Abstract:
The use of UAV network cells may enable a wireless communication carrier to provide supplemental cellular network communication coverage to geographical areas. In some implementations, a first baseband processor of the UAV network cell may establish a first communication link with the ground network cell via a first antenna. The ground network cell may be connected to a core network of the wireless carrier network via a wired backhaul. Further, a second baseband processor of the UAV network cell may establish a second communication link with a user device via a second antenna. The first and second baseband processors may be communicatively coupled together. Accordingly, communication data may be routed between the user device and the core network through the first communication link and the second communication link.
Abstract:
Systems and methods are described herein for handling E911 communications within IMS networks, such as Voice over LTE (VoLTE) networks. In some embodiments, the systems and methods, via various communication nodes, handle or otherwise govern emergency calls within the VoLTE network, by sending an INVITE message from a sender node of the VoLTE network to a recipient node of the VoLTE network, and starting a retry timer at the sender node that is specific to handling E911 calls by the VoLTE network.
Abstract:
Systems and methods for adapting traditional landline telephones to make and receive Voice over Internet Protocol (VoIP) calls and other communications are described. In some embodiments, an adapter, adaptor, or other device or apparatus connects an IP router, such as a WiFi router or other access point, to a traditional landline telephone (e.g., a phone using dual-tone multi-frequency, or DTMF, signaling), enabling the traditional landline phone to make and/or receive VoIP calls.
Abstract:
Systems and methods for determining network congestion (e.g., reduced or low average user throughput with telecommunications networks, such as LTE networks, are described. The systems and methods described herein facilitate the identification and/or prediction of congestion at cell sites, which may enable telecommunications networks to prevent and/or remedy current or future occurrences of congestion at cell sites within their networks.
Abstract:
Managing Security Parameter Information (SPIs) to prevent race condition failures begins where a system negotiates SPIs along with associated expiration times, and re-negotiates new SPIs as necessary. The system prevents race conditions that would otherwise occur when both an old SPI and a new SPI are active at the same time. The system accomplishes this by managing the storage and deletion of old SPIs such that only active SPIs are stored on the system for use by a User Equipment (UE) or Proxy Call Session Control Function (P-CSCF).
Abstract:
A system for providing an IP-based wireless telecommunications device with access to an IP-based wireless telecommunications service provided by a carrier network includes an access point that sets up a radio link with the IP-based wireless telecommunications device and couples the IP-based wireless telecommunications device to the network. The system also includes a network controller in communication with the carrier network and the access point. The network controller is configured to receive data packets corresponding to the IP-based wireless telecommunications device at the access point. The network controller is also configured to accept/reject the provision of the IP-based wireless telecommunications service to the IP-based wireless telecommunications device based on an IP address or other unique identifier associated with the access point. In other examples, the system further includes a data store that associates IP addresses of access points (or other identifiers) with an indicator of a black or whitelisted status. Other features and systems are also disclosed.
Abstract:
A system and method of providing a secure data corridor are provided. A request is received from a subject for a data feed comprising one or more data elements. A use-case is identified and a security level is determined for the data feed. For each data element of the data feed, a security level and one or more security controls that are mapped to the corresponding data element, are determined. A data sensitivity rating is assigned to the use-case. Upon determining that a clearance of the subject is at or above the data sensitivity rating of the use-case, the subject is granted privilege to the data feed via the secure data corridor.
Abstract:
A mobile device, via a roaming platform, can switch IMSIs (e.g., Home IMSI-1, Roamer IMSI-2, etc.) depending on a location of the mobile device. Upon switching IMSIs, the roaming platform can forward the update location to an HLR of the home network and roaming network. If the MMSC on the home network receives an MMS message, the MMSC on the home network may query the HLR for a current location. From the query, if the message recipient is roaming, the MMSC on the home network may communicate with the MMSC on the roaming network to deliver the message. As a result, the roaming network can handle the routing of the message without a data session routed back through the home network.
Abstract:
Systems and methods for remote device customization and modification are provided. Various embodiments remove the need for a carrier to source multiple types of the same user equipment. In some embodiments, the user equipment can be customized upon activation using network communications. Historically, a carrier might have a variant of a phone for each mobile virtual network operator. However, management of the inventory and custom builds can be difficult and expensive. Some embodiments provide for a single global SKU and a single blank-slate device from an original equipment manufacturer. Carrier detection can be used when the phone is activated to create customized phone settings. For example, the look and feel can be updated to match preferences of a carrier (e.g., wallpaper, ringtones, default apps, etc.), corporate client, family, or another specified group of users.
Abstract:
A system for managing access point functionally and configuration includes a server that is coupled to a computer network and configured to communicate with an access point via the computer network. The access point is configured to couple a mobile device to the computer network by providing a wireless link between the mobile device and the access point. The access point is further configured to produce a status point regarding the access point and the server is configured to receive the status report from the access point following a trigger event at the access point. In other examples, the server is further configured to transmit a response message and/or a configuration file to the access point in response to the status report that is received at the server. Other features and systems are also disclosed.