telecommunications service provider. Specifically, one embodiment includes an access network provided by a primary telecommunications service provider in communication with a multi-network access gateway. One subset of telecommunications information conveyed across the access network is provided to a customer of the primary telecommunications service provider. Another subset of telecommunications information conveyed across the access network is provided to a third-party network interface and to a third-party network, for the use of the third-party telecommunications service provider.
Abstract:
Novel tools and techniques that can provide wireless service for multiple service providers from a single, multi-service provider wireless access point. In an aspect, a multi-service provider wireless access point might communicate with a plurality of wireless devices, each associated with a different wireless carrier, and route communications from each device to the appropriate carrier (and/or, similarly, transmit communications from each carrier to the appropriate wireless device). In this way, for example, a single wireless access point could provide service to cellphones of subscribers of a number of different carriers. Such a wireless access point can provide enhanced efficiency and reduced cost, along with the ability to provide higher service for a number of wireless carriers.
Abstract:
Novel tools and techniques that can provide wireless service for multiple service providers from a single, multi-service provider wireless access point. In an aspect, a multi-service provider wireless access point might communicate with a plurality of wireless devices, each associated with a different wireless carrier, and route communications from each device to the appropriate carrier (and/or, similarly, transmit communications from each carrier to the appropriate wireless device). In this way, for example, a single wireless access point could provide service to cellphones of subscribers of a number of different carriers. Such a wireless access point can provide enhanced efficiency and reduced cost, along with the ability to provide higher service for a number of wireless carriers.
Abstract:
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor or container communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
Abstract:
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor or container communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
Abstract:
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor or container communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
Abstract:
A system for noise profile generation includes a customer gateway communicatively coupled to one or more end devices over a communication medium, at least one noise information node communicatively coupled to the customer gateway and programmed to extract noise information present on a communication path from the customer gateway to at least one of the one or more end devices, a noise profile database storing one or more noise profiles, and a noise profile generator. The noise profile generator includes at least one processor and non-transitory computer readable media having a set of instructions executable by the at least one processor to retrieve the extracted noise information associated with the communication path, determine whether the at least one noise characteristic of the extracted noise information matches with one or more noise profiles and identify at least one noise source on the communication path.
Abstract:
Novel tools and techniques might provide for implementing application, service, and/or content access control. Based at least in part on a consumer's choice of applications, services, content, and/or content providers—particular in exchange for a subsidy on content and/or network access fees provided to the consumer by chosen content providers—, a computing system may determine whether access to applications, services, and/or content not associated with the chosen content providers (“other content”) should be allowed or restricted. If restricted, the computing system might utilize various network access techniques and/or technologies to block the consumer's access to the other content, to allow access to the other content on a charge per access basis, or to allow access to the other content at reduced network access speeds. In some embodiments, an access provider (e.g., an Internet service provider, etc.) might perform both determination and implementation of content access and restriction.